Wednesday, July 31, 2019

Women in the Workplace

From running for president, making up over half of the workforce, managing some of the world’s most successful companies, and earning almost 60% of university degrees in America and Europe, women’s presence in the workforce is more prominent today than ever. This â€Å"economic empowerment of women† is changing the workplace, as we know it. Only 20 years ago, women were viewed as only capable of unskilled jobs and were assumed to place marriage and children before having a career. In today’s society, women have more opportunities to have power over their lives and chose their career path. In today’s global economy, every country should be utilizing the talents of their women in their workforce. For many countries, this progress has not been the same as America. For example, in Italy and Japan men employment rates are more than 20 percentage points higher and women’s employment rate is still below 50%. On average, women still earn significantly less than men and are a minority in top management. Remarkable Social Change without Conflict The Economist found three surprising results from the increase of women in the workforce: the lack of privilege felt from women about their new opportunities, unmet expectations of women’s role in the workforce and the lack of resistance from society, especially men. The lack of celebration from women is believed to be because of the economic necessity of women to work. Today, most households are two-income and women have little choice as to whether they want to work or not. Their contribution is the only way for many households to maintain their standard of living after having children. Also, many young women take this opportunity to work for granted, because they have grown up in a welcoming environment where women were always part of the workforce. Although women are encouraged to enter the work force, only 2% are managers and less than 13% are board members. Men dominate top management. America and Britain’s average full-time, female workers earn only about 80% as much as their male counterpart. Finally, most Americans are comfortable with women in the workforce with 9 out of 10 men are even comfortable with women earning more than they do. The minimal resistance to this social trend, especially by men, has allowed it to adapt rapidly and with little conflict. Contributing Factors to this Social Change A major explanation for increased women in the workforce is the large amount of women who are university graduates and professional workers. Growth of higher education has increased women’s value in the job market and has caused a shift in the woman role model as professional women, not just homemakers. According to The Economist, in 1963, 62% of college-educated women were in the workforce whereas 46% of those who had a high school diploma. Today, 80% of American women with a college education are in the workforce in contrast to 67% with a high school diploma and 47% without one. Women are also educated in more â€Å"marketable subjects† such as business and management. In 1966, 40% of women obtained a degree in education and 2% in business and management. Where as today, 12% obtain degrees in education and 50% obtain degrees in business and management. Engineering and computer science are one of the few areas women are lagging in. Politics have had a major effect on this revolution. Feminists have made domestic slavery unacceptable. Feminists have also strongly criticize discrimination toward women in the work place. We’ve even seen equal-rights acts passed in order to assure an equal playing ground in the work force for men and women of all ethnicities. Economic and technological forces have also played a role in the empowerment of women in the workforce. There has been a growing demand for women in the workforce. When strength was required to work, men had the advantage. The growth in the service sector and decline in the manufacturing sector has made brainpower more of a demand in the work force. This puts men and women on a more equal playing ground. Lastly, women have been more than willing and able to meet the demands of being in the workforce. Many factors play a role in this. For example, traditional cleaning is done easier and quicker than before. The contraceptive pill has allowed women to get married late, increased their ability to invest in their careers, and allowed them to finish schooling instead of taking breaks due to childbirth. Major Challenges Faced with a Woman Workforce Two major challenges have occurred with the increase of women in the workforce. First, women continue to be under-represented in top management, with only 2% in America and 5% in Britain, and are paid considerably less than men. Secondly, it is very demanding for women to manage both their career and their family. In America, 74% of parents believe they don’t spend enough time with their children because they are constantly juggling their work and home life. In two-parent working households, childcare consumes a large proportion of the budget, but having one parent stay at home could result in much lower income for family expenses. Therefore, having only one income is not an option. Poor households are affected the most because of the large amount of poor mothers in the workforce and the unwillingness to spend public funds on childcare for these mothers. Career Woman vs. Motherhood As women become more and more prevalent in the workforce, they find themselves choosing between being successful in their careers and being a stay-at-home mother. Many women are in challenging careers in their 20s, leave in their 30s to have children and find it hard to return after their leave of absence. Of all the women who left work to have children, 93% of women wanted to return to work, but only 74% returned to work, only 40% returning full-time. Also, many women find the role of motherhood damaging to their professional career. Those women in corporate America who don’t have children earn as much as men, where as mothers earn less and single mothers even less. The Economist explains that the â€Å"cost of motherhood† is great for women in professional careers because wages increase abruptly and schedules are very demanding. Many times executives are expected to work in numerous departments and travel often. Therefore, the gap ii pay and positions between men and women may be because women are measured exactly the same as men, not because of discrimination or unfair treatment. This trend is producing high cost on individuals and society because many professional women are eliminating motherhood altogether or are forced into the fertility industry when they do decide to have children. Solutions for these Challenges For the most part, people believe that this trend will handle itself. Others argue that government intervention such as women quotas, state-funded daycares, extended paid maternity leave, â€Å"parent’s salary,† earlier preschool education, or the elimination of part-time jobs is necessary to fix these problems. The Economist discusses how these different alternatives have been used in other countries with success, but there is not enough evidence to show these measures have created the success. In fact, America has had many of the same results as these countries without taking such drastic measures. There are less dramatic steps that the American government can take to improve and ease women into the workforce. These include alterations such as longer school days and shorter summer holidays or closing midday. The struggle with fixing problems from â€Å"the social consequences of women’s economic empowerment† will continue for decades to come. The Future of Women in the Workforce This trend of women in the workforce is likely to continue to grow and is apparent throughout all aspects of business. The Economist predicts that by 2011, there will be 2. 6 million more female than male university students. The Bureau of Labor Statistics states that women already compose more than 2/3 of employment in 10 of the 15 job categories today. Many women are also opening their own business, doubling that of men in the last 10 years. Women will also benefit from the â€Å"war for talent† because of the ageing workforce and need for skill-dependent workers. Many firms are dividing hours differently such as judging hours annually instead of weekly, allowing them to come in early or late, allowing Fridays off as long as hours are made up, and even allowing husbands and wives to share jobs. The corporate world is even making adjustments to encourage women into the workforce and help with the juggle of raising children and working such as rethinking promotional practices and sustain communication with mothers who are away from work due to their children, allowing them to work from home, or offering flexible scheduling. With the advancement of technology – Internet, e-mail, and conferencing – redesigning the workplace is much more possible.

