Tuesday, August 6, 2019

Ecommerce in Bangladesh Essay Example for Free

Ecommerce in Bangladesh Essay 1. Introduction When Electronic commerce, commonly known as ecommerce, is the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Electronic commerce draws on such technologies as electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the at least at one point in the transactions life-cycle, although it may encompass a wider range of technologies such as email, mobile devices and telephones as well. Electronic commerce is generally considered to be the sales aspect of ebusiness [1]. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. E-commerce can be divided into: i. E-tailing or virtual storefronts on Web sites with online catalogs, sometimes gathered into a virtual mall ii. The gathering and use of demographic data through Web contacts iii. Electronic Data Interchange (EDI), the business-tobusiness exchange of data iv. E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters) v. Business-to-business buying and selling vi. The security of business transactions The main areas of e-commerce are following: i. Business to Business (B2B) ii. Business to Consumer (B2C) iii. Business to Government (B2G) iv. Government to Business (G2B) 2. Objectives Our objectives are following: i. To define e-commerce and describe how it differs from ebusiness. ii. To identify and describe the unique features of ecommerce technology and discuss their business significance. iii. To describe the major types of e-commerce. iv. To discuss the origins and growth of e-commerce. v. To explain the evolution of e-commerce from its early years to today. vi. To identify the factors that will define the future of ecommerce. vii. To describe the major themes underlying the study of ecommerce. viii. To identify the major academic disciplines contributing to e-commerce and understand design of an e-commerce engine ix. To identify the opportunity and problem of e-commerce implementation in Bangladesh. x. To identify the future of e-commerce. Volume 2 Issue 2, February 2013 www.ijsr.net 150 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 3. E-Commerce in Bangladesh In Bangladesh there is a limited application and use of B2C e-commerce .This field is not yet much developed in Bangladesh. There are many reasons behind it one simple reason this country is not so developed and most of its citizens are poor and uneducated. It is quit natural that there are few customers who is willing and can shop in internet. It will take years to be developed this sector in bd. The telecommunication infrastructure any country affect the Internet services directly, cause it is largely depended on it. In this chapter Define Need for e-commerce in Bangladesh, different sector in Bangladesh, overview of implementation stage of e-commerce in Bangladesh. And there is some problem such as: low internet speed, no payment gateway and internet range, and recommendation. 3.1 Need for E-commerce in Bangladesh With the increasing diffusion of ICTs, more specifically t he Internet, the global business community is rapidly moving towards Business-to-Business (B2B) e-commerce. The buyers/ importers gain a clear advantage when the Internet gives them access to the global market, by which they can compare prices across regions, find out whether prices vary by order fragmentation, get awareness about substitute/ alternative products. Consequently, the sellers/ exporters make sure that they are well portrayed in the cyber world through websites and portals. Like buyers, sellers also benefit from increased and more efficient access to the global market through the Internet. Bangladesh is pursuing an economic policy of export-led growth. With the rising forces of globalization, it is becoming increasingly important that the private sector, particularly the export sectors are well prepared to meet the requirements and expectations of the importers and also stand out in the competition against exporters in other countries. In such a scenario, two issues are becoming particularly important for Bangladeshi export sectors –one, whether businesses are automating their internal processes with these of ICTs to become increasingly efficient and competitive in a global context, and two, whether businesses have effective presence and participation in the cyber world. International organizations such as UNCTAD (United Nations Center for Trade and Development) and WTO (World Trade Organization) [2] have, over the last several years, put much emphasis on the importance of e-commerce for developing countries. UNCTAD has special programs to facilitate developing countries to transition into e-commerce. The WTO has also develo ped rules and guidelines for global e-commerce transactions. 3.2 E-commerce in Different Sector in Bangladesh Despite being a under developed country, selected segments of the Bangladeshi business community has embraced technology with reasonable success. Personal computers and the Internet are also emerging as day-to-day business tools. These positive indicators are favoring the prospects of e-commerce in Bangladesh. i. RMG Sector ii. Banking on the Web (Online Banking) iii. Online Shopping iv. Web Hosting, Domain v. Online cards, gifts vi. Pay Bill 3.3 The Existing Situation and Potential of E-commerce in Bangladesh Internet services are presently available in Bangladesh. Its usage for e-commerce by the Bangladeshi producers to export as well as to access inputs will be dependent on their willingness and ability to use this medium as well as that of the buyers of final products and the sellers of intermediate goods and services. Figure 1 depicts the three dimensions of e-commerce. Business to-Consumers (B2C) e-commerce is practically non-existent within Bangladesh, while a very limited level of Business-to-Business (B2B) and Businessto-Government (B2G) transactions exists [3]. The potential for use of e-commerce by Bangladeshi consumers and businesses with foreign firms is much brighter, and can play an important role in boosting the country’s exports. A significant volume of B2G is also possible, as the government remains the biggest spender. Figure 1. The Three Dimensions of E-commerce 3.4 E-commerce growth in Bangladesh E-commerce growth in Bangladesh shown in figure 3.2 in the year of 2000 e-commerce business is 11440 million taka. In the years of 2001 business of e-commerce is 15840 million taka and increase year by year 2002 business is 18980 million taka 2002 to 2004 businesses is not very fast but in the year of 2005 business of e-commerce is 22480 and end the year of 2006 business of e-commerce growth is 252000 million taka. Figure 2. E-commerce growth in Bangladesh 4. Methodologies The methodologies of our survey are given below: 4.1 Identification of scope of study 151 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 To accomplish the project objectives, a systematic process is followed. The project process begins with the identification of the project topic where studies was carried out to obtain enough information on the topic. 4.2 Group discussions to collect suggestions on the survey of e-commerce system Discuss with group member about the topic and collect their suggestions on this topic. Also discuss impacts of ecommerce in our society and business and barriers ecommerce in different sectors in Bangladesh and the future of e-commerce system. 4.3 E-commerce site visits as clients Some e-commerce websites visits were made as clients. We visited websites like www.ebay.com, browsed many products, added product to shopping cart, created user account and observed the check out process. We also examined their user interface, front end design and various category of product. We searched products by different types, t he product names and the company name. 4.4 Internet search to collect data on e-commerce growth world wide We searched the internet to collect data on e-commerce business growth based on time, data on e-commerce revenue based on geographic locations. We also collected data about e-commerce business growth and present situation of ecommerce in Bangladesh. 4.5 Architecture and code review of e-commerce site We reviewed the main technologies involved in ecommerce site, which include php sessions, catalog technology, server technology (hardware and software). We also reviewed credit card transaction and shopping cart checkout process. 4.6 Interviews to find what people think about ecommerce We interviewed people from various sections of the society to find out what they think about e-commerce and what changes they needed. We also discussed with them what the advantages and disadvantages of e-commerce systems are. 4.7 Introducing intentional change to understand ecommerce engine We downloaded e-commerce site code and changed the catalog of product, banner, product detail, product image, and increase and decrease number of product show in the main page also changed the theme of e-commerce site. We entered new products and removed selling product and updated the products. 