Thursday, August 27, 2020

Lenovo Marketing

Lenovo Acquisition Analysis Product/Brand choices: Some of the issues Lenovo needed to manage in the obtaining of IBM was the way to exploit the marriage of brands and how to win corporate regard with the Lenovo brand. The securing permitted Lenovo to move rapidly into the universal commercial center. Given that IBM had one of the most confided in brands far and wide, this permitted Lenovo to expand on past IBM’s notoriety. Be that as it may, Lenovo just reserved the privilege to utilize the IBM logo for a long time so they needed to use that asset.The media view of Lenovo’s relationship with the Chinese government was additionally worried to Lenovo’s administrators since firms with this sort affiliation will in general get bad grades for reliability. Accordingly they faced to confront overviews to decide client concerns. Subsequent to deciding to concentrate on development and quality the organization in the long run chose a methodology with two components: deve lop the Lenovo brand as ace brand and keep on fortifying the ThinkPad brand which appraised high among corporate purchasers. Estimating choices: Lenovo’s evaluating choices was an instance of how to situate itself in the brains of consumers.They had just gotten effective with the expense of assembling since the vast majority of the segments were at that point being made within China. In any case, they needed to pick what its image pith would be and over what number of classifications its image would be extended. As they saw it there were two gatherings with which to contend. One gathering incorporated the limited valuing model like Dell, HP, Acer and such. Another gathering included Apple and IBM which recognized their items on development and quality. So to stay serious, Lenovo intended to dispatch their new PC Series 3000.This was an endeavor to keep the ace brand and the ThinkPad as extravagance items at a top notch cost and to make another item that was evaluated lower an d could contend in the market on another level. They decided not to contend legitimately on cost with the 3000 family by applying what they realized business purchasers needed which was ‘worry free computing’. They were going to worry in their showcasing methodology that the Lenovo brand represented advancement. Contending on cost would have given the view of a modest item from China. However, they discovered that customers put a superior incentive on quality, unwavering quality and durability.Distribution choices: The procurement permitted Lenovo to secure circulation channels that IBM had just developed. It presently had a commercial center to 138 nations where the two organizations had been selling beforehand. Preceding the obtaining deals in China for Lenovo’s were 70% value-based through colleagues and 30% by connections or counseling. Comprehensively for Lenovo it was the inverse with just 30% of deals through accomplices. IBM’s client base had been dominatingly corporate clients. On the gracefully chain side IBM pc’s were at that point sourced in China so there were operational efficiencies to be gained.According to one official there seemed, by all accounts, to be no channel struggle since they had integral items and customer bases. They could gathering a wide item portfolio and utilize worldwide conveyance to take items around the globe. Joining the two societies despite everything represented a test to making the organization work in the way it was the merger was considered. Despite the fact that Lenovo had displayed itself after HP and IBM by concentrating on meritocracy, the potential for corporate and operational conflicts had not been unmistakably expelled. In any case, the youthful CEO Yang urged them to cooperate as they incorporate the two organizations. The key message was to trust the other person’. This helped encourage an environment that would support the change. Advancement choices: Lenovo had num erous provokes confronting them with respect to advancement of the brand and item portfolio. One was the way to situate the ThinkPad brand with the market and whether to put this brand on existing Lenovo items. The showcasing director figured this would weaken the ThinkPad brand and chose to keep the ThinkPad as a different item class that would expand on its notoriety of a superior business notebook.This turned out to be a piece of their procedure of a ‘one-two punch’: developing the Lenovo ace brand and keep on fortifying the ThinkPad item brand. Not long before the securing Lenovo had arranged an Olympic sponsorship so as to acquaint the world with the brand. They would have the option to utilize the Olympic logo for showcasing and advancement however this plan would come at a strong cost of $80 million to begin and another $160 for the extra publicizing prerequisite; a huge whole for an organization with $3. 2 billion in sales.Lenovo would likewise have the option t o keep on utilizing the IBM logo for a long time as a major aspect of the procurement which they expected to use. The advancement system prompted a three stage promoting plan. To start with, they ran an overall crusade where every advertisement finished with a notice of the ThinkPad rather than Lenovo to console client and keep up the ThinkPad force. The subsequent crusade was named ‘ThinkPad Unleashed’ which ran during the Olympics to accentuation that the ThinkPad was being made surprisingly better. The third stage focused on that Lenovo represented development which is the means by which they proposed to separate themselves from their competitors.In request to keep on bringing issues to light, the promoting director examined brand-following exploration from 10 nations each quarter. They would picked item arrangements on TV appears in nations like India because of the investigations. They likewise investigated flighty approaches to situate the organization as Dell and HP proceeded to outspend them in promotion dollars by as much as multiple times in the US and multiple times in Japan. After presenting a ‘3000’ group of pc’s for the private company advertise, the test was the manner by which to situate it as cost serious without the discernment that they were modest items from China.This may weaken the ace brand. They would examine more top to bottom about what business clients at last needed in their pc’s. To help with what their examination uncovered, every PC accompanied a lot of instruments named ‘LenovoCare’ for without ‘worry computing’. Showcasing procedure: The promoting technique would inevitably pressure a group of imaginative items that came about because of the marriage of the two brands. This would help bolster their statement of purpose: We put more advancement in the possession of more individuals so they can accomplish all the more astounding things.Delivering on this crucial en d up being harder than trying to say it. From the start, Lenovo strived to make a supervisory crew that was agent of the new worldwide market. They accomplished this by recruiting representatives in the nations where they sold the PC’s. Building up an advertising methodology that crossed the globe was an overwhelming errand that would possibly be fruitful if their different group of administrators cooperated. Having various societies cooperating toward a similar objective would be troublesome. Inside the initial a while after the securing the Lenovo lost market share.Now the organization would need to remain on the Lenovo brand to get them through the following a few troublesome long stretches of recovering that share and getting increasingly settled in the US advertise. They would locate that even in their own nation of origin of China where they once had the favorable position that opposition had gotten increasingly serious because of extra advertisement dollars they were s pending. For whatever length of time that they kept on supporting the imaginative culture which won IBM so much acknowledgment and to work to cause the way of life to oversee together this would prompt a fruitful future.

