Tuesday, December 17, 2019

Women s Voting And Political Power - 2588 Words

The United States was and still is one of the best nations in the world. People come here from all over to achieve the American dream. With this being said, our nation should be ahead of every other nation when it comes to something like the oppression of women in politics. Back in the day, the United States †had the lowest percentage of women in the National legislature, (Werner 17).† This relates to my research. In many aspects of life, women are represented less and their voices are not heard as much compared to males. The main aspect I focus on are women participating in Congress and in voting. My original research question was whether women’s voting and political power in Congress, at the local, state, and national level, has increased in the last century. This question is broad in order to cover a lot of research over a long period of time. I will be using academic research to support of hypothesis that â€Å"Over the past century, men have been represented more than women in the voting booth and when participating in Congress. Gender may play a huge role in this issue but there are other variables to take into account, such as education, when looking for why the gender gap exists.† In order to receive the best results, I chose articles ranging from 1914- 2014. I also chose an article that compares the gender gap in United States with another country, India. I expect to find multiple reasons for the gender gap between women and men in congress and in the voting polls.Show MoreRelatedWomen‚Äà ´s Suffrage Movement of Europe1187 Words   |  5 PagesThroughout history, women have struggled for equality in all parts of the world. European women fought for suffrage for an extremely long period of time before they were granted full voting rights. Each country approved women’s suffrage at different ti mes, but it occurred in most European countries in the early 20th century. The first country to develop universal suffrage was Finland in the year 1906(â€Å"Women’s Suffrage in Europe†). One of the last countries to become open about women’s voting rights was SwitzerlandRead MoreThe Women’S Rights Convention Took Place In Seneca Falls,1296 Words   |  6 PagesStates, and with almost 200 women in attendance. This convention was organized by Lucretia Mott and Elizabeth Kelly Stanton, who were both abolitionists that met at the 1840 World Anti-Slavery Convention in London. In 1848 at Elizabeth Stanton’s home near Seneca Falls, the two women, Mott and Stanton, were working with Martha Wright, Mary Ann McClintock and Jane Hunt, to send out a call for a women’s conference to be held at Seneca Falls. On July 19, 1848, 200 women gathered at the Wesleyan ChapelRead MoreEssay about Gerrymandering886 Words   |  4 PagesGerrymandering When I thought of the topic Gerrymandering, I thought perhaps it would be too far-fetched when it came to the Rubric designed in a women studies class. But, on further review of the subject matter I realized how important this practice is to study, and how it can be used for both good and evil concepts in the political scheme of things. Gerrymandering is a form of boundary redistricting, in which the boundaries of an electoral district or constituency are modified for electoralRead MoreEssay about Frq Analysis1138 Words   |  5 PagesRuhani Malik Period 4 1960’s HW FRQ Questions Due by April 26-27, 2012 Be sure to provide a strong and specific thesis statement with a nice introduction to your essay. Also be sure to provide names, dates, book titles, court cases, statistics and any and all other relevant facts you can think of to support your answer. Staple this sheet to the front of your essay and be sure to follow the formatting rules discussed for previous FRQ’s. 1. With respect to THREE of the following,Read MoreThe Nature and Functions of Political Parties and Voting Behaviour in Britain939 Words   |  4 PagesThe Nature and Functions of Political Parties and Voting Behaviour in Britain The two major parties in the British political system, the Labour party and the Conservative party, often mention the same issues of importance but have different policies on how these issues should be handled. Both parties state in their manifestoes that Education is an important issue - Labour sighting it a major priority, aiming to cut class sizes for 5-7 year olds to under 30 and to modernise Read MoreEssay about Predicting Voting Behavior1075 Words   |  5 PagesPredicting Voting Behavior Voting behaviour is increasingly hard to predict because of the variables that ultimately affect it, these being class, gender, age, ethnicity and regional locality. It is the job of a political scientist to weigh up these factors along with public opinion on major and current issues such as the Health Service, Crime etc. In addition to these they will look at past elections and their statistics to determine the possible result of an imminentRead MoreWomen s Suffrage During The Nineteenth Century975 Words   |  4 Pagespassed, women were encouraged by the suffrage organizations to take part in their nation’s politics. Many women were elected to political offices in the 1920’s. In this time frame seven women had been elected into the House of Representatives. However, no women were elected for positions in the Senate. Although seven women may not seem like a lot that was only on the national level and was a big victory for the suffrage organizations. The greatest success came at the state level politics for women asRead MoreWhy Do Voters Vote The Way They Do?1659 Words   |  7 Pageselections. Voting behaviour is explained using the concepts of expressive voting and strategic voting. A rational voter would act more strategically, that is, the voter would vote to produce an election outcome which is as close as possible to his or her own policy preferences, r ather than voting on the basis of party attachment, ideology, or social group membership (expressive voting). Strategic voting has become more important than voting on the basis of political cleavages (expressive voting), so votersRead MoreThe 19th Amendment: Equal Rights to Vote1329 Words   |  6 Pagesturning point for many women in America. It gave women freedom that they didn’t have before. Before this amendment was passed many women had no self portrayal, something they couldn’t reach with a male figure ruling next to them. That was until 1920 when the 19th amendment was passed. The amendment let women into power giving them social justice and many political rights. Before 1920 women did not have the right to vote. They were known as â€Å"second class citizens†. Women were to stay home to helpRead MoreDiscrimination And The War At Appomattox Court House1486 Words   |  6 Pagesnot, discrimination is a problem that has been occurring for thousands of years and is one that will continue to occur for years to come. American history has seen its share of discrimination, perhaps none more evident than the mid-19th century. Political tensions between northern and southern states concerning states’ rights and slavery sent the country into turmoil. The bloodiest battle in American history soon began and the country would never be the same again. However, after the conclusion of