5.1 Architecture This is the design of front-end design shown in Figure 3. There is a one home page, wish list, acco unt, shopping cart, and product list and checkout option. Figure 3. E-commerce site front end design 5.2 Database Structure 5.2.1 E-R Diagram A sample entity–relationship diagram using Chens notation is shown in Figure 4. 5. Technical Design of E-Commerce Site The technical design of e-commerce site include database structure, database schema, table structure, php session, shopping cart, e-r diagram, and credit card transaction. Figure 4. A sample entity–relationship diagram using Chens notation In software engineering, an entity–relationship model (ER model for short) is an abstract [4] and conceptual representation of data. Entity–relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often 152 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 a relational database, and its requirements in a top-down fashion. Diagrams created by this process are called entity– relationship diagrams or ER diagrams. Using the three schema approach to software engineering, there are three levels of ER models that may be developed. The conceptual data model is the highest level ER model in that it contains the least granular detail but establishes the overall scope of what is to be included within the model set. The conceptual ER model normally defines master reference data entities that are commonly used by the organization. Developing an enterprise-wide conceptual ER model is useful to support documenting the data architecture for an organization. A conceptual ER model may be used as the foundation for one or more logical data models. The purpose of the conceptual ER model is then to establish structural metadata commonality for the master data entities between the set of logical ER models. The conceptual data model may be used to form commonality relationships between ER models as a basis for data m odel integration. A logical ER model does not require a conceptual ER model especially if the scope of the logical ER model is to develop a single disparate information system. The logical ER model contains more detail than the conceptual ER model. In addition to master data entities, operational and transactional data entities are now defined [5]. The details of each data entity are developed and the entity relationships between these data entities are established. The logical ER model is however developed independent of technology into which it will be implemented. One or more physical ER models may be developed from each logical ER model. The physical ER model is normally developed be instantiated as a database. Therefore, each physical ER model must contain enough detail to produce a database and each physical ER model is technology dependent since each database management system is somewhat different. The physical model is normally forward engineered to instantiate the structur al metadata into a database management system as relational database objects such as database tables, database indexes such as unique key indexes, and database constraints such as a foreign key constraint or a commonality constraint. The ER model is also normally used to design modifications to the relational database objects and to maintain the structural metadata of the database. The first stage of information system design uses these models during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data modeling technique can be used to describe any ontology (i.e. an overview and classifications of used terms and their relationships) for a certain area of interest. In the case of the design of an information system that is based on a database, the conceptual data model is, at a later stage (usually called logical design), mapped to a logical data model, such as the relational model; this in turn is mapped to a physical model during physical design. 5.2.2 The Building Blocks: Entities, Relationships, and Attributes The building blocks: entities, relationships, and attributes as shown in Figure 5, first here two related entities then an entity with an attribute next in this figure a relationship with and attribute and finally see primary key. Figure 5. The building blocks: entities, relationships, and attributes An entity may be defined as a thing which is recognized as being capable of an independent existence and which can be uniquely identified. An entity is an abstraction from the complexities of some domain. When we speak of an entity we normally speak of some aspect of the real world which can be distinguished from other aspects of the real world. An entity may be a physical object such as a house or a car, an event such as a house sale or a car service, or a concept such as a customer transaction or order. Although the term entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a given entity-type. There are usually many instances of an entity-type. Because the term entity-type is somewhat cumbersome, most people tend to use the term entity as a synonym for this term. Entiti es can be thought of as nouns. Examples: a computer, an employee, a song, a mathematical theorem. A relationship captures how entities are related to one another. Relationships can be thought of as verbs, linking two or more nouns. Examples: owns relationship between a company and a computer, supervises relationship between an employee and a department [6], performs relationship between an artist and a song, a proved relationship between a mathematician and a theorem. The models linguistic aspect described above is utilized in Volume 2 Issue 2, February 2013 www.ijsr.net 153 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 the declarative database query language ERROL, which mimics natural language, constructs. ERROLs semantics and implementation are based on Reshaped relational algebra (RRA), a relational algebra which is adapted to the entity–relationship model and captures its linguistic aspect. Entities and relationships can both have attributes. Examples: an employee entity might have a Social Security Number (SSN) attribute; the proved relationship may have a date attribute. Every entity (unless it is a weak entity) must have a minimal set of uniquely identifying attributes, which is called the entitys primary key. Entity–relationship diagrams dont show single entities or single instances of relations. Rather, they show entity sets and relationship sets. Example: a particular song is an entity. The collection of all songs in a database is an entity set. The eaten relationship between a child and her l unch is a single relationship. The set of all such child-lunch relationships in a database is a relationship set. In other words, a relationship set corresponds to a relation in mathematics, while a relationship corresponds to a member of the relation. 5.2.3Relationships, Roles and Cardinalities In Chens original paper he gives an example of a relationship and its roles. He describes a relationship marriage and its two roles husband and wife. A person plays the role of husband in a marriage (relationship) and another person plays the role of wife in the (same) marriage. These words are nouns. That is no surprise; naming things requires a noun. However as is quite usual with new ideas, many eagerly appropriated the new terminology but then applied it to their own old ideas. Thus the lines, arrows and crows-feet of their diagrams owed more to the earlier Bachman diagrams than to Chens relationship diamonds. And they similarly misunderstood other important concepts. In particular, it b ecame fashionable (now almost to the point of exclusivity) to name relationships and roles as verbs or phrases. 