Tuesday, July 30, 2019

E-Ticket

INDEX 1. ACKNOWLEDGEMENT 2. FEASIBILITY STUDY a) ABSTRACT b) PROBLEM STATEMENT c) FORMULATION OF SOLUTION STRATEGIES and d) ANALYSIS OF ALTERNATE SOLUTIONS 3. REQUIREMENT ANALYSIS a) HARDWARE AND SOFTWARE REQUIREMENTS b) SRS DOCUMENT i. SOFTWARE MODEL ii. ARCHITECTURAL PATTERN iii. DESIGN PATTERN iv. SCOPE AND PROCESS v. OUTLINE OF ANALYZED PROCESSES 4. SYSTEM DESIGN a) PROJECT SYNOPSIS b) ER-DIAGRAMS c) UML DIAGRAMS i. USECASE DIAGRAMS ii. CLASS DIAGRAMS iii. SEQUENCE DIAGRAMS d) DATABASE DESIGN 5. MAINTENANCE 6. CONCLUSION 7. BIBLIOGRAPHY ABSTRACT ? Name of the Project: e-Ticketing Vision: The Ultimate motto of the project addresses all the problems that were faced by the current traveling agencies. Coming to the feasibility aspect the current project focuses on 1) Economical Feasibility 2) Technical Feasibility 3) Operational Feasibility ? Deliverables/ Functional Specification:- 1. Current Administrators 2. Current Agents 3. Customers 4. Details of the services. 5. Timings, Sourc e, Destination details. Note: The application should be secured with different levels of access control. INITIAL INVESTIGATION Project Request and Problem initializationThe first step in System Development Life Cycle (SDLC) is the identification of need. The user request identifies the need for change and authorizes the initial investigation. The objective is to determine whether the request is valid and feasible. The outcome of the initial investigation is the presentation of results called project proposal. An acceptance signature on the project proposal by the authorized person and its acceptance by the MIS department makes it a formal agreement to proceed with the detailed analysis and design of the candidate system. PROBLEM DEFINITION:This project is basically about the â€Å"e-Ticketing† for â€Å"xxxxxxxxxx†. The existing procedure of â€Å"e-Ticketing† was done locally respective to the travelling agency, looking up and checking the various details of di fferent services in different places was a tedious and cumbersome process. It was even error prone and definitely not a pleasant task to perform. There are many problems involved in the existing system and has the following limitations- †¢ Time consuming (All process was done involving manually). †¢ Lack of integration. †¢ Difficulty in data processing (Since for each time the customer has to manually involve). Changing the decision at the last moment is a tedious task. †¢ Difficulty in viewing the service details. These were the chief reasons for the development of the project. To alleviate the above lacuna and thus achieving better information retrieval, the organization has decided to introduce the use of â€Å"e-Ticketing† FORMULATION OF SOLUTION STRATEGIES AND ANALYSIS OF ALTERNATE SOLUTIONS Organizations today can be benefit from the availability of these alternatives and evaluate how they can best benefit from them in the short to long term. Full tr easury centralization is today more accessible than ever.The traditional centralizing structures are still the preferred options, but payment factories are becoming more critical as the integration layer between treasury and the rest of the organization. Furthermore, strategic outsourcing is lowering the investment and project risk barriers and can significantly reduce the execution time of a centralization initiative if not even leap-frog some of the intermediate phases. While organizational centralization is a concept that is well understood, its practical application faces many challenges that often lead to a slow progression towards fully centralized management models.Transition can take different forms and can proceed at different speeds depending on the corporate organization. Individual business as well as form-wide initiatives, driven by cost efficiency, process integration or performance visibility, generate new centralization-fostering opportunities The use of reference to centralization terminology requires some qualifications: †¢ Strategic coordination – the less intrusive form, relying on policies, procedures and guidelines centrally issued. Compliance control – based on a formal and strict compliance and reporting framework, which could extend to central approval for certain activities †¢ Mandated execution – involving the transfer of some value-adding activities to a central entity †¢ Functional consolidation – migration and reorganization of entire activities into a new infrastructure Over the past decade functional centralization has experienced a strong acceleration thanks to rapid developments in application technology and communication protocols.By breaking down some of the barriers to effective exchange, access and circulation of data and information, the functional distribution of tasks and activities can be designed in a more flexible manner. Business applications can be deployed as single globa l installations and accessed remotely and securely. They can interface more easily with other systems and integrate a number of independent or standalone processes. The combination of these features takes centralization to a new level of sophistication and at the same time makes it more accessible and appropriate to a broader number of organizations.While organizational centralization is a concept that is well understood, its practical application faces many challenges that often lead to a slow progression towards fully centralized management models. Transition can take different forms and can proceed at different speeds, depending on the corporate organization. â€Å"Centralization† is commonly associated with a number of strong benefits that range from pure cost savings to control improvement, full compliance with corporate policies, process standardization, increased productivity and expertise consolidation. Hardware and software Requirements User interface requirements: D reamweaver MX.IDE : Eclipse Database requirements : Oracle8. 1 Server : Tomcat 5. 0 Preferred Technologies : JavaScript, Java ( Jdbc 2. 0,Servlets2. 1, JSP 1. 2 ,Struts) SOFTWARE DEVELOPMENT PROCESS MODEL In this project we are using the â€Å"Evolutionary Model† which is also referred to as the successive versions model and sometimes as the Incremental model. Comparison of different life cycle models Although classical waterfall model is the basic model for all the other life cycle models but it cannot be used in practical development projects, since these models supports no mechanism to handle the errors during the phases.This problem is overcome in iterative waterfall model but it is not suitable for very large projects and for projects that are subject to many risks. This model assumes that the requirements be completely specified before the next of the development activity can start, it cannot be satisfactorily used in projects where only rough requirements are available at the beginning of the project. This model creates blocking states in the system i. e. , some team members would have to wait for a phase to be complete before they can start their next activity. This is clearly wastage of resources and such wastages are rarely tolerated in real projects.In this life cycle model, the software is first broken down into several models (or) functional units, which can be incrementally constructed and delivered. The development team first develops the core modules of the system. This initial product skeleton is refined into increasing levels of capability by adding new functionalities in successive versions. Each evolutionary version may be developed using an iterative waterfall model of development. Each successive version of the product is fully functioning software capable of performing more useful work than the previous versions.In this model, the user gets a chance to experiment with partially developed software much before the complete version o f the system is released. Therefore, the evolutionary model helps to accurately elicit user requirements during the delivery of the different versions of the software, and the change requests therefore after delivery of the complete software are minimized. Also the core modules get tested thoroughly, thereby reducing chances of errors in the core modules of the final product. Further, this model obviates the need to commit large resources in one go for development of the system.The main disadvantage of the successive versions model is that for most practical problems it is difficult to divide the problem into several functional units, which can be incrementally implemented and delivered. Therefore, the evolutionary model is normally useful for only very large products, where it is easier to find modules for incremental implementation. Often the evolutionary model is especially when the customer prefers to receive the product in increments to be able to start using the different feat ures as and when they are developed rather than waiting for the full product to be developed and delivered.Evolutionary model is very popular for the object-oriented software development projects, because the system can easily be partitioned into stand-alone units in terms of the objects. ARCHITECTURAL PATTERN Model-View-Controller The Model Layer The model layer in a Java based web application can be implemented using any Java-based technology, such as EJB, Hibernate, or JDO. In our CoreBanking System. The model is represented as simple JavaBeans containing the data and business logic in a simple data access object. As far as possible, the model objects should be developed so that they have no knowledge of the environment.This allows us to more easily reuse them across environments and applications. The View Layer The view layer of most Java based web applications is made up of JavaServer pages. To facilitate the development of the view, Java provides a set of JSP tag libraries. Th ese tag libraries allow us to easily provide fully internationalised user interfaces that interact with the model components of a web application. The vast majority of dynamic Web front ends are based on HTML forms, and users of such applications have come to expect from these applications certain behaviours, such as form validation.With standard JSP, this is a tedious process that involves recording the contents of the form and populating every form element with information from a JavaBean in case of error. Java facilitates this sort of form processing and validation using Custom tags. These, in combination with the JSP tag libraries, make View development with forms really simple and natural. The Controller Layer Java includes a Servlet that implements the primary functions of the Controller, which is to map the incoming URL to a model object. The Servlet provides the following functions: 1.Decide what action is required to service a users request 2. Provide view data to the view 3. Decide which view to show next A Java developer must provide these actions (models) to implement the logic of their application. What is Model-View-Controller? . Let’s start by looking at how the Model, the View, and the Controller interact with one another: [pic] Figure 1: Model 2/MVC architecture As you can see from the above diagram, the user interacts with the Controller components (usually represented by Servlets) by submitting requests to them.In turn, the Controller components instantiate Model components (usually represented by JavaBeans or other similar technology), and manipulate them according to the logic of the application. Once the Model is constructed, the Controller decides which View (usually represented by JavaServer Pages) to show to the user next, and this View interacts with the Model to show the relevant data to the user. Using Java Server Pages or Servlets alone is known as Model 1. Model 2 was not particularly innovative or new; it uses Servlets to resemble Controller and Java ServerPages for resembling views.Many people realised that it follows the well-known MVC pattern that was developed back in the days of Smalltalk. As such, Java programmers tend to use the terms Model 2 and MVC interchangeably. DESIGN PATTERN Data Access Object Context Access to data varies depending on the source of the data. Access to persistent storage, such as to a database, varies greatly depending on the type of storage (relational databases, object-oriented databases, flat files, and so forth) and the vendor implementation Problem Applications can use the JDBC API to access data residing in a relational database management system (RDBMS).The JDBC API enables standard access and manipulation of data in persistent storage, such as a relational database. The JDBC API enables J2EE applications to use SQL statements, which are the standard means for accessing RDBMS tables. However, even within an RDBMS environment, the actual syntax and format of the S QL statements may vary depending on the particular database product. There is even greater variation with different types of persistent storage. Access mechanisms, supported APIs, and features vary between different types of persistent stores such as RDBMS, object-oriented databases, flat files, and so forth.Such disparate data sources offer challenges to the application and can potentially create a direct dependency between application code and data access code. When business components-entity beans, session beans, and even presentation components like servlets and helper objects for Java Server Pages (JSP) pages –need to access a data source, they can use the appropriate API to achieve connectivity and manipulate the data source. But including the connectivity and data access code within these components introduces a tight coupling between the components and the