Monday, December 9, 2019

Internet Technologies CryptographyBased Scheme

Question: Describe about the Internet Technologies for Hybrid Wireless Mesh Protocol . Answer: In Ipv4 TCP/IP protocol is used or sending and receiving packets of data and the IPv6 is the future of the IP addressing. It have advantage over IPv4 and the IPv4 framework is changed to develop the IPv6 by the Internet Engineering Task Force. The advantages of the IPv6 over IPv4 are described as follows: It has a huge range of IP address- IPv6 contains 128 bit address but when compared with the IPv4 it have 32 bit address and thus it results in availability of IP address and accommodate more number of users. End to End Connection- The need of NAT is eliminated with the implementation of IPv6 and better peer to peer connection is created (Matousek, Skacan Korenek, 2013) Built-in Security- The interoperability improves with the implementation of IPv6. In IPv4 the IP address is separated in 8 bit boundaries but in IPv6 the address is separated using 16 bit boundary and the representation is called colon hexadecimal. IP Version Address size IPv4 32 bit and it allows 232 and 4294967296 number of possible address (Wu et al., 2013) IPv6 128 bits that allows 2128 and 340282366920938463374607431768211456(3.4*1038) number of possible address The transition of IPv4 to IPv6 required formal strategies and each of the strategies are described in the below table. Method of Transition Description Dual stacking method Most of the network devices such as the PC and the routers runs on IPv4 and IPv6 and thus two set of address can be used for the transition. Manual IPv4 to IPv6 (4-6) tunneling IPv4 packets can be tunneled in the IPv6 network and vice versa by encapsulating them in the necessary packets (Matousek, Skacan Korenek, 2013). The requirement for these techniques is that the routers in the network should be configured with dual stack method. Dynamic 6 4 tunneling This method allows IPv6 locality to connect to IPv6 using IPv4 network as a backbone. In this method, a unique IPv6 prefix is added locally and retrieval of the address information is eliminated. Intra site automatic tunnel addressing protocol (ISATAP) tunneling VPN can be used for connecting IPv6 with the IPv4 network automatically. The boundary routers are required to be configured using dual stack method. Teredo Tunneling With the implementation of Tedro tunnel, the use of routers to tunnel the packets of data can be eliminated (Wu et al., 2013). The host server is required to be configured with dual stack method and the packet of data can thus move using the IPv4 address translation device. NAT proxying and translation (NAT-PT) It uses a address translation device for translating the Ipv4 and IPv6 address. The bit rate of the for the 4.2 MHZ bandwidth system can be calculated using the following formula. C= B log2 (1+SNR) (Ji et al., 2014) = 4.2 * 106 log2 (1+170) = 2.23Mbps The upper limit is 2.23 Mbps The Shannon formula gives 2.23 Mbps, the upper limit and thus for better performance something lower is chosen and the nyquist formula is applied for finding the levels of signal. 2Mbps= 2 * 4.2 MHz * log2 2 L= 2.52 The difference between the centralized and decentralized peer-to-peer network are discussed as follows: Centralized system In this system the server maintains the directories that are stored in the peer of the computer. The central server directs the connection between the peers and thus for establishing the connection between the peers the central server is necessary. Decentralized system In decentralized system, the peer connects between himself and herself directly without being directed by a server (Wu et al., 2013). These are large network, the connection is repeated, and a number of layers of computers are there for passing the message to the client. Advantage: It is easy to install and configure the network connections All the contents and the resources are shared by the peers in the decentralized system