Saturday, August 31, 2019

An Effective Counsellor Essay

Counsellor’s should continually assess their own feelings and needs to maintain an appropriate relationship with the client. There are issues that a counsellor should be aware of when doing a self-assessment; The counsellor should be aware of when they feel uncomfortable with a client or a topic being discussed. The counsellor must choose to either be honest with the discomfort of a situation or topic, or they may refer the client to another counsellor. The counsellor should be aware of their own avoidance strategies. The counsellor must be able to recognize when they avoid certain topics, or allow distractions and then find an effective way to facilitate help appropriately. The counsellor should be able to recognize when they are trying to control a situation. It is important that the counsellor engage in responsive listening so that they’re not controlling the communication process. The counsellor must remind themselves continuously that any issue being discussed has many perspectives and that theirs may be different, from that of the clients. It is important not to express whether the clients view is right or wrong. The counsellor must avoid being omnipotent. It is not the counsellors job to make the client better. It is the counsellor’s job to help facilitate the client in addressing and resolving the issues. It is also important that the counsellor identifies and responds to positive feelings, and that they don’t just focus on negative ones. This provides balance for the client and allows them to amplify positive strengths in their lives. Lastly, the counsellor must keep in mind to never ask a question, or discuss a 1 topic that you would not be able to discuss in a similar situation. These issues should always be addressed when a Counsellor is engaging in a self-assessment. By completing a self-assessment I was able to address my values, skills, attributes and my interests. I identified that while I am not a judgemental person, I do hold values that if not addressed prior to a situation could cause myself to become close-minded and that would ultimately put a barrier up in my ability to help the client. I also was able to identify how I can use my skills and attributes to counsel my clients in a positive manner. I have identified that I try to find a positive in all situations but I don’t ever be-little the seriousness of the topic at hand. With a self-assessment I am able to recognize when and how to communicate appropriately with a client. The individuals I support will be able to discuss issues with me and feel comfortable knowing that I don’t judge or assume things about them. Both my verbal and non-verbal skills will make this evident to the client. As a registered Developmental Service Worker I could be taking on a role as a counsellor where self-assessment is crucial as it is important to be able to identify when or if I am not dealing with a situation or topic appropriately. I will use the skill of self-assessment in any other role whether that be taking on a position as a Personal Support Worker or working in a group home. It is important that I am able to identify my strengths and weaknesses when it comes to helping a client and that I am able to do so in a way that is prudent. It is also important to continually perform a self-assessment as situations change or evolve. A counsellor who understands how they communicate and who has self-awareness is likely to be more effective in helping the client, then those who are not aware of these issues. Counsellors who are able to identify aspects such as if a topic being discussed makes them feel uncomfortable, if the topic goes against their own values or beliefs, if it is causing different emotions in themselves and why that may be, if they are projecting these feelings and whether or not they are really listening to the 2 client. Continual self-awareness is crucial to the development of the counsellor and their ability to help the client.

Friday, August 30, 2019

Coconut Tree Essay

The coconut tree as a â€Å"tree of life† is characteristically a food supplier as this tree provides fruit and is well-known to be devoid of any anti-nutrient factors and is known as a whole food with 5,000 years of recorded use in food preparation with health benefits.The fruit is edible at any stage of maturity. It provides not only a solid food but a large volume of very safe and healthy drinking water-based juice. The fruit of the coconut palm is the main source of many food products such as coconut milk/cream, desiccated coconut, coconut chip, coconut water, nata de coco, coconut oil, copra, etc. Apart from these, the unopened inflorescence can produce coconut sap or toddy (tuba) which can be processed into high value and nutritious food products. Coconut sap sugar, considered to be one of the best natural sweeteners, is truly a perfect and healthier substitute for artificial sweeteners because it is not a product of chemical laboratories, not an artificial sweetener and not a by-product of sugar cane, not brown sugar nor muscuvado sugar. Coco sugar is good for both diabetic and non-diabetic consumers because it does not induce high blood sugar because it has a Low Glycemic index. Glycemic index (GI) is a numerical system of measuring how much of a rise in circulating blood sugar a carbohydrate triggers-the higher the number, the greater blood sugar response. So a low GI food will cause a small rise, while a high GI food will trigger the opposite. GI is about the quality of the carbohydrates, not the quantity. Coco sugar can be good for weigh maintenance. (Dr. Trinidad P. Trinidad, Scientist II of the Food and Nutrition Research Institute – Department of Science and Technology.) It is also rich in various amino acids, vitamins and minerals that are essential for the human body to benefit.

Thursday, August 29, 2019

Green Thinking and Green Product Design Essay Example | Topics and Well Written Essays - 1000 words - 1

Green Thinking and Green Product Design - Essay Example In order to make this clear, the discussion will involve the study of America as the representatives of consumerism, while the developed Asian countries as the representatives of technology. The developed Asian countries in question will include China and Japan since their development has mainly relied on the advancement in technology. The discussion will take the economic downturn of West, represented by America, as a result of consumerism while considering the rise of Asian countries on technology. The West consumer culture is a culture which advocates for the satisfaction of the consumers’ desires rather than their actual needs meaning. The chapter will need further investigation on how consumerism has actually affected the West Economy, leading to the economic downturn; and how technological advancement in China has lead to a possibility of the country outcompeting USA in terms of economic development. The western countries, particularly America has heavily relied on consumption rather than technological advancement. The countries have not considered shifting to a service economy with the main fruit of consumerism being materialism and the ultimate individualism. This is a weak point in illustrating the economic downturn of the West countries. Schumacher asserts, â€Å"Wisdom demands a new orientation of science and technology towards the organic, the gentle, the non-violent, the elegant and beautiful.(1973:20). It is true that the early technological development such as paper making, woodblock and movable type printing contributed to the growth of China implying that it rose as a scientific nation oriented with technology. Further, the chapter would also deal with the study of how the green thinking is reflected in the government’s activities. This is helpful to determine whether the government is in a position of accommodating the emerging technology in their everyday operation. Particularly, the government has been on the verge of improving its strategies of development. The discussion will look into the ways in which the government has tried putting up with the advancement in technology.  

Wednesday, August 28, 2019

Business Law Essay Example | Topics and Well Written Essays - 3250 words - 2

Business Law - Essay Example This paper shall consider different authorities on the subject matter in order to arrive at a scholarly appraisal of the subject matter. According to section 181 of the Corporations Act, â€Å"a director or other officer of a corporation must exercise their power and discharge their duties in good faith in the best interest of the corporation and for a proper use†. Violations of this provision make a director civilly and criminally liable. For directors who act dishonestly and recklessly, criminal liability may be forthcoming (Organisation for Economic Co-operation and Development, 1997). The directors’ duty is to avoid conflicts of duty and interest and therefore, he must not allow conflicts of interest to compromise his position in the company. Sections 191-195 of the Corporations Act set forth obligations for directors to not allow conflicts of interest to arise from his actions. Based on these provisions, directors are therefore called on to notify the board of directors when there are instances of personal interest which have a bearing on the company activities and affairs (Panoramic Resources, 200 8). Section 195 of the Corporations Law specifies that a director of a public company cannot be present during a voting or board meeting where the members are deliberating an issue where he is an essential person of interest. He may however be present if the other directors pass a resolution allowing him to be present and to vote; and if the ASIC orders a specific order on the issue (Corporations Law, 2001). The responsibilities in the section cover board meetings, and meetings of committees of the board. This is to be applied even if the committee would not have any bearing on the affairs of the company. Committees under advisory capacities are therefore part of the prohibition (Tomasic, et.al., 2002). In evaluating the terms under which

Tuesday, August 27, 2019

Price and promoting Starbucks Essay Example | Topics and Well Written Essays - 500 words

Price and promoting Starbucks - Essay Example e growth in a market with price fluctuations; and upholds Starbucks commitment to purchase high-quality product in a socially responsible manner† (9). Starbucks likewise implements differentiated pricing strategies depending on diverse target markets. Smith disclosed that Starbucks pricing strategy at the lower end of the market as the â€Å"mark-to-market pricing strategy. Basic coffee at Starbucks may be somewhat more expensive than the watered down swill they call coffee at a low end diner, but it is priced competitively within its peer category† (Smith par. 5). On the other hand, at the higher end of the target market, Starbucks implements that â€Å"differentiated-value pricing strategy. In this category, the competition is weaker and Starbucks does have stronger pricing power. They can price in proportion to the value customers place on having a high quality and highly customized product† (Smith par. 7). promotion (Tewell, Odom and Snider 18). The Starbucks Back to Basics article written by NewMyer, et al. has emphasized the organization as implementing a pull promotional strategy; meaning, they promote directly to the customers (NewMyer, Fox and Kelsay 3). Carmichael emphasized that since bulk of their customers return to get the next cup of coffee or purchase some food items at Starbucks, â€Å"company executives feel that improving the in-store customer experience is a much more effective means of advertising than via Starbucks commercials. Starbucks encourages the promotion of their stores as a ‘third home’, providing comfortable chairs for customers to relax and spend time in, playing music and providing outlets for people to plug their laptops into† (Carmichael par. 4). However, Starbucks has also acknowledged that using social media as a means to promote various products and activities. As reported by Noff, â€Å"overall Starbucks’s social media strategy integrates many different elements into the mix and combined together, these elements

Monday, August 26, 2019

Philosophy of Death Comparing Dualism and Physicalism Essay

Philosophy of Death Comparing Dualism and Physicalism - Essay Example This research discusses that  Descartes and Plato championed the concepts of dualism. The first argument, which looks at the opposites states that the dead originated from the living and therefore the living, should also arise from those who died. This argument states that the process of dead helps in liberating the soul. The second argument of dualism is based on the recollection.This essay declares that  the first argument on physicalism ascribes that humans are physical in entirety. Therefore, when death of the physical body takes place, the process does not provide any alternative means of sustaining our consciousness. The second perspective considers the soul as dependent on the body, meaning it cannot survive on its own. Contrary to the dualistic perspective, the soul and the body does not survive death. The physicalism argument holds more water because no one can provide evidence that the soul may not perish. Besides, the concept of separating the two (soul and body) raise s questions and many concerns. Therefore, I think physicalism concepts raises genuine concerns on the argument by both Descartes and Plato, who generated many gaps in their argument. The counter argument holds more water. The death of a friend is painful for the relatives and family. Therefore studying it helps a person to prepare emotionally and spiritually. It also draws interesting discussions that opens the understanding on the death.

Sunday, August 25, 2019

Political independence of FED Essay Example | Topics and Well Written Essays - 500 words

Political independence of FED - Essay Example This has been contributed by the fact that politicians like manipulating and controlling these institutions for their own gains. In his lectures, Bernanke (2012) argued that central bank should be allowed to make independent decisions without political interference in order to have sound decisions. Studies have documented that political interference in the financial sector not only hinder how these institutions operate, but also interfere with how regulators enforce regulations. Financial regulators are, therefore, unable to take actions on banks that do not follow the laid down rules and regulations. When political interference is evident in the financial regulatory bodies, recognition of severity of crisis is delayed, intervention needed is also slowed and consequently raise the cost of the crisis to tax payers. Shielding financial sector from political interference helps to improve the quality of regulation and supervision. This helps in preventing financial crisis. Financial regu lators have two main purposes. First, they are mandated to protect the consumer. Second, they are also mandated to maintaining financial stability of financial institutions. When political interferences come in, these two roles of the regulator are abandoned. For instance, in 1997, political interference in the regulatory bodies of East Asia led to postponement of recognition of severity of crisis, which led to increased crisis.

Managing Information Technology Globally (I need someone with a good Essay

Managing Information Technology Globally (I need someone with a good backgroud about IT and Database for this case analysis) - Essay Example Dell was the first in its competitors to think of online business and though leads best. It offers customer service for configuring dell products and with technical support view Internet same as it was once on telephones which reduces its cost price and increased its revenues. Dell successfully made a network of not only with customers but also with distributors and suppliers through e-commerce. Its sale automated functioning enhances the business strategies and Dell on its e-commerce establishment starts serving with e-business solution. E-business solutions were to offer customer the solution for their business by converting their business in virtual world as did by Dell. Though, Dell earned its revenues, more with the selling hardware devices and giving online customer services, in addition with, providing e-solutions to small organizations, incorporation with other software companies. 2. Characterize the distribution of decision-making responsibility at Zara, when it comes to how Zara's products are designed, allocated, and distributed How does this pattern of decision-making contrast with decision-making in traditional, hierarchical organizations (IT at Zera) Zara is responsible for its products for sale, and though developed a high-tech e-commerce site for its online business.