data source implementation.Such code dependencies in components make it difficult and tedious to migrate the appl ication from one type of data source to another. When the data source changes, the components need to be changed to handle the new type of data source. Forces Portability of the components is directly affected when specific access mechanisms and APIs are included in the components. Components need to be transparent to the actual persistent store or data source implementation to provide easy migration to different vendor products, different storage types, and different data source types. SolutionUse a Data Access Object (DAO) to abstract and encapsulate all access to the data source. The DAO manages the connection with the data source to obtain and store data. The DAO implements the access mechanism required to work with the data source. The data source could be a persistent store like an RDBMS, an external service like a B2B exchange, a repository like an LDAP database, or a business service accessed via CORBA Internet Inter-ORB Protocol (IIOP) or low-level sockets. The business com ponent that relies on the DAO uses the simpler interface exposed by the DAO for its clients.The DAO completely hides the data source implementation details from its clients. Because the interface exposed by the DAO to clients does not change when the underlying data source implementation changes, this pattern allows the DAO to adapt to different storage schemes without affecting its clients or business components. Essentially, the DAO acts as an adapter between the component and the data source. Participants and Responsibilities Business Object The Business Object represents the data client. It is the object that requires access to the data source to obtain and store data.A Business Object may be implemented as a session bean, entity bean, or some other Java object, in addition to a servlet or helper bean that accesses the data source. Data Access Object The DataAccessObject is the primary object of this pattern. The DataAccessObject abstracts the underlying data access implementati on for the Business Object to enable transparent access to the data source. The Business Object also delegates data load and store operations to the DataAccessObject. Transfer Object This represents a Transfer Object used as a data carrier. The DataAccessObject may use a Transfer Object to return data to the client.The DataAccessObject may also receive the data from the client in a Transfer Object to update the data in the data source. Consequences: †¢ Enables Transparency Business objects can use the data source without knowing the specific details of the data source's implementation. Access is transparent because the implementation details are hidden inside the DAO. †¢ Enables Easier Migration A layer of DAOs makes it easier for an application to migrate to a different database implementation. The business objects have no knowledge of the underlying data implementation. Thus, the migration involves changes only to the DAO layer.Further, if employing a factory strategy, i t is possible to provide a concrete factory implementation for each underlying storage implementation. In this case, migrating to a different storage implementation means providing a new factory implementation to the application. †¢ Reduces Code Complexity in Business Objects Because the DAOs manage all the data access complexities, it simplifies the code in the business objects and other data clients that use the DAOs. All implementation-related code (such as SQL statements) is contained in the DAO and not in the business object.This improves code readability and development productivity. Centralizes All Data Access into a Separate Layer Because all data access operations are now delegated to the DAOs, the separate data access layer can be viewed as the layer that can isolate the rest of the application from the data access implementation. This centralization makes the application easier to maintain and manage. Scope of the Development Project Database Tier: The concentration is applied by adopting the Oracle 8. 1 Enterprise versions. SQL is taken as the standard query language.The overall business rules are designed by using the power of PL/SQL components like stored procedures stored functions and database triggers. User Tier: The use interface is developed is a browser specific environment to have centralized architecture. The components are designed using Dreamweaver and Java server pages power the dynamic of the page design. Data Base Connectivity Tier The communication architecture is designed by concentrated on the standards of servlets and Java Beans. The database connectivity is established using the Java Database connectivity. PurposeThe generated application is the first version upon the system. The overall system is planned to be in the formal of distributed architecture with homogeneous database platform. The major objective of the overall system is to keep the following components intact. ( System consistency ( System integrity ( Overall se curity of data ( Data reliability and Accuracy ( User friendly name both at administration and user levels ( Considering the fact of generality and clarity ( To cross check that the system overcomes the hurdles of the version specific standards OUTLINE OF ANALYZED PROCESSES ACTOR: ADMIN Process:1 Registration of new Administrator Input: Enter all the admin details like first name, last name, date of birth etc. Process: registration (form) Output: registration success/ registration fail ? Process:2 View Pending Agents Input: All the Pending Agents Process: view Pending Agents (form) Output: Accept/Reject Process:3 View Permanent Agents Input: All the Permanent Agents Process: view all the permanent Agent Details Output: success/fail ? Process :4 Add a new Bus Input: Enter Number, Type, Source, and Destination†¦ Process: Add the details in the database Output: success/fail Process :5 Add a new Bus Type Input: BusType, Id†¦ Process: Insertion of new Type (Id. ) Output: succes s/fail ? Process :6 Add Offer Input: OfferName, Applicable for, time. Process: adding Offer (form) Output: success/fail ? Process :7 Add New Trip Details Input: Enter all the trip details like Tripid, Locationid, etc. Process: New Trip (form) Output: success / fail ? Process:8 Change Halts Input: Enter existing source, destination details of the Location Process: change Halts (form) Output: success/fail ? Process:9 Send Messages To Notice Board Input: Enter Description of the Topic, Applicable to†¦Process: sendMessages(adform) Output: success ? Process:10 Send Mails Input: Agents Id, Customer Id Process: send mails (form) Output: success ? Process:11 Create new group Input: Enter grid and name of the group Process: insertGroupDetails (GroupDetailsForm gdf) Output: success ? Process:12 View all the Buses Input: View All Process: get all the details from Database Table Output: success/fail ? Process:13 View Offers Input: View Offers, Time they will be elapsed. Process: view Offer s (table) Output: success ? Process:14 view Permanent Agents Input: view all the existing Permanent AgentsProcess: all the permanent Agents (table) Output: success ? Process:15 view messages Input: view All the messages that r sent by Agents, Customers Process: view Messages (table) Output: success ? Process:16 view Buses Input: view all the existing Buses Process: view Buses(table) Output: success ? Process:17 View TripDetails Input: view All the TripDetails Process: Get all the trip details like(Trip Id,Timings.. ) Output: success ? Process:18 view BusTypes Input: view all the existing BusTypes Process: View BusTypes(table) Output: success ACTOR: AGENT ? Process:1 RegistrationInput: Enter all the Agentdetails like first name, last name, date of birth etc. Process: registration (form) Output: registration success/ registration fail ? Process:2 View Pending Agents Input: All the Pending Agents Process: view Pending Agents (form) Output: Accept/Reject ? Process:3 View Permanent Agent s Input: All the Permanent Agents Process: view all the permanent AgentDetails Output: success/fail ? Process :4 Add a new Bus Input: Enter Number, Type, Source, and Destination. Process: Add the details in the database Output: success/fail ? Process :5 Add a new BusType Input: BusType, Id,Process: Insertion of new Type (Id. ) Output: success/fail ? Process :6 AddOffer Input: OfferName, Applicable for,time.. Process: adding Offer (form) Output: success/fail ? Process :7 Add New TripDetails Input: Enter all the tripdetails like Tripid, Locationid, etc. Process: NewTrip(form) Output: success / fail ? Process:8 Change Halts Input: Enter existing source, destination details of the Location Process: change Halts (form) Output: success/fail ? Process:9 Send Messages To NoticeBoard Input: Enter Description of the Topic,Applicable to†¦ Process: sendMessages(adform) Output: success Process:10 SendMails Input: AgentsId, CustomerId Process: send mails(form) Output: success ? Process:11 Cr eat new group Input: Enter gid and name of the group Process: insertGroupDetails (GroupDetailsForm gdf) Output: success ? Process:12 View all the Buses Input: View All Process: get all the details from Database Table Output: success/fail ACTOR: CUSTOMER ? Process:1 Registration of new Administrator Input: Enter all the admindetails like first name, last name, date of birth etc. Process: registration (form) Output: registration success/ registration fail ? Process:2 View Pending AgentsInput: All the Pending Agents Process: view Pending Agents(form) Output: Accept/Reject ? Process:3 View Permanent Agents Input: All the Permanent Agents Process: view all the permanent Agent Details Output: success/fail ? Process :4 Add a new Bus Input: Enter Number, Type, Source, and Destination. Process: Add the details in the database Output: success/fail ? Process :5 Add a new Bus Type Input: BusType, Id, Process: Insertion of new Type (Id. ) Output: success/fail ? Process :6 AddOffer Input: OfferNa me, Applicable for, time. Process: adding Offer (form) Output: success/fail Process :7 Add New TripDetails Input: Enter all the trip details like Tripid, Locationid, etc. Process: New Trip (form) Output: success / fail Project Synopsis Technical Descriptions ? Database: The total number of databases that were identified to build the system is 14. The major parts of the databases are categorized as administration components and customer of based components. The administration components are useful is managing the actual master data that may be necessary to maintain the consistency of the system. These databases purely used for the internal organizational needs and necessities.The Administrator, Agent and Customer components are designed to handle to transactional states that arise upon the system whereas customer makes a visit onto the portal for making his transactions faster. The Customer components are scheduled accept parametrical information from the users as per the system nece ssity. ? GUI: In the flexibility of the users the interface has been developed a graphics concept in mind, associated through a browsers interface. The GUI’S at the top level have been categorized as ? Administration users interface ? Agents interface ? Customer users interfaceThe Administration users interface concentrate on the consistent in that is practically part of organizational actuaries and which needs proper authentication for data collation. The Administrator and Agent user interface helps the respective actors in transacting with the actual information as per their necessities with specific to the required services. The GUI’s restrict the ordinary users from mismanipulating the systems data, which can make the existing system non-operational. The information with specific to their personal standards and strategies can be changed through proper privileges. Modules: ) Administrator Module: This module maintains the services related to system administrator who is authenticated upon the system. This module fairly maintains the integration between the modules related to backend database and the functionalities carried out in the whole organization. This module also binds itself with the agent and customer details. 2) Agent Module: This module maintains the information related to the customers who have been signed upon to the system as well as the internal information of the organization. The module integrates itself with the other modules like the Administrator module and customer module that are provided y the organization. This module acts as a major integrator with Admin transactions and the requests for approvals that are raised by the customer. 3) Customer Module: This module manages and keeps track of the details of the existing services. It has interaction to Agent as well as administrator to keep track of the consistency of information form time to time as they are executed. 