Thursday, October 31, 2019

Channel marketing Essay Example | Topics and Well Written Essays - 500 words

Channel marketing - Essay Example Nevertheless, this paper will assesses the service outputs supply of Wal-Mart and Costco in the food section, hence identify what the firms offers and their structures. Wal-Mart and Costco purchase products from manufactures and producers in large quantities and they are gradually broken down as they reach the consumers. The products of high value are squeezed in to small volumes, since it is cost effective to ship to end-customers compared to the cost of shipping a bulkier product (Perner, 1). Convenience has been identified as a significant factor used to influence the consumer food choices, by Wal-Mart and Costco, since they have changed ways in which the nature of products are provided in grocery stores, and the time consumed to prepare a meal. Wal-Mart focuses on responding to the demand by offering more in-store delis and ready to eat prepared foods such as chicken, salad and sushi, while Costco has introduced an increased selection of frozen and prepared meals for consumers seeking a quick meal from their grocery stores. Wal-Mart has made a substantial investment in information technology and logistics, which facilitates commitment in taking a risk of placing large orders in advance of customer, needs in order to focus on the reducing the waiting time and delivery time. On the other hand, Costco has developed an efficient distribution system, which is based on its information system and enormous demand, though they have short channels for perishable products. Moreover, Wal-Mart and Costco have to incur additional costs in order to ensure that merchandise is distributed quickly. Wal-Mart and Costco consolidate goods by carrying a wide assortment of goods from different manufactures to provide a breadth of assortment, whereby their stores carry different kinds of food from different suppliers. In this case, this makes

Tuesday, October 29, 2019

U.S. Commercial Rayon Fiber Production Essay Example | Topics and Well Written Essays - 1500 words

U.S. Commercial Rayon Fiber Production - Essay Example But this artificial production of the fibers is just a century old. It was in 1890s that the first artificial silk, which was nothing but rayon made its beginning as a commercially produced fiber and it was in the year 1911; American Viscose Company, the first company to pioneer artificial fiber production began producing rayon.2 Though the fiber revolution begun in later half of 19th century, its roots have got a beginning with the description on minute bodies in the book â€Å"Micrographia† by Robert Hooks in 1665.3 That humble beginning got translated into the production almost two centuries later and now this man made fiber production has reached up to 24 million ton. These artificial fibers have got its application not only for apparel manufacturing but also for home furnishings, medicine and many others.4 Rayon was first artificially produced fiber and was called as artificial silk. Developed in France by Count Hilaire de Chardonnet, this fiber despite being a man-made product is still not synthetic.5 Its production involves wood pulp which is a naturally occurring raw material. The basic nature of rayon is very much like naturally occurring fibers such as cotton or linen. The industry as of now produces four different types of rayon namely Regular rayon, High Wet Modules (HWM) rayon, High Tenacity Rayon and Cupramonium Rayon. The production of these different types is due the use of two different chemicals and varying manufacturing techniques.6 The United States at one time was the leading producer of rayon with companies like Viscose Co. and DuPont being the two largest producers in US. But as of now there is not even a single rayon manufacturer in United States.7 Rayon still forms a major part of total fiber consumption with companies mostly from Europe and Asia are making it avai lable to the customers. The production of rayon made its beginning in US in the year 1911. It was the American Viscose Company (A. V. C.) who started the