Saturday, August 22, 2020

Global Warming, El Nino, and other Climate Phenomena

An unnatural weather change, El Nino, and other Climate Phenomena The climate we experience is an appearance of the atmosphere we live in. Our atmosphere is influenced by a worldwide temperature alteration, which has prompted many watched changes, including hotter ocean temperatures, hotter air temperatures, and changes in the hydrological cycle. Moreover, our climate is additionally influenced by common atmosphere wonders that work more than hundreds or thousands of miles. These occasions are regularly cyclic, as they reoccur at time interims of different lengths. An Earth-wide temperature boost can influence the force and return interims of these occasions. The Intergovernmental Panel on Climate Change (IPCC) gave its fifth Assessment Report in 2014, with a part committed with the impacts of environmental change for these huge scope atmosphere marvels. Here are some significant discoveries: Rainstorm are occasional breeze inversion designs joined by huge precipitation. They are mindful, for instance, for the late spring tempest time frames in Arizona and New Mexico, and the heavy storms in India’s blustery season. By and large, rainstorm examples will increment in territory and power with proceeded with environmental change. They will begin prior in the year and end later than what had been the average.In North America, where storms are restricted to the U.S. Southwest district, no adjustment in precipitation because of a worldwide temperature alteration has been obviously watched. A diminishing in the length of the period has been watched, however, and rainstorm are relied upon to be postponed during the year. So there seems, by all accounts, to be not a single help to be found for the watched (and anticipated) increment in recurrence of extraordinary summer temperatures in the U.S. Southwest, adding to drought.The measure of precipitation from storm downpours i s determined to be higher in the more critical situations considered by the IPCC. In a situation of proceeded with dependence on petroleum product and the nonappearance of carbon catch and capacity, absolute precipitation from rainstorm, comprehensively, is evaluated to increment by 16% before the finish of the 21st century. The El Niã ±o Southern Oscillation (ENSO) is an enormous territory of curiously warm water that creates in the Pacific Ocean off South America, influencing climate over a huge bit of the globe. Our capacity to display future atmospheres while considering El Niã ±o has improved, and apparently changeability in precipitation will increment. At the end of the day, some El Niã ±o occasions will deliver more precipitation and snowfall than anticipated in certain zones of the globe, while others will create less precipitation than expected.The recurrence of tropical violent winds (hurricanes, storms, and storms) is probably going to remain the equivalent or diminishing, all inclusive. The force of these tempests, both in wind speed and precipitation, is probably going to increment. There are no reasonable changes anticipated for the track and force of North American extra-typhoons (Hurricane Sandy got one of those cyclonic tempests outside of the tropics).â â Prescient models have improved altogether over the most recent couple of years, and they are as of now being refined to determine remaining vulnerabilities. For instance, researchers have little certainty when attempting to foresee changes in rainstorm in North America. Pinpointing the impacts of the El Niã ±o cycles or the force of tropical violent winds in explicit zones has likewise been troublesome. At long last, the marvels portrayed above are to a great extent know by people in general, however there are numerous different cycles: models incorporate the Pacific Decadal Oscillation, the Madden-Julian Oscillation, and the North Atlantic Oscillation. The communications between these wonders, provincial atmospheres, and an Earth-wide temperature boost make the matter of downsizing worldwide change forecasts to explicit areas bewilderingly mind boggling. Source IPCC, Fifth Assessment Report. 2013. Atmosphere Phenomena and their Relevance for Future Regional Climate Change.