1. Actor: Admin The Admin module consists of the followin g services: ? Register another administrator. ? View pending agents and Accept or Reject them ? View permanent agents ? Add a new Bus. ? Add New Bus Type ? Add Offer Add New Trip Details ? Change Halts ? Send Messages to notice Board ? Send Mails ? View All the Busses ? View All Administrators ? View Offers ? View Permanent Agents ? View Messages ? View Busses ? View Trip details ? View Bus Types Register another administrator: In this process, Admin submits the details of another administrator with whom he want to share his responsibilities. The person whom admin appoints as an administrator will have the privilege to do all the responsibilities that are performed by actual Admin only if he is properly authenticated after login. †¢ View pending agents and Accept or Reject them::In this process, he can view the pending agents, he may accept the agents or reject. The agents who r accepted will be treated as Permanent agents. Those who are rejected, their details will not be upda ted in the database. †¢ ViewPermanentAgents: In this process he can view all the permanent agents along with their complete details. And the details of new Agents which he made from pending to permanent agents. †¢ Add New Bus : In this process, if the existing services are not able to meet the requirements of customers, he may add new types to meet the requirements of customer. Add New Bus Type: In this process, if the existing services are not able to meet the requirements of customers, he may add new types to meet the requirements of customer. †¢ Add Offer: In this process, a strategy of new offers will be declared by admin to attract customers, and increase his business and thereby withstanding in the competition. †¢ Add New Trip Details: In this process, new trip details will be declared by admin as per the agent & customer requirements. By modifying the trip details according to customer and agent requirements they may feel convenient. †¢ Change Halts:I n this process, admin can change the halts of his buses according to the Requirement of customers and also the agents keeping in view of appropriate halts and timings. †¢ Send Messages to notice Board: In this process, admin can display the messages about the bus services, timings, charges, offers, trips, also the details of performance appraisal of his employees to motivate them. †¢ Send Mails: In this process, admin can send the messages about the queries that were posted by both agent and customer. A proper feedback must be there for every organization to withstand the competition and to be interactive with customers. View All Administrators: In this process Admin can view all the administrators that are appointed by him for responsibility division. and he can all the details of them completely in this module. †¢ View Offers: In this process Admin can view the offers he provided . Because he should delete the offers as and when the time of the particular offer has been elapsed. †¢ View Permanent Agents: In this process Admin can view the permanent agents that r under his guidance. By viewing this module he can have the complete idea that who are the new agents added as permanent and also their details. View Messages: In this process Admin can view all the messages that are sent by agents for enhancements and has the privilege to implement the enhancements if the requirements are really needed. Can view all the messages that are sent by agents for enhancements and has the privilege to implement the enhancements if the requirements are really needed. †¢ View Buses: In this process, admin can view the details of the services and their appropriate timings and their halts and also the type of services and all other desired details. †¢ ViewTripDetails:In this process, admin can view the details of the services and their appropriate timings and their halts and also the type of services and all other desired details. †¢ ViewBusTyp es: Instead of sending messages to each and every account with this service Admin can display the message into the notice board and is accessed by every person. †¢ Logout: Whenever the Admin wants to quit the application he needs to use this service so that the session will be invalidated so that no one can access his account thus restricting others in accessing the Admin’s account. 2. Actor: Agent Registration for new License ? Registration ? Add Offer ? View Offers ? Send Messages ? View Messages ? Book Ticket ? Block Ticket ? Add Customer ? View Customers ? Logout †¢ Request for new license: In this process, new bus station that is agent want to establish should take a license from the Central agency i. e. Head Office . In the license certificate establishment details. Location, date details will be there. Registration In this process, agent can change his password by submitting the specified fields like agent id, old password, new password, retype new password.I f he enters the correct values then his password and he will get new password. †¢ Add Offer In this process, offers will be announced by agent office to implement business strategies such that it will improve the throughput and withstand in the competitive environment. †¢ View Offers: In this process, the existing offers include and also to delete the offers if the specified offer time has been elapsed. †¢ Send Messages: In this process, the total offers include new & old will be maintaining at the agent office. If the correspondent agent office has some permanent customer it can send messages to them. View Messages: In this process, every agent maintain list of messages to which they have sent, the messages how the people (customers r interactive with both agents and Administrators. †¢ Book Ticket: In this process, agent can book the tickets as the requirement of the customer approached by verifying the availability of trips, timings, availability seats†¦. †¢ Block Ticket In this process, agent office maintains details of customers if any one wants to cancel the tickets immediately they can block the tickets by assigning to others who r ready that trip. .Add Customer:In this process, if any customer wants to register with the agent he has the privilege to add the customer and make the services available to this new Customer. †¢ View Customers: In this process, every agent office maintains data about the customers, and their complete details regarding the journey along with his journey details. And also the services he was using. †¢ Logout: Whenever the Agent wants to quit the application he needs to use this service so that the session will be invalidated so that no one can access his account thus restricting others in accessing the Agent’s account. 3. Actor: Customer ? Register ? View Offers View Messages ? Send Messages to Agent ? Send Messages to Administrator ? View Bus Services ? View Bus Trip details like t imings †¦ ? Send Request to agent for booking a ticket ? Logout †¢ Register : In this process the Customer who wants the intended services provided by the agency. He should submit the details required, and if they r valid then only he will be given with one unique ID, Password which he should submit while login phase. If he forgets the password or Id he will be provided with an option to regain its Uid And password, but he should submit some details correctly with the data which he was submitted during registration phase. View Offers: In this process, customer see offers according to that he can register to view the offers. If he is eligible for that offer i. e. time is not elapsed he may bargain that offer. †¢ View Messages: In this process, customer sees all messages that are given by Customers, Agents, and Administrators and may get the required information. †¢ Send Message to Agent: In this process, Customer Registration modifications (i. e. ticket cancellati on, buy new tickets, dates postponement) occur. If the customer has any problem-sending message to agent can solve him. †¢ Send Message to Administrators:If the agents could not solve problems of the customers, meesage are sent to the administrators to solve those problems. Such they may get the accurate information from the adminstrator or send their valuable suggestions to implement by the Organization. †¢ View Bus Services: This process helps to get overall information about bus services i. e. Bus timings, routes such that he may get the services for his desired timings And may travel accordingly. †¢ View Bus Trip details like timings †¦ This process helps to give overall information about bus services And No. f Trips, Bus timings, routes, availability at his desired timings †¢ Send Request to agent for a ticket booking: In this process customer can directly reserve the tickets in nearer agents or from far place. by submitting the source & destination det ails along with the fare details i. e. the way of amount to be paid. †¢ Logout: Whenever the Customer wants to quit the application he needs to use. This service so that the session will be invalidated so that no one can access his Account thus restricting others in accessing the customer’s account. IMPLEMENTATION Program Design LanguageThe program design language is also called as structured English or pseudopodia. PDL is a generic reference for a design language PDL looks like a modern language. The difference between PDL and real programming language lies in the narrative text embedded directly within PDL statements. The characteristics required by a design language are: ? A fixed system of keywords that provide for all structured constructs date declaration and modularity characteristics. ? A free syntax of natural language that describes processing features. ? Subprogram definition and calling techniques that support various nodes of interface description.PDL syntax should include constructs for subprogram definition, interface description date declaration techniques for structuring, conditions constructs, repetition constructs and I/O constructs. PDL can be extended to include keywords for multitasking and/or concurrent processing interrupt handling, interposes synchronization the application design for which PDL is to be used should dictate the final form for the design language. Testing Objectives: The main objective of testing is to uncover a host of errors, systematically and with minimum effort and time. Stating formally, we can say, ?Testing is a process of executing a program with the intent of finding an error. ? A successful test is one that uncovers an as yet undiscovered error. ? The tests are inadequate to detect possibly present errors. ? The software more or less confirms to the quality and reliable standards. Unit Testing : ? The purpose of the coding and unit testing phase of software development is to translate the software d esign into source code. Each component of the design is implemented as a program module. The end-product of this phase is a set of program modules that have been individually tested.To enable the engineers to write good quality programs, every software development organization normally formulates its own coding standards that suits itself. A coding standard addresses issues such as the standard ways of laying out the program codes, the template for laying out the function and module headers, commenting guidelines, variable and function naming conventions, the maximum number of source lines permitted in each module, and so forth. ? During this phase, each module is unit tested to determine the correct working of all the individual modules.It involves testing each module in isolation as this is the most efficient way to debug the errors identified at this stage. Another reason behind testing a module in isolation is that the other modules, with which this module has to be interfaced, may not be ready. Integration and System Testing Integration of different modules is undertaken once they have been coded and uni tested. During the integration and syste3m testing phase, the modules are integrated in a planned manner. The different modules making up a software product are almost never integrated in one shot.Integration is normally carried out incrementally over a number of steps. During each integration step, the partially integrated system is tested and a set of previously planned modules are added to it. Finally, when all the modules have been successfully integrated and tested, system testing is carried out. The goal of system testing is to ensure that the developed system conforms to its requirements laid out in the SRS document. Our project is integrated and tested by using an activity by name (- testing. (- testing is the system testing performed by the development team. MAINTENANCEMaintenance is any work done to change the system after it is in operational. The term maintenance is used to describe activities that occur following the delivery of the product to the customer. The maintenance phase of the software life cycle is the time period in which a software product performs useful work. Maintenance activities involve making enhancements to products, adapting products to new environments, correcting problems. In this be retrieve the data from the database design by searching the database. So, for maintaining data our project has a backup facility so that here is an additional copy of data, which needs to be maintained. More over our project would update the annual data on to a CD, which could be used for later reference. CONCLUSION ? WORK DONE: The â€Å"e-Ticketing† was successfully designed and is tested for accuracy and quality. During this project we have accomplished all the objectives and this project meets the needs of the organization . The developed will be used in searching, retrieving and generating information for t he concerned requests. ? GOALS ? Reduced entry work. ? Easy retrieval of information ? Reduced errors due to human intervention ? User friendly screens to enter the data Portable and flexible for further enhancement ? Web enabled. ? Fast finding of information requested BIBLIOGRAPHY Reference Books: 1. The Complete Reference ——————–Patrik Naughton, Herbert Schildt 2. Java Servlet Programming ——————–Orielly 3. Html Black Book ——————–Steven Hozner 4. The Programming Language ——————–Ivan Bayross 5. Software Engineering ——————–James Websites: 1. http://www. java. sun. com 2. http://www. sunsoft. com 3. http://www. javasoft. com 4. http://www. apress. com 5. http://www. oracle. com 6. http://www. jspin. com