Sunday, October 27, 2019

A Study On Electric Machines Engineering Essay

A Study On Electric Machines Engineering Essay The classical set of machines represents the asynchronous induction, synchronous, DC machines, and variable reluctance machines. Among these classical machines, the asynchronous machine is most widely used in a large range of applications and is able to operate as a motor (converting electrical power into mechanical power) or as a generator (converting mechanical power into electrical power). The machine can be fed via a power electronic converter or connected directly to an AC or DC supply. Electric machines are majorly based on 4 principles. The first principle is that an electrical current produce a magnetic field around it that can be strengthened by more than a thousand times when passing through iron. The second principle is called motor action and is defined by a force perpendicular to both the direction of the electrical current and the magnetic field. This induced force is given by: F= i (L) B: magnetic flux density L= length of wire i= magnitude of current in the wire The third principle is that an electrical conductor moving in a magnetic field has an electrical current induced in it creating an electromotive force. The induced voltage is expressed by the following formula: ?ind= (v) L v: velocity of the wire L: length of conductor in the magnetic field B: magnetic flux density The fourth principle is that a change in the magnetic field in a circuit can cause an induced voltage to this circuit. This effect is based on the Faradays law that states that when a flux passes through a turn of coil, a voltage proportional to the rate of change of the flux will be induced. ?ind = N: number of turns of wire in coils ?ind: voltage induced F: flux passing in the coil (http://mysite.du.edu/~jcalvert/tech/elmotors.htm) An electric machine has two essential electrical parts: The stator and the rotor. The stator (derived from the word stationary) is the stationary part of the machine forming a hollow cylinder consisting of individual electro-magnets shaped towards the middle. The rotor (derived from the word rotating) is located inside the stator and consists of a group of electro-magnet arranged around a cylinder, mounted on the motors shaft with its poles facing toward the stator poles. The rotor is the rotating component of the machine. (http://www.reliance.com/mtr/mtrthrmn.htm) (http://www.reliance.com/mtr/mtrthrmn.htm) In general, when the change of flux is associated with mechanical motion, it is the case of electromagnetic energy conversion. Regarding the rotation machines, the voltage is generated in groups of coils, often called windings, by three different ways. The first technique is by mechanical rotation of the windings through a magnetic field, the second is mechanical rotation of the magnetic field past the winding, and third by the design of the magnetic circuit so that the reluctance varies with the rotation of the rotor. So these methods generate a time-varying voltage caused by the cyclic charge of the flux linking a specific coil. The armature winding of a machine is a combination of such coils interconnected so that their generated voltage is close to the desired. In a DC machine, the armature is the rotating member or rotor. As for the AC machine, the armature is the stationary member or stator. The coils pointed out previously are wound on iron cores in order to maximize the coupling between the coils, to increase the magnetic energy density associated with electromechanical interaction, and to shape and distribute the magnetic fields according to the requirements of each particular machine design. Eddy currents will be induced in the armature iron since it is subjected to a time varying magnetic flux. To minimize this eddy-current loss, thin laminations for the armature of AC machines construct the armature iron. The magnetic circuit is completed through the iron of the other machine member, and excitation coils, or field windings, may be placed on that member to act as the primary source of flux. Permanent magnets may be used in small machines, and developments in permanent magnet technology are resulting in their use in larger machines. In variable reluctance machines, there are no windings on the rotor, and the operation depends on the non uniformity of air-gap reluctan ce associated with variations in rotor position. (electric machinery fifth edition (LIBRARY)) AC electric machines AC machines are motors converting AC electrical energy to mechanical energy and generators that convert mechanical to AC electrical energy. AC electric machines are divided into two types: Asynchronous (induction) and synchronous machines. The difference between these two types is that induction machines have their field currents supplied by magnetic induction while the field current in synchronous ones are supplied by a separate DC source. (Electric machinery fundamentals). The principle of rotating magnetic fields is the main rule of the operation to most ac motors. The magnetic field created by the poles will make the rotor rotate making the stator poles progressively change. This change will make the rotor follow and rotate with the magnetic field of the stator. As each change is made, the poles of the rotor are attracted by the opposite poles on the stator, forcing the rotor to rotate with the stator field. (http://www.reliance.com/mtr/mtrthrmn.htm) The rotor is rotating within the stator at angular velocity ?n, the magnitude of the flux density vector B at any angle a around the stator is given by B= BM cos(?t-a). Then the voltage induced in the stator that has N turns of wire is expressed by eind= NF?cos(?t). The voltage induced is sinusoidal with amplitude depending on the flux, angular velocity and a constant depending on the construction of the machine. In a three phase set of coils, the voltages induced will have same magnitude but they are shifted by 120 degrees. eaa'(t)= NF? sin(?t) ebb'(t)= NF? sin(?t-120) ecc'(t)= NF? sin(?t-240) The rms voltage of each phase is: EA= pNFf