Friday, August 21, 2020

Introducing Slashsquare - Indian Blog Network

Introducing Slashsquare - Indian Blog Network Make Money Online Queries? Struggling To Get Traffic To Your Blog? Sign Up On (HBB) Forum Now!Introducing Slashsquare Indian Blog NetworkUpdated On 20/04/2018Author : Pradeep KumarTopic : Editorial FeaturedShort URL : http://bit.ly/2ozcraN CONNECT WITH HBB ON SOCIAL MEDIA Follow @HellBoundBlog[Cross posted from Slashsquare Blog]When I started HBB I thought one blog was enough for me to survive in this tremendous field and that thought worked for me for couple of months, but then I realized the topics which I admire cannot be covered on one blog. HBB is not a Wikipedia to include all the existing topics. Then I understood HellBound Bloggers (HBB) will not be my first and last blog. My passion for blogs helped me to survive in this field midst my academics. With my academics coming to an end, my interest in blogging increased and I decided few blogs along with HBB will be safe for my future and I can write about various topics I admire.If I started another blog earlier, that would have killed both the blogs. My degree and my blog helped me to compare things brilliantly, I learned things which nothing can teach me in this world. So I decided I should stay with one blog at this point.P.S. I even started a forum and closed it (without an official good-bye).Why starting a new one?Comparing how my blog was before one year and how it is now, I can see a huge difference. Full credits to the evergreen guest authors, active readers and commentators. Success of HBB and myself belongs to their dedication. Practically right now it is in auto-pilot mode. I feel bad for not being a regular contributor for HBB, but I have some valid reasons for that. All I wanted is to fill HBB with informative posts. Each day I make sure Im publishing something to someone or delivering something to someone which should be a valuable part in his life.READ10+ Interesting Ways How Porn Websites Make MoneySay, he/she takes 10-15 minutes to read an article fully, they should not regret for putt ing their time on us, each and every post should make some valuable changes in their lives. So I check the guest posts submitted seriously, but at the same time, I dont want to disappoint newbies. They start to contribute without any guidance, so they kinda messed up at the end. If I say a big NO to their guest posts, they will forget there is a blog called HBB. Im trying to best to publish all the posts which are in Good Manner, no matter what kind of information they produce, as long as they are valuable and not repeated, there is nothing wrong in proceeding.Slashsquare NetworkHaving lot of blogs under a common name makes sense. So I started Slashsquare Network. I thought HBB Media or HBB Network would have been perfect, but you know, mind is a monkey. Jumped into another name.Slashsquare Network will have HellBound Bloggers (HBB) under it. Hopefully next week, you can see another blog under this network. Right now Im not trying to outsource, I made some changes to make things wor k properly.You can connect with us on Facebook, Twitter and YouTube. You can also check our Slashsquare Blog for updates.So from now on, HBB will be under this network and you can expect few more good niche blogs under this. You can check our Network page for more updated details. Check out Slashsquare Network.

Monday, May 25, 2020

How to Mix Acid and Water Safely

When you mix acid  with water, its extremely important to add the acid to the water rather than the other way around. This is  because acid and water react in a vigorous exothermic reaction, releasing heat, sometimes boiling the liquid. If you add acid to water, the water is unlikely to splash up, however, even if it did, its less likely to cause injuries than if you make the mistake of adding water to acid. When you add water to acid, the water boils and  the acid may splatter and splash! Extra Caution With Strong Acids This rule is particularly important if you are working with strong acids that react completely with water. Mixing sulfuric acid and water is particularly risky because any splashed acid is corrosive enough to immediately burn skin and clothing. When mixing sulfuric acid or another strong acid, start with a volume of water large enough to absorb the heat of the reaction. Add the acid in small amounts of volume and stir thoroughly prior to adding more. Just Remember: Add the Acid An easy way to remember the rule  is Add the Acid. Protective Gear and a Fume Hood Because of the risk of splashes and the release of dangerous fumes, acids and water should be mixed inside a fume hood. Protective goggles, gloves, and a lab coat should be worn. If Acid Splashes In most cases, an acid splash should be treated by immediately rinsing the affected area with running water. Acid splashes on a lab bench or other surfaces may be neutralized by adding a weak base solution (e.g., baking soda in water). Although a strong base will neutralize an acid more quickly than a weak base, a strong base should never be used because the reaction between a strong base and acid releases a great deal of heat.