Monday, July 29, 2019

Baby Can You Love Me Essay

Essex Hemphill is an extremely paradoxical poet, for his verses are a combination of that what seems to be impossible to combine. He uses strange and shocking wording in order to make his audience look at usual problems from unusual point of view. In this regard his â€Å"Baby Can You Love Me? † is one of the most indicative among his verses, if not the most indicative one. Love an death are melted together in this Freudian poem, that reveals the deepest layers of human Eros and Thanatos with the first being the desire of life and the latter being the desire of death. Hemphill’s poem makes it clear that these two desires can sometimes be one. Essex died on AIDS that he has caught during sexual intercourses in a black gay community. He was perhaps aware of his prompt death when writing â€Å"Baby Can You Love Me? †, and thus one can ask what is the rationality of asking to kill oneself and killing a loved one who would certainly die soon? From the rational point of view, the poem is senseless. However, what Hemphill’s poetry surely lacks is rationality. This is not a classical verse with a tone, voice, rhythm and metre. In fact, I am not sure whether Hemphill knew something at all of these formal aspects of poetry. â€Å"Baby Can You Love Me? † has no plot and even no visible characters. It is a poetic question, and it is hardly important whether it is a man asking a man or a man asking a woman, or a woman asking a man, or a woman asking a woman. It would be better to say that this is one personality asking another personality, and this asking personality experiences deep inner crisis that makes him or her turn to the most hidden and most unconscious motivations of own â€Å"I† that Hemphill was not afraid to articulate, reveal and analyze in his poem. This is a deeply psychological intuitive poem that can not be understood by analysis. In order to understand Hemphill one needs a kind of mystical insight, one needs to feel what he has felt and try to feel what he has felt when writing â€Å"Baby Can You Love Me? † The poem opens with a classical question of all enamoured humans asked ever since men learned what is love, although this question is asked in a â€Å"horribly† informal manner usual for marginalized communities of black youth. This question is immediately contrasted with another one: Are you willing to kill me if I ask you to? What makes Hemphill ask this question immediately after confessing love? Perhaps it is the word â€Å"willing† that might help to understand that. This is a kind of examination, a test of love that can be true only if the wills of the loved ones are combined in one will. For most people losing the truly loved one is a tragedy. So the question can be reformulated in a following manner: â€Å"are you ready to subject me and you to terrible suffering in the name of love? † Classical literature from Shakespeare to modernity provides examples of killing loved ones out of painful passion, and Hemphill puts feeling to test by this passion. There are many reasons for which one individual can resolve to put a violent end to the life of another individual, but killing out of love always means killing out of passion. I can hardly imagine killing out of tempered love. So the question is as follows: â€Å"is your love so strong, have you lost your head so much that you can kill me? † This passionate plea for death can be nothing but an up-to-minute whim, yet in order to instigate someone to commit murder even this up-to-minute whim of a lover has to become a law for another lover. Love makes people stronger, although this strength sometimes borders on insanity. It is unusual and unnatural for most people to kill someone else or commit suicide. And Hemphill hesitates whether he can kill himself, thus asking his lover for help in fulfilling this last will: If I’m unable to do so Are you willing to kill me? Once more we come across this formal aspect of will. Hemphill asserts that his will may be not enough to consciously die, so he needs a combination of two wills to fulfill his wish. Perhaps he already knows what is love, so now he is willing to know what is love’s eternal opponent death like, but he has not enough will, so he needs an another will, an another â€Å"I† that would not be tied with natural instinctive will of life and whose will would be purer and stronger. In the concluding lines of the poem Hemphill does indirectly confess what his problem is about. It is in fact fear that keeps him alive. He thus needs bravery, and can there be a greater bravery than the one of an enamoured individual in a moment when he or she confesses his or her feelings. So Hemphill asks: Can you be as brave and clearheaded as you are now, professing that you would love to love me? â€Å"Clearheaded† is perhaps one of the worst characteristics that can be applied to passions, for ‘clear head† is an antipode of passion. On the other hand. murdering the loved one with â€Å"clear head† is a certain demonstration of the place that love occupied in the consciousness of an individual. Hemphill speaks of such high stage of passionate love when it becomes a part of a personality, and when the head becomes cleared and heart becomes brave because of and due to this passion. A lover is â€Å"clearheaded† professing â€Å"love to love†, yet the poem eventually revolves around death. Does this mean that â€Å"love to love† implicates â€Å"love to death† and are lve and death interchangeable in the sense of Hemphill’s â€Å"Baby Can You Love Me? † Hemphill himself answers this question positively in the last lines of the poem: But could you kill me If I asked you to? † This passage echoes the first lines of the poem. â€Å"Baby can you love me† and â€Å"Baby can you kill me† are indeed interchangeable questions. The ending resembles the medieval style of rondos – poems that started and ended with the same lines, symbolizing perfection and circularity of the verse. Whether consciously of not, Hemphill applied this method in his poem and interconnected the two contrasting oppositions into a unity. Love is measured by death and death is measured by love for Hemphill. He does not say that directly, but he makes us feel that.

Cold war 1989-1991 under Bush's Administration Essay

Cold war 1989-1991 under Bush's Administration - Essay Example The barometer to consider whether or not to intervene was different in each case. The important characteristics of post-Cold War conflicts were that they did not relate to superpower completion. U.S. interests did not face severe threat, as it was in the Cold War calculus. The strife at far-off places was not of consequence to the national security of U.S. and the vital interests were more or less secure, with no compelling reasons to intervene. There was no confrontation with Soviet Union who was once the dangerous contender for U.S. interests. With the end of the Cold War, trouble fomented at various spots leading to a series of events of inter-state aggression. U.S. had no decisive platform to intervene, either political or legal. Its foreign policy was against, â€Å"interference in the internal affairs of others." U.S. could not pursue a policy of isolationist, it needed active political and economic support from governments and U.S. was averse to set forth precedents which affected their relations with other countries. Another important consideration was a bout adherence to international law governing interventions. Without the correct international legal rationale, any intervention would be termed as an act of self-seeking, with motivated desires and with hidden agenda. Decisions for intervention needed to be taken, explained and defended. The break-up of the Soviet Union was an important development, but no American interests were threatened. Besides, it was an ideological conflict and power-struggle between two factions, both owing allegiance to Communism. Intervention decisions have far-reaching economic implications, besides the need for solid domestic support. In the confusing world scenario, with many set of actions taking place simultaneously in different parts of the world, the decision-making process cannot be expected to be orderly and well-structured. That the issue

Sunday, July 28, 2019

International Business. Crises and Exchange rate Essay

International Business. Crises and Exchange rate - Essay Example Even if there is no monetary agency, a government can create an inflation/debt crisis by excessive spending financed by domestic and international borrowing. Mutatis mutandis, the same considerations apply to a central bank that has the same degree of strictness as the currency board. (Betts, C. and Devereux, M, 2000) Second, world securities markets might crash as, for example, in October 1987 or in the October 1989 mini-crash. Many countries' central banks expanded their stocks of high-powered money to provide liquidity to markets as investors fled from equities and corporate bonds and to high-quality assets such as U.S. T-bills and T-bonds. A currency board is ill-equipped to handle this type of crisis. At a time when it need to increase liquidity by expanding the domestic supply of money, a currency board is likely to have domestic currency presented for conversion to the reserve currency, as international investors who fled to U.S. government securities did in the 1987 and 1989 crises. This flight reduces the stock of domestic currency as well as that part of the country's international reserves that the currency board holds. In turn, domestic banks are less willing to provide liquid assets, and depositors are more interested in holding the reserve currency directly (or liabilities of the re serve-currency country). (Jan Winiecki, 2002). A domestic monetary agency parallel to the currency board might expand liquidity, as measured by the domestic money stock, through open market operations. There may well be a flight from domestic assets to reserve currency assets. The monetary agency can preserve the exchange rate by selling reserve currency obtained from selling its own liquid holdings denominated in the reserve currency or by borrowing reserve-currency assets, either commercially from foreign banks or from the reserve-currency central bank. A small country with only a brief track record and low international holdings will likely find it difficult to preserve the exchange rate parity; a monetary agency that has the holdings and power to preserve the parity is likely also to have the power to undercut currency board discipline over monetary and fiscal policy. Disturbances to Equilibrium Real Exchange Rates Third, the currency to which the board pegs may come under pressure from output market disturbances in the reserve-currency country. An example is the pressure on the European Exchange Rate Mechanism (ERM) after German reunification to either revalue the German mark or devalue the other ERM currencies relative to the German mark. The interpretation of the September 1992 and July-August 1993 crises in the European Monetary System is that they arose in substantial part from the reunification of Germany. German aggregate demand rose substantially more than German aggregate supply. This increase caused upward pressure on German interest rates (with some observers arguing that the increase in interest rates was exacerbated by German reluctance to use taxes rather than bond issuance to finance the

Saturday, July 27, 2019

Analyses and evaluate the micro-external environment of (two) Essay

Analyses and evaluate the micro-external environment of (two) international markets - Essay Example According to Mintel Oxygen (2012), fitted bedroom furniture contributes in large proportion to the total sales revenue earned by the bedroom furniture industry. Fitted bedroom furniture includes built-in wardrobes, built-in drawers, fitted beds etc, and Mintel Oxygen (2012) has also pointed out that fitted bedroom furniture is designed for large bedrooms. USP of fitted bedroom furniture lies on the ability to provide variety in design, systematic fittings and synchronise with large space in the room. Mintel Oxygen (2012) has reported that non-fitted furniture is generally preferred by bachelors and individuals who do not have large space in the room for using fitted bedroom furniture. Non-fitted furniture includes bedside tables, customized chests of drawers, dressing tables, beds etc. A unique selling proposition of non-fitted bedroom furniture depends on its ability to provide a high degree of customization in terms of assembling bedroom furniture to customers. The next section of the study will discuss the market composition of Germany for the bedroom furniture segment. The German bedroom furniture industry is going through a critical phase in terms of shrinkage in demand due to the slow economic growth rate and dwindling purchasing parity of customers. Lynn (2010) has pointed out that sovereign debt crisis has decreased the retail merchandising growth rate in most of the European countries. Market Line (2012a) has reported that almost half of the German furniture industry is dominated by the bedroom furniture segment. According to Market Line (2012a), the value of the bedroom furniture industry in Germany is more than $25 billion, which is proportionate to more than 50% of the overall industry composition. Industry analysts have forecasted a compound annual growth rate (CAGR) of 3%–4% for the bedroom furniture industry. The bedroom furniture market in the country is fragmented due to presence of both domestic and international players in large propor tion. Market Line (2012a) has been able to conclude that only 7% to 13% of buyers in the country prefer to purchase high priced premium luxury bedroom furniture for their home. The majority of buyers prefer to purchase mid-range bedroom furniture for their home. Customer segmentation for the German bedroom furniture industry can be done by using lifestyle criteria of Brassington and Pettitt (2007). According to lifestyle, bedroom furniture customers in Germany can be segmented as ‘singletons’ and ‘best agers’. Young professionals with a high spending capacity can be classified as ‘singletons’; these customers prefer to purchase customized non-fitted furniture, which can fit in their small bedroom. Couples with children and older people complemented with a high spending capacity can be classified as ‘best agers’; these customers prefer to purchase fitted furniture for their large bedrooms. De Mooij (2011) has pointed out that the pu rchasing behaviour of customer can be directed by personality and cultural orientation, which means that companies planning to expand their business in the bedroom furniture segment of Germany need to design their product in accordance with German culture for generating attraction among customers. The stable political condition of Germany will encourage retailers to invest in the bedroom furniture segment, which will help them to expand their business in the country. Gillespie et al. (2010) have pointed out that antitrust law in European countries such as Germany has