but the centralized system only shares the contents and the resources. Peer to peer connection in decentralized system is more because there is no central dependency. Failure of one of the peer does not affect the other peer (Bryan et al., 2016). In case of the centralized model if the central goes down the whole network is affected. The need of full time system administrator is eliminated the users of the network can control the resources. The cost of maintaining the network and addition of nodes is comparatively less. Disadvantage: In decentralized system the system administrator faces difficulty in administrating the network because the determination of the accessibility of the system is difficult. The system is less secure because virus, spyware and Trojan can be implemented from any source. Backup and data recovery is difficult because data is decentralized and the data are required to be backed up in the own systems Latency = processing time + queuing time + transmission time + propagation time Processing time = 12 2 s = 24 s = 0.000024 s Queuing time = 12 4 s = 48 s = 0.000048 s Transmission time = 5,000,000 / (5 Mbps) = 1 s Propagation time = (2600 Km) / (2.2108 m/s) = 0.01 s Latency = 0.000024 + 0.000048 + 1 + 0.01 = 1.010072 s The transmission time is dominant here because the packet size is huge, and processing time and queuing time are negligible. FTP (File Transfer protocol) is used for transferring files between one computer to another in a same network. The below figure demonstrate the working of FTP where FTP works with an active internet connection. One command is used for sending and receiving data and the other command is used for establishing a secure connection (Sharma Nandal, 2014). A standard PORT is used for communicating with the Internet Protocol and the PORT number is 21. Figure 1: FTP work flow diagram (Source: Sharma Nandal, 2014) SCP (Secure copy protocol) differs from FTP (File Transfer Protocol) because it helps to send file a file to the server and retrieve file from the server. The security is more in the FTP because it SSH protocol for authentication. The files transmission speed in SCP is much faster when compared with FTP (Ben?Othman Saavedra Benitez, 2013). Directory listings can be implemented for accessing the source file and the destination folder. It also supports larger file for transfers and it can also resume the transfer of files. For establishing a FTP connection an FTP client is required to be installed on the client PC and information about the FTP server is required like server address, username, password, etc. A connection is established using the server address and the user name password and the files can be uploaded or downloaded using the FTP file manager. References Ben?Othman, J., Saavedra Benitez, Y. I. (2013). IBC?HWMP: a novel secure identity?based cryptography?based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11 s.Concurrency and Computation: Practice and Experience,25(5), 686-700. Bryan, D., Matthews, P., Shim, E., Dawkins, S., Willis, D. (2016). Concepts and terminology for peer to peer sip. Ji, R., Duan, L. Y., Chen, J., Huang, T., Gao, W. (2014). Mining compact bag-of-patterns for low bit rate mobile visual search.IEEE Transactions on Image Processing,23(7), 3099-3113. Matousek, J., Skacan, M., Korenek, J. (2013, April). Towards hardware architecture for memory efficient IPv4/IPv6 Lookup in 100 Gbps networks. InDesign and Diagnostics of Electronic Circuits Systems (DDECS), 2013 IEEE 16th International Symposium on(pp. 108-111). IEEE. Sharma, S., Nandal, V. (2014). FTP Server Hacking: Brute Force Algorithm. Wu, P., Cui, Y., Wu, J., Liu, J., Metz, C. (2013). Transition from IPv4 to IPv6: A state-of-the-art survey.IEEE Communications Surveys Tutorials,15(3), 1407-1424. Wu, X., Tavildar, S., Shakkottai, S., Richardson, T., Li, J., Laroia, R., Jovicic, A. (2013). FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks.IEEE/ACM Transactions on Networking (TON),21(4), 1215-1228.