Thursday, May 14, 2020

Communication And Its Impact On The Workplace - 936 Words

Overall, communication has a big impact over all of our lives. It is something that we use on the day to day basis. For most of us we use communication on our job each and every day. On our jobs we use communication through visual communication, verbal communication, and written communication. In the workplace communication is extremely important. It can be seen as the glue that basically holds the workplace together to produce a great organization. But with communication there are also some strengths and weaknesses that can impact an organization in a positive or negative way. Over the years the two components that have made a big impact in the workplace are formal small-group communication and the famous grapevine. Keywords: Communication, Formal Small-Group Networks, the Grapevine Communication As stated above we use communication each and everyday. According to authors Robins and Judge (2009) the term communication can be defined as â€Å"the transfer and understand of meaning (Robins Judge 2009, p. 351). Now going a step further authors Milakovich and Gordon of the text called Public Administration in America defines communication as the â€Å"vital formal and informal processes of interacting within and between individuals and units within an organization, and between organizations (Milakovich Gordon 2013, p.170). To begin with there are two types of communications that take place within the workplace such as formal communication and informal communication. FormalShow MoreRelatedThe Impact Of Communication On The Workplace Essay1646 Words   |  7 Pages2.1 Communication in the work place In management, planning, leading, organising and having control over the organisation requires one to have good communication skills in order to ensure that fellow colleagues and employees are able to work efficiently and effectively (Robbins Coulter, 2016). Therefore, in an organisational context, communication is a medium of either verbal or non-verbal communication within a specific context (Louw and du Ploy-Cilliers, 2014). 2.1.1 Role in the workplace CommunicationRead MoreThe Impact Of A Poor Communication Climate On The Workplace Essay951 Words   |  4 Pagesliterature review will consist of theoretical perspectives and previous research findings related to the communication climate in the workplace. The review will provide a focus for the study and to report the important concepts and data related to the attitudes and behaviors in the workplace. The review will include an overview of the behaviors, conflict resolution, and educating leadership on communication strategies. A variety of resources will be utilized for reviews of literature pertinent to the projectRead MoreIn modern times Information Communication Technology (ICT) has become ever-present in life.800 Words   |  4 PagesIn modern times Information Communication Technology (ICT) has become ever-present in life. Sometimes it feels as though it is encroaching on daily routine but the advantages it offers in both personal and working life are prodigious. This essay will examine the impact ICT currently has, on private life and at work. The issues arising from the developments of these technologies will also be given consideration. Furthermore legislation relevant to ICT will be examined to ensure there is adequateRead MoreDiversity Within The Workplace And How Communication Is The Driving Force Behind It Essay1463 Words   |  6 PagesDiversity in the workplace and how communication is the driving force behind it. Workplace diversity can be described as â€Å"all the differences in age, gender, sexual orientation, education, cultural background, religion, and life experience† (Okora Washington, 2012, as cited in Mulkeen, 2008). Another functional definition of diversity is being cultural, racial, or sex-based. An organization’s definition and viewpoint concerning diversity guides the strength of its employees to connect and communicateRead MoreLateral Workplace Violence : Effective, Destructive, Or Harassment Behavior1344 Word s   |  6 Pages Lateral workplace violence is described as aggressive, destructive, or harassment behavior in the workplace between nurses or other members of the interprofessional team (Yoder-Wise, 2015). This type of behavior can occur within every aspect of life including professional, social, and personal life. The behavior can include gossiping, withholding information, or ostracism extending outside of the workplace and can occur in person or in cyberspace (American Nursing Association, 2011). LateralRead MoreBusiness Ethics And Ethical Practices1503 Words   |  7 Pagesin recent years. Business ethics can help the company to create and develop it workplace culture as well as to increase the productivity of employees. Due to the rapidly change and improvement of technologies, ethical practices within of the workplace have also been changed with the raising of new ethical issues. Many studies and researchers have indicated that it is very importance to identify and understand the impact o f technologies advance on ethical practice of businesses. The main purpose ofRead MoreThe Importance Of Communication1210 Words   |  5 Pagesimportance of good communication skills. Most college students are familiar with the aspect of good communication, but everyone seems to avoid explaining poor communication in detail. I believe the best way to practice good communication is to understand what poor communication is and to analyze how you may be practicing poor communication without proper knowledge. We use communication to express our thoughts and opinions. Communication takes place in many methods the main method of communication includesRead MoreThe Importance of Listening Skills in the Workplace Essay1115 Words   |  5 Pagesof time spent on communication (Eunson 2012:310), argue the importance of listening skills in the workplace. Your analysis should identify three specific listening behaviors and provide examples to demonstrate how these skills promote communication a nd understanding. Support your analysis with relevant communication theory and evidence from appropriate academic sources. Listening skills play a significant role in evaluating communication capabilities in the workplace throughout the globeRead MoreIntroduction to Business Communications Essay1194 Words   |  5 Pagesï » ¿Introduction to Business Communications Report: 2/21/2013 Paragraph 1: Your Vision for the Company What does it means to be a ‘’good ‘’Communicator? A good communicator is an individual that can listen, organized, clarity, a being sincere. Understanding their communication style, because understanding your communication style is the key to being a great communicator whether it is being aggressive, passive, or passive aggressive. After knowing your communicating style you must be able to useRead MoreThe Impact Of Social Media On Employee Performance1421 Words   |  6 PagesThe following annotated bibliography with the use of six peer-reviewed articles outlines the impact social media has had on business and management communication. Social media has changed so much for the world; it has connected people from all over with the click of a button. Even though social media has been a game-changer for many businesses and a vital tool for communication, it has brought along of negative outcomes. The articles I have researched demonstrate both pros and cons for the use of