Friday, July 26, 2019

Heidegger and Understanding Term Paper Example | Topics and Well Written Essays - 1750 words

Heidegger and Understanding - Term Paper Example Fear and anxiety can be regarded as pivotal in philosophy, art, and literature; however, fear and anxiety are frequently confused, partially because the two are intertwined. The two terms can be easily differentiated: fear makes reference to certain object or situation, while anxiety represents a state of mind (mood) with its object and/or origin is never concise and is a source of anguish for the individual experiencing the emotion. The paper explores the claim that, â€Å"fear, is anxiety, fallen into the ‘world’, inauthentic, and, as such, hidden from itself,† and formulates arguments in favor against the claim. It is essential to recognize that phenomenological analysis of the form of intentionality that accompanies moods does not simply register a passing adjustment of the psyche, but rather discloses crucial fundamental elements of the self. For instance, the element of threat yields to fear, which makes individuals perceived some places of the world as more threatening, or some individuals vulnerable. Anxiety and fear are mainly distinguished to diverse degrees in psychology and philosophy. Fear manifests based on some danger or threat around a person’s self, whether precise or imprecise, but definitely known. Anxiety, on the other hand, conveys an ontological situation that is atypical to the individual’s quintessence indicating uncertainty or nothingness (Heidegger190). Nevertheless, is essential to appreciate that, the fact that the object is irresolute does not necessarily imply that it I connected to a certain situation. A frightened individual usually acts as per the situation, irrespective of whether the source of the fear is unknown, even in instances in which the case of fright remains tentative. The fact that fear manifests devoid of any distinct source signify that fear avails itself as an occasion of achieving freedom, whereby the context is solely distinct to man. Fear presents man with the opportunity to choose to be

Thursday, July 25, 2019

Trends Essay Example | Topics and Well Written Essays - 250 words - 1

Trends - Essay Example A recent research reveals that low wage rates and high unemployment contribute to increased crime cases (Grabmeier, 2002). Moreover, it has also been observed by the researchers that less-educated or illiterate men are more likely to adopt criminal behaviours. The possible reason of these criminal behaviours or crime activities involve frustration, family and social needs, lack of basic necessities of life and social isolation. The government has taken many steps on fighting against the crime cases and crime-fighting initiative including punishments, penalties and strict laws, yet, it cannot be ignored that these initiative are limited in their effects. The increasing unemployment along with the inflation prevalence have a profound impact on crime rates. The large unemployed population is compelled to adopt criminal behaviours and meet the needs of their families. Knowing the importance of money and resources in people’s life, it is justifiable to believe that unemployment leads to increased crime rates. People can sacrifice their moral values but not lives. All human beings including the unemployed population have the needs to get food, shelter, proper clothing, education and so on. Hence, most of the unemployed people choose to adopt crimes and violent behaviours to attain these sources of life. The government must also keep an eye on the employment issue while designing any initiative to combat crime

Wednesday, July 24, 2019

Drug Allergy Essay Example | Topics and Well Written Essays - 500 words

Drug Allergy - Essay Example tion, the patient developed signs of a re-infection with new right lower lobe infiltrate and the fever did not resolve despite empiric antibiotic therapy for 48 hours on the same antibiotics. Ans to Q1: After 4 days of discontinuation of the antibiotics, the patient became tachypnoeic with a rise in the neutrophil count and a fever of 102 degrees Fahrenheit and appearance of a pulmonary infiltrate. It is clear that the initial therapeutic course was uneventful. Although the patient has a history of childhood penicillin allergy, no penicillin drug was utilized at this illness, and therefore, it can be taken for granted that there was no previous exposure at this illness, and it has appeared following several treatment days. These allergic drug reactions usually subside after discontinuation of the drug. The only point against this diagnosis is absence of peripheral blood eosinophilia (Van Arsdel, Jr., 1982). This reaction can be classified as unpredictable reaction since it is evident that this happened in a dose-independent fashion without any relation to the pharmacological action of these agents. This could be one of the three, idiosyncratic reactions, allergic reactio ns, or pseudoallergic reactions. Thus following discontinuation of the drugs, there is a possibility of development of development of drug specific IgE antibodies which night have been responsible for nonspecific mast cell release. However, in this patient, as it looks like it is a drug fever with organ specific reactions that may indicate a multifactorial origin. Due to this allergic reaction, the patient developed pneumonitis, and there is immense possibility that the renal failure that continued is actually enhancement of baseline renal failure on which renal reactions of drug allergy had been superimposed. Most probably these drugs could have produced univalent chemical compounds as a result of phase I reactions, and these might have been activated to trigger the immune response with

History of Advertising Essay Example | Topics and Well Written Essays - 1750 words

History of Advertising - Essay Example The very first form of advertising that dates back to 3000 B.C was outdoor display of Signs. Then advertising was done in the form of Word-of-mouth or were done vocally. The graphical forms of advertising then came including the paper ads, print ads, and newspaper ads. The very first form of advertising was through signs. The signs that were painted and displayed on the walls of the buildings in the ancient Rome and Pompeii were the very first forms of advertising [5]. These signs were ads about any property for rent or the ads were to attract the travelers of one town to the taverns in the same or some other town. These signs also consisted of the any matches, for example circus matches [2] that needed to be advertised. Next, the advertising took the vocal form of word-of-mouth or street or town cries [5]. These street criers used to read public notices aloud or praised the products aloud for their advertising. These kinds of advertisements also included the announcements for the sales of any cattle and slaves [2]. These town criers were the predecessors of the announcers of the later radio and TV ads. Then the newspapers came in the seventeenth century. The newspaper ads initially included short ads of product descriptions and prices [1]. The color and headlines and all the complementary stuff came later. The first newspaper was printed in England by the name of "Weekly News" in 1622 [2]. The magazine ads then followed. When the company's' name emerged in the advertisements, the emergence of brand name in the history of advertising took place. In the 1700s pasted-up notices, brochures and posters came into existence [2] and a lot of advertising through posters began. These then lead to the billboards. In the 1800s, printed media ads arrived [3]. This was the time when advertising through billboards started and started to be used abundantly. A movable type printing press was invented by a German printer Johannes Gutenberg which made the distribution of posters possible [5]. After the emergence of radio, long time later, advertising through radio started. Then advertising through video and TV advertisements also started after the invention of TV, later in the 19th century TV advertisements started to come on TV and gained a lot of popularity among all other forms of advertising. Producing a Successful TV Advertisement Producing a successful TV advertisement requires some important steps and factors that need to be checked and need to be kept in mind. These are as stated as under: 1. The target audience [6] and the budget should be planned and kept in mind. Before making an ad you should know it very well that for whom are you making the ad and what are the needs and requirements of the customers. It is also important to know what financial standing or budget you need in order to deliver the target audience that is intended. 2. A well-conceived plan needs to be made that should cover the budget and all the necessary steps that are needed. The plan for advertising is really important as it is the basis on which you continue with your ad and also the success or failure of the ad depends on how appropriate is the advertising plan. 3. It is important to include in your TV advertisement the company's brand and the company's overall business objectives

Tuesday, July 23, 2019

Electronic Media Critical Analysis Paper TV Show Family Guy Essay

Electronic Media Critical Analysis Paper TV Show Family Guy - Essay Example The family guy is an animated television series about a seemingly normal middle class American family with its tribulation problems and spans of happiness. In this show the Griffin family is the main characters. The Griffin Family is not a normal family by any measure. It has some incredible members who do the most unexpected of things. The six members of the family are Peter Griffins, Lois Griffin, Chris Griffin, Meg Griffin, Brian Griffin, and Stewie Griffin who are characters in the show. The show is mainly based on humor and within the humor the creator play around with many themes such as violence, stereotypes and issues such as transgender. The head of this household is Peter who is depicted as the dumbest of all having an IQ lower than that of a retarded, a typical couch potato who is overweight and loves to watch TV. Paradoxically he is also the fastest in the series. The other character Lois Griffin who is the wife of peter, she plays a role that seems to keep the disjointed family together as a unit. She comes from a rich background and always associated with the rich but decided to marry Peter because she wanted some adventure and uniqueness. She found the rich folks too snobbish and thus she chooses someone different, and that was Peter who was a towel boy at the time. The couple has three children and Chris is one of them. He is just as fat as his father and even just as dumb. In the series he is constantly being attached by an Evil Monkey from his closet, the evil monkey usually comes out of the closet and points at him only. Meg the daughter is usually the ignored child and her family members ignore her as if she never existed and they only focus on her when they are teasing and making fun of her.