Sunday, December 1, 2019

Portes FIve Force In MBL Essay Example

Portes FIve Force In MBL Essay The Threat of new entrants: There is no real problem in the formation off new bank, and it is not even an unusual occurrence. It is also not unusual for an entity such as Merrill Lynch to offer ere bank like services to clients. The market is so large and so fragmented, that the significance off new entrant or even entrants is minute. If the concept of the combination of existing participants into what amount to new entities the importance of the concept changes, but only slightly. The new entity is nothing more than a combination of formerly existing entities, and its immediate effect on the market wills probably me minimal. Want to know the price of your unique Paper? 126 writers online Deadline Paper topic Pages 550 words(double spaced) Get a price Longer term, its increased size and financial strength may alter the market situation slightly. Bargaining power of customer: The bank is involved in import trade financing. Bulk importers of consumer durable, food gains industrial raw materials are its customers. The bank has financed in textile, garments, and SEEM and apparels sectors. The bank has a tread of choosing customer Trot Leverages groups . Nine Dank NAS TLS class customers In ten construction sectors involved in high-rise building, heavy construction and roads and high way construction. So, Customer bargaining power is high. We will write a custom essay sample on Portes FIve Force In MBL specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Portes FIve Force In MBL specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Portes FIve Force In MBL specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Bargaining power of suppliers : A bank has three suppliers of its product, money: 1 . Its depositors 2. The credit market 3. The central bank The first source, depositors, has no bargaining power whatever in reality. If they make time deposits the bank will set the price or interest rate it will pay. If they have a demand deposit the bank pays nothing or effectively nothing for the deposit. It is possible that there may be some v variation in services as a form of competition, but a demand account (DAD) is not subject to great variation and most customers simply want an account and dont even know the exact terms of their account. Larger clients, reparations, government agencies, and wealthy individuals are offered packages of services in what is actually a form of market orientation in current management terminology. The bank is still the dominant party, even with very large clients, but the client can make the threat of going to another bank, and if he/she/it is large enough, the threat may have some significance. There is a distinct element of competition for the business of large accounts, but even here it would be very difficult for any entity to offer anything significant that its competitors could not plicate almost instantly. This part of the business becomes very much one of personalities and individuals as opposed to marketing initiatives. The bank advertisements on CNN all focus on the quality of the individuals and services. They say in effect, Our people are the best. The credit market as a source of supply of the raw material, money, is open to all at all times if they are qualified participants. The source of supply can be argued to be infinite. The Central bank is effectively the resource of last resort. Apparently, at least for the moment, it will continue to supply equity to the banking system in virtually unlimited quantities at very reasonable cost. The threat of substitute products: For the most part there is no real threat of substitute products in the banking industry. It could be argued that a personal loan is a substitute for a mortgage, but in reality both are loans and the loan is taken out because the customer wants money. The same can be said of other bank products, and even institutions. A mortgage company is a substitute for a bank, but it is the same product offered by an alternative vendor. There is a good chance the mortgage company is owned by a ann. holding company in any case. The only question is the origination of the loan. Bank transfers are more common in Europe than in United States banking practice. They serve approximately the same function as checks and some of the new Internet banking services are actually transfers, even in the states. There probably will be a continued evolution of products from paper to electronic in coming years. This is an area of potential competition, and probably innovation, but the final services, moving money from account A to account B will not change.