Wednesday, May 6, 2020

Racial Profiling And Its Effects On Society - 982 Words

Racial profiling has and always will be a large part the American society. Although before we can discuss its effects on society and how society then affects me we should know what it is. Racial profiling is the use of an individual’s race or ethnicity by law enforcement personnel as a key factor in deciding whether to engage in enforcement (e.g. stop and search or arrest). In other word it is justifiable racism. I say this because in order to use a person’s skin color to determine whether they have committed a crime or not you must be comparing it to another skin tone. Then you get into the habit of thinking of the ‘bad races’ and the ‘good races’. I call it a habit because it was first an idea to help speed of the judicial process. It became a habit after they realized it was doing more harm than good but refused to change it. This however is not the only profiling, it is simply the one in the news right now. There is behavior and appearanc e profiling. We watch a person walk a certain way and assume the worst. We see a boy dressed in way we would never dress our son and declare war on them.These habit can lead to many lives ruined and stolen. The race card has never failed to be played. Not only race but stereotyping as well. If you are walking down a sidewalk and see a black you man with his pants hanging below his butt, three different colored shirts on (all untucked and wrinkled), hat on backwards with a headscarf tied under it what will be your reaction? You say youShow MoreRelatedRacial Profiling And Its Effects On Society1393 Words   |  6 PagesAlina Haseeb History 104 Professor Smith 3 August 2015 Racial Profiling We live in a society that has prospered generously over the years. America has opened its doors for so many different people by establishing itself as a free country. Not only have we progressed in technology and economically but we have created our own identity by becoming a free nation in which every individual has the same rights and eligibility as the other. This is the core of our countries success; we are not a nationRead MoreRacial Profiling And Its Effects On American Society2621 Words   |  11 PagesEver since the late 1970 s profiling was associated with a method of interdicting drug traffickers (Data Collection Resource Center, n.d., para 3). The profiling provided not only a quick way to see evidence of concealment in the vehicle, but included age and race characteristics of possible drivers (Data Collection Resource Center, n.d., para 3). The controversy is over whether or not there are a disproportionate number of blacks and Hispanics involved with law enforcement th at reflects policeRead MoreProfling Vs Racial Profiling848 Words   |  4 PagesRecently there have been many issues concerning wrongful searches and police brutality in the criminal justice system. Cries for racial equality and social justice have been heard from across the nation. Profiling and stereotyping are generally seen as almost the same concept, but this is not the case. Specifically, criminal profiling is defined as â€Å"the act or process of extrapolating information about a person based on known traits or tendencies,† according to Merriam-Webster Dictionary. In contrastRead MoreThe Community Of Jamaic A Middle Class Area1723 Words   |  7 Pagesgroups because if certain stigmatisms placed on heavily populated neighborhoods. Racial profiling is very much common in this vicinity of Jamaica. Racial profiling is a growing epidemic that has been a major problem for people of color. There are many people who are affected by it and have no way of defending themselves against the norms of society. According to the Merriam Webster online dictionary, racial profiling is the use of a generalized suspicion based on race rather than evidence specificRead MoreRacial Profiling1321 Words   |  6 PagesANALYSIS OF â€Å"RACIAL PROFILING AND CRIMINAL JUSTICE† 1 Analysis of â€Å"Racial Profiling and Criminal Justice† Domenica Martinez Colorado Mesa University ANALYZING RACIAL PROFILING AND CRIMINAL JUSTICE 2 Research Question I chose to analyze article titled â€Å"Racial Profiling and Criminal Justice† which is written By Jesper Ryberg withinRead MoreThroughout history, racial profiling has become a prevalent issue within humanity. From slavery,1400 Words   |  6 PagesThroughout history, racial profiling has become a prevalent issue within humanity. From slavery, segregation, and to world wars, furthermore ongoing issues of terrorism, these examples have led to the profound effects of racial profiling. Racial Profiling can be defined as the action of law enforcers and society, which specifically targets people based on race, ethnicity, religion or national origin and not by actual behavior. Although, many people may believe that racial profiling is non-existent,Read MoreRacial Profiling Is A Necessary Evil1100 Words   |  5 PagesRacial Profiling In order to understand racial profiling, it must first be correctly defined. Although different authors use different criteria for the term racial profiling, the definition for the word racial is â€Å"of, relating to, or based on a race The definition the dictionary puts forth for profiling is â€Å"the act of suspecting or targeting a person solely on the basis of observed characteristics or behavior.† Based on these definitions, racial profiling could be defined for criminal justice purposesRead MoreRacial Profiling : A Race And Ethnic Class1208 Words   |  5 Pagespoint presentation on â€Å"racial profiling†. Starting off racial profiling refers to the biased practice by law enforcement officials focusing on individuals for suspicion of crime, based on the individual s race, ethnicity, religion or national origin. Racial profiling is a very brood and sensitive topic because it’s a lot of it going on in the world today. My opinion is that racial profiling is a controversial topic in our society. The beneficial parts of racial profiling are firmly upheld by statisticsRead MoreNarrow Views On The United States939 Words   |  4 Pagesinhumane event, but also by America government official’s racial profiling citizens of all nationalities that set foot into America territory. As citizens of the United States, we are concerned about criminality undermining our society; drugs, terrorist attacks and violence are increasing in our communities. Although crime is a serious problem in our society, government resources are limited and we live under a terrorist threat. However, racial profiling is not the solution to reduce our social issues becauseRead MoreRacial Profiling Term Paper1588 Words   |  7 PagesRacial profiling is a popular method used by law officers in order to hypothetically enhance crime prevention by targeting minorities, because they are more likely to commit a crime. According to Wikipedia, racial profiling is defined as: the inclusion of race in the profile of a person considered likely to commit a particular crime or type of crime. In other words, it is targeting specific ethnic groups because they are more likely to commit certain crimes. Racial profiling is a flagrant form of