Friday, October 25, 2019

Nonsmokers can be cancer victims, too :: essays research papers

Like Reeve, widow of "Superman" star Christopher Reeve, 1 in 5 women diagnosed with the disease never lit a cigarette, doctors say. Yet they share an unfortunate stigma with cancer patients who smoked. "The underlying assumption is, you were a smoker and you caused this, therefore you're not going to get my sympathy," said Tom Labrecque Jr., who started a foundation to raise awareness after his nonsmoker father died several years ago of the disease. No one "deserves" lung cancer, doctors say. But nonsmokers do have one silver lining: They respond better to the newest targeted cancer drugs like Iressa and Tarceva. That's because people who get lung cancer early in life, like the 44-year-old Reeve, are more likely to have genetic factors fueling their disease, doctors say. Only 3 percent of lung cancers occur in people under 45, regardless of smoking status. Reeve, an actress who leads a paralysis research foundation named for her husband who died last year, disclosed Tuesday that she was being treated for lung cancer but gave no details on how or where. Her announcement came two days after ABC News anchor Peter Jennings, a smoker, died of lung cancer at age 67. Despite their different smoking histories, they share the most common cancer in the world, and the deadliest. This year in the United States, an estimated 93,010 men and 79,560 women will be diagnosed with lung cancer and almost an equal number -- 90,490 men and 73,020 women -- will die of it. About 10 percent of men and 20 percent of women with lung cancer never smoked, and the number of nonsmokers with the disease doesn't seem to be rising significantly, said Dr. Michael Thun, chief epidemiologist for the American Cancer Society. But awareness may be on the rise because of the aggressive anti-smoking campaigns in recent years. And stigma may be rising, too. "When people get breast cancer, people say, 'What can I do to help you?' When people get lung cancer, people say, 'Did you smoke?"' said Susan Mantel, executive director of Joan's Legacy, a fund-raising group named for Joan Scarangello, a nonsmoker and former head writer for newsman Tom Brokaw. Scarangello died in 2001 of lung cancer, as did her nonsmoking mother before her. "There is a definite stigma," said Labrecque, recalling comments after the funeral for his father, a former chairman of Chase Manhattan Corp. "People would say, 'I didn't know he smoked,"' he said. His foundation's Web site even acknowledges this trend, by stating that more than half of people newly diagnosed with lung cancer each year have either never smoked or quit smoking.