Saturday, August 24, 2019

Chu Essay Example | Topics and Well Written Essays - 250 words

Chu - Essay Example The school has remained to be one of the altenatives in the 11th century as a Confuniacism mainstream (Kim, 2000). Consequently, the philosophy need to be recommended because of the inherent interest that it holds. The philosophy focuses on the social and moral problems which are perfect guidelines for leaders of Chu. The natural knowledge of philosophy is of great value to the leaders since they have a key role in investigation of things.Additionally, the philosophy are weighted heavily on the social and moral concerns with the objects and knowledge failing to be excluded form the ‘wu’ conception (Kim, 2000). Closely related to the philosophical aspect is the belief that the moral order underlaid the natural world and offered a cosmic basis for the morality. This has been recognized by the founders of Neo-Confucian moral philosophy. That is the reason why the shift is considered as the key achievement since the philosophy exists without the help of cultural tradition. The main outcome of the philosophy was a rising importance of moral cultivation in comparison with cultural accompl ishments and

Friday, August 23, 2019

Glomerular basement membrane diseases Essay Example | Topics and Well Written Essays - 1250 words

Glomerular basement membrane diseases - Essay Example NORMAL GBM. LEFT - a single glomerulus. There are one million of these in each kidney. RIGHT - a close up of the GBM (G) around part of one tiny blood vessel in a glomerulus (red circle in left hand diagram) Alport syndrome is the second most common inherited cause of renal failure (Turner, 2006). The disorder involves basement membranes of the kidneys and sometimes even the cochlea and the eye (Devarajan, 2008). It occurs as a result of mutations in type IV collagen genes. There are different modes of inheritance of this disease. The commonest is X-linked which is seen in 80% of the cases. Autosomal recessive inheritance is seen in 15 % of the cases and autosomal dominant inheritance is noted in 5% of the patients with Alport syndrome. Presence of 3 of the following 4 clinical presentation is necessary to arrive at a diagnosis of Alport syndrome (Devarajan, 2008). 50-80% of patients with X-linked Alport syndrome have mutations in the COL4A5 gene. Some may even have mutations of COL4A6 along with COL4A5 gene (Devarajan, 2008). There are several hundred mutations of this gene which account for most cases of X-linked Alport syndrome. These mutations include missense mutations, splice-site mutations, and small deletions. The most common mutation is substitution for glycine in the collagenous domain of the a5 (IV) chain by a bulky amino acid. This mutation results in protein-folding abnormalities. Other mutations result in interchain association and formation of the collagen network due to premature termination of protein translation and loss of the carboxy-terminal NC1 domain. Patients with autosomal recessive and autosomal dominant Alport syndrome have mutations in COL4A3 and COL4A4 (Devarajan, 2008). Most patients of Alport syndrome present during the first 2 decades of life with persistent microscopic hematuria and episodic gross hematuria. The common X-linked form of Alport syndrome leading to ESRD predominantly affects male

Thursday, August 22, 2019

One Day on the River Essay Example for Free

One Day on the River Essay Elijah has grander and more dangerous dreams. Having been largely acculturated by a residential school upbringing before escaping into the forest to live with Xavier and Niska, he has acquired the dubious skills of public relations and boastfulness as much as the crafts of the hunter. His English, learned from the nuns, is impeccable, and he makes his mark among the men in the trenches as much by the flash of his storytelling as by his murderous midnight prowls in no man’s land. Gradually Elijah becomes imprisoned by two great obsessions: a need for morphine, whose use is rampant up and down the lines, and an insatiable hunger for killing. Some French soldiers suggest that if he really wants to gain respect for all his kills, he should scalp his victims as evidence. He decides to do so, much to Xavier’s disgust. In counterpoint to the exploits of Xavier and Elijah, Boyden interweaves the story of Niska, told as she paddles her wounded nephew back home after the war is over. Niska is part of the sad but admirable remnant of traditional natives who refused to enter the reserves in the 19th century, choosing instead to live by their wits and traditional teachings in the woods. Subject to what modern medicine would call epileptic seizures, Niska is deemed by her tribe to have inherited her father’s skills as a shaman and a windigo-killer. Since windigos manifest themselves in humans who have practiced cannibalism, getting rid of them involves what white society would call murder, and indeed Niska’s father was executed as a murderer by the white courts. The constant crossing of the moral lines between the worldviews of native and white society is one of the many strengths of this fascinating novel. At one point, hunkered down in his sniper’s nest, Xavier indulges himself (and the reader) in a contemplation on the number three, which he sees as an obsession of his white commanders. There’s the front line, the support line, and the reserve line, for starters. There’s the infantry, the cavalry, and the artillery. Off the battlefield, there’s food, then rest, then women. In church, there’s the Father, Son, and Holy Ghost. Not to mention the superstition about lighting three cigarettes with one match, a prime metaphor for courting danger in the Great War. But then Xavier suddenly remembers Niska’s traditional teaching, that those who are dying must walk the three-day road to death, and he wonders â€Å"if we share something, some magic. Maybe it will help me get through all this.† The real war hero, Peggy, makes a brief cameo appearance in the novel, which may not have been a wise choice on the author’s part. The characters of Xavier and Niska and, to a slightly lesser extent, Elijah are full to the brim with life – they’re quite satisfying and believable as they are, and need no further stamp of authentication.

Wednesday, August 21, 2019

Detection of Apoptosing Retinal Cells in Glaucoma Diagnosis

Detection of Apoptosing Retinal Cells in Glaucoma Diagnosis Study Proposal Investigating a possible correlation between DARC (Detection of Apoptosing Retinal Cells) and Psychophysical methods (e.g. Contrast Sensitivity, Colour Vision, LogMAR Visual Acuity in different contrast levels) in Glaucoma diagnosis and assessing treatment efficacy. Background Glaucoma is a neurodegenerative eye disease and one of the major causes offor blindness in developed countries. It is a chronic degenerative disease of the optic nerve, which has been characterised by a progressive loss of retinal ganglion cells (RGCs) and their axons (Sommer, 1989). Glaucoma is a collective term for a complex group of conditions that cause progressive optic neuropathy, which may result in irreversible loss of visual function.[E1] Therefore, assessment of visual function is essential in diagnosis and treatment of Glaucoma. Although several diagnostic tools have been developed to detect and monitor this disease, none is sensitive enough to identify it at a preclinical stage or to distinguish small changes in retinal health in a relatively short periods (Normando et al., 2013) In Glaucoma, irreversible visual changes may occur before neuronal damages are discovered. The detection of glaucomatous structural damage might happen before, during and after glaucomatous visual field defects findings (Kass et al., 2002). Clinical assessment of visual function in parafoveal regions is mostly dependent on the examination of visual fields by using standard perimetry (Rauscher et al., 2013). Perimetry plots often do not represent full extent of visual loss as conventional field assessments only examine a single feature at the location tested, which usually is the differential light threshold. Although, outcome for absolute thresholds of flashed stimuli is useful but frequently these findings are the final component of visual function that are affected in disease. It should be taken into consideration that visual field defects cannot be detected until 20-40% of retinal ganglion cells (RGCs) which are the key cells associated with the development of irreversible blindne ss in glaucoma, have already been lost (Guo and Cordeiro, 2008). In many of the eye disease, sensitivity for detection of fine spatial detail and colour signals can be damaged prior to visual field loss (Barbur and Konstantakopoulou, 2012). In studies such as (Rauscher et al., 2013) colour thresholds revealed the highest sensitivity to early glaucomatous changes and Red/Green losses tended to happen before perimetric loss of binocular visual field sensitivity. It should be noted that simple measures of perimetriy are not sensitive enough to detect selective loss of specific visual attributes and therefore fail to show a strong correlation with Quality Of Life (QOL) measures. Moreover, the ability to differentiate contrast plays an important role in patients everyday vision and quality of life. Contrast sensitivity testing can identify many ocular diseases and provides additional useful clinical information to standard visual acuity assessments (Richman et al., 2013). Additionally, a new noninvasive real-time imaging technology, has recently been developed which is named DARC (Detection of Apoptosing Retinal Cells). Apoptosis is a form of programmed cell death that is involved in both pathological and physiological processes throughout the body. Although, Apoptosis plays a vital role in normal development and ageing but deregulation of this process is responsible for many disease including neurodegenerative disorders. Therefore, in vivo imaging of apoptosis may prove a useful tool for both laboratory research and clinical diagnostics (Galvao et al., 2013) DARC visualizes single RGC, which undergo apoptosis, as the earliest sign of glaucoma. Use of fluorescent annexin A5 is one of the most widely accepted in vitro assay for apoptotic cells (Normando et al., 2013). DARC is a non-radioactive approach that can evaluate the efficiency of the treatments by monitoring RGC apoptosis in the same living eye over time by using fluorescently labeled annexin 5 and confocal laser scanning ophthalmoscopy. DARC uses unique optical properties of the eye for direct microscopic observation of cellular processes in the retina. DARC has been used to assess different neuroprotective therapies in glaucoma-related animal models and demonstrated to be a useful tool in screening neuroprotective strategies. As DARC directly evaluates the RGC death process, it will potentially provide a meaningful clinical end point. DARC can be used in tracking disease, assessing treatment efficacy and may lead to the early identification of patients with glaucoma (Cordeiro et al., 2010; Cordeiro et al., 2011; Guo and Cordeiro, 2008; Normando et al., 2013). DARC uses a novel automated algorithm, which enables accurate quantification of apoptosing RGCs and is highly comparable to manual counting. This appears to minimise operator-bias and at the same time being both fast and reproducible. Quantification of apoptosing retinal cells may prove to be a valuable method, particularly in relation to translation in the clinic now that a Phase I clinical trial of DARC in glaucoma patients is due to start shortly (Bizrah et al., 2014). 3 year plan 1st Year Ethics approval Pre-Screening patients with glaucoma for suitability using LogMAR visual acuity in low contrast level and any available visual field findings 2nd Year Recruiting candidates Study both psychophysical methods (Contrast sensitivity and colour vision) and DARC 3RD Year Data analyzing Writing up Expecting outcome Better evaluation of sensation in patients with glaucoma Better evaluation of Quality Of Life (QOL) Better evaluation of the most suitable method for early diagnostic and follow-up treatments in glaucoma Possible diagnostic and follow-up applications of the selected methods for other neurodegenerative disease such as Alzheimer and Parkinson References Barbur JL, Konstantakopoulou E (2012) Changes in color vision with decreasing light level: separating the effects of normal aging from disease. J Opt Soc Am A Opt Image Sci Vis 29:A27–A35 Bizrah, M., S. C. Dakin, L. Guo, F. Rahman, M. Parnell, E. Normando, S. Nizari, B. Davis, A. Younis, and M. F. Cordeiro, 2014, A semi-automated technique for labeling and counting of apoptosing retinal cells: BMC Bioinformatics, v. 15, p. 169. Cordeiro, M. F., L. Guo, K. M. Coxon, J. Duggan, S. Nizari, E. M. Normando, S. L. Sensi, A. M. Sillito, F. W. Fitzke, T. E. Salt, and S. E. Moss, 2010, Imaging multiple phases of neurodegeneration: a novel approach to assessing cell death in vivo: Cell Death Dis, v. 1, p. e3. Cordeiro, M. F., C. Migdal, P. Bloom, F. W. Fitzke, and S. E. Moss, 2011, Imaging apoptosis in the eye: Eye (Lond), v. 25, p. 545-53. Galvao, J., B. M. Davis, and M. F. Cordeiro, 2013, In vivo imaging of retinal ganglion cell apoptosis: Curr Opin Pharmacol, v. 13, p. 123-7. Guo, L., and M. F. Cordeiro, 2008, Assessment of neuroprotection in the retina with DARC: Prog Brain Res, v. 173, p. 437-50. Kass, M. A., D. K. Heuer, E. J. Higginbotham, C. A. Johnson, J. L. Keltner, J. P. Miller, R. K. Parrish, M. R. Wilson, and M. O. Gordon, 2002, The Ocular Hypertension Treatment Study: a randomized trial determines that topical ocular hypotensive medication delays or prevents the onset of primary open-angle glaucoma: Arch Ophthalmol, v. 120, p. 701-13; discussion 829-30. Lek, J. J., A. J. Vingrys, and A. M. McKendrick, 2014, Rapid contrast adaptation in glaucoma and in aging: Invest Ophthalmol Vis Sci, v. 55, p. 3171-8. Normando, E. M., L. A. Turner, and M. F. Cordeiro, 2013, The potential of annexin-labelling for the diagnosis and follow-up of glaucoma: Cell Tissue Res, v. 353, p. 279-85. Rauscher, F. G., C. M. Chisholm, D. F. Edgar, and J. L. Barbur, 2013, Assessment of novel binocular colour, motion and contrast tests in glaucoma: Cell Tissue Res, v. 353, p. 297-310. Richman, J., G. L. Spaeth, and B. Wirostko, 2013, Contrast sensitivity basics and a critique of currently available tests: J Cataract Refract Surg, v. 39, p. 1100-6. Sommer, A., 1989, Intraocular pressure and glaucoma: Am J Ophthalmol, v. 107, p. 186-8. [E1]it looks too similar to the sentence in the article below. Could you please rephrase? http://openaccess.city.ac.uk/3294/1/Author version Edgar DF paper 1432-0878 15 03 14.pdf