5.2.4 Limitations ER models assume information content that can readily be represented in a relational database. They describe only a relational structure for this information. Hence, they are inadequate for systems in which the information cannot readily be represented in relational form, such as with semistructured data. Furthermore, for many systems, the possible changes to the information contained are nontrivial and important enough to warrant explicit specification. Some authors have extended ER modeling with constructs to represent change, an approach supported by the original author; an example is Anchor Modeling. An alternative is to model change separately, using a process modeling technique. Additional techniques can be used for other aspects of systems. For instance, ER models roughly Figure 6. E-R modeling 5.3 Table Structure In relational databases and flat file databases, a table is a set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows each row is identified by the values appearing in a particular column subset which has been identified as a unique key index. Table is another term for relations; although there is the difference in that a table is usually a multi-set (bag) of rows whereas a relation is a set and does not allow duplicates. Besides the actual data rows, tables generally have associated with them some meta-information, such as constraints on the table or on the values within particular columns. The data in a table does not have to be physically stored in the database. Views are also relational tables, but 154 correspond to just 1 of the 14 different modeling techniques offered by UML. Another limitation: ER modeling is aimed at specifying information from scratch. This suits the design of new, standalone information systems, but is of less help in integrating pre-existing information sources that already define their own data representations in detail. Even where it is suitable in principle, ER modeling is rarely used as a separate activity. One reason for this is todays abundance of tools to support diagramming and other design support directly on relational database management systems. These tools can readily extract database diagrams that are very close to ER diagrams from existing databases, and they provide alternative views on the information contained in such diagrams. In a survey, Brodie [7] and Liu could not find a single instance of entity–relationship modeling inside a sample of ten Fortune 100 companies. Badia and Lemire blame this lack of use on the lack of guidance but also on the lack of benefits, such as lack of support for data integration. Also, the enhanced entity–relationship model (EER modeling) introduces several concepts which are not present in ER modeling. ER modeling as shown in Figure 6. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 their data are calculated at query time. Another example is nicknames, which represent a pointer to a table in another database. 5.4 Database Schema A database schema of a database system is its structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data to create a blueprint of how a database will be constructed (divided into database tables). The formal definition of database schema is a set of formulas (sentences) called integrity constraints imposed on a database. These integrity constraints ensure compatibility between parts of the schema. All constraints are expressible in the same language. A database can be considered a structure in realization of the database language. The states of a created conceptual schema are transformed into an explicit mapping, the database schema. This describes how real world entities are modeled i n the database. A database schema specifies, based on the database administrators knowledge of possible applications, the facts that can enter the database, or those of interest to the possible end-users. The notion of a database schema plays the same role as the notion of theory in predicate calculus. A model of this â€Å"theory† closely corresponds to a database, which can be seen at any instant of time as a mathematical object. Thus a schema can contain formulas representing integrity constraints specifically for an application and the constraints specifically for a type of database, all expressed in the same database language. In a relational database [8], the schema defines the tables, fields, relationships, views, indexes, packages, procedures, functions, queues, triggers, types, sequences, materialized views, synonyms, database links, directories, Java, XML schemas, and other elements. Schemas are generally stored in a data dictionary. Although a schema is defined in text database language, the term is often used to refer to a graphical depiction of the database structure. In other words, schema is the structure of the database that defines the objects in the database. In an Oracle Database system, the term schema has a slightly different connotation. For the interpretation used in an Oracle Database, see schema object. 5.5 Levels of Database Schema A conceptual schema or conceptual data model is a map of concepts and their relationships. This describes the semantics of an organization and represents a series of assertions about its nature. Specifically, it describes the things of significance to an organization (entity classes), about which it is inclined to collect information, and characteristics of (attributes) and associations between pairs of those things of significance (relationships). Figure 7. Conceptual schema or conceptual data model A logical schema is an alias that allows a unique name to be given to all the physical schemas containing the same data store structures. The aim of the logical schema is to ensure the portability of the procedures and models on the different physical schemas. In this way, all developments in Designer are carried out exclusively on logical schemas. A logical schema can have one or more physical implementations on separate physical schemas, but they must be based on data servers of the same technology. A logical schema is always directly linked to a technology. To be usable, a logical schema must be declared in a context. Declaring a logical schema in a context consists of indicating which physical schema corresponds to the alias logical schema for this context. For example: The logical schema LEDGER is the set of Sybase tables required for the functioning of the accounting application. These tables are stored in a physical schema for each installation of the accounting application. Work in Designer or Operator is always done on the logical schema LEDGER. Only the context allows the physical schema on which the operations are actually done to be determined. Thus, the user can switch from one physical environment to another in a single action. A logical schema’s example is shown in figure 8. Table 1: Name of the logical schema Name of the logical schema LEDGER LEDGER LEDGER Context Boston Seattle Production Seattle Test Physical Schema Sybase Boston LDG Sybase SEATTLE PROD LDG Sybase SEATTLE TEST LDG Volume 2 Issue 2, February 2013 www.ijsr.net 155 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 This article discusses the Oracle use of the term. For other uses of schema in a database context, such as a graphical representation of tables and other objects in a database, see database schema. In an Oracle database, associated with each database user is a schema. A schema comprises a collection of schema objects. Examples of schema objects include: tables, views, sequences, synonyms, indexes, clusters, database links, snapshots, procedures, functions and packages. Figure 8. Logical schemas Physical schema is a term used in data management to describe how data is to be represented and stored (files, indices, et al.) in secondary storage using a particular database management system (DBMS) (e.g., Oracle RDBMS, Sybase SQL Server, etc.). The logical schema was the way data were represented to conform to the constraints of a particular approach to database management. At that time the choices were hierarchical and network. Describing the logical schema, however, still did not describe how physically data would be stored on disk drives. That is the domain of the physical schema. Now logical schemas describe data in terms of relational tables and columns, object-oriented classes, and XML tags. A single set of tables, for example, can be implemented in numerous ways, up to and including an architecture where table rows are maintained on computers in different countries. Figure 10. Schema objects 5.6 Php Sessions A PHP session variable is used to store information about, or change settings for a user session. Session variables hold information about one single user, and are available to all pages in one application [9]. When you are working with an application, you open it, do some changes and then you close it. This is much like a Session. The computer knows who you are. It knows when you start the application and when you end. But on the internet there is one problem: the web server does not know who you are and what you do because the HTTP address doesnt maintain state. A PHP session solves this problem by allowing you to store user information on the server for later use (i.e. username, shopping items, etc). However, session information is temporary and will be deleted after the user has left the website. If you need a permanent storage you may want to store the data in a database. Sessions work by creating a unique id (UID) for each visitor and store variables based on this UID. The UID is either stored in a cookie or is propagated in the URL. In PHP, sessions can keep track of authenticated in users. They are an essential building block in todays websites with big communities and a lot of user activity. Without sessions, everyone would be an anonymous visitor. In system terms, PHP sessions are little files, stored on the servers disk. But on high traffic sites, the disk I/O involved, and not being able to share sessions between multiple web servers make this default system far from ideal. This is how to enhance PHP session managem ent in terms of performance and share ability. If you have multiple web servers all serving the same site, sessions should be shared among those servers, and not 156 Figure 9. Physical schema In Database lore, a schema object is a logical data storage structure. This possibly originates from the use of the term in the context of Oracle databases. The term schema can have other meanings when talking about non-Oracle databases. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 reside on each servers individual disk. Because once a user gets load-balanced to a different server, the session cannot be found, effectively logging the user out. A common way around this is to use custom session handlers. 5.7 Shopping Card A shopping cart is a software application that typically runs on the computer where your Web site is located (the Web server), and allows your customers to do things such as searching for a product in your store catalog, adding a selected product to a basket, and placing an order for it. The shopping cart integrates with the rest of your Web site. In other words, there are typically links on your Web pages that customers can click on, and which allow them to perform some of the functions described above. For example, many e-commerce Web sites have a search link appearing on every Web page, as part of the navigation area Shopping carts are written in a variety of different programming languages. Some of them provide full access to the source code, thus allowing experienced programmers to make modifications to the system features, some others dont. Some shopping carts run on Windows Web servers, some on Unix, others on both. In most cases, you can place the shopping cart on your Web server simply by transferring its files there using any FTP [10] software, where FTP stands for File Transfer Protocol. For example, our shopping cart software called Product Card is a collection of files written in a programming language called Classic ASP, and that you host on a Windows server. Experienced programmers can customize the system as they wish as the source code is included. iii. Merchant runs credit card through the point of sale unit. The amount of the sale is either hand-entered or transmitted by the cash register. iv. Merchant transmits the credit card data and sales amount with a request for authorization of the sale to their acquiring bank. . v. The acquiring bank that processes the transaction, routes the authorization request to the card-issuing bank. The credit card number identifies type of card, issuing bank, and the cardholders account. vi. If the cardholder has enough credit in their account to cover the sale, the issuing bank authorizes the transaction and generates an authorization code. This code is sent back to the acquiring bank. vii. The acquiring bank processing the transaction, and then sends the approval or denial code to the merchants point of sale unit. Each point of sale device has a separate terminal ID for credit card processors to be able to route data back to that particular unit. viii. A sale draft, or slip, is printed out by the point of sale unit or cash register. The merchant asks the buyer to sign the sale draft, which obligates them to reimburse the cardissuing bank for the amount of the sale. ix. At a later time, probably that night when the store is closing up, the merchant reviews all the auth orizations stored in the point of sale unit against the signed sales drafts. When all the credit card authorizations have been verified to match the actual sales drafts, the merchant will capture, or transmit, the data on each authorized credit card transaction to the acquiring bank for deposit. This is in lieu of depositing the actual signed paper drafts with the bank. x. The acquiring bank performs what is called an interchange for each sales draft, with the appropriate card-issuing bank. The card-issuing bank transfers the amount of the sales draft, minus an interchange fee to the acquiring bank. xi. The acquiring bank then deposits the amount of the all the sales drafts submitted by the merchant, less a discount fee, into the merchants bank account. Credit card transaction is shown in Figure 12. Figure 11. Google Checkout shopping cart 5.8 Credit Card Transaction From the information presented in the preceding sections, we can start to piece together what is occurring during a credit card transaction. We know that merchants have a relationship with either an acquiring bank or independent sales organization, through which they have their credit card transactions processed. The section on industry terminology shows us some of the fees involved in this process. Merchants must pay the acquiring bank or ISO a discount fee based on the total amount of the sale. Likewise, the acquiring bank or ISO must pay the card issuer an interchange fee when they process the sales draft from the merchant. Steps involved in a normal credit card transaction: i. Merchant calculates the amount of purchase and asks buyer for payment ii. Buyer presents merchant with a credit card. Figure 12. Credit card transaction 6. Conclusion Electronic commerce or e-commerce is a term for any type of business, or commercial transaction that involves the transfer of information across the Internet. It is currently one of the most important aspects of the Internet to emerge. E157 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 commerce has grown tremendously worldwide. In the future e-commerce may become totally mobile based. In Bangladesh E-commerce also become a very powerful business mechanism but Bangladesh will have to overcome the problems with poor network connectivity and electronic payment issues. The problems identified in this Project are: Security problem, Confusing checkout process, Customers can’t find products, Customers can’t touch and fell a product, No sales staff means any chance of up-selling, Language barrier. Regarding the identified problems the following solutions have been proposed: Merchant needs to ensure the platform employs strong encryption for payment processing and customer data retention. E-commerce platform should always have a visible running total of purchases prominently displayed during the customer experience. E-commerce platform must support the ability to present the customer with nested categories as well as a search box. An e-commerce platform should also support the ability to attach multiple pictures to a product catalog page, allowing the consumer to view the product from multiple angles. E-commerce platform needs to be able to associate products with related and complimentary products. The system should allow all tran slation to be done centrally. My M.Sc Engg. in CSE is running at Bangladesh University of Engineering and Technology (BUET), Dhaka-1000, Bangladesh. My research interest areas are the image processing, Computer Networks, Computer Networks and Data Security, Compiler, Theory of Computations, etc. My several papers Published in International Journals. Muhammad Golam Kibria, Assistant Professor and Head, Department of CSE, University of Information Technology Sciences, Dhaka, Bangladesh. I completed Masters in Mobile Computing and Communication from the University of Greenwich, London, UK. My research interests are Computer Network Security and image processing, Sensor, Robotics and Wireless Sensor Network. Mohammad Nuruzzaman Bhuiyan is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212.Bangladesh. I have completed my B.Sc Engg. and M.Sc Engg. in CS from The University of Sheffield, Western Bank, Sheffield S10 2TN, UK. My research interest areas are Fundamental of Computer, Web technology, Computer Networks, Computer Networks and Data Security, Theory of Computations, etc. My several papers accepted in International Journals. References [1] http://en.wikipedia.org/wiki/Electronic_commerce [2] Tkacz, Ewaryst; Kapczynski, Adrian (2009), Springer, P. 255 [3] Online Today, The Electronic Mall. CIS/compuserve nostalgia. Http://www.gsbrown.org/compuserve/electronic-mall1984-04/. [4] http://www.marketwatch.com/story/amazon-buysdiaperscom-parent-in-545-mln-deal-2010-11-08/. [5] http://techcrunch.com/2011/03/28/ebay-to-acquire-gsicommerce-for-2-4-billion [6] Miller, Holmes E. And Engemann, Kurt J. (1996); A methodology for managing information-based risk; Information Resources Management Journal; 9:2; 17-24 [7] http://www.e-consultancy.com/news blog/363726/whydo-customers-abandon-the-Checkoutprocess.htmlcopyright 2008 Voloper Creations Inc. 7 [8] http://www.articlesbase.com/e-commercearticles/impacts-of-e-commerce-on-business1882952.html [9] http://www.startupsmart.com.au/mentor/michaelfox/2011-02-03 Authors Profile Md. Akbor Hossain received the B.Sc degrees in CSE University of Information Technology and Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. I am working as a Lab Demonstrator at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. *Md. Akkas Ali is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka1212, Bangladesh. I completed my B.Sc Engg. in CSE from Chittagong University of Engineering and Technology (CUET), Chittagong-4349, Bangladesh. Volume 2 Issue 2, February 2013 www.ijsr.net