Monday, July 22, 2019

International Organizations and World Order Essay Example for Free

International Organizations and World Order Essay After First World War, there was call for formation of international organization to bring order in the world. The notion led to the formation of the League of Nations due to the conviction of the then president of the United States of America, President Woodrow Wilson who was certain that the move would prevent future conflict if only nations would come together to defend the principles of self-determination and independence. The progress of the League of Nations was thwarted when the United States refused to join it. It was also thwarted by the extremist political ideologies and power rivalry that existed at that time in history, which was 1930s. Due to the outbreak of Second World War that ended in 1945, there was more concern that led to the formation of another international organization in the name of United Nations. The Bretton woods conference, which is the reason for the existence International Monetary Fund, and the World Bank as well as the Dumbarton Oaks Conference came to existence in 1944. The foundation do the United Nation was laid by the allies of the organization (Owen, 1996). According to Owen (1996, p. 9) most of the international organizations were formed with an intention of reconstructing Europe, which was seriously devastated after the war against Nazi Germany. Most of the International organizations that were formed after World War II became more active in the 1960 where their activities were expanded to meet the new challenges because of European colonization, which included independent but politically immature and poor nations in Latin America, African and Asia. Most of the international organizations were started in the 19the century. Owen (1996, p. 10) states that â€Å"More recently, with the uncertainties and instabilities which have followed the ending of the Cold War, international organizations have stepped in to cope with the effects of the resulting conflicts and tensions, many of them within states rather than between states n the process, many UN bodies have been found wanting. The office f the United Nations Disaster Relief Coordinator (UNDRO), for example was founded in 1971. † Some of the international organizations include regional Arab Maghreb Union (AMU), which was formed in 1989 with an objective of establishing common military, cultural and economic policies to ensure free movement of goods, services and people between member states. The Member nations of Arab Maghreb Union include Morocco, Libya, Algeria, Tunisia and Mauritania (Schafer, Verbist, Imhoos, 2005). Another International Organization is Asia Pacific Economic co-operation Forum (APEC) was formed in 1989 to promote linearization of economy in the Pacific region. Association of South East Asian nations (ASEAN) was formed in 1967 to replace ASA (Association of South East Asia). The member nations of ASEA include Australia, United States of America, Japan and New Zealand. The main objective of the organization is to promote common economic, political and trading policies. There is also another international organization in the name of Caribbean Community (CARICOM), which was formed in 1965 to ensure economic cooperation in Caribbean common market, to put in place common policies in education, health, culture, industrial relation and communication and to coordinate foreign policy among the member nations. The affiliations of the CARICOM according to Owen include â€Å"Caribbean Development Bank; Caribbean Examinations Council; Caribbean Meteorological Organization; Council of Legal Education; University of Guyana; University of the West Indies; West Indies Shipping Corporation†. The Common wealth is another important international organization that is in forefront trying to address contemporary global issues. Commonwealth was formed in 1884 and it grew out of the British Empire. The objectives of the Commonwealth are to enable nations from different parts of the world to exchange opinions in an informal, friendly and intimate atmosphere. Commonwealth has member nations, which according to Owen (1996, p. 11) include â€Å"Australia, Bahamas, Bangladesh, Barbados, Belize, Botswana, Brunei Darussalam, Canada, Cyprus, and Dominica. Others are: Gambia, Ghana, Grenada, Guyana, India, Jamaica, Kenya, Kiribati, Lesotho, Malawi, Malaysia, Maldives, Malta, Mauritius, Namibia, Nauru, New Zealand, Nigeria, Pakistan, Papua New Guinea, St Kitts-Nevis, St Lucia, St Vincent and the Grenadines, Seychelles, Sierra Leone, Singapore, Solomon Islands, South Africa, Sri Lanka, Swaziland, Tanzania, Tonga, Trinidad and Tobago, Tuvalu, Uganda, the United Kingdom, Vanuatu, Western Samoa, Zambia, Zimbabwe. † There are several other International organizations such as Commonwealth of Independent States, Council of Europe, European free trade association (EFTA), European union (EU), gulf co-operation council (GCC), Mercosur (Mercado Commun del Sur-southern common market), African union (AU), Organization of American States (OAS), Organization of the Islamic Conference (OIC), South Pacific Forum, Southern African Development Community (SADC) among others. According to Mendlovitz (1966, p5) â€Å"Law has too often been conceived in static terms as a system of order designed to uphold the status quo. In any legal system, whether national, regional, or global in scope, law also has a dynamic aspect which allows it to make a contribution to projects for social change. † Saul Mendlovitz further states that â€Å"international law to the postulated goal of a warless world with an excerpt from an article that considers how law might help us move from where we are to where we would like to be; it is this gap that creates what we have called the transition problem. In this new age, there has emerged a vas and ancient worldwide conspiracy called the New World Order, which aims to unite the entire world under one government. The New World Order concept was introduced into the dictionary of the international politics after the collapse of Communism in Eastern Europe (Slaughter, 2004). The former president of the United States of America George Bush was the first who strongly invoke the idea in response to the Gulf crisis. Therefore, the concept traced to 1991, when Iraq invaded Kuwait and when the cold war ended. According to Ismael (1994), he states that â€Å"Thus, the end of the cold war and Iraqs invasion of Kuwait in August 1991 constitute the historical reference points for the concept. This suggests at least two dimensions in its meaning: the end of an international order determined by the struggle for hegemony between the United States and the Soviet Union; and the initiation of a U. S. foreign policy doctrine based on U. S. hegemony in the international order. † When president George Bush was waging a war of words with the then the president of Iraq Saddam Hussein in 1990 he demonized him and referred to his effort as an attempt to establish a new world order (Wells, 2008). Many were excited by the effort of Bush at first because they thought the president of the United States was promoting democracy in the region as he had done in the Eastern Europe. Unfortunately that was not to be realized as Ishmael (1994) says, Bush was determined in establishing hegemony. The region after the gulf war in Iraq and Kuwait has remained unstable politically. According to Lloyd (2002, p. 1) New world Order was a fragile creation that emerged after September 11 attack. Lloyd states, â€Å"Before 11 September, the new (left) world order was a tentative, even fragile, creation. It emerged from new Labor in 1997 as an ethical dimension in foreign policy, announced by the then foreign secretary, Robin Cook, as a natural extension of the globes interdependence. The world had become a moral forum through the media and the work of non-governmental organizations (NGOs). † The world was at peace before the attack on the United States to the extent that most world leaders praised the state in which the world was. Some of the people who were at the forefront of the new idea of new world order are Robert cooper and Anthony Giddens, a senior diplomat and a director of the London school of Economics respectively. Giddens was for the idea that globalization could then take place because there was a state of peace that was a recipe to one global governance. The globalization, he argued would transfer power from the nations into the global space leading to the call for the need of regulation to guide the governance. Copper on the other hand argued that new world order will lead to a shift in value where there will be a victory of values of individual of those of state and those of market over the military ones and foreign policy will no longer to be about war (Lloyd, 2002, p. 1). International court creation came in to being after two attempts to organize an international court had failed (Mower, 1931, p. 616). Before there was, a court called The Hague Permanent Court of International Arbitration, which could not provide the much-needed justice in the international level as the current International Criminal Court. Other international courts deal with different legal issues. For instance, there are courts that deal with human rights at the international level, which include African Court of Justice (ACJ), African Court on Human and Peoples’ Rights (ACHPR), European Court of Human Rights and International-American Court of Human rights. Others include International Court of Justice (ICJ), International Criminal Court (ICC), and Permanent Court of Arbitration (PCA), Resource materials on International Courts and Special International Criminal Courts and Tribunals. According to Class Action Publisher (2008), there are seven special international criminal courts and tribunal, which include Extraordinary Chambers in the Courts of Cambodia (ECCC), International Criminal tribunal for the former Yugoslavia (ICTY) and International Criminal Tribunal for Rwanda (ICTR). Others are â€Å"Regulation 64† Panels in the Courts of Kosovo, special Courts for Sierra Leone, Special panels of the District Court of Dili (East Timor) and War Crimes Chambers (WCC) in Sarajevo- within the state court. All these international courts have well designed objective and operation guidelines. International criminal Court established in 1998 by Rome statute and it is the first permanent court to hear international criminal claim. The court has a role to hear cases that are regarded as most serious such as crime against humanity, war crimes and genocide (Janis, 1992). It does not deal with cases that occurred prior it its institution but only to those crimes that have been committed after July 1, 2002. ICC does not deal with cases that have been committed by legal entities but natural persons. It can act on cases when the cases have been referred to it by the United Nations’ Security Council or with consent of the affected state. The International Criminal Court takes up a case or jurisdiction only as the last resort when all the national avenues have been completely exhausted (Buhler Webster, 2005). The nations have been endowed with the responsibility of international crimes but when a state is unwilling to pursue justice, delays in pursuing justice or it shows impartiality of dealing with international crimes then the ICC takes up the matter. This may also result from unavailability of proper judicial system or if the state is unable to carry out the proceeding. Over one hundred nations worldwide subscribe to the Rome statute that established the ICC exclusive of the United States of America. United States revoked the signature of the former president Bill Clinton that was due to lack of checks and balance of the ICC. The ICC gives considerable rights to victims which include attending the proceeding of the court have having their concerns considered; being represented by counsel and interrogating witnesses; seeking monetary compensation after conviction and seeking preservation of defendant assets pending trial. The ICC has four major organs namely judicial divisions, the presidency, office of the prosecutor and the registry, which have different roles that help the court to achieve its objectives (Schafer, Verbist Imhoos, 2005). The international courts have been able to provide effective enforcement of international legal instruments in different countries. Many countries have suffered from the art of war, which have seen many people suffer thereby depriving them of their human rights. Individuals for their own personal and selfish reasons started some of the wars that have caused suffering to citizens of the affected nations. Being well connected to the political order of the day most perpetrators of the crimes that lead to the abuse of human right cannot be properly persecuted in their respective countries. Other reasons that have made it possible for the perpetrators of the crime of high magnitude is the fact that most countries where such crimes are committed lack proper judicial system that is independent, impartial and ineffective. This has led to transfer of many cases to the international courts or to the ICC (Barker, 2004. ) International Criminal Tribunal for Rwanda is an existing testimony to the effectiveness of the International Courts. In Rwanda where the conflict started between the Tutsi and the Hutu tribes in 1994, many people belonging to the Tutsi tribe were killed in the Genocide. The total number of the Tutsi that were killed is estimated to be over five hundred thousand people. In response to the crime, the United Nation Security Council created the International Criminal Tribunal for Rwanda in November of 1994 to prosecute crimes genocide and violation of the Geneva Convention. The ICTR is a subsidiary organ under chapter VII of the United Nations Charter of the Security Council under article 29 (Barker, 2004). International Criminal Tribunal for Rwanda has completed over fifty trials so far and of the accused persons, 29 have been convicted of crime (Klip Sluiter, 200). About eleven people are on trial, others waiting trial, some are to be transferred to the national jurisdiction trial while others are still unconfined. The first person was tried three years after the formation of the International Criminal Tribunal for Rwanda in 1997 and he was Jean-Paul Akayesu. Jean Kambanda also pleaded guilty after wards. The tribunal has also issued arrest warrant to some suspects that are thought to have played a role or orchestrated the genocide like Kabuga Felicien. International Criminal Tribunal for Rwanda issued an international arrest warrant for Felicien in 1999 where he was charged with complicity in genocide, genocide and conspiracy to commit genocide. The action of the international court in Rwandan genocide has achieved a lot in the nation and it has sent a clear message to the whole world. With arrest, trial and judgment of the suspects of the unfortunate occurrence, peace and order has been restored in Kigali because the Tutsi who were the main victim of all sorts of crime committed feel that justice has finally prevailed and cannot think of revenge and other notions that might lead to civil war again. The action has also sent a right signal to anybody in Ruanda and all over the world that any perpetrators of such crime will not escape the long arm of justice. Therefore, in reality International Court has succeeded in pursuing justice and is in the right path of ensuring that there is a peaceful planet where the innocent are vindicated while the guilty are condemned (Klip Sluiter, 200).