Tuesday, August 20, 2019

System of cyber warfare

System of cyber warfare Introduction: Could hackers get into the main computer systems that run fundamental elements of the most worlds infrastructure informations? Today its not only possible, but all of that has actually happened before, and plus a lot more we dont even know about. Many believe that cyber war experts could be used to launch a major attack on the nations infrastructure. According to the researchers, other noticeable trends will include greater interest and awareness in continuing cyber war activities going on in the international area, and greater than before use of shade based defenses to help organizations share intelligence and stay ahead of attacks. The country of Chinas hacking and cyber combat capabilities includes that China is likely using its growing computer system operation capability to maintain intelligence gathering against the United States government and industry by conducting a extensive period, complicated computer system operation.[1] I think there are a lot of evidence that shows Chi nese government is using hacking techniques to embezzle United States government and diligence secrets. Also, many of the attacks have come from Russia. Numerous of the cyber attacks are being hosted by Russian state computer main servers. Im going to argue that the water works, electrical power, internet, cyberspace, defense, telecommunications, and transportation is highly vulnerable to cyber attack. There are possible threats to computing facility and the information contained that it is in are to determine the security measurements that should be investigated plus both external and internal threats.[2] Cyber threats can be grouped into deliberate threats, accidental threats, and natural disasters such as water and fire. It is because of natural disasters have typically been very critical and likewise expensive, there are computing main centers security budget is geared to prevent and recover from a huge devastating natural disasters.[3] One of the reason why water resource will be in great damage is because due to fire sprinklers. Thousands of firefighters can be more damaging than the fire itself. Since the main computer circuits and magnetic storage media are not even near the fire so it may be damaged too. Not only that but the other sources of water damage may come from many tropical storms such as floods. It will cause danger activities of the firefighter on higher floors, leakage in the main computers water cooling system, sewers backing, broken pipes, and many more. But on the other hand, there are other natural calamities that may occur to computing centers include sandblasting near air conditioning intakes, gas or chemicals, lightning, war, aircraft crashes, tornadoes, earthquakes, and explosions.[4] The sprinkler systems are often the second line of defense. If a sprinkler system is to be used, there should be at least a delay between the alarm and the water so that the equipment can be powered down and the fire can be put out by hand held equipment. Energy Electrical Power and Grids: Second reason why there is a greater chance on cyber attack is the electrical power. There are various sectors of critical infrastructure sectors have unique types of location, structure, and facilities. Consequently, all the information that is potentially responsive will vary by sites, by sector and among similar sites in various locations. Energy sectors such as electrical power systems are very complex networks composed of the transmission, generation, control, and support networks. In which case, they will work together to supply electricity to end users. But overall, the national electrical power grid is an enormously organized and active system. There is numerous major electrical power generation sources that are petroleum, gas, hydroelectric, nuclear, and coal.[5] They are the control networks that are information control points that regular the overall system operations. Also, they support the networks that provide resources and information that the other networks need to op erate. I think that there are possible vulnerabilities of the energy sector that may vary drastically with regard to possible contact within and outside its systems. Vulnerabilities exist in terms of both objective and cyber attacks. In general, the targets of potential highest value are those located in populated country or urban areas where attacks will generate the maximum prospective impact In addition, the energy sector facilities that contain hazardous materials, of which there are many, could also prove vulnerable target.[6] Many of these targets meeting with great criteria should be considered highly vulnerable. The Internet: Information system like the Internet are very defenseless to cyber attack, as evidenced by the quickly rising number of system intrusions. Well the focus here is on the criminal violators, including terrorists who seek to attack and destroy elements of society. A different, and potentially more severe, threat is where the attacker is a sovereign state. That class of attack, constituting what is called information warfare, is beyond the scope of the discussion here and of the Draft International Convention.[7] The Internet provides the basis for the global information infrastructure and it gradually more provides connectivity for a wide range of other infrastructures. The Internet is governed through the voluntary actions of the technical people who expand and extend its functionality. Many internet are basically running on the basis of network protocols, agreements on how information should appear in a message, how that information is to interpreted and the format of that message.[8] There are strong arguments for imposing liability on Internet Service Providers for violations of cyber security and they can track the four core intuitions outlined in the previous section.[9] Some people say that individuals who originate malicious computer code are typically far beyond the reach of conventional law. Well for one thing, they are very hard to identify. So saboteurs use the Internets topology to conceal their tracks by routing messages through a convoluted path that is difficult for authorities to uncover. Moreover, by the time a computer virus or a worm is detected, the trail often is cold or loss. Even if the attackers were caught, the individuals who create malicious computer code rarely have to sufficient assets to pay for the losses they impose.[10] Moreover, careless firms and users would typically not be that hard to track down. I think the only sense in which these bad attackers are beyond the reach of law is the practical concern about the costs of identifying and suing them as compared to the fraction of the damages for which they might be held legally responsible. Cyber Space: One thing is that the rise of cyberspace has greatly facilitated all kinds of activity including governmental interaction, commercial, and social. There is no doubt that cyberspace today constitutes expensive real estate indeed. They have also running scared control of many real world processes through cyberspace. Because of this increased value, the security of cyberspace has grown in importance. The rise of terrorism as one of the type of symmetric and distributed ware, has threaten not only the gains derived from cyberspace but the activities that now come to depend on communication through cyberspace infrastructure.[11] There are obvious problems in making detailed recommendations about the United States government role in critical infrastructure protection in general, and in dealing with the powerful threats posed by cyber warfare and cyber terrorism in particular. Also it is very clear that the U.S. has made substantial progress in defining policies and strategies for dealing with the new threats to its critical infrastructure. At the same time, there is a disturbing gap between the military focus on asymmetric ware fare and civil focus on cyber crime and cyber terrorism. Well for me, the only way for a success is ultimately be for the U.S. government to focus on only those threats that truly being threaten the nation.[12] Cyber war is a case in point, as is high level cyber terrorism. So they are efforts to create effective international cooperation in limiting all forms of cyber attacks. United States Defense Infrastructure: Another reason why is the disconnecting between cyber defense and cyber offense. There is also a clear disconnect between the efforts in the United States to plan offensive cyber warfare and efforts at cyber defense. Many defenders also assert that technology in favors the attackers, prevents attribution, and makes counteroffensive difficult or impossible.[13] I believe that the United States military and defense officials involved in information warfare and planning and executing cyber war have divided views. I feel that those people who directly involved in cyber offense generally seem to feel that carrying out a successful major cyber attack is far more difficult than those outside the national security arena recognize. This disconnect between defense and offense illustrates a basic problem underlying both any unclassified analysis of cyber threats and their impact on homeland defense.[14] In the book Mapping the Risk: Assessing the Homeland Security Implications of Publicly Available Geospatial Information, Anthony quoted: For potential attackers, such as terrorist groups, seeking to cause casualties or economic disruption, the United States is a target-rich-environment. Many critical sites are relatively vulnerable to various types of attacks involving conventional explosives, weapons of mass destruction, or unconventional means of attack, such as aircraft crashes.[15] To improve the protection of the most critical facilities and location within the U.S. Homeland, the federal government is pursuing a comprehensive national approach to their physical and cyber protection in partnership with state and local governments and the private sector. Telecommunication: In Hong Kong, computer crimes are as a rule, governed under the Telecommunications Ordinance. Under Hong Kong law, offenses against e-mail, damage and destruction, computer fraud, and theft of electronic data are all criminal offenses.[16] Abraham argue that in the Peoples Republic of China, all computer related crimes are covered by Articles 258-287 of the Criminal Code.[17] He also mention that if they illegally interfering in the operation of a computer system, they will be punish by a minimum sentence of five years in prison. The legislatures of Western and Central European countries have been active in promulgating laws prohibiting unauthorized access, computer sabotage, computer espionage data manipulation, and computer fraud.[18] This shows that one area in which the national laws of European countries are significantly in agreement is that of computer sabotage, which encompasses purposeful damage to the integrity of computers, computer afforded to computer stored data among the criminal laws of European states. Throughout this paper we have seen or believed that the United States is vulnerable to various types of information cyber warfare attacks. Many threats that are range from nuisance attacks by hackers to those potentially putting national security at risk. Critical command and control and intelligence systems are designed to be robust and secure under attack. We see that our cyber security is a leading national problem for which the market may fail to produce a solution. Much has been said about the threat posed by worldwide cyber crime, but little has been down to protect against it. All they need to do is to meet challenge immediate and compelling necessity. Bibliography Anderson, H. Robert. Feldman, M Phillip. Gerwehr, SCott. Houghton, Brian. Mesic, Richard. John, D. Pinder. Jeff, Rothenberg. Chiesa, James. Securing the U.S. Defense Information Infrastructure: A Proposed Approach. National Defense Research Institue. Washington D.C. 1999. Baker, C. John. Lachman, E. Beth. Frelinger, R. David. OConnell, M. Kevin. Hou, C. Alexander. Tseng, S. Michael. Orletsky, David. Yost, Charles. Mapping the Risks: Assissing the Homeland Security Implications of Publicly Available Geospatial Information. RAND Corporation. 2004. Cordesman, H. Anthony. Cordesman, G. Justin. Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland. Praeger. Connecticut. 2002. Grady, F. Mark. Parisi, Francesco. The Law and Economics of Cyber Security. Cambridge University Press. New York. 2006. McMillian, Robert. IDG News Service. PCWorld. October 27, 2009. March 15, 2010. http://www.pcworld.com/article/174210/report_says_china_ready_for_cyberwar_espionage.html. Sofaer, D. Abraham. Goodman, E. Seymour. The Transnational Dimension of Cyber Crime and Terrorism. Hoover Institution Press Publication. California. 2001. Walker, J. Bruce. Blake, F. Ian. Computer Security and Protection Structures. Dowden Hutchinson Ross, Inc. Pennsylvania. 1977. McMillian, Robert. IDG News Service. PCWorld. October 27, 2009. March 15, 2010. http://www.pcworld.com/article/174210/report_says_china_ready_for_cyberwar_espionage.html. Walker, J. Bruce. Blake, F. Ian. Computer Security and Protection Structures. Dowden Hutchinson Ross, Inc. Pennsylvania. 1977.p.1. Walker. Ibid., p. 1. Walker. Ibid., p. 2. Baker, C. John. Lachman, E. Beth. Frelinger, R. David. OConnell, M. Kevin. Hou, C. Alexander. Tseng, S. Michael. Orletsky, David. Yost, Charles. Mapping the Risks: Assissing the Homeland Security Implications of Publicly Available Geospatial Information. RAND Corporation. 2004., p.184. Baker, Ibid., p. 185 . Sofaer, D. Abraham. Goodman, E. Seymour. The Transnational Dimension of Cyber Crime and Terrorism. Hoover Institution Press Publication. California. 2001., p.126. Sofaer. Ibid., p. 127 Grady, F. Mark. Parisi, Francesco. The Law and Economics of Cyber Security. Cambridge University Press. New York. 2006. p.232. Grady. Ibid., p.234. Grady. Ibid., p.259. Cordesman, H. Anthony. Cordesman, G. Justin. Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland. Praeger. Connecticut. 2002. p.179. Cordesman. Ibid., p.3. Cordesman. Ibid., p.3. Cordesman. Ibid., p.180. Sofaer, D. Abraham. Goodman, E. Seymour. The Transnational Dimension of Cyber Crime and Terrorism. Hoover Institution Press Publication. California. 2001. p.44. Cordesman. Ibid., p.44. Cordesman. Ibid., p.45.