Monday, August 5, 2019

The Sound And The Fury By Faulkner | Analysis

The Sound And The Fury By Faulkner | Analysis William Faulkners modernist novel The Sound and the Fury is a challenge for the reader and actually it is one of the books you have to read twice in order to fully understand because it has no chronology and the use of the stream of consciousness makes it more difficult to read. The stream of consciousness refers to the recording of the flow of a characters thoughts in a fragmentary, nonlinear manner. Images and impressions suggest others through an associative process that ignores distinctions between past, present and future. (Anderson 12) Broadly, The Sound and the Fury is the story of the decline and fall of the Compson family. The novel is structured in four sections, Benjys section, Quentins section, Jasons section and an objective account which is considered by some critics to be Dilseys section. Benjy, Quentin and Jason are the Compson brothers and Dilsey is their black servant. In the first three sections the stream of consciousness is employed and the story is told in flashbacks. The fourth section has an omniscient narrator who is thought to be the author himself. Each section has a different date, the first, the third and the last sections are set around Easter in April 1928 in Jefferson and the second section in June 1910 in Harvard. After a close reading of the novel, the authors concern for the use of time and the passing of time becomes obvious. The purpose of this essay is to analyze how the time motif is employed and emphasized in William Faulkners The Sound and the Fury and how are the characters affected by time. Firstly, I will show the different ways in which the author uses time in the four sections. Secondly, I will analyze how the four main characters, namely Benjy, Quentin, Jason and Dilsey perceive time, how important time and especially the past is for them and what is their attitude towards the past. Faulkner mixes past and present in his novel and often shifts the time sequence back and forth without regard for chronological order. (Roberts 11) Faulkner uses numerous time levels in Benjys section and in fact, the reader is confused by the time shifts between present and past. However, the author in most of the cases uses italics to signal the time shifts and gives clues that point to a particular episode in the story. For instance, Luster takes care of Benjy in April 1928. Although Benjys section is dated April seventh 1928, little of the events and facts that make up the story really happen that day events of the past are constantly juxtaposed with various events in the present or some other time in the past. (Roberts 36) Faulkner has a particular style of writing and he uses linear time only in the last section. In the other three sections, the sense of time is broken and there is an emphasis on the past. This points to the fact that the author is often concerned about how muc h of the past intrudes upon the present. (Roberts 36) In Quentin and Jasons sections the reader is still confronted with the recurring time motif. If in Benjys part, clock time is almost totally disregarded (Roberts 36) in Quentins narrative clocks are very important. Quentin is obsessed with clocks and the past that haunts him. In Jasons section the flashbacks are used too, but unlike the first two sections, it combines thoughts and memories, with many indicators of objective time and space reality. (P. Anderson 199) The last section is written as a third person narrative and it is focused mainly on Dilsey, the Compsons family servant. It sheds light on the events narrated in the previous sections. In order to indicate that the past and the present are both equally important for Dilsey, the author chooses to end the novel with a linear narrative making no use of the stream of consciousness technique or flashbacks. In The Sound and the Fury, each character has a different approach to time. Benjy is a 33 years old man, but with the mental age of a 3 years old child. He is incapable to speak and to distinguish between the past, the present, and the future. His section, which opens the book, is the most intriguing because he is completely oblivious of time (Roberts 36) and he perceives things only through his senses. According to Roberts, for Benjy all time blends into one sensuous experience. He makes no distinction between an event that happened only hours ago and one that occurred years ago. (36) For instance, he waits for Caddy, his sister, to return from school in 1928 even if she left home in 1910. Benjy perceives the past only by making associations Whenever something reminds Benjy of the past, his narration jumps to that past moment. With little understanding of time, Benjy narrates his memories of the past as if they are happening in the present. (Anderson 35) For the mentally disables Be njy the concept of time does not exist. He lives in a world of his own. Quentin, whose narrative is the only one not anchored in April 1928, but in June 1910 expends all his energy trying to understand time. (Roberts 36) His section begins with the memory of his fathers comments about time When the shadow of the sash appeared on the curtains it was between seven and eight oclock and then I was in time again, hearing the watch. It was Grandfathers and when Father gave it to me he said I give you the mausoleum of all hope and desire; its rather excruciatingly apt that you will use it to gain the reducto absurdum of all human experience which can fit your individual needs no better than it fitted his or his fathers. I give it to you not that you may remember time, but that you might forget it now and then for a moment and not spend all your breath trying to conquer it. Because no battle is ever won he said. (Faulkner 89) Throughout his entire narrative he feels haunted by the past and he tries to escape from time. (Roberts 25) In a desperate try to free himself from time he breaks his watch, but it ironically continues to tick proving him that whatever he does the passing of time is unstoppable I went to the dresser and took up the watch, with the face still down. I tapped the crystal on the corner of the dresser and caught the fragments of glass in my hand and put them into the ashtray and twisted the hands off and put them in the tray. The watch ticked on. I turned the face up, the blank dial with little wheels clicking and click ing behind it, not knowing any better. (Faulkner 91) At the end of his section, Quentin committs suicide in the final attempt to escape the clicking of the clock and symbolically time. His last gesture is not made with regret, but rather with joy and a sense of freedom a quarter hour yet. And then Ill not be. The peacefullest words. The peacefullest words. (Faulkner 142) Jasons section precedes Benjys section and it is set in 6 April 1928. According to Roberts he completely denies the past; he functions only in the present. (27) Unlike Quentin, he thinks that the present is more important. However, there are moments when the past signifies something to him. For example, the moments when he remembers that he lost a position in a bank because of his sister Caddy. He is in contrast with Quentin because he does not care about his familys reputation and history therefore the past. Time is important to him, but he is the man of the present at last I found a pad on a Saint Louis bank. And of course shed pick this one time to look at it close. Well, it would have to do. I couldnt waste any more time now. (Faulkner 201) The last section is dated 8 April 1928 and it is narrated in the third person. Dilsey is the main character of this section and the only one who brings the past and the present into a proper balance. (Roberts 24) She is the only one that acknowledges the boundaries between past and present a cabinet clock ticked, then with a preliminary sound as if it had cleared its throat, struck five times. Eight oclock, Dilsey said. She ceased and tilted her head upward, listening. (Faulkner 264) She is both aware of the past and the present. She witnessed both the prosperous past of the Compson family and its fall in the present I seed the beginning, en now I sees de endin. (Faulkner 284) Dilsey is not afraid of the passing of time and she does not regard the past as a menace for her present or even for her future. In conclusion, the aim of this essay has been to analyze how William Faulkner employed the time motif and what impact has time upon the characters in his novel The Sound and the Fury. The analysis of the four sections revealed that in the first three time is not linear and there are always time shifts between the past and the present. Thus, chronology of events is totally disregarded in the first three sections and the stream of consciousness technique and flashbacks are used. On the other hand, in the last section time is linear with focus mainly on the present of the story that is April 1928. The characters Benjy, Quentin, Jason, and Dilsey are all affected by time and especially by the past but some more and others less. Benjy is unaware of the concepts of time and past and he lives in a continuous present. For Quentin the past is very important and he puts the present on a second plan. In contrast with him is his other brother, Jason, who sees the present important and gives no i mportance to the past. Unlike Quentin and Jason, Dilsey is focused both on the past and on the present.