Tuesday, May 5, 2020

System Thinking In Portflio Management †Myassignmenthelp.Com

Question: Discuss About The System Thinking In Portflio Management? Answer: Introducation Systems thinking and project management, both the function have a strong relationship with each other. Both of the topics are used together for big researches in the mid 90s. After World War 2 both the processes had their separate progression but their interrelation cannot be neglected, not even today. Development of bodies like SEBOK and PMBOK, elevated the practices of system thinking, specifically system engineering. The shared concepts between system engineering and project management are life-cycle advancement of designs and concepts as well as implementations of projects and systems (Liu, Forrest and Yang 2015). With the evolution of technology system thinking and engineering have been spread from hard to soft systems like personnel and communication management, team structure and performance, communication management and others (Brandstdter, Harms and Grossschedl 2012). The complexities of any project can be understood by the managers by application of concepts of system think ing. Purpose of this essay is to understand the system thinking process and application of different tools and techniques of system thinking in project management. A project can be considered as a system since a system is purposeful factor, interrelated with different interacting constructive parts. A system runs by taking input from the environment or circumstances and by converting them into desirable outputs (Hanson 2014). The structure of a system defines its relationships and usefulness in performing specific activities. Boundary of a system can be defined as the concerns regarding the systems and these concerns or scopes are changeable along with circumstances. A project consists of activities, structures and processes. Project managers can settle down an uncontrollable project by the appropriate application of system thinking (Henry et al. 2013). The term general system management is first introduced by Ludwig von Bertalanffy, which tells that a system can be identified by the dynamic interaction between the components and its non-linearity (Kerzner 2013). A part of a system cannot be understood separately. A system approach can be descr ibed as explaining the problems from large viewpoint to analyse, synthesize, provide feedback and verify alternative approaches which can minimise the complexities (Brownsword and Setchi 2012). Approach of system thinking in project develops a definition of project management system, which an helpful organisational sub-system for superimposing a project team on the structure of an organisation. System engineering is an inter-regulatory approach consisting of successful engineering systems for deducing the solutions of problems by understanding the needs of stakeholders and by deploying useful applications like opportunity explorations, documentations of requirements and validating and verifying the complexities (Kerzner 2013). System engineering should provide a guide for the necessary information regarding the boundaries, vocabulary and structural concepts of any discipline. It should inform about the values as well as limitations of system thinking to the project managers (Gomes and Romo 2015). Incorporating a system engineering process a project can avail requirements, verifications and functions (Haimes 2015). An effective project management system incorporates work breakdown structure that is a hierarchy composed of the products and services necessary for the completion of the project. This work breakdown structure is associated with system architecture, which configur es the alignment between system engineering and project management (Nicholas and Steyn 2017). With the application of system engineering the integration of risks and risk management process in project management is inevitable (Liu, Forrest and Yang 2015). These risks can be defined as the uncertainty of an event or its result constructed by system engineering. These risks can be categorised as- strategic, financial, operational, technical and program or project risks. These risks are associated with the strategic plans and policies of an organisation, its financial base, technical and operations departments of an organisation (Henry et al. 2013). In order to achieve safety from these risks system engineering must be incorporated of a suitable set of risk management procedures. The components of this risk management procedure are planning, identification of risk factors, analysis, development of strategies for responding to the risk factors, monitor and control of risks. A larger project management plan should include sufficient resources for risk management which can give pro per information about tools and techniques, objectives and goals, responsibilities and roles of communication. Next important thing is ti identify the category of the risks (Brownsword and Setchi 2012). There are several risk factors associated with technical, cost-revenue, human resources, production, management, engineering, business threats and more. A proper identification of risk factors will allow an organisation to take appropriate measures to counter the risk. Risk analysis can be of two methods, which are qualitative and quantitative (Haimes 2015). For qualitative analysis a risk mapping matrix delivers the risk probability. Quantitative analysis comprises two techniques, Decision tree analysis and Monte Carlo analysis in order to present the measurement of risks either by using permutation possibility or by sampling randomly. Analysing the risk factors, based on the findings strategies are made to respond against risks. Generic model of development of risk response strateg y follows acceptance, avoidance, control and transfer (Hanson 2014). Finally, the risks are controlled and monitored that those risk factors do not return in the system to affect the project. The techniques for controlling risk factors are achieved value, which is technique of comparison of earned work value with work value set to perform in the scheduled time, program metrics, which is periodic analysis of the achievement of risk management plans and measurement of technical performances, which is a quantification of technicalities of a project and comparison of it with project success metrics. Concepts that strategize the decision making ability incorporating investment policies, align it with objectives and allocation of individual and organisational assets and development of risk management strategies are the structural unit of portfolio management. It is associated with strength, weakness, opportunity and threat analyses that estimate the maximum return despite of presence of risk factors (Brandstdter, Harms and Grossschedl 2012). The consolidated management that manages various procedures, techniques and technologies applied by the bodies of project management in order to analyze a project based on several key characteristics is called project portfolio management (PPM) (Heising 2012). The key objectives of this management procedure is the determination of resource combination for delivery and scheduling of activities to properly achieve the operational, technical and financial objectives of an organisation keeping the boundaries and constraints delivered by strategies, consumers and other circumstances (Martinsuo 2013). Organisational maturity model explains the selection, management and completion of projects by any organisation. The portfolio consistency of any company is dependent on the experience of that organisation (Gomes and Romo 2015). Different levels of project portfolio management are associated with organisational maturity model differently (Bourne 2016). The first level, which can be described as reactive, consists of no formal tool for project management. The directives of management are prioritized on the basis the most needed projects and the projects have definite cost estimation. New-formed organisations are the elements of this PPM (Wendler 2012). The second level, emerging discipline, consists of a project management office that provides the surety of involvement of organisational strategies to the projects. The project managers at this level follow a