Monday, August 19, 2019

Review of a Website Essay -- Website Review, Reliable Sources

â€Å"If you want to understand today, you have to search yesterday,† quoted Pearl Buck. Most everyone has a time in their life where history becomes important to them. Whether that be tracing back family heritage, writing a research essay, or just out of curiosity. All and all, history is very influential to people’s lives and what better way to learn about history then to visit the website â€Å"Image Archive on the American Eugenics Movement.† This credible website offers an opportunity for the public to learn more about our American history in an interactive and creative way. The creators of the image archive arrange features, cross-referencing and images with the Adobe Flash plug in program in order to enhance learning. The site offers various virtual exhibits that can be explored. The American Eugenics Movement included key events, persons, and social conditions that formed the development. There are nine specific virtual exhibits that are presented: social origins, scientific origins, research methods, traits studied, research flaws, eugenics popularization, marriage laws, sterilization laws and immigration restriction. All of these options show evidence of the development and expansion of The American Eugenics Movement. The first thing most notable about this website was their sense of design. A black ebony background illuminated with old brush style text and decorative graphics, welcomes and invites the visitor to â€Å"Enter† their website. This particular idea is a very artistic way of getting people to interact with their website. It is studied that most people learn better by hands on interaction, instead of reading perhaps plain, boring text. The website is appealing and fairly easy to navigate within the various browsers.... ...hives date back to July 2009. Even twitter and facebook links are offered in order to share information. This was all possible by the Dolan DNA Learning Center producers. In conclusion, the American Eugenics movement website is most beneficial to the public and distributes information appropriately and accessibly. The movement was very influential towards our history today, and it is noted that the information should be easy and fun to learn through this creative and unique website. Every part of information on this site has a reliable source and author which is important when citing a source. Overall, most everyone has a time in their life where history becomes important to them, and with the help of the â€Å"American Eugenics Movement† website, people can continue to correlate history with their lives and learn more about how history changed our world forever.

A Plead for Weed :: Legal Issues, Drugs, Marijuana

â€Å"All Mexicans are crazy and this stuff [marijuana] is what makes them crazy,† (Anonymous, 1927). While marijuana has been seen as a malignant substance that causes insanity, the specific reason marijuana became illegal still remains unknown. Most Americans assumed marijuana was illegal due to the process involving scientific, medical, and government hearings that it was to protect citizens from the dangerous drug (Guither, 2011). However, the United States should completely legalize marijuana because it has its own benefits to improve the society. The debate over the legalization of marijuana is not a new phenomenon as it has been an ongoing controversy in the United States. In 7000 – 8000 B.C., marijuana was legal and used in woven fabric, food, incense, cloth, and rope (Guither, 2011). Marijuana remained legal until the Mexican-Americans smoked it and brought the plant with them during the Mexican Revolution in 1910. California then initiated the first marijuana state law outlawing the preparations of hemp (Guither, 2011). In addition, Latin Americans and black jazz musicians were also involved with marijuana, which played an essential part in the music scene. A newspaper in 1934 also editorialized that â€Å"marijuana influences Negroes to look at white people in the eye, step on white men’s shadows and look at a white women twice,† (Guither, 2011). Based on history, racism became the charge against marijuana. The history of marijuana has influenced the United States’ decision not to legalize marijuana completely today. Legalizing marijuana is still a concern because the United States has failed to recognize the potential benefits of marijuana. Some states have recently legalized a small portion of marijuana only for medical purposes. The people who oppose to the legalization of marijuana have never given a chance to understand the benefits of marijuana. They should take into consideration that legalizing marijuana could create major changes to the world. The current interest of legalizing the use of marijuana has led to two arguments: The entrance of people into the field of drug abuse, and the insistence that people believe marijuana is not a detrimental drug compared to alcohol and tobacco (Bloomquist, 1967). With the strict laws prohibiting the use of marijuana, individuals have decided to use their own methods to obtain marijuana illegally. This type of criminal behavior causes the police to arrest individuals for marijuana violation (Bloomquist, 1967). This convinces proponents to believe that the current laws have restricted and violated people’s constitutional rights to smoke marijuana instead of tobacco or instead of drinking alcohol (Bloomquist, 1967).

Sunday, August 18, 2019

Essay --

Throughout the years, the news media has existed in some form or another. Starting back in medieval times, news came primarily through a town crier, who spouted information about the events occurring in the kingdom. Then as the years progressed, alternative forms of news erupted; the newspaper, the radio, television. The three of these contained a central element: the reporter. However, depending on which outlet that a person decided to receive their news on, the stories may end up different. After all, when one watches the television, the reports depend on the use of flashy images and strong dialogue to press the news into the hearts of citizens. However, when someone catches their news in a written variety, be it a newspaper or a magazine, the reports tend to rely more heavily on the details. But both varieties of news media have their merits and their problems. For example, when following the Affordable Care Act website crash as well as the law's other glitches, the televi sed coverage and the print coverage painted a slightly different picture for what should have been the same story. The Affordable Care Act (ACA) is a policy, passed in 2010 by President Barack Obama, that was made to reform the Health Care System as it once stood. The law, dubbed ObamaCare, made it mandatory for all citizens of the United States to have medical insurance by 2014. It also provided a framework for what a baseline medical insurance plan could have. Now, all coverage plans must include prenatal services as well as cancer screenings for woman, for one example. Another feature of the law is that it made a policy that stated that no person can be denied coverage because of a preexisting condition, such as asthma or diabetes. The Afforda... ...ds to be presented in a fact-based format, while for televised broadcasts, the information can be given through short snippets filled with photo and video evidence. In the example of ObamaCare glitches and problems, the story was fully fleshed out through the use of both television reports and printed articles. Without the statistics given through the journals, the video snippets given by the television wouldn't have much reason. The same occurs in the reverse. The televised industry is more widely used due to its accessibility. But neither is better than the other. After all, one doesn't know the whole story until they get both sides. If one option doesn't have the information you need, the other option probably will. Through the use of a critical mind and research, the whole story may be discovered. This can only be achieved through use of both resources.

Saturday, August 17, 2019

Natural disasters

December 28th 1908 barely three days after Christmas, the Messing earthquake would rock and forever change Italy. The earthquake registered a 7. 2 on the Richter scale. This by far has been one of the deadliest earthquakes In Europe, and for obvious reasons Is recorded as one of the most destructive. Given Italy's history of earthquakes, it's said to be one of the most prone areas In Europe. During that last 2,000 years, more than 400 destructive earthquakes have been documented in Italy and seismic activity varies considerably across the country due o the complex tectonics of the & Lead's). The fact that Italy sits on top of the plate boundary off the African Continental plate, leaves those to believe this was a true cause of the devastating earthquake. The plate Italy is sitting on is actually to this day continuing to push against the ocean floor and causing vertical displacement, in return causing earthquakes.The current population of Messing is somewhere around 242,000. At the t ime of the devastating earthquake the population was around 180,000. The earthquake claimed the lives of over 123,000 people that day and left over 59,000 homeless. A estimation of population for 2050 would be In the area of 279,000. The fact that after the earthquake hit and last for a duration of about seconds, a 12 meter tsunami struck the nearby coastlines which added to the destruction already experienced by Messing. The amount of debris and rubble left behind almost totally engulfed the area.There was no power or running water which as a result required evacuation processes to start. The fact that much of the city was unable to survive in these conditions lead to relief efforts from other countries. Russian sailors stepped in and ultimately some cost their lives due to the aftershocks which buried them amongst the rubble. The British sent two battleships and five cruisers along with a destroyer to the site. The US also was able to step In an support humanitarian efforts by bri ng in food off the Navy ships, and by making make shift hospitals for the Injured.Many residents at this point didn't have to means or funds to pay for all the major repairs needed, so they turned to the government to help. The ending result for Messing was that the ability to bounce back from such a terrible tragedy was not easy when the economy along with uninsured properties were at risk. As a consequence, very few homes and businesses had sufficient enough funds to cover the loss from the earthquake. This definitely but a strain on the rebuilding process for Messing. It was an estimated 60 million Euro for repair cost and rebuilding of Messing, however the true amount is still unknown.With little funding to be had, it was only possible at the time for the government to rebuild a much smaller city. The city as we know it today has fully recovered, but will forever be tragically impacted by the lasting effects. In the aftermath, and In the following year to come, Messing took reci tation to reconstruction and built architecture that would withstand earthquakes of various magnitudes. During this lengthy process of rebuilding, many of the survivors were taken to various parts of Italy until the building process was cargo ship Florida, which were brought into the New York Harbor to start a new life.In the year of 1887 a disastrous flood of the Yellow River in China became one of the world most devastating natural disasters. â€Å"Originating at the Banyan Hard Mountains in Western China, the famous Yellow River runs through several provinces before pouring into the Boohoo Sea†(The). The Yellow River is very prone to flooding based on the fact the river itself is elevated and runs between dyke's above the broad plains around it. The flooding that occurred in September of 1887 was so demoralizing and killed more than an estimated 900,000 people. Thus making it one of the world's most recorded deadliest natural disasters to date.Much of the flooding that occ urred in the 1887 floods, was said to be record spring rains and the melting of snow that allowed the river to topple of the 60 foot levees that had been set in place to help this type of disaster from happening. The heavy water flowing eventually eroded the levees and allowed for the mile wide river to then pour out in the floodplain areas. This barrage is what resulted in over 900,000 deaths. It was also said that the in ability for crops to grow due to flooding also played a huge role to many of these deaths as well. Since there is no international unit which to measure a flood's strength it is usually classified by the extent of the damage done, depth of water left and number of casualties†(Worlds Worst Disaster). The city hardest hit by the flood was said to be the Squeezing in Henna province. Due to the waters of the Yellow River potentially breaking through the dyke's in Handouts which flowed into Squeezing, the flood water spread very quickly throughout Northern China at an estimated 50,000 square mile area.Much of this area was said to be that of swamping