Anti-cancer Drug Targeting AFR Receptor

Anti-cancer Drug Targeting AFR Receptor Results 1a 1b Figure 1 Cell viability data based on the use of the XTT assay Two different lung tumor cell lines were tested: one expressing the mutated AFR receptor (blue line) and one that expresses wild-type AFR (orange line). Figure 1a represented AFR lung cancer cell line with Drug X and figure1b represented AFR lung cancer cell line with drug Y. Cells were seeded in wells of a 96 well plate at 3 x 10*4 cells/well before treatment with the drugs at the indicated concentrations for 72 hours (triplicate samples at each concentration). XTT assay reagent was then added to the wells and the absorbance measured at 450 nm. Control wells (no cells) contained medium but no cells. The Cell Proliferation XTT assay is a colorimetric assay for the nonradioactive analysis of cellular proliferation, viability, quantification of cytotoxic and cytostatic compounds like anticancer drugs and pharmaceutical compounds, evaluation of growth-inhibitory antibodies and physiological mediators that able to inhibit cell growth (Sigma-Aldrich, 2016). Sample is adherent or suspension which cultured in 96-well microplates. A fictional receptor (AFR) was targeted by anti-cancer drug to inhibit the mutated AFR function, causing an anti-proliferative effect and even cell death. XTT ((2,3-bis-(2-methoxy-4-nitro-5-sulfophenyl)-2H-tetrazolium-5-carboxanilide)) assay was used to measure cell viability in the two different lung tumor cell lines, one expressing the mutated AFR receptor (AFR mut) and one that expresses wild-type AFR (AFR wt). Drug Y was observed to hinder cancer cell growth dose dependently (Figure 1). The amount of observed absorbance increases with cell number and incuba tion time for 72hours when a maximum absorbance level is reached. The plot of the XTT assay data should create a curve with a linear part. This area exhibits the highest sensitivity to changes produced by the experimental parameters. Establishing the XTT assay data for treatment of AFR mutated and AFR wild-type lung cancer cell line with drug X from 0nm to 1600nm (Figure 1a), It was illustrated that the cell viability of mutated AFR increased considerably from 1.1 to 1.3 between 0nm and 800nm and then became steady at approximately 1.4 from 800nm to 1600nm. Compared with the wild type of AFR (Figure1a), the trend of the line was similar to the mutated one but the cell viability was first rised from 0.9 to 1.2 between 0nm and 800nm and finally exhibited a loss of linearity when greater than 800nm. The lung cancer cell line with drug X represented a cell proliferation assay because the absorbance values of the mutated one were greater than control conditions, representing an increase in cell proliferation and viability. On the other hand, investigating the XTT assay data for treatment of AFR mutated and AFR wild-type lung cancer cell line with drug Y from 0nm to 1600nm, It was indicated that the cell viability of m utated AFR started off at about 1.1 from 0nm to 50nm and then occurred a dramatic drop from 1.1 to 0.1 between 50nm to 400nm and finally lied on 0.03 at 1600nm (Figure1b). Compared with the wild type of AFR (Figure1b), the line was also decreasing but showed a completely different trend. The cell viability decreased from 0.89 to 0.88 between 0nm and 800nm stably and then exhibited a significant drop when greater than 800nm and finally lied on 0.8 of 1600nm. The lung cancer cell line with drug Y represented a cell apoptosis assay as the absorbance values were lower than control conditions, showing a decrease in cell proliferation and resulted from cellular necrosis or apoptosis. From the data analysis, drug Y was successfully tested to inhibit the function of mutated AFR which have an anti-proliferative effect to cause cell death and drug Y could be put forward for further testing. Figure 2 Flow cytometry apoptosis data: Annexin V -FITC (x axis) and propidium iodide (Y axis)   Ã‚   The proapoptotic effect of drug X and Y. The AFRmut cell line was treated with each drug at a concentration of 800 nM for 24 hours. The cells were harvested, resuspended in buffer and then treated with Annexin V-FITC and propidium iodide. Cytograms of annexin-V-FITC binding against PI uptake show three populations: (i) viable cells (low FITC and low PI signal) in gate Lower Left; (ii) early apoptotic cells (high FITC and low PI signal) in gate Lower Right and (iii) cells that lost membrane integrity which results in late apoptosis (high FITC and high PI signal) in gate Upper Right. The percentage of cell death increases in the tumor cancer cell line of drug Y, as demonstrated by incorporation of Annexin V. The inhibition of cell proliferation caused by AFRmut was related to the apoptosis induction. Apoptosis is programmed as cell death which is important in development, in normal function of certain tissues and in the response to the damage. Apoptosis involves events which results in the destruction of cell. Annexin V -FITC is a protein that binds to phosphotidylserine which can be labelled and used to detect apoptotic cells. The flow cytometry apoptosis data was plotted on a dot plot and the lower left was represented the viable cells while the upper right and the lower right were represented the dead cells and the apoptotic cells respectively. From the apoptosis data (Figure2), it was observed that the untreated condition showed 77% viable cells and 21% of apoptotic effect. When AFRmut was treated with drug X, the viable cells were increased by 19% and the apoptotic effect was largely decreased to 3%. In contrast, the incorporation with drug Y lead to considerable anti-proliferative effect where 58% of apoptotic cells were observed and viable cells only remained as 40%. Related to the induction of programmed cell death, the majority of cells from the two tumor cell lines were alive upon carrier treatment, the use of AFRmut lead to the entrance of these cells into apoptosis with incorporation of Annexin V. The treatment of drug Y showed a significant apoptotic effect than the drug X, which has a potential to inhibit the function of mutated AFR and results in anti-proliferative effect. Figure 3 Flow cytometry cell cycle data: x-axis shows propidium iodide fluorescence and y-axis shows the number of cells The AFRmut cell line was treated with drug X and Y at a concentration of 800 nM for 24 hours and then fixed with ethanol and stained with propidium iodide before analysis in a flow cytometer. Treating with drug Y showed no cells in G2/M phase. The inhibition of cell proliferation induced by AFRmut was correlated with cell cycle which was evaluated with propidium iodide by flow cytometry. Cell cycle demonstrated the cell progression through a division cycle which result in cell growth and separation into two daughter cells. Live cell observation of cellular DNA and distribution of cell cycle are valuable to regulate apoptosis, and also the tumor behavior and suppressor gene systems. Cells would be distributed into three phases of cell cycle: G0 /G1 phase (2N), S phase (DNA synthesis with various DNA), and G2 /M phase (4N) to identify apoptotic cells with partial DNA content desirably   (Krishnakumar R, Kraus W ,2010). Propidium iodide fluorescence was needed in these actions to bind DNA. From the flow cytometry results by histogram (figure 3), the untreated condition showed 42% of cells in G0/G1 phase while 31% in S phase and 27% in G2/M phase. When the AFRmut was treated with drug X, the cell number in G1 phase dropped by 7% while there was increase of 6% in S Phase. DNA replication occurs more effectively during S phase. Tumor cells with a higher proportion of cells in S phase as tumors were growed faster and more aggressive in that phase so drug X induced proliferation of mutated AFR. However, the addition of drug Y caused effective anti-proliferation effect by increasing the cell numbers in G1 phase from 42% to 86% since the cell has left the cycle and has stopped dividing. There was increase in the cell numbers and grow in size. The decrease from 31% to 14% for S phase indicated the ineffective DNA replication. Moreover, there was no cells observed in G2/M phase when treated with drug Y which represented the increasing numbers of apoptotic cells and the G2/M pha se arrest, which failed the mitosis progression. Discussion Drug Y can be an effective anticancer drug which targets mutated AFR and inhibit its function to lead an anti-proliferative effect. In the present study, two lung tumor cell lines, mutated AFR receptor (AFRmut) and wild-type AFR (AFRwt), Drug Y was found that it could inhibit the growth of the AFR in vitro. The IC50 values of AFRmut and AFRwt were with the same range of 450nm. Additionally, the cell cycle revealed that Drug Y arrested mutated AFR at S phase and G2/M phase. Furthermore, the data demonstrated that Drug Y induced apoptosis in the mechanism assessed by 3 different methods: cell viability assay, apoptosis assay and the cell cycle of flow cytometry. Taken together, these results suggest that the inhibitory effect of Drug Y on cell proliferation in mutated AFR is mediated through induction of cell cycle arrest and apoptotic cell death. The limitation is the flow cytometry are only authorize the relative abundances of cell cycle phases compared to another (Dick FA, Dyson NJ, 2002). These actions can be examined by evaluating a coordinate sample of cells with mitotic inhibitor like nocodazole or G1/S inhibitor like aphidicolin. As these drugs establish a prevalent arrest in M-phase or early S-phase accordingly, moderately proliferating cells will gather at the drug inferred arrest location. For instance, cells arrested in G1 BY pRB expression will stay in G1 phase regardless of nocodazole treatment even regulating cells will accumulate in M-phase[13] Overall, the data demonstrated drug Y is able to develop an anti-cancer drug that targets a receptor called AFR (A Fictional Receptor) to block its activity. Drug Y successfully inhibits the function of mutated AFR by evaluating the cell viability assay, apoptosis assay and the cell cycle of flow cytometry. The assays showed an anti-proliferative effect and even cause cell death, which explains its significant antitumor activity in the various experimental investigations that have assessed. Thus, further studies about the way of administration, dose limiting toxicities and recommended doses are needed for the preclinical development of drug Y to evaluate the potential of the compound as an anticancer drug. References Dick FA, Dyson NJ, 2002. Three regions of the pRB pocket domain affect its inactivation by human papillomavirus E7 proteins. J. Virol.2;76: 6224-6224. Krishnakumar R, Kraus W, 2010. The PARP side of the nucleus: molecular actions, physiological outcomes, and clinical targets. Mol Cell. 39:8-24 Matthew J., et al, 2012. Analysis of Cell Cycle Position in Mammalian Cells  (59): 3491. Sigma-aldrich, 2016. Cell Proliferation Kit II (XTT) [online] Available at: http://www.sigmaaldrich.com/catalog/product/roche/11465015001?lang=enregion=GB Wang, G., et al, 2005. Antitumor effect of ÃŽÂ ²-elemene in non-small-cell lung cancer cells is mediated via induction of cell cycle arrest and apoptotic cell death. Cellular and Molecular Life Sciences CMLS 62.7-8: 881-893.