specific set of project management processes giving priority to the initiated projects. Level three of PPM is initial integration (Beringer, Jonas and Kock 2013). The organisations in this level utilize a program, a set of projects embedded in its project portfolio management that clearly defines roles and objectives of project manager. Project officer, PPM manager and different committees that can guide a project exist in these organisations. Layer four, which is effective integration, consists of organisations those use the knowledge gathered from organisations all around the world (Teller et al. 2012). Each project is tracked, monitored and forecasted specifically for its benefits. Project portfolio is modelled to obtain risks, rewards and investment returns. Layer five of project portfolio management, effective innovation, is the maximum level of maturity of project portfolio management where the communication is channelled through an Enterprise project management office and the scope of interest of the project changes circumstantially. Roll out rate of the PPM projects at this level is faster than that o f the lower level PPM projects (Unger, Gemnden and Aubry 2012). Project managers are given responsibilities of smaller project for achieving improved flow of projects within the enterprise and quicker success rates. Aligning project portfolio with corporate strategies and objectives ensures the focus of any organisation towards the right projects. This alignment is done in the basis of strategic goals, assumptions, operational constraints and applicable data (Beringer, Jonas and Kock 2013). These portfolio alignments provides various benefits like clients have been clearly defined about the objectives and targets of the organisation and based on that the vision develops inside the client (Heising 2012). It gives clients the idea of project values and helps them to eliminate un-aligned projects for waste reduction and proper utilization of resources. There are certain business values related with portfolio management. Allocation of resources can be improved by prioritizing work through every available department of an organisation (Bourne 2016). The portfolio incorporates both in-house equipments and outsourced works. Work scrutiny can be improved by portfolio management as it suggests that the work has to be approved by all the stakeholders. According to the concepts, any work must be opened for scrutinizing in more than one area as any work when approved in any one area, it reduces the potential for other works to be approved in that same area (Martinsuo 2013). The authorization process of any work gets sufficiently open as the information of funding of the work gets revealed. The planning process gives the permission to every individual to propose work and channels the knowledge of authorization of the work to the relevant people. Consistency of work assessment can be improved by portfolio management planning process. The comp arison of the authorized work can be evaluated on an apples to apples basis. Along with the selection of high priority works, the alignment of work is also an effect of portfolio management (Unger, Gemnden and Aubry 2012). The alignment is made on the basis of targets and objectives of the overall context of the department. Work balance can be improved also. Financial portfolio management helps to develop a balance in the usage of resources. The instruments used to ensure this balance are bonds, real estate, stocks and some others. Sometimes evaluation of the portfolio of an authorized work set some barriers in the path of the work. Portfolio management helps to overcome these barriers by categorizing the events for spending resources and provides a way to adjust the expenses and create balance in utilization of resources (Wendler 2012). The values lie further ahead. A shift of focus from cost to investment is an important effect of portfolio management. Any work will only get authorized when teh values become relative to the cost structure. This focus change is primarily observed in the areas of information technology due to the involvement of computers. The values of expenditure can be mentioned in the portfolio. Collaboration and communication can be increased through portfolio management. Good amount of communication between the functional departments and the peer departments enhances the collaboration (Nicholas and Steyn 2017). The enhanced communication between the team for portfolio management and the executives of any organisation is also required for a perfectly build portfolio management system. Lastly, a project needs to be stopped at an appropriate moment. Sometimes the financial activities like the investment on a project do not fulfil the objectives (Teller et al. 2012). This profitability diminishes an d the resources need to be saved as they can be used for another approach. These ideas can be achieved from project portfolio management. Therefore, from the above discussion, it can be said that a project can only be developed properly with the application of system engineering. Thinking every step systematically helps a project to be constructed according to the objective of the project. Project portfolio management is centralized approach of management for different organisations. In order to gain the profit from the projects and fulfil their objective every organisation must include a project portfolio management team. PPM set the business values of an organisation and affects various parts of its functions. Ultimately it selects the works those need to be authorized and the works those need to be rejected. References: Beringer, C., Jonas, D. and Kock, A., 2013. Behavior of internal stakeholders in project portfolio management and its impact on success.International Journal of Project Management,31(6), pp.830-846. Bourne, L., 2016.Stakeholder relationship management: a maturity model for organisational implementation. CRC Press. Brandstdter, K., Harms, U. and Grossschedl, J., 2012. Assessing system thinking through different concept-mapping practices.International Journal of Science Education,34(14), pp.2147-2170. Brownsword, M. and Setchi, R., 2012. A formalised approach to the management of risk: a conceptual framework and ontology.Systems approaches to knowledge management, transfer, and resource development. IGI Global, Hershey, PA, pp.263-285. Gomes, J. and Romo, M., 2015. Enhancing Organisational Maturity with Benefits Management.International Journal of Information Technology Project Management (IJITPM),6(4), pp.34-47. Haimes, Y.Y., 2015.Risk modeling, assessment, and management. John Wiley Sons. Hanson, B.G., 2014.General Systems Theory-Beginning With Wholes: Beginning with Wholes. Taylor Francis. Heising, W., 2012. The integration of ideation and project portfolio managementA key factor for sustainable success.International Journal of Project Management,30(5), pp.582-595. Henry, D., Pyster, A., Olwell, D.H., Hutchison, N., Enck, S. and Anthony, J.F., 2013. Experiences from creating the guide to the systems engineering body of knowledge (SEBoK) v. 1.0.Procedia Computer Science,16, pp.990-999. Kerzner, H., 2013.Project management: a systems approach to planning, scheduling, and controlling. John Wiley Sons. Liu, S., Forrest, J. and Yang, Y., 2015. Grey system: thinking, methods, and models with applications. InContemporary Issues in Systems Science and Engineering(pp. 153-224). New York, NY: John Wiley Sons, Inc.. Martinsuo, M., 2013. Project portfolio management in practice and in context.International Journal of Project Management,31(6), pp.794-803. Nicholas, J.M. and Steyn, H., 2017.Project management for engineering, business and technology. Taylor Francis. Teller, J., Unger, B.N., Kock, A. and Gemnden, H.G., 2012. Formalization of project portfolio management: The moderating role of project portfolio complexity.International Journal of Project Management,30(5), pp.596-607. Unger, B.N., Gemnden, H.G. and Aubry, M., 2012. The three roles of a project portfolio management office: Their impact on portfolio management execution and success.International Journal of Project Management,30(5), pp.608-620. Wendler, R., 2012. The maturity of maturity model research: A systematic mapping study.Information and software technology,54(12), pp.1317-1339.