agricultural settlements and commercial centers. The population in 1887 was estimated to be a little over 3 million. Today's population is that of 8 million. The projected population for 2050 is said to be around 11 million. With the flood claiming so many lives it is also to be known that there causes were contributing factors as well. Pandemics and lack of basic needs for survival was also a major factor to the death toll. China has since taken measure to secure the river in hopes that the floods never happen again.By this the government have built three damns that control the river and in return is also a source of hydroelectricity for the cities. On the afternoon of November 13th, 1985 the Volcano Nevada del Uric erupted in the city of Rammer, Columbia. The Volcanic eruption itself caused a massive mudflow that would practically whippet the entire city. When the Volcano became active and mo lten lava began to melt the snow and ice a chain reaction started to take place. This formed showers of ash in the air.This specific volcano is located some 5,389 meters above sea level, which puts it to be one of the tallest in Columbia. â€Å"All of these mountains are ice-capped extraneousness and are vulnerable to seismic activity due to lying at the intersection of four fault lines†(Suite). There were several precursors noticed before the eruption in 1985. Pumice fragments were seen at the beginning of the onset of eruption along with the ash. By several hours later the town had started an evacuation and the first signs of the molten rock had begun.When the Lars finally hit the city that dreadful night, the whole town was asleep. This resulted in over 23,000 deaths. The mudflow was rushing down at speeds of 30 help predict their eruptions. Special tools and equipment used are that of seismographs, tilt meters, and geometers and correlation spectrometers. All these tools are able to help find small earthquakes and possible swelling of volcanoes. The population of Rammer during this time was 27,300 which meant that less than one- .NET of the population survived. The population today is zero, as the town never rebuilt.The town today is considered a cemetery for all the people buried among the mud. As the town of Rammer never rebuilt, the efforts taken at the time of the disaster by the government and by the United Nations were of great help. Many people and family of the deceased were extremely upset at the government as the evacuation was not taken seriously. As relief efforts took place a great deal was to be held off till daylight in order to look for the live under buried rubble and mud. Relief efforts eased for well over three months lingering into February of 1986.Much of the deaths were blamed on the government for the cancellation of the evacuation, poor planning, human error and simple a lack of experience. † In fact, $1 billion of the Colombian Gross National Product was used for the recovery†. Though the city of Rammer was a good 74 kilometers away from the volcano Nevada del Uric, it only took a mere two and half hours before the city was completely covered. Since this deadly eruption , the volcano has had very little volcanic activity, however, the lasting effects f Nevada del Uric can still be seen today. Natural Disasters Why do Natural disaster occur : here you can include the reasons why natural disaster occurs. the reasons could be both man made and natural. i said man made because there is a theory called â€Å"Population theory of Malthus † where its stated that if the balance of population exceeds that of food supply many natural disaster would occur. you can google â€Å"Population theory of Malthus† for more details. and the natural ones could be earthquakes on which humans have no control. here you can give examples of earthquakes that frequently hits japan. Advantages of natural disaster: there are some advantages of natural disaster as well. for example with flood comes lots of silts which in turn makes the soil fertile. apart from that any population that faces natural disaster frequently builds a strong survival mentality. for example some countries in the Indian subcontinent gets hit by hurricane, tornadoes etc yet the destruction rate is very low due to their adoption of the environment. Disadvantages; There are psychological, social, economical disadvantages of natural disasters. Psychological could be that people might loose their loved ones, their hard earned property. social disadvantages could be after effects of the event like you know looting, robbery due to want of basic necessities etc. Economic disadvantages could be the spending to reconstruct the damaged infrastructures, damage of crops, damage of properties etc then you can include precautionary measures to better deal with natural disaster. So far thats all I can come up with. if anything else comes in my mind I will edit this answer further Natural disasters December 28th 1908 barely three days after Christmas, the Messing earthquake would rock and forever change Italy. The earthquake registered a 7. 2 on the Richter scale. This by far has been one of the deadliest earthquakes In Europe, and for obvious reasons Is recorded as one of the most destructive. Given Italy's history of earthquakes, it's said to be one of the most prone areas In Europe. During that last 2,000 years, more than 400 destructive earthquakes have been documented in Italy and seismic activity varies considerably across the country due o the complex tectonics of the & Lead's). The fact that Italy sits on top of the plate boundary off the African Continental plate, leaves those to believe this was a true cause of the devastating earthquake. The plate Italy is sitting on is actually to this day continuing to push against the ocean floor and causing vertical displacement, in return causing earthquakes.The current population of Messing is somewhere around 242,000. At the t ime of the devastating earthquake the population was around 180,000. The earthquake claimed the lives of over 123,000 people that day and left over 59,000 homeless. A estimation of population for 2050 would be In the area of 279,000. The fact that after the earthquake hit and last for a duration of about seconds, a 12 meter tsunami struck the nearby coastlines which added to the destruction already experienced by Messing. The amount of debris and rubble left behind almost totally engulfed the area.There was no power or running water which as a result required evacuation processes to start. The fact that much of the city was unable to survive in these conditions lead to relief efforts from other countries. Russian sailors stepped in and ultimately some cost their lives due to the aftershocks which buried them amongst the rubble. The British sent two battleships and five cruisers along with a destroyer to the site. The US also was able to step In an support humanitarian efforts by bri ng in food off the Navy ships, and by making make shift hospitals for the Injured.Many residents at this point didn't have to means or funds to pay for all the major repairs needed, so they turned to the government to help. The ending result for Messing was that the ability to bounce back from such a terrible tragedy was not easy when the economy along with uninsured properties were at risk. As a consequence, very few homes and businesses had sufficient enough funds to cover the loss from the earthquake. This definitely but a strain on the rebuilding process for Messing. It was an estimated 60 million Euro for repair cost and rebuilding of Messing, however the true amount is still unknown.With little funding to be had, it was only possible at the time for the government to rebuild a much smaller city. The city as we know it today has fully recovered, but will forever be tragically impacted by the lasting effects. In the aftermath, and In the following year to come, Messing took reci tation to reconstruction and built architecture that would withstand earthquakes of various magnitudes. During this lengthy process of rebuilding, many of the survivors were taken to various parts of Italy until the building process was cargo ship Florida, which were brought into the New York Harbor to start a new life.In the year of 1887 a disastrous flood of the Yellow River in China became one of the world most devastating natural disasters. â€Å"Originating at the Banyan Hard Mountains in Western China, the famous Yellow River runs through several provinces before pouring into the Boohoo Sea†(The). The Yellow River is very prone to flooding based on the fact the river itself is elevated and runs between dyke's above the broad plains around it. The flooding that occurred in September of 1887 was so demoralizing and killed more than an estimated 900,000 people. Thus making it one of the world's most recorded deadliest natural disasters to date.Much of the flooding that occ urred in the 1887 floods, was said to be record spring rains and the melting of snow that allowed the river to topple of the 60 foot levees that had been set in place to help this type of disaster from happening. The heavy water flowing eventually eroded the levees and allowed for the mile wide river to then pour out in the floodplain areas. This barrage is what resulted in over 900,000 deaths. It was also said that the in ability for crops to grow due to flooding also played a huge role to many of these deaths as well. Since there is no international unit which to measure a flood's strength it is usually classified by the extent of the damage done, depth of water left and number of casualties†(Worlds Worst Disaster). The city hardest hit by the flood was said to be the Squeezing in Henna province. Due to the waters of the Yellow River potentially breaking through the dyke's in Handouts which flowed into Squeezing, the flood water spread very quickly throughout Northern China at an estimated 50,000 square mile area.Much of this area was said to be that of swamping agricultural settlements and commercial centers. The population in 1887 was estimated to be a little over 3 million. Today's population is that of 8 million. The projected population for 2050 is said to be around 11 million. With the flood claiming so many lives it is also to be known that there causes were contributing factors as well. Pandemics and lack of basic needs for survival was also a major factor to the death toll. China has since taken measure to secure the river in hopes that the floods never happen again.By this the government have built three damns that control the river and in return is also a source of hydroelectricity for the cities. On the afternoon of November 13th, 1985 the Volcano Nevada del Uric erupted in the city of Rammer, Columbia. The Volcanic eruption itself caused a massive mudflow that would practically whippet the entire city. When the Volcano became active and mo lten lava began to melt the snow and ice a chain reaction started to take place. This formed showers of ash in the air.This specific volcano is located some 5,389 meters above sea level, which puts it to be one of the tallest in Columbia. â€Å"All of these mountains are ice-capped extraneousness and are vulnerable to seismic activity due to lying at the intersection of four fault lines†(Suite). There were several precursors noticed before the eruption in 1985. Pumice fragments were seen at the beginning of the onset of eruption along with the ash. By several hours later the town had started an evacuation and the first signs of the molten rock had begun.When the Lars finally hit the city that dreadful night, the whole town was asleep. This resulted in over 23,000 deaths. The mudflow was rushing down at speeds of 30 help predict their eruptions. Special tools and equipment used are that of seismographs, tilt meters, and geometers and correlation spectrometers. All these tools are able to help find small earthquakes and possible swelling of volcanoes. The population of Rammer during this time was 27,300 which meant that less than one- .NET of the population survived. The population today is zero, as the town never rebuilt.The town today is considered a cemetery for all the people buried among the mud. As the town of Rammer never rebuilt, the efforts taken at the time of the disaster by the government and by the United Nations were of great help. Many people and family of the deceased were extremely upset at the government as the evacuation was not taken seriously. As relief efforts took place a great deal was to be held off till daylight in order to look for the live under buried rubble and mud. Relief efforts eased for well over three months lingering into February of 1986.Much of the deaths were blamed on the government for the cancellation of the evacuation, poor planning, human error and simple a lack of experience. † In fact, $1 billion of the Colombian Gross National Product was used for the recovery†. Though the city of Rammer was a good 74 kilometers away from the volcano Nevada del Uric, it only took a mere two and half hours before the city was completely covered. Since this deadly eruption , the volcano has had very little volcanic activity, however, the lasting effects f Nevada del Uric can still be seen today.