Sunday, August 4, 2019

To Kill A Mocking Bird :: To Kill a Mockingbird Essays

To Kill a Mockingbird is set in Maycomb County, an imaginary district in southern Alabama. The time is the years of the Great Depression in the United States. The mood of the novel is mostly light and humorous, especially when talking about the children’s antics. However, another mood throughout the novel is somber and calm, because come important issues are being valued and dealt with. Atticus’ dealings with the blacks, the negative attitudes of some other members of the community, the trial of Tom Robinson and his gruesome end, depicts a seriousness and a grave reconsideration of accepted beliefs, which is expected of the readers by the author. Atticus Finch, the father of Scout and Jem, is a highly respected and responsible citizen of Maycomb County. An attorney by profession, he has always tried to instill good values and a sense of moral in his children. Jem is a true brother to Scout, helping her out of scrapes, escorting her to school and back, guiding her at times and comforting her in general. When he is given money to buy something for himself, he buys a gift for Scout too. When he finds out that Scout has eaten the gum found in the knothole of the oak tree, he insists that she gargle her throat. When she muddles up her role in the pageant and is mortified, Jem is the one to console her. He displays much genuine concern and consideration in dealing with his unruly sister. Scout, because of her age, and being the youngest in the family, is impulsive by nature and extremely emotional too. She unthinkingly rushes into fights and scrapes, cries when her ego is hurt and is generally is rash in her actions. Conflict- The protagonist of the novel is Atticus Finch, who is the prime initiator and coordinator of various events in the novel. In his involvement with the poor whites of the community, like Walter Cunningham, as well as the deprived blacks, like Tom Robinson, he is portrayed as a just, sincere and a greatly considerate human being. He has clear-cut values and beliefs, and it is his sincere wish that his children too grow up with a broad outlook and an unprejudiced way of thinking. He is indifferent to what others have to say or think about his actions, and he is steadfast in his beliefs of equality and liberty. Bob Ewell serves as the antagonist villain in the novel, with his laid-back way of living and the utter disregard he has for other human beings.

Saturday, August 3, 2019

Sea Lions: Natures Playful Aquatic Land Mammals Essays -- Essays Pap

Sea Lions: Nature's Playful Aquatic Land Mammals Introduction Sea lions may look like sea creatures, but they also behave like terrestrial animals. Unlike whales, mammals that spend their entire lives in water, sea lions inhabit both the water and land throughout their lives. This aquatic land animal prefers the water for food, fun, and safety; while preferring the land for socializing, territory, and procreation. Being mammals, they share many behaviors common to humans and other mammals. Like mammals, they are born with the ability to walk on land shortly after birth. Surprisingly, they are not born with the ability to swim from birth, but need to be taught by their mothers. Like other mammals, they love to stay in social groups. During their reproductive season, females are dominated by aggressive males, that establish harems on the beaches. The relationship between females and their pups is characterized by affection, protection, nourishment, and instruction. In contrast to their limited terrestrial mobility, they can swim much better than they can walk. Unlike other land mammals, they have the ability to sleep in water . The most interesting thing is that they can sleep in water by using one part of their brain, while the other part of their brain is asleep ("Birds sleep with one eye open, half awake, study finds"). Clearly, sea lions have adapted well to a both an aquatic and land life. Sea lions are parts of the seal family and in the class of Pinnipedia ("Sea lion"). They have external ear flaps and well-developed foreflippers and hind flippers ("Sea lion"). Their predators include killer whales, sharks and humans ("Sea lion"). Sea lions have several types such as Zolophous, Steller, etc. Stellar sea lions are t... ...nd more than in the sea. Unfortunately, some species of sea lions are declining and may become extinct so that it is time to save them by enacting laws for protecting them and encouraging people not to kill them for commercial reasons. "Birds Sleep with One Eye Open, Half Awake, Study Finds." {CNN} 5 Feb. 1999. Bruemmer, Fred. "My Life Among Wild Pinnipeds." {International Wildlife} July-Aug. 1996: 10-12. Peterson, Richard S., and George A. Bartholomew. {The Natural History and Behavior of the California Sea Lion}. Los Angeles: American Society of Mammalogists, 1967. "Sea Lion." {Www.nhgs.tec.va.us/ptoption/sealion.html} (1999) "Sea Lion: Bark Is Worse Than His Bite." {Wysiwyg://104/http://www.letsfindout.com} (1999) "A Seal's-Eye View of Undersea Hunt." {MSNBC} 11 Feb. 1999. "Steller Sea Lion Distribution." {US Department of Commerce} (1999)