Sunday, July 21, 2019

Public Policies Used To Solve Market Failure Economics Essay

Public Policies Used To Solve Market Failure Economics Essay Market is defined as a group of buyers and sellers of a particular good or service. There are many different types of markets such as stock market, currency market and more. Market is efficient when the market is perfectly competitive. If a market is not perfectly competitive, the market failure will occur. Market failure also occurs when the allocation of resources in a free market is inefficient. Market failure occurs when the market is not in perfectly competitive. There are many reasons to cause market failure. The main causes of market failure are: a) Negative Externalities Externalities are defined as the uncompensated impact of one persons actions on the well-being of a bystander. Negative externality such as the effect of environmental pollution can cause the marginal social cost(MSC) of production to exceed the marginal private cost(MPC) according to the diagram below: In the process of production, the firms will cause the pollution of the environment. The pollution is bad for public health so that the marginal social cost(MSC) is exceed the marginal private cost(MPC). The optimum of production is at Qs, MSB is equal to MSB. The firms will produce goods at Qp, where MPB is equal to MPC. The excess of production not only does not promote the public welfare but also causes more pollutions to the environment. As a result, the market will go inefficient. b) Positive Externalities The positive externalities such as the provision of education and healthcare can cause the marginal social benefit(MSB) of consumption to exceed the marginal private benefit(MPB) according to the diagram below: In a free market, the consumption will be at Qp where the private benefit equals to the private cost. However, this is socially inefficient because the social benefit is exceed to the social cost. Therefore, that is under-consumption(Qs-Qp) of the positive externality. The social efficiency will occur at Qs where the social cost equals social benefit. c)Merit and Demerit goods Merit good is a good that people do not realise its true benefit such as the people underestimate the benefit of education. The examples of merit goods are education and healthcare. These goods usually have positive externalities. Therefore, there will be a under-consumption of merit goods in a free market. Demerit good is a good that people do not realise the costs of doing something such as smoking and drugs. These goods usually have negative externalities. Therefore, there will be over-consumption of demerit goods in a free market. d)Public goods The private sectors in free markets cannot profitable supply to consumers public goods that are needed to meet peoples demand. So that the public goods are generally provided by government. e)Monopoly Power Market that controlled by monopoly can cause under-production and higher prices than would exist under condition of competition. f)Factor immobility Factor immobility will cause unemployment hence productive inefficiency. When market fails, the market will fall into position of inefficiency. It may cause unfair distribution of income and property to the public. Many firms increase the quantity of goods supplied in order to earn more profit. It may cause the pollution in the environment as the firms are not willing to protect the environment whenever they produce goods. Besides that, unemployment will occur because of the exclusion of labor by the machines when the firms are able to improve the productivity. There will be also an undersupply of public goods. The private sectors are not willing to produce public goods as the consumers do not need to pay for these goods so that they will not earn profit from providing the public goods. To address these public issues, the government will execute some policies to solve the market failure such as imposing taxes on negative externalities. In the diagram above, the marginal social cost(MSC) of production will exceed to the marginal private cost(MPC). The government imposed the taxes to the sellers and the imposition of taxes will increase the production cost of the sellers. Then, the supply curve(PMC) will shift to the left. The quantity of production will decrease from Qp to Qs where the optimum output is and the social welfare will be maximized. New Mexico Legislature is supposed to increase the state cigarette tax from 75 cents to $1.66 per pack this year. The purpose of imposing the tax is to reduce the tobacca use and save lives. The increasing of tax will discourage people from smoking. Increasing the cigarette tax is one of the most effective ways to reduce smoking, especially among kids. From the diagram above, the production of tobacca of marginal social cost(MSC) is exceed to the marginal private cost(MPC) and the output of tobacca of the sellers is at Qp. New Mexico Legislature imposed the cigarette tax to the output of tobacca of sellers. So that, the supply curve(S=PMC) of tobacca will shift to right. The output of tobacca will decrease from Qp to Qs as the tobacca tax will increase the cost of production of tobacca. As a result, the supply curve of tobacca will move to left and equals to marginal social cost(MSC). At this moment, the optimum output of tobacca is at Qs. The imposition of cigarette tax will reduce the output of tobacca and discourage people from smoking. Taxes on negative externalities will raise the revenue for the government and reduce the pollution of environment. The second policy that can overcome the market failure is to provide subsidy on positive externalities. The government provides subsidy to the firms to pay part of cost for them to encourage more production. From the diagram above, the production of marginal social benefit(MSB) is exceed to the marginal private benefit(MPB). The government provided subsidy(P2-P1) to the firm to decrease their cost of production. As a result, the firm will increase the output from Qp to Qs. Then, the social welfare will be maximized. For example, Malaysia government plans to provide a subsidy of RM30bil to enhance primary and secondary school education nationwide which is one of the plans of Budget 2010. From the diagram above, when our government provides a subsidy of RM30bil on education, the operating cost of school will decrease. Then, the school will have enough capital to build more facilities and provide more educational plans from Qp to Qs for the students. The students will get more benefit from studying. At this moment, the social welfare will keep increasing till the marginal social benefit(MSB) equals to marginal social cost(MSC). The third policy is to change the property right. This will happen when the government gives the property rights to certain people such as the fishermen could be given the property rights to a river. When negative externalities occurred, the owners of property could sue a company who caused damage or pollution such as the fishermen can sue a chemical factory which polluted the river. It may charge some social costs to the chemical factory. The government pursued this policy to reduce the pollution of environment so that the negative externalities could be eliminated. In addition, the government will also impose the laws and regulation to prohibit the unhealthy behaviour of people such as legalizing the age for smoking and banning on drunk driving. The laws and regulations must be simple and easy to understand to the public. Due to a reducing in negative externalities, the marginal social cost will decrease. So that, imposing the laws and regulations is also a policy to overcome the market failure. For example, in New Zealand, it is illegal to sell tobaccos and cigarettes to person aged uner 18. It is also illegal for a person over 18 to give a person under 18 cigarettes or tobaccos in a public place. Another example is sales of tobacco to person aged under 18 are illegal in all Australian states. The purpose of legalizing the smoking by both governments is to reduce the consumption of tobaccos. It may help to decrease the negative externalities for improving efficiency of the market. Finally, the other policy is to give the pollution permit. The government can give a pollution permit to a firm to limit his output. The more the firm produce, the more polluted the environment is. Therefore, the marginal social cost will keep increasing and market failure will occur. The government will give the pollution permit to the firm such as limiting the firm to produce only 100 units carbon dioxide per year. As a result, there is an incentive to pollute less and the negative externalities will be eliminated. Conclusion The public policies implemented by the government can successfully solve the market failure. The main causes of market failure is the externality. It can divide into negative externality and positive externality. Government will impose the tax to the firms to decrease their output as every unit of good they produce will cause the pollution of environment. The implimentation of this public policy can reduce the pollution of environment but also to eliminate the negative externalities for efficient market. Secondly, the government will also provide subsidy to the firms. With this policy, the production cost of the firms will decrease and their output will increase. The market will be efficient as the subsidy on positive externalities forces the marginal social cost equals to the marginal social benefit. Thirdly, the government will implement the policy of changing the property rights. By giving the property rights, the owner of the property can sue a company which caused pollution to their property such as the lands. It may help to reduce the pollution of the environment and eliminate the negative externalities. So that, the market failure can be overcome. The government will also impose the laws and regulations to prohibit people from the unhealthy behaviour such as smoking and taking drug. The implementation of this policy can effectively increase the social benefit. So that, the market failure will turn into an efficient market. Lastly, the government will also give the pollution permit to the firm. This policy can limit the output of carbon dioxide of the firm. It can reduce the negative externality of air pollution. As a result, the market will be efficient by reducing the negative externalities. For archieving an efficient market, the government will implement the public policies when market failure occurred although the government needs to spend a high cost on them.