Friday, August 16, 2019

Comparison Between Market Structures

A COMPARATIVE STUDY OF MARKET STRUCTURES Perfect Competition No. of Firms A large number, each being small. Monopolistic Competition A large number, each have some amount of market power. Oligopoly A small number, each being mutually interdependent. Monopoly Only one firm, possessing full control in the market. Size of Firms Small. Therefore each is a price taker. Relatively small but possessing some ability in setting price. Relatively big but bases its decision on other firms. Very large and is able to influence price or output but not both simultaneously. Nature of Product Homogeneous Differentiated Differentiated Unique Knowledge of Product Perfect knowledge of market by buyers and sellers Imperfect knowledge of market by buyers and sellers Imperfect knowledge of market by buyers and sellers Imperfect knowledge of market by buyers and sellers Barriers Free entry and exit from industry Free entry and exit from industry Barriers of entry and exit from industry Barriers of entry and exit from industry Mobility of Factors Perfect Mobility Perfect Mobility Imperfect Mobility Imperfect Mobility Extent of Price Control/Pricing Policy None by individual firms who take the market prevailing price Firms may either set price or output, constrained by its demand curve Firms may either set price or output, constrained by the actions of rival firms Firms may either set price or output, constrained by its demand curve Non-price Competition No advertising or other forms of promotion because of perfect competition †¢ Perfectly price elastic – each firm is a price taker because of all the above conditions †¢ D=P=AR=MR †¢ Price is constant at all levels of output †¢ The industry’s demand and supply determine the market price Advertising and other forms of promotion may take place Advertising and other forms of promotion may take place because of price rigidity †¢ Kinked demand curve – price rigidity exists because of all the above conditions †¢ D=AR and AR>MR †¢ The oligoplistic firm determines the market price or output, taking into account its competitor’s reaction No advertising or other forms of promotion because of the absence of competition †¢ Relatively price inelastic – firm is a price setter because of all the above conditions †¢ D=AR and AR>MR †¢ The monopolist determines the market price or output but not both simultaneously because it is constrained by the demand curve Demand Curve/Price Line/AR curve †¢ Relatively price elastic – each firm has some ability to set price because of all the above conditions †¢ D=AR and AR>MR †¢ The monopolistically competitive firm determines the market price or output but not both simultaneously because it is constrained by the demand curve 1 Perfect Competition Relationship between the demand curves of the Firm and Industry Price Price S P2 D1 D2 D0 P0 P1 AR2 AR0 AR1 Monopolistic Competition Demand Curve of the Firm $ Oligopoly Demand Curve of the Firm $ Monopoly Demand Curve of the Firm / Industry $ P2 P0 P1 MR Quantity Firm Quantity AR=DD Quantity MR AR=DD Quantity MR AR=DD Quantity Q1 Q0 Q2 Industry TR Curve †¢ TR = P x Q †¢ Because P is constant, TR curve is a linear upward-sloping from left to right Revenue Curves under Perfect Competition $ $ 60 TR †¢ TR = P x Q †¢ Because P falls when Q rises, TR curve is an inverted U-shape Revenue Curves under Monopolistic Competition $ †¢ TR = P x Q †¢ Because P falls when Q rises, TR curve is an inverted U-shape Revenue Curves under Oligopoly $ TR = P x Q †¢ Because P falls when Q rises, TR curve is an inverted U-shape Revenue Curves under Monopoly $ 10 AR=MR=DD AR=DD Quantity $ AR=DD Quantity MR Quantity 6 Quantity $ MR AR=DD Quantity $ MR TR Quantity TR Quantity TR Quantity MR Curve †¢ Identical to P and AR, that is, D=P=AR=MR †¢ Constant †¢ MR is less than AR, with the gradient of the MR curve twice as steep as the AR curve (implying that the MR cuts the quantity axis at half the length at which the AR cuts the quantity axis) †¢ Downward sloping, that is, is falling as quantity increases MR is less than AR, with the gradient of the MR curve twice as steep as the AR curve (implying that the MR cuts the quantity axis at half the length at which the AR cuts the quantity axis) †¢ Downward sloping, that is, is falling as quantity increases †¢ Presence of a broken line, implying the presence of price rigidity †¢ MR is less than AR, with the gradient of the MR curve twice as steep as the AR curve (implying that the MR cuts the quantity axis at half the length at which the AR cuts the quantity axis) †¢ Downward sloping, that is, is falling as quantity increases 2 Perfect Competition MC/AC Curves †¢ U-shaped in SR because of Law of Diminishing Returns †¢ U-shaped in LR because of internal economies and diseconomies of scale Monopolistic Competition †¢ U-shaped in SR because of Law of Diminishing Returns †¢ U-shaped in LR because of internal economies and diseconomies of scale Oligopoly †¢ U-shaped in SR because of Law of Diminishing Returns †¢ U-shaped in LR because of internal economies and diseconomies of scale Monopoly †¢ U-shaped in SR because of Law of Diminishing Returns †¢ U-shaped in LR because of internal economies and diseconomies of scale Profit-maximising Condition †¢ MR = MC where MC is rising (revenue from the last unit of output is equal to the cost of producing the last unit, therefore marginal profit is equal to zero) †¢ Since MR=P(=D=AR), when MR=MC, P=MC †¢ When individual firms no longer reshuffle output †¢ When maximum profits are attained †¢ SR equilibrium conditions are fulfilled, and †¢ No entry of new firms and no exit of existing firms †¢ MR = MC where MC is rising (revenue from the last unit of output is equal to the cost of producing the last unit, therefore marginal profit is equal to zero) †¢ Since P>MR, when MR=MC, P>MC MR = MC where MC is rising (revenue from the last unit of output is equal to the cost of producing the last unit, therefore marginal profit is equal to zero) †¢ Since P>MR, when MR=MC, P>MC †¢ MR = MC where MC is rising (revenue from the last unit of output is equal to the cost of producing the last unit, therefore marginal profit is equal to zero) †¢ Since P>MR, when MR=MC, P>MC Meaning of SR Equilibrium †¢ When individual firms no longer reshuffle output †¢ When maximum profits are attained †¢ SR equilibrium conditions are fulfilled, and †¢ No entry of new firms and no exit of existing firms When individual firms no longer reshuffle output †¢ When maximum profits are attained †¢ SR equilibrium conditions are fulfilled, and †¢ No entry of new firms and no exit of existing firms †¢ When individual firms no longer reshuffle output †¢ When maximum profits are attained †¢ SR equilibrium conditions are fulfilled, and †¢ No entry of new firms and no exit of existing firms Meaning of LR Equilibrium Profitability in SR †¢ Supernormal profits when the firm earns profits which are in excess of what is necessary to induce it to remain in the industry Supernormal Profits under Perfect Competition $ MC AC P0 Supernormal Profits †¢ Supernormal profits when the firm earns profits which are in excess of what is necessary to induce it to remain in the industry Supernormal Profits under Monopolistic Competition $ MC AC Supernormal Profits †¢ Supernormal profits when the firm earns profits which are in excess of what is necessary to induce it to remain in the industry Supernormal Profits under Oligopoly $ MC †¢ Supernormal profits when the firm earns profits which are in excess of what is necessary to induce it to remain in the industry Supernormal Profits under Monopoly $ MC AC Supernormal Profits AR=MR=DD P0 P0 AC Supernormal Profits P0 AR=DD MR Q0 Quantity Q0 Quantity Q0 MR AR=DD MR Quantity Q0 AR=DD Quantity 3 Perfect Competition †¢ Normal profits refers to that level of profits that is just sufficient to induce the firm to stay in the industry Normal Profits under Perfect Competition $ MC AC P0 AR=MR=DD Monopolistic Competition †¢ Normal profits refers to that level of profits that is just sufficient to induce the firm to stay in the industry Normal Profits under Monopolistic Competition $ MC AC P0 Oligopoly †¢ Normal profits refers to that level of profits that is just sufficient to induce the firm to stay in the industry Normal Profits under Oligopoly $ MC AC P0 Monopoly †¢ Normal profits refers to that level of profits that is just sufficient to induce the firm to stay in the industry Normal Profits under Monopoly $ MC AC P0 AR=DD MR Q0 Quantity Q0 Quantity Q0 MR AR=DD MR Quantity Q0 AR=DD Quantity †¢ Subnormal profits occur when the firm earns less profits than what is necessary to induce it to remain in the industry Subnormal Profits under Perfect Competition $ MC AC Subnormal profits occur when the firm earns less profits than what is necessary to induce it to remain in the industry Subnormal Profits under Monopolistic Competition $ AC MC Subnormal Profits †¢ Subnormal profits occur when the firm earns less profits than what is necessary to induce it to remain in the industry Subnormal Profits under Oligopoly $ MC AC Subnormal Profits †¢ Subnormal profits occur when the firm earns less profits than what is necessary to induce it to remain in the industry Subnormal Profits under Monopoly $ AC MC Subnormal Profits P0 Subnormal Profits AR=MR=DD P0 P0 P0 AR=DD MR Q0 Quantity Q0 Quantity Q0 MR AR=DD MR Quantity Q0 AR=DD Quantity Profitability in LR Necessarily makes normal profit because of free entry and exit from the industry †¢ Supernormal profits – beyond optimum capacity (Overutilisation where AC is rising) †¢ Normal profits – optimum capacity (Full utilisation where AC is at its minimum) †¢ Subnormal profits – below optimum capacity (Underutilisation where AC is falling) Necessarily makes normal profit because of free entry and exit from the industry †¢ Supernormal profits – below optimum capacity (Underutilisation where AC is falling) †¢ Normal profits – below capacity (Underutilisation where AC is falling) †¢ Subnormal profits – below optimum capacity (Underutilisation where AC is falling) Can be making either normal or supernormal profits because of the presence of entry to the industry †¢ Supernormal profits – below optimum capacity (Underutilisation where AC is falling) †¢ Normal profits – below capacity (Underutilisation where AC is falling) †¢ Subnormal profits – below optimum capacity (Underutilisation where AC is falling) Can be making either normal or supernormal profits because of the presence of entry to the industry †¢ Supernormal profits – below optimum capacity (Underutilisation where AC is falling) †¢ Normal profits – below capacity (Underutilisation where AC is falling) †¢ Subnormal profits – below optimum capacity (Underutilisation where AC is falling) Plant Utilisation in SR 4 Perfect Competition Plant Utilisation in LR Normal profits – optimum capacity (Full utilisation where AC is at its minimum) Monopolistic Competition Normal profits – below optimum capacity (Underutilisation where AC is falling) Oligopoly †¢ Normal profits – below optimum capacity (Underutilisation where AC is falling) †¢ Supernormal profits – below optimum capacity (Underutilisation where AC is falling) Monopoly †¢ Normal profits – below optimum capacity (Underutilisation where AC is falling) †¢ Supernormal profits – below optimum capacity (Underutilisation where AC is falling) Allocative Efficiency Allocative efficiency is attained where P=MC Allocative efficiency is NOT attained because P>MC Allocative efficiency is NOT attained because P>MC Allocative efficiency is NOT attained because P>MC EXCEPT when the monopolist is practising first degree (perfect) price discrimination Productive Efficiency (NEW vs OLD definition) NEW: Productive efficiency is attained where profit-maximising level of output is at the LRAC OLD: Productive efficiency is attained where profit-maximising level of output is at the minimum LRAC NEW: Productive efficiency is attained where profit-maximising level of output is at the LRAC OLD: Productive efficiency is NOT attained because profit maximising level of output is falling LRAC (underutilisation) NEW: Productive efficiency is attained where profit-maximising level of output is at the LRAC OLD: Productive efficiency is NOT attained because profit maximising level of output is falling LRAC (underutilisation) NEW: Productive efficiency is attained where profit-maximising level of output is at the LRAC OLD: Productive efficiency is NOT attained because profit maximising level of output is falling LRAC (underutilisation) Distinction between Firm and Industry †¢ Industry consists of many small firms producing an identical product. Therefore, there exists a distinction between firms and industry †¢ Firm’s demand curve is perfectly elastic because it is a price taker; industry’s demand curve is downward sloping †¢ SHORT-RUN – Price ? Average Variable Cost (Total Revenue ? Total Variable Cost) †¢ LONG-RUN – Price ? Average Total Cost (Total Revenue ? Total Cost) The portion of MC curve that is above the average variable cost †¢ Industry consists of many relatively small firms producing differentiated products. Therefore, there exists a distinction between firms and industry †¢ Firm’s demand curve and the industry’s demand curve is both downward sloping Industry consists of a few large firms producing differentiated products. Therefore, there exists a distinction between firms and industry †¢ Firm’s demand curve and the industry’s demand curve is kinked implying the presence of price rigidity †¢ Industry consists of only one firm producing a unique product. Therefore, there exists NO distinction between firms and industry †¢ Firm’s demand curve is the industry’s demand curve and it is downward sloping Shut-down condition †¢ SHORT-RUN – Price ? Average Variable Cost (Total Revenue ? Total Variable Cost) †¢ LONG-RUN – Price ? Average Total Cost (Total Revenue ? Total Cost) Cannot be determined because there is no unique price to a quantity and viceversa †¢ SHORT-RUN – Price ? Average Variable Cost (Total Revenue ? Total Variable Cost) †¢ LONG-RUN – Price ? Average Total Cost (Total Revenue ? Total Cost) Cannot be determined because of the presence of price rigidity †¢ SHORT-RUN – Price ? Average Variable Cost (Total Revenue ? Total Variable Cost) †¢ LONG-RUN – Price ? Average Total Cost (Total Revenue ? Total Cost) Cannot be determined because there is no unique price to a quantity and viceversa Supply Curve in SR 5

Thursday, August 15, 2019

Caste System and Religion of Aryans Essay

The second group was of priests, scholars and philosophers and were called Brahmans. These two groups struggled politically for leadership among the Aryans. In this struggle the Brahmans got to be the leaders of the Aryan society. The third group was named as Vaishyas and people of this group were farmers, traders, merchants and craftsmen. The lowest caste were Shudras and were considered as non- Aryans. Members of Shudras were laborers, peasants and servants of other castes. Vaishyas took control of many parts of the region and they made local people their servants. So with the passage of time the Vaishyas who were the farmers and craftsmen became the landlords and businessmen of the society. There was another caste consisted of local people and were called â€Å"Untouchables†. They were not considered as a caste infect. They were outcaste. They were used to perform the least desirable activities like cleaning toilets, dealing with dead bodies etc. They were disallowed to touch high caste and stand at some distance from high castes. This is not enough. Well, they have some other restrictions too. They were not allowed to enter holy places, schools and were not allowed to even touch the things belong to high castes. In some parts of Southern India, even the sight of untouchables was thought to be polluting so they were forced to sleep during the day and work at night. To remain an upper caste of the society, Aryans resolve some rules. The castes were to identify the occupation of people of that caste and some marriage restrictions were also imposed. Castes were unchangable groups. A person belong to one caste can never change his caste. One had to lived, married, ate and worked within one’s own caste. A everything has its own advantages and drawbacks. So the caste system of Aryans also benefited them in some aspects. Marriages within the caste ensured continuity of occupation as the sons usually followed the fathers occupation. This reduced unemployment and brought about perfection of several arts and crafts. Furthermore, since the caste system was based on the principle of division of labor, the Aryans were able to establish and maintain a sound economy. But soon caste system became a social evil. It suppressed an individual’s talent and became an obstacle for his personal development. It gave rise to untouchability and acted against the feeling of common brotherhood. Due to this injustice, many people left it and converted to Islam, Christianity and Buddhism. Religion Aryans seem to have believed in monotheism. They believed that God is one, but he is called by many names. The early Aryans worshipped phenomena of nature in the form of nature gods. They have male or female gods to which they were used to worship. Indra  was the god of strength, foremost in battle, always ready to smite dragons and demons and to destroy cities. He was the God of thunder, the rainmaker. Agni  considered as the God of fire and marriages were solemnized in the presence of fire. Fire was the purest of the five elements and was held in high esteem. Surya  (Sun),  Savitri  (a solar deity to whom the famous Gayatri mantra is dedicated). Varuna  was the god of water. He was the sustainer of plant and animal life. It was his responsibility to uphold the natural order. Soma  (god of intoxicating juice soma). Yama  the god of death and had a prominent place. Vayu   (the god of winds). Prithvi  was the goddess of Earth Usha, the goddess of Dawn. Although a large number of gods are referred to in the Vedas, yet they were polytheistic and believed that there is one god only but with different names. They believed in one god who is the creator, preserver and destroyer of the whole universe and called him Ishwar. Although, Aryans worshiped different signs of powers but yet they believe in only one god. So this can be concluded that they believe in monotheism. This concept is still present among Hindus. They worship Sun, Moon and many other powers as well as many gods. ——————————————– [ 1 ]. http://adaniel. tripod. com/historycaste. htm [ 2 ]. Dowling, Mike, â€Å"The Caste System of Ancient India at mrdowling. com,† available from http://www. mrdowling. com/612-caste. html; Internet; updated  Sunday, July 10, 2005  .  ©2009, Mike Dowling. [ 3 ]. http://indiansaga. com/history/aryans_religion. html