Friday, August 2, 2019

Microeconomics Samuelson Essay

Explain how the cool head might provide the essential positive economic analysis to implement the normative value judgments of the warm heart. Do you agree with Marshall’s view of the role of the teacher? Do you accept his challenge? In order to achieve the ultimate goal of economic science which is to â€Å"improve the living conditions of people in their everyday lives† (*) a cool head attitude has the knowledge and wisdom acquired through a lifetime relation to the economic momentum. Balancing this with a warm heart compassion vision, and a willingness to improve society, is the most appropriate way to use certain economic models in order to acquire economic sustainability with social improvement. We agree with Marshall’s view which was conceived through a social corporate responsibility. We, as leaders, accept his challenge through developing projects which should be not only profitable but also socially accepted and with respect to the environment. Also, we should use our cool heads to objectively take challenges and make difficult decisions that will lead us to a prosperous society with a sustainable economic growth. Some scientists believe that we are rapidly depleting our natural resources. Assume that there have only two inputs (labor and natural resources) producing two goods (concerts and gasoline) with no improvements in society’s technology over time. A. Show what would happen to the PPF over time as natural resources are exhausted. B. How would invention and technological improvement modify your answer? On the basis of this example, explain why it is said that â€Å"economic growth is a race between depletion and invention. It is said that economic growth is a race between depletion and invention because the continuous use of the natural resources of a country will tend to deplete them, over a long period of time but in the contrary, the invention of new technologies can extend a country PPF – making a race between them, since both things usually happens at the same time. Chapter 2 1. Question 1 . – What determines the composition of national output? In some cases, w e say that there is â€Å"consumer sovereignty† meaning that consumers decide how to spend their income on the basis of taste and market prices. In other cases, decisions are made by political choices of legislatures. Consider the following examples: transportation, education, police, energy efficiency of appliances, health-care coverage, television advertising. For each, describe whether the allocation is by consumer sovereignty or by political decision. Would you change the method of allocation for any of these goods? National Output includes the total amount of goods and services that a country is capable to produce in a certain period of time. It is also known as the country? A country has the responsibility to decide what outputs to produce and in what quantity, how to produce them and for whom should they be produced. In a market society, the national output is influenced by consumer tastes and the resources and technology available in the country. On the other hand, governments may intervene to compensate for market failures that usually occurs inside a country, or to fund social programs. Here there are some examples that show mixed economies between consumer sovereignty and government interventions. Generally speaking transportation means are controlled by the private sector through companies that provide transportation services such as airlines, company taxis, trains, etc. Inside a country, there also exists public transportation for those people who can not afford the private one. In Peru, specially for the ground transportation, the government plays a fundamental role regulating tariffs, taxes and making sure we have a safe an organized transportation system in the country for the society. Education In a country generally exists public and private education. Usually, private schools tend to have a higher price but also delivering high quality and it is market driven. There are different private schools with different prices in the market. On the other hand, public education is provided by the government to lower socio economic levels in order to make education accessible to the whole population. Government applies procedures in order to maximize its quality. In Peru for example the government is trying to break the poverty cycle incentivizing the rural population to attend school through monetary allowances. There are also regulations in terms of the requirements asked for being a public teacher, the education syllabus of the country, etc. Police Police is a government regulated service to the population which is part of the arm forces of a country. Its function is to assure security to the population. However, in some countries where there is scarce resources allocated to this public entity, private police petrol are created. In Peru even in rural areas where police is not present, communities organize themselves to fight against crime. Energy efficiency of appliances Energy is a strategic scarce resource for a country. Therefore, the importance of having government regulations to control it, its tariffs while having private companies supplying the service in order to assure this service on the long term to the community. Health care coverage Health care is a private and public good also. Government provides health care services to the majority of the population by building public hospitals and providing insurance coverage programs. Usually private health care provides a higher quality service and is accessible to higher socio-economic levels of the population. Television advertising It is a consumer sovereignty good, driven basically by program ratings and market price. Usually, the government owns public television channels but even in those cases the advertising is not controlled. What government usually does is to control advertising of some products such as cigars, or the time and programs where you can advertise such products. Would you change the method of allocation for any of these goods? We would not change the method of allocation for any of the goods mentioned above. We think that in the examples mentioned, a mixed economy of public and private goods is the best to make services accessible to the whole population while having a market driven economy. However, if we customized this question to the Peruvian reality, we think that an example where government could intervene more is the banking regulations entity which should improve the credit policies in order to create a sustainable finance growth. 2. Question 3. – This chapter discusses many â€Å"market failures† areas in which the invisible hand guides the economy poorly, and describes the role of government. It is possible that there are, as well, â€Å"government failures† government attempts to curb market failures that are worse than the original market failures? Think of some examples of government failures. Give some examples in which government failures are so bad that it is better to live with the market failures than to try and correct them. A possible failure can be represented by a tax system that discourages private and foreign investments in the country that at the end will affect government’s income. Another example is a bad monetary policy in which inorganic emission of currency will impact over inflation rate dramatically, affecting purchasing power of nationals (Peru 1985) . During this time Peru suffered more than 7000% inflation generating scarcity of basic goods and creating a parallel black market. During this time, another bad example would be that the banking system was nationalized and generated a lack of confidence in the population towards the banking system, loosing a high percentage of the savings of the population decreasing the country’s investment.

Thursday, August 1, 2019

Enthalpy Lab Background

Enthalpy, represented by the sign ? H in kJ/mol, is the heat change in a reaction. It shows whether how much heat is released or absorbed during the reaction. If the reaction is endothermic, the enthalpy would be positive and if the reaction is exothermic, the enthalpy would be negative. During a chemical reaction, which consists of breaking and creating bonds, heat is either absorbed or released. In this lab, the reaction uses the disassociation of an ionic compound ammonium nitrate shown in the equation #1 below into ions.In order to disassociate ammonium nitrate into ions, energy is required. Both NH4 and NO3 are always soluble, therefore the ionic compound disassociates completely. Through equation #2, heat absorbed or released can be measured. In equation #2, q stands for the heat change in joules, m for the mass of the water in grams, C for the specific heat of water, and ? T for the change in temperature. By using the calorimeter with a stir rod, change in temperature is found . 1. NH4NO3(s) NH4(aq) + NO3(aq) 2. q=mC? TFree energy is a thermodynamic function that shows the available energy that can be converted into work. By using the Gibbs-Helmholtz equation, which uses free energy and is shown in equation #3, spontaneity of the reaction can be found using enthalpy, temperature, and entropy. Free energy, unlike entropy, is an absolute way to determine whether the reaction is spontaneous or not. If the free energy is negative, then the reaction is spontaneous, whereas if the free reaction is positive, then the reaction is not spontaneous.If free energy is neither, meaning if the free energy is zero, the reaction has reached equilibrium, therefore not shifting to left or right. In this lab, the reaction shown in equation #1 reaches equilibrium, so the free energy of this reaction would be zero. Entropy, shown by the sign S, is the measurement of molecular randomness or disorder. It is given in J/K*mol and it determines the disorder by the number of molecul ar arrangements that are possible in the state, whether it is solid, liquid, or gas.The more arrangements there can be, or larger amount of mole there is, the higher the entropy. If the change in entropy of a given reaction is negative, it means that the reaction is increasing in order, or decreasing in disorder. If the change in entropy of a given reaction is positive, it means that the reaction is increasing in disorder. Generally, negative entropy of a given reaction means that the reaction is spontaneous, but not always. Both equation #3 and #4 can be used to find entropy. 3. ?G = ? H-T? S 4.? Sreaction=? pSproducts – ? nrSreactants In equation #4, if the entropies of the molecules involved in the reaction are known, then change of entropy in the overall reaction can be found by subtracting the sum of the entropy of the products by the sum of the entropies of the reactants. If the entropies of the molecules aren’t known like this lab, than equation #3 can be used t o find the entropies of the reaction, where T represents temperature in Kelvin, ? G is the change in the free energy in kJ/mol, ? H is the change in enthalpy in kJ/mole, and ?S is the change in entropy in J/K*mol. The enthalpy of the reaction shown in equation #1 can be calculated by the third equation using arithmetic because ? G is zero. And in this equation, the formula number 3, where ? G = ? H-T? S, Enthalpy must be greater that Entropy if the equation is to be positive. This is reason why this value is set to zero, because then by subtracting the enthalpy the value of entropy can be found. And through these methods, the value of G can be substituted in and to find the accepted value of ? H and ? S.The Kelvin is the accepted value, and the ? S can be found when plugged in ? H and ? G to be found as the zero value. The calculated entropy should match or be very close to the accepted entropy value for the dissolving of ammonium nitrate if the ionic compound is dissolved in water and the enthalpy determined by the calorimeter because the calorimeter shouldn’t have lost any heat to surrounding and all of the solid should have been dissolved. Through this method, the absorbance rate of FeCl3 can be estimated, just like how NH4NO3 can be found.