Thursday, October 24, 2019

Cybercrime †computer crime Essay

1.1Background Cybercrime is also called computer crime. The use of computers as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy is cybercrime. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.1 New technologies creates new criminal opportunities because of the early and widespread adoption of computers and the Internet, these days computer crime has been a growing issue even here in Nepal. 1.2 Statement of Problem The development on information technology and cyberspace made the world as a small global village. People can get access right through the world from their home with internet. The trends of global terrorism are also changed by using such IT. Cyber crime as a â€Å"new weapon† becomes a potential threat in international peace. In particular, this paper is focused on cyber crime, its effects, challenges and impact of cyber crime on global security. 1.3Objectives of the Study: a. To know how far cybercrimes are occurring in Nepal b. Cyber crime in Nepal and the law into force c. To learn about cyber security 1.4Importance of the Study The research work is basically useful for all researchers and learners who are willing to study about cyber crime. It is equally beneficial to armed and police forces, the students of strategic studies, political science, history and international relationship. Cyber crime, at present is being a great challenge in each and every development sector. So, it will be useful for the planners and policy makers too. 1.5Limitation of the Study It is because of time constrains; the research is limited in studying on cyber crime, its effects and cyber security only. However, broaden concept of cyber crime has been drawn in the study. Field visit was very costly in terms of time and resources, so only secondary sources (data) have been used to complete the study. It is specifically focused on identifying the causes, objectives, and impacts of cyber crime, the development in cyber space and information warfare, and potential threat in international peace. At last various measures for combating it and recommendations. 1.6Methodology In this study, descriptive and analytical method has been chosen. Because of the time constrains, the data has been used in the research work are based on secondary sources. They were obtained through books, and World Wide Web sites. CHAPTER II HISTORY OF CYBER CRIME The first recorded cyber crime took place in the year 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime. In Nepal, business houses, organizations started using electronic materials and computers where government was lacking in electronic rules and regulations. There is no exact date recorded for the first cyber crime in Nepal till date. But we can see many people being the victim of cybercrime. Especially in Nepal, many renowned companies are receiving emails from proxy mailing address demanding for money. Beside this, hacking websites of banks, newspaper and face book accounts, humiliating gi rls and uploading images in porn sites, sales of pirated CDS and DVDS are the most commonly practiced cybercrime in Nepal. CHAPTER III CATEGORIES OF CYBERCRIME Basically we can categories cybercrime into two types: (a) The computer as Target: using of computer to attack another computer like hacking, virus/ worms attacks. (b) The computer as a weapon: using a computer to commit real world crime like cyber terrorism, credit card fraud and pornography, DoS attack and many more.2 CHAPTER IV EFFECTS OF CYBERCRIME As the world goes mobile, cybercrime follows. Criminal takes advantage of technologies and internet in many ways to commit crime which is very hard to control by solo effort. Some of the effects of cybercrime that is frequently occurring in Nepal are as follows; (a) Hacking:This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location. (b) Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading. (c) Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable. (d) Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history. (e) Malicious Software: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system. (f) Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting. CHAPTER V CYBER SECURITY AND ITS ADVANTAGES 5.1Cyber security:Cyber Security involves protection of sensitive personal and business information through prevention, detention and response to different online attacks. The measures of applying cyber security are as follows: (a) Privacy Policy: Before submitting your name, e-mail address, on a website look for the sites privacy policy. (b) Keep Software Up to Date: If the seller reduces patches for the software operating system your devices install them as soon as possible. Installing them will prevent attackers from being able to take advantages. Don’t choose options that will allow your computer to remember your passwords. (c) Disable remote connectivity: Some devices are equipped with wireless technologies like Bluetooth that can be used to connect to other devices. You should disable these features when they are not in use. 5.2Advantages of Cyber Security:The advantages of cyber security are mentioned below: (a) The cyber security will defend us from critical attacks. (b) It will defend us from hacks and virus. (c) Internet Security processes all the incoming and outgoing data on your computer. (d) Application of cyber security used in our PC needs update every week. (e) It helps us to browse the site, website. CHAPTER VI CYBER LAW IN NEPAL Nepal has moved a step further in the information and communication technology (ICT) as the government has promulgated Electronic Transaction Act-2063 and Regulations, legalizing all electronic transactions and digital signatures. 4 Cyber law or Electronic Transaction Act clearly defines the rights, duties and authorities of the subscribers, network service provider, etc. The act had provision of separate bodies, IT Tribunal and Appellate Tribunal. The both look into all cases related to computer crime and the cyber crime. The IT tribunal is headed by the District Court Judge and has 3 members. The main purpose of this act (law) is to legalize the electronic transactions and digital signatures for both private and public transactions, protecting the electronic documents from the unauthorized access and to control the illegal activities or the cyber crimes. This act has 12 sections and 79 clauses. Electronic Transaction Act 2006 is here to fore addressed in the capacity of cyber law. The Cyber law 2006 dictates the limitation for complaint within 35 days of first knowhow of crime and breaching of the cyber law. The punishment varies from Rs. 50000 to Rs. 300000 penalty and 6 months to 5 years imprisonment as the attempts to discourage the cyber crime. CHAPTER VII CHALLENGES IN CYBER CRIME Though there is cyber law in Nepal, but yet there are many challenges in investigating Cybercrime due to: a. Internet and the computers as the Scene of Crime there are many types of computer crime that exist, as well as the legal and technical challenges that face law enforcement and prosecutors in their efforts to combat this crime. b. Investigator’s skills (not trained) to combat cyber terrorism. c. knowhow of cyber security d. high-tech crimes and confusions e. Low participation of tech groups and less co-operation of resource groups f. Imitation of traditional perspective for defining cyber crime. A challenging aspect of cybercrime is its nonlocal character: actions can occur in jurisdictions separated by vast distances. g. Creating a Safer Information Society by Improving the Security of Information Infrastructures. CHAPTER VIII RECOMMENDATION Many people has become the victim of cybercrime especially girls, celebrities, politicians and many other renowned personalities. It’s a well known saying that â€Å"Prevention is always better than cure†, Therefore, it is always better to take certain precaution beforehand rather than regretting afterwards. Whosoever is accessing the net should take Safety and privacy activation on social networking site. Some of the safety measures are mentioned below: a. Stay informed, pay attention to news sources to learn about recent threats and websites that have been attacked. b. Be careful, to never enter private or financial data into websites that don’t show proof of security. c. Clean and clear your internet cache, lost fragments, orphaned registry keys, temporary files, deleted email messages, and other temporary files on your computer often. d. Google yourself and make sure there is nothing out there that gives out too many details about you. e. Never provide your c redit card number as a proof f. Report abuse, if you are stalked or harassed online, don’t respond to the attacker. Instead keep a record of the communications and report the abuse to the websites administrator. CHAPTER IX CONCLUSION There are appropriate investigative law enforcement agencies, District Police Offices of Police Headquarters or Local Police office, Metropolitan Crime Division who are working against cybercrime and the criminals. Cybercrime is indeed getting the recognition it deserves. However, it is not going to be restricted that easily. In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security. Moreover, every individual most apply the possible way to stay alert. ACRONYMS FBI- Federal Bureau of Investigation DoS- Denial-of-Service PC- Personal Computer IT- Information Technology CD-Compact Disc DVD-Digital Versatile Disc / Digital Video Disc ICT-Information and Communication Technology BIBLIOGRAPHY a. http://www.britannica.com/EBchecked/topic/130595/cybercrime b. http://www.bezaspeaks.com/cybercrime/history.htm c. http://www.slideshare.net/aemankhan/cybercrimeppt-27376284 d. http://www.slideshare.net/aemankhan/cybercrimeppt-27376284 e. http://egovernancenepal.blogspot.com/2007/03/cyber-law-electronic- transaction-act.html f. http://www.crossdomainsolutions.com/cyber-crime/ g. http://www.spotlightnepal.com/News/Article/-Cyber-Law-And-Its-Challenge- h. http://www.ekantipur.com/2014/05/25/oped/cybercrime-without-cyber-rules/390001.html i. http://www.thehimalayantimes.com/fullNews.php?headline=Journo+charged+with+cyber+crime&NewsID=38http://setopati.net/politics/1775/0963 j. http://mybhaktapur.com/2011/12/20/nepal-police-arrests-facebook-mis-user-for- cyber-crime/ k. http://www.thehimalayantimes.com/fullNews.php?headline=Cyber+criminals+to+target+mobile%26sbquo%3B+social+in+2014&NewsID=401622 l. http://surendraphuyalnepal.wordpress.com/ m. Kantipur Daily n. Nagarik Dainik o. A Guide to Computer Crime from legal.practitioner.com p. International Journal of Cyber Criminology q. Cybercrime Nepalese Prospective by Nepal Police r. Moore, R. (2005) â€Å"Cyber crime: Investigating High-Technology Computer Crime,† Cleveland, Mississippi: Anderson Publishing.

Wednesday, October 23, 2019

Democratic Theory Essay

The concept of democracy has developed through the theories that different personalities have created. Among the most notable individuals that gave substantial contribution to democracy are Thomas Hobbes, John Locke, and Jean Jacques Rousseau through their social contract theory. The social contract theory serves as a foundation in the establishment of the major tenets of democracy. The social contract theory of Thomas Hobbes is affected by his belief regarding human nature. Hobbes deems that people are living in a state of nature wherein each individual has a right to everything in the world. However, this could become chaotic as people have varying and often times conflicting interests. As such, this kind of situation will eventually lead to conflict. In relation to this, he asserts that people should surrender their natural rights to a sovereign authority that will be responsible in protecting them against a life that is â€Å"solitary, poor, nasty, brutish, and short† (Friend). He also states that the abuses of power by this sovereign authority should be accepted in exchange for peace (Friend). On the contrary, the social contract theory of John Locke is different from Hobbes as he believes that the state of nature is not a state without morality. It is pre-political as there is no civil authority or government, but it is not pre-moral because people are regarded as equal with one another in the state of nature and they are capable of discovering the law of nature, which is the basis of all morality. Individuals in this state of nature would come together and surrender their rights to the public power of a government in order for this body to punish those who transgress the law of nature. Another difference of Locke’s theory from Hobbes is that he does not believe that the abuses of power of a supreme authority should not be tolerated, rather the people has the right to reject an abusive government and return to the state of nature to be able to construct a better governing body (Friend). Jean Jacques Rousseau’s social contract theory is largely influenced by the enlightenment age as it was created during that time. Roseau asserts that humans are essentially free in the state of nature but the progress of civilization made people infringe upon the liberty of others through economic and social inequalities. In this sense, he believes that people should have an agreement to come together through the social pact wherein individual persons become collective in surrendering their individual rights and freedom and transfer it to a single body. This single body is composed of the people that are directed towards the common good of the people. As such, the government in Rousseau’s theory is authorized through the general will of the people, which is regarded as a direct form of democracy. His theory is different from Hobbes and Locke because of his idea of respecting the individual will and still allowing them to assemble themselves to form a general will that will embody all the people concerned (Friend). Despite the fact that democracy is regarded as one of the ideal forms of government, it still has its corresponding problems. One of the most notable dilemmas in a democratic system is that the minority is sometimes put in a disadvantageous position as the will of the majority reigns supreme. Another predicament is the ability of the people to vote for the right officials that they will elect in the government. Voting wisely requires people to have the necessary knowledge and ability to discern the right candidates that they will choose. However, this becomes difficult especially for countries where people are illiterate and could be easily influenced by propaganda (Haarsma and Kuchling). Works Cited Friend, Celeste. 2006. â€Å"Social Contract Theory. † The Internet Encyclopedia of Philosophy. 10 June 2009 . Haarsma, Loren. , and Kuchling, Andrew Mark. 10 February 1992. â€Å"Problems with Democracy. † 10 June 2009 .