Wednesday, August 14, 2019

Intelligent Tutoring System For Primary School Students Education Essay

LITERATURE REVIEW This chapter will incorporate the reappraisal of literature of old research that is considered significance in the development of Intelligent Tutoring System for primary school pupils. 2.1 Problem Sphere Problem sphere is the country that needs to be examined to work out a job. In this undertaking, Intelligent Tutoring System is used in the sphere of instruction. Education is the field for larning and learning. It is the procedure where cognition is transferred and received. The intent to hold Intelligent Tutoring System for this undertaking is because to give an end product larning to the pupils particularly primary school pupils. Nowadays, instructors or pedagogues frequently face troubles to manage their pupils. It is because one instructor needs to provide many categories and each category will hold about 20 to 30 pupils. It is impossible to provide each pupil needs and penchant. Each pupil have their ain acquisition manner either they are good in listening, visualising, or making stuff at manus. Since the instructor is impossible to cognize each pupil larning manner, hence, there are demands for Intelligent Tutoring System that can provides a tutoring system that can find the pupils involvement so they will non holding jobs such as deficiency of apprehension and misconceptions. Besides that, the benefit of this tutoring system towards the instructor is the instructor will easy supervise the pupil ‘s public presentation and they will cognize the suited attack to cover with the pupil manners of acquisition. 2.1.1 Learning Manners Students learn in many ways such as by seeing and hearing, reflecting and moving, concluding logically and intuitively, memorising and besides visualising ( Felder, n.d. ) . Teaching and larning are different between each individual. It ‘s all depends on the persons itself. Everybody has larning manner strengths in which different people will hold different strengths ( Dunn, 1990 ) . In 1986, Marie et al. , as cited in ( Farwell, 2000 ) provided an analysis in which approximately 20 to 30 per centum of the school-aged pupils remembers what is heard, 40 per centum easy recalled what they have seen or read and the remainder were normally used both techniques which is they heard and visualise at the same clip. They have their ain manner that will assist them in larning. There are several different theories refering acquisition manners. Auditory, kinaesthetic and ocular are three types of cardinal acquisition manners ( Graham, n.d. ) . Below are the descriptions for each acquisition manners as cited in Graham ( n.d. ) and Farwall ( 2002 ) . Auditory Learners Childs who are audile learner normally prefer more on listening to account by reading them and sometimes they like to analyze by declaiming information aloud. Furthermore, audile scholar may love to environ with music while analyzing or they may necessitate a quiet infinite to analyze without diverted with any sounds. Auditory scholars learn successfully when the manner of giving information are being spoken and presented verbally. Ocular Learners â€Å" Show me and I will understand † is the keyword for ocular acquisition manner. It is a pattern to make new information by looking at something and visualise it. Normally, those people with this sort of larning manner can catch information presented in chart or graph, but they may foster impatiently listening to an account. Kinesthetic Learners Most of the school ‘s kids excel through kinaesthetic which means touching, feeling, and sing the stuff at manus. Learning activity such as scientific discipline lab, field trip, skit and many other activities are the best technique for kinaesthetic scholar. Most people use the combination of manner to acquire best acquisition manner for themselves. As for this undertaking, there are two larning manners covered which is the ocular and audile acquisition manners. This learning manners can be classify via some set of personality inquiries in which it will find the pupils country of acquisition manners. Intelligent Tutoring System will normally come across to several techniques such as Case Based Reasoning technique, Agents technique, Neural techniques, Neuro Fuzzy techniques, Track Analysis and many more. Below are other potencies techniques that can be used for this Intelligent Tutoring System ‘s undertaking despite the Agents technique. 2.1.2 Examples of utilizing Bayesian Networks for Learning Styles Detection Bayesian Networks is one technique that detects pupil ‘s acquisition manners in a web-based instruction system. In 2005, Garcia et al. , had proposed this technique to guarantee that all the pupils can larn even though they have different acquisition manners. Furthermore, Garcia et Al. ( 2005 ) , had besides stated that intelligent agent can used those information to gives the pupils personalized aid and present learning constituents that suit best harmonizing to pupil ‘s acquisition manners. Table 2.1 shows the dimensions of the acquisition manners. Detectors like particulars informations and testing ; intuitive prefer political orientation and theories. Detectors are digesting with item but do non like complications ; intuitive are uninterested by item and love complications. Table 2.1 Dimensions of Felder ‘s acquisition manners ( Beginning: Gracia et al. , ( 2005 ) ) A Bayesian Networks ( BN ) is a directed acyclic graph encodes the dependance relationships between a set of variables ( Pardalos, n.d. ) . It allows us to detect new cognition by uniting adept sphere cognition with statistical informations. In this BN, the nodes represent the different variables that determine a given acquisition manner. The arcs represent the relationships among the acquisition manner and the factor finding it. As shown in Figure 2.1, the theoretical account merely has the three dimensions of Felder ‘s model, perceptual experience, processing and apprehension. Figure 2.1 Bayesian Network patterning pupil ‘s acquisition manners. ( Beginning: Gracia et al. , ( 2005 ) ) The undermentioned sentences describe in item the different states the independent variables can take: Forum: station messages ; answers messages ; reads messages ; no engagement. Chat: participates ; listens ; no engagement. Mail: utilizations ; does non utilize. Information entree: in tantrums and starts ; sequential. Reading stuff: concrete ; abstract. Exam Revision ( considered in relation to the clip assigned to the test ) ; less than 10 % ; between 10 and 20 % ; more than 20 % . Exam Delivery Time ( considered in relation to the clip assigned to the test ) ; less than 50 % ; between 50 and 75 % ; more than 75 % Exercises ( in relation to the sum of exercisings proposed ) : many ( more than 75 % ) ; few ( between 25 and 75 % ) ; none Answer alterations ( in relation to the figure of inquiries or points in the test ) : many ( more than 50 % ) ; few ( between 20 and 50 % ) ; none. Entree to illustrations ( in relation to the figure of illustrations proposed ) : many ( more than 75 % ) ; few ( between 25 % and 75 % ) ; none Exam Consequences: high ( more than 7 in a 1-10 graduated table ) ; medium ( between 4 and 7 ) ; low ( below 4 ) . The chance maps associated with the independent nodes are bit by bit obtained by detecting the pupil interaction with the system. 30 Computer Science Engineering pupils have been interviewed to find the values by experimentation utilizing the ILS ( Index of larning manners ) questionnaire. Then, allow the pupils used the instruction system and recorded their interactions with the system. The information was used to find the parametric quantity of the BN. The Bayesian theoretical account is continuously updated as new information about the pupil ‘s interaction with the system is obtained. The chance maps are adjusted to demo the new observations or experiences. The chances reach equilibrium at certain point in the interaction. The chance values show a really little fluctuation as new information is entered. The values obtained at this point represent the pupil ‘s behaviour. This paper considered for each dimensions three values to do the consequences more comparable. For illustration, for the understanding dimension, it considered the values consecutive, impersonal and planetary. The per centum of happenstances is 100 % for the understanding dimension, 80 % for the perceptual experience dimension, and 80 % for the processing dimension. All information from this paper is cited from Gracia et Al, ( 2005 ) . 2.2 Technique In this undertaking, Intelligent Tutoring System is used to sort pupils larning manners. It used Numberss of regulations as the chief technique because it has the possible to give appropriate end product which is the acquisition manners for the pupils. Below are the descriptions of all techniques that will be used in this undertaking. 2.2.1 Intelligent Tutoring System An early lineation of Intelligent Tutoring System ( ITS ) demands was delivered by Hartley and Sleeman in 1973 ( Shute & A ; Psotka, n.d ) . As stated by Shute and Psotka, Hartley and Sleeman argued that ITS must possess cognition of the sphere ( adept theoretical account ) , cognition of the scholar ( student theoretical account ) , and cognition of learning schemes ( coach ) . Furthermore, in order for ITS to hold appropriate control schemes, it need to hold capturing environment of acquisition, effectivity of communicating and to hold flexible determinations. The ITS is a plan in which pupil can communicated through a sequence of natural linguistic communication inquiries and replies and the coach could both ask and reply inquiries and maintain path of ongoing duologue construction ( Corbett, Koedinger & A ; Anderson, 1997 ) . The authoritative ITS architecture consist of four constituents which are a undertaking environment, a sphere cognition faculty, a pupil theoretical account and pedagogical faculty. Figure 2.2 ITS architecture ( Beginning: Corbett, Koedinger & A ; Anderson, ( 1997 ) ) As cited in Corbett, Koedinger & A ; Anderson ( 1997 ) , pupils engage in job resolution environments and these actions are evaluated with regard to the sphere cognition constituents. Student ‘s cognition province is maintained based on the rating theoretical account. Finally, the pedagogical faculty delivers instructional actions based on the rating of pupil ‘s actions and on the pupil theoretical account. Advantages of ITS as described by Yousoof, Sapiyan & A ; Kamaludin ( 2002 ) , ITS is a systems that can supply considerable flexibleness in presentation of stuff and greater adaptability to react to idiosyncratic pupils need. It besides found to be extremely effectual in their intent. It has been proved by research that the pupils who tend to larn utilizing ITS really could larn fast when compared to the pupils utilizing traditional manner of instruction. Disadvantages of ITS as besides cited in Yousoof, Sapiyan & A ; Kamaludin ( 2002 ) , hazard issues affects the execution of ITS, unsuccessful ITS can do the barrier in execution of ITS, replacing of human coach will besides be a barrier in execution and broad spread of ITS will take topographic point in another five old ages. 2.2.2 Rule Based Expert System Expert system is a computing machine plan that uses cognition and illation process to work out job that are hard plenty to necessitate important human expert to work out for their solution ( Negnevitsky, 2002 ) . It is besides a computing machine plan in which it is able to execute at the degree of a human expert in a all right job country. The most popular expert systems is a regulation based expert system. It besides called as production regulations in which it contains IF-THEN statement. Structure of Rule Based Expert System A rule-based expert system has five constituents: the cognition base, the database, the illation engine, the account installations, and the user interface. Knowledge Base Database Inference Engine Explanation Facility User Interface User Figure 2.3 Basic Structure of Rule Based Expert System ( Beginning: Negnevitsky, ( 2002 ) ) The cognition base contains the sphere cognition utile for job resolution. In a rule-based expert system, the cognition is represented as a set of regulations. Each regulation specifies a relation, recommendation, directive, scheme or heuristic and has the IF ( status ) THEN ( action ) construction. When the status portion of a regulation is satisfied, the regulation is said to fire and the action portion is executed. The database includes a set of facts used to fit aligned with the IF ( status ) parts of regulations stored in the cognition base. The illation engine brings out the concluding whereby the expert system reaches a solution. It links the regulations given in the cognition base with the facts provided in the database. The account installations enable the user to inquire the expert system how a peculiar decision is reached and why a specific fact is needed. An adept system must be able to explicate its logical thinking and warrant its advice, analysis or decision. The user interface is the agencies of communicating between a user seeking a solution to the job and an expert system. The user is the 1 who will be used the system. User is besides the 1 that will seek for solution. Advantages of Rule Based Expert System Natural cognition representation. An expert normally explains the job work outing process with such looks as this: ‘in such-and-such state of affairs, I do so-and-so ‘ . These looks can be represented rather of course as IF-THEN production regulations. two. Uniform Structure. Production regulations have the unvarying IF-THEN construction. Each regulation is an independent piece of cognition. The really sentence structure of production regulations enables them to be self-documented. three. Separation of cognition from its processing. The construction of a rule-based expert system provides an effectual separation of the cognition base from the illation engine. This makes it possible to develop different applications utilizing the same expert system shell. It besides allows a graceful and easy enlargement of the expert system. To do the system smarter, a cognition applied scientist merely adds some regulations to the cognition base without step ining in the control construction. Disadvantages of Rule Based Expert System Opaque dealingss between regulations Although the single production regulations tend to be comparatively simple and self-documented, their logical interactions within the big set of regulations may be opaque. Rule-based systems make it hard to detect how single regulations serve the overall scheme. This job is related to the deficiency of hierarchal cognition representation in regulation based expert systems. two. Ineffective hunt scheme The illation engine applies an thorough hunt through all the production regulations during each rhythm. Adept systems with a big set of regulations ( over 100 regulations ) can be slow, and therefore big rule-based systems can be unsuitable for real-time applications. Inability to larn In general, rule-based expert systems do non hold an ability to larn from the experience. Unlike a human expert, who knows when to ‘break the regulations ‘ , an expert system can non automatically modify its cognition base, or adjust bing regulations or add new 1s. The cognition applied scientist is still responsible for revising and keeping the system. All information for Rule Based Expert System is cited from Negnevitsky ( 2002 ) . 2.2.3 Intelligent Agent An agent is anything that can be viewed as comprehending its environment through detectors and moving upon that environment through effecters ( Rusell & A ; Norvig, 1995 ) . Presently, agents are the point of involvement on the portion of many countries of Computer Science and Artificial Intelligence. Harmonizing to Jennings & A ; Wooldridge ( n.d. ) , an intelligent agent is a computing machine plan that is able to execute immediate response in order to run into its design aims. Flexible here means that the systems must be antiphonal in which agents should separate their environments and react in a timely to alterations that occur in it. Agents should besides be proactive whereby they should be able to exhibit chances, purposive behaviour, and take the enterprise where appropriate. Finally, agents should be societal in which agents should be interrelate when they comfortable with other Artificial Agents and worlds in order to finish their ain job resolution and to assist others with their activities. Advantages of utilizing Intelligent Agent are because agents represent a powerful tool for doing system more flexible. Agents should act like an ‘expert helper ‘ with regard to some application, knowing about both the application and the user, and capable of moving with user in order to accomplish the user ‘s ends. Agents are besides good in bettering the efficiency of Software Development. The restrictions or the disadvantages of utilizing agent as discussed by Jennings & A ; Wooldridge ( n.d. ) are: – No overall system accountant An agent-based solution may non be suited for spheres in which planetary restraints have to be maintained, domains where a real-time response must be guaranteed, or in spheres in which dead ends or unrecorded locks must be avoided. No planetary position Agents may do globally sub-optimal determinations since in about any realistic agent system ; complete planetary cognition is non a possibility. An agent ‘s action are by definition determined by that agent ‘s local province. Trust and deputation Users have to derive assurance in the agents that work on their behalf, and this procedure can take some clip. During this period of clip, the agent must strike a balance between continually seeking counsel ( and needlessly deflecting the user ) and ne'er seeking counsel ( an transcending its authorization ) . An agent must cognize its restrictions. 2.2.4 Multiagent System As stated by Capuano et Al. ( n.d. ) , multiagent system ( MAS ) can be defined as loosely-coupled webs of pass oning and collaborating agents working together to work out jobs that are in front of their single capablenesss. In order to obtain consistent system behaviour, single agents in a multiagent system are non merely able to portion knowledge about jobs and solutions, but besides to ground about the procedures of coordination among other agents ( Capuano et al. , n.d. ) . The thought of multiagent system is that an agent is a computing machine plan that has capableness to execute independent action on behalf of its proprietor or user. In add-on, agent can calculate out for itself what it needs to make in order to fulfill its design aims. A multiagent system is one that consists of figure of agents, which interact with another, typically by interchanging messages through some computing machine substructure ( Wooldridge, 2002 ) . In order to successfully interact, these agents will therefore necessitate the ability to collaborate, co-ordinate and negotiate with each other. 2.2.5 Distributed Case Based Reasoning Case Based Reasoning ( CBR ) is another technique that is widely used in Intelligent Tutoring System and in the field of instruction so. As proposed by Rishi et Al. ( 2007 ) , they combine both technique which are CBR and agent technique to supply pupil patterning for online acquisition in a distributed environment with the aid of agents. In this paper, it focused more on Case Based Distributed Student Modeling ( agent based ) ITS architecture to back up student-centred, self-paced, and extremely synergistic acquisition. The first measure is to construct the effectual acquisition environment which is the CBR where the system maintains a complete and full set of instances ( scenarios ) of pupil ‘s acquisition form and employs an efficient and flexible instance retrieval system. The system as cited in Rishi et Al. ( 2007 ) must used the pupil ‘s larning profile such as larning manner and background cognition in selecting, forming and showing the larning stuff to back up instance based acquisition. As Rishi et Al. ( 2007 ) cited from Yi Shang et Al. ( 2001 ) and Kumar ( 2005 ) , Distributed CBR based pupil patterning enables adaptative bringing of educational contents and facilitates automatic rating of larning results. This system consists of three agents with different expertness. The first agent which is personal agent will concentrate on pupil profiler which include cognition background, larning manner, involvements, class enrolled etc. The other two agents communicated with each other through different communicating channel which situated in distributed environments are learning agent and class agent. Figure 2.4 show the communicating theoretical account among agents. Figure 2.4 Communication theoretical account among agents ( Beginning: Rishi et Al. ( 2007 ) ) Furthermore, the undermentioned activities as shown in figure 2.5 return topographic point during the pupil patterning when the pupil interacts with the system as such, choice of subject by the pupil and acquire to cognize pupil ‘s background by showing jobs to the pupil, analysing the pupil ‘s response by the system, choice of instance by the system based on response, version of the instance by the system, accomplishing the cognition constituent of the pupil theoretical account through instance retrieval, coevals of learning scheme by the system and showing the following job to the pupil. Figure 2.5 Procedure of Student Modeling ( Beginning: Rishi et Al. ( 2007 ) ) Finally, this system is to the full distributed in which it does non bounded with any web topology, it reduces the demand of big storage infinites at the user ‘s site to hive away all the instances and redundancy is maintained for mistake tolerance. The whole system is managed in the distributed environment with merely three agents which are Personal Agent, Teaching Agent and Course Agent. 2.2.6 Path Analysis Learning indexs is the manner of working and analysing the paths and supplying cognition on the activities ( Bousbia et al. , n.d. ) . This will assist instructors to comprehend and construe the scholar ‘s activities in e-learning state of affairss. As in figure 2.5 this paper by Bousbia et Al. ( n.d. ) considers three stairss in the analysis. The first 1 is index ‘s pick. The first measure is fundamentally to steer the aggregation procedure. It helps the instructor to take high degree indexs in which the instructor intends to seek from the indexs base. It will so inquire the instructor to supply extra informations required for their computations. The following measure is observation. In this phase, the system identified the necessary paths extracted through a aggregation tool which installed on the learner side. This tool has specific history such as visited pages URLs, clip and actions. Finally, the analysis and interpretation measure. This is the most of import measure in which it divided into three chief phases which are shoping way rebuilding, indexs ‘ computation and learning manner tax write-off. Figure 2.6 Learning Style Deduction Steps ( Beginning: Bousbia et Al. ( n.d. ) ) There will be three beds remain which are educational penchant bed, larning procedure bed and cognitive abilities bed. The first bed includes properties related to the preferable acquisition clip, environment penchant, information representations and encoding methods. The 2nd bed includes larning scheme, comprehension and patterned advance attack. For the last bed, it includes motive and concentration capacity. The learning manner can be determined by ciphering the value of each bed ‘s property. By utilizing the necessary high degree indexs, the value is deduced. Furthermore, to link the indexs to the acquisition manners, Bousbia et Al. ( n.d. ) sort them harmonizing to theoretical account beds. The possible values of each bed ‘s property are chosen from the bing acquisition manner theoretical accounts, by doing their definitions closer. 2.3 Related Plants Related plants are plants from other research workers which have related to this undertaking or possibly the same technique used but in different field or sphere. Intelligent Tutoring System and some other techniques is the chief focused in this research to compare and distinguish sphere and techniques with other undertakings. 2.3.1 Intelligent Agent in E-commerce Ecommerce or e-commerce is the ability and accomplishment of selling merchandises or services over the Internet ( Ward, 2010 ) . As discussed by Pivk & A ; Gams ( n.d. ) in their article on Intelligent Agent in E-commerce, the article discussed on appraisal of agent engineerings which involved in purchasing and selling. Several agent-mediated electronic commercialism systems are analyzed in the position of a general theoretical account of the purchasing procedure. E-commerce involves business-to-business ( B2B ) , business-to-customer ( B2C ) and customer-to-customer ( C2C ) minutess. It encounters a broad scope of issues such as security, trust, electronic merchandise, catalogues and many more. Intelligent agent can be used or applied to any of these. Pivk & A ; Gams ( n.d. ) had given illustrations on the use of agent in ecommerce such as Tete-a-Tete ( T @ T ) . For illustrations in Figure 2.7, a shopping agent may have proposals from multiple gross revenues agents. Each proposal defines a complete merchandise offering including a merchandise constellation, monetary value and the merchandiser ‘s value-added services. The shopping agent evaluates and order these proposals based on how good they satisfy its proprietor ‘s penchants. If the shopper is non satisfied, he can review them along one or more dimensions. User shopping agent broadcasts this penchant changes to the gross revenues agents in which, in bend, utilize them to counter-propose better merchandise offering. Figure 2.7 Consumer-owned shopping agents integrative negotiate with multiple merchant-owned gross revenues agents. ( Beginning: Pivk & A ; Gams ( n.d. ) ) 2.3.2 Intelligent Agent Based Graphic User Interface ( GUI ) for e-Physician This paper is proposed by Jung, Thapa & A ; Wang ( 2007 ) . It is all about the attack of utilizing ontology based intelligent interface agent that will help the doctor to get on-line entree interface to patient ‘s chart, fast rescheduling such as exigency instance, easy entree to research lab consequences and cut downing overall cost because of optimal use of clip. In this paper, medical homecare system model is designed in real-time environment. There are four types of agents that are used in this system which are Interface Agent, Admin Agent, Laboratory Agent, Diagnosis Agent and Schedule Agent as in Figure 2.8. Figure 2.8 Conceptual Framework of Intelligent Agent Based user interface ( Beginning: Jung, Thapa & A ; Wang ( 2007 ) ) As cited from Jung, Thapa & A ; Wang ( 2007 ) , interface agent is the agent that will interact with the user and will work as an information filtering agent and choose the most critical instance per precedence. On the other manus, research lab agent will be able to supply the item scrutiny study from the research lab database. Furthermore, diagnosing agent will assist the interface agent to propose proper diagnosing by utilizing determination devising regulations. In add-on, administrative agent will supply pre-historic diagnosing tendency of the patient and eventually schedule agent will assist in fixing patient ‘s chart, programming, and fat rescheduling of the program on footing precedence. Those agents will assist in the development of the system and will give user ‘s concluding control for optimisation of their best Graphical user interface. 2.3.3 Intelligent Agent in Computer Games Games are the practical universes that are more traceable than existent universe. It is besides something that can be controlled, formal, and mensurable, supply realistic and important challenge ( Mikkulainen, n.d. ) . Intelligent agents can be deployed in games today. As cited in Lent et Al. ( n.d. ) , they discussed on the usage of intelligent agent in the games called Soar. It make the growing of intelligent agents for games easier by giving common illation engine and reclaimable cognition base that can be merely applied in many different games. Soar allows easy decomposition of the agent ‘s action through hierarchy of operation. It used Quake II and Descent 3 agents in which both have the functionality in the games such as winging in a starship without gravitation, onslaught, explore and many more. Furthermore, Soar invariably cycles through perceive in which it accept sensor information from the game, think ( choice and execute relevant cognition ) and Act ( Execute internal and external actions ) . Interface is another of import portion in developing games since the interface extracts the necessary information from the game and encodes it into the format required in Soar. 2.3.4 Nervous Network-based Fuzzy Modeling of the Student in ITS This paper is utilizing empirical attack that use the neuro-fuzzy synergy to measure the pupils in the context of an ITS is presented. Stathacopoulou, Magoulas & A ; Grigoriadou ( n.d. ) stated that fuzzed logic techniques is widely used in ITS since it have the ability to manage imprecise information such as pupil ‘s actions and to supply human descriptions of cognition and of pupil ‘s cognitive abilities. In this paper, fuzzed logic is used to supply human-like approximative diagnosing of pupil ‘s cognition and cognitive abilities and Neural Network is used to trained human instructor ‘s determinations sing pupil ‘s features and fixed weight Neural Network are used to measure and aggregate rank map. The neuro-fuzzy theoretical account has been tested in natural philosophies domain to measure pupil ‘s features for make up one's minding about the appropriate instruction scheme. Experiments have been performed by Stathacopoulou, Magoulas & A ; Grigoriadou ( n.d. ) utilizing a population of 300 fake pupil instances with the determinations of 5 instructors. The overall mean categorization success has been 95 % . As decision, rating of pupils depends on interior decorator ‘s ability to analyse the cognitive sphere appropriately, define fuzzed sets and associate the pupil response with suited cognition and cognitive features. 2.3.5 FlexiTrainer: A Ocular Authoring Framework for Case-Based Intelligent Tutoring System FlexiTrainer is an authoring model that allowed the fast fleet design of didactically rich and performance-oriented acquisition environments with tradition content and tutoring schemes ( Ramachandran, Remolina & A ; Fu ( n.d. ) ) . This authoring tool specifies a dynamic behaviour of tutoring agents that interact to present direction. FlexiTrainer has been used to develop an ITS for preparation chopper pilots in winging accomplishments. FlexiTrainer consists of two constituents which are the authoring tools and the everyday engine. Core constituent for FlexiTrainer are Task-Skill-Principle Editor, Exercise Editor, Student Model Editor, and Tutor Behavior Editor. Each of these editors has their ain specific functionality. An instructional agent is used to transport out teaching-elated to accomplish instructional ends. It used Bayesian illation to integrate pupil patterning schemes. 2.3.6 Intelligent Tutoring System utilizing Hybrid Expert System with Speech Model in Neural Networks This paper used supervised larning nervous webs to successful rate. Besides being more information bringing systems, this system aid pupils to actively build cognition. This paper by Venkatesh, Naganathan & A ; Maheswari ( 2010 ) enable learning system to be developed in assorted Fieldss and topics. Nervous Model in this system is used for Question Answering System. As shown in Figure 2.9, input bed contains the inquiries on the wanted topics. Both possible inquiries and replies are stored in the coveted end product. Figure 2.9: Nervous Network Architecture ( Beginning: Venkatesh, Naganathan & A ; Maheswari, ( 2010 ) ) On the other manus, address theoretical account consists of linguistic communication extraction ( includes categories such as noun, verb, operator, pronoun and many more ) , speech act classifier ( tutor uses strings of words and punctuation to sort each part of the scholar into speech act units ) , file direction ( used as marker for the lector ‘s manner reply which communicated with ITS faculty ) and manners ( choice individual to be communicated with the ITS either pupil, lector or admin ) . This system non merely cut down development times but besides appreciably simplifies the proficient cognition required of forces involved in the coevals of an auto-regulated intelligent tutoring duologue system ( Venkatesh, Naganathan & A ; Maheswari ( 2010 ) ) . 2.4 Drumhead There are many ways in developing Intelligent Tutoring System as mentioned above. Each technique used has its ain strengths and failings. In this undertaking, Rule-based is used since it gives more impact and significance to the paradigm. The following chapter will demo the research model on the methodological analysis for developing this paradigm.