Wednesday, April 8, 2020

Survival Of The Fittest Essays - Herbert Spencer,

Survival Of The Fittest Survival of the Fittest Alas, Babylon, by Pat Frank, illustrates genuine examples of how superior creatures survive and the weaker perish. Those who sufficiently responded to this difficult challenge set before them were Randy Bragg, Dan Gunn, Alice Cooksey, and Florence Wechek. Those individuals who were unsuccessful with this devastating feat were Edgar Quisenberry, Bubba Offenhaus, Pete Hernandez, and Porky Logan. During this period those animals that become savage beasts and would do anything for food survived, while the animals that were controlled by humans did not. Randy Bragg is a natural leader and a quick thinker and he had his mind set that he was going to live even if he had to fight for his life. "We're going to have to be tough, we are going to have to be catfish" (Ch.7). The community's doctors had either been killed or vanished and Dan Gunn, now the only physician in Fort Repose, tried to help everyone who was sick and this made him survive because he knew the people of the community needed is capabilities. After being beaten by the highwaymen he shows how strong and how much will power to survive he had by walking miles to the Bragg household. Fort Repose's librarian, Alice Cooksey, had the strength to keep on living because she knew that the library was the only source of learning for the people and especially the children. "She felt fulfilled, even important" (Ch.8). Florence Wechek, "a guppy, a nice, drab little guppy " in the eyes of her pier Randy Bragg (Ch.7). The analysis made by Randy Bragg was correct in the sense that Florence relating to the guppy was willing to do what she had to serve the community and survive. The President of the Fort Repose Bank became a massive position after The Day. Edgar Quisenberry was a coward because he couldn't face the facts; he couldn't bare a world that didn't use any type of currency and he wouldn't allow himself to be humiliated so he committed suicide. " He had been a banker all his life and that was the way he was going to die, a banker" (Ch.5). Bubba Offenhaus, an egotistical man, was the Deputy Director of Civil Defense in the town. He gave all the Civil Defense pamphlets to the librarian because they took up to much space in his office and if they people could have seen these pamphlets they might have had a better chance to support themselves longer. Even though he didn't die he was a failure because he sat at home and did nothing but wait to die. After everything was sold in his grocery store Pete Hernandez had stored some supplies for him and his sister but, he was so greedy that he was happy about making ten dollars a pound for salt. " Ten dollars a pound for salt!?.. Ain't that something!" (Ch.7). Stupidity and greediness was Pete's downfall and wearing contaminated watches and other jewelry killed him. Porky Logan took everything he could out of a demolished jewelry store and sold some of the items to the Hernandez' for food and other items. His greediness killed him because he should have just sold all the jewelry, but he liked it so much he had to keep it. Animals and humans evolved at the same time during this time. The dogs of Fort Repose had become wolves and found and caught their prey any way conceivable. The cats are one of the few animals that did survive. "The house cat turns hunter" (Ch.7). The controlled animals put up less of a fight to survive. Anthony the pet bird failed to survive because the cat over powered the little bird. The evolutionary theory that only the strong survive stated in Darwin's Origin of Species is well focused throughout the novel. Those who survived knew they had to find the joy in this disaster, whereas the ones who did not survive wanted to give up and die. Many found their place in life and those who could not find it in life instead found it in death.

Monday, March 9, 2020

health bullying essay

health bullying essay health bullying essay Briana Cole 9/28/14 Health Bullying is a distinctive pattern of deliberately harming and humiliating others. Jamie was a person that was bullied for being a homosexual. He brought his story to court by taking his middle and high school principal and assistant principal to court to justify his 14th amendment, the right to equal protection by discriminating against him based on his gender or sexual orientation. Jamie was one of many that was being bullied and was petrified to go to school each day. This film was focused on a young boy names Jamie Nabozny who was targeted of physical violence and degrading acts by his classmates. When Jamie turned to school administration for help, they told him he should expect to be bullied if he was going to be gay. Jamie reached his turning point he wanted a change and he wanted people to care and take charge. This film was necessary to address the issue of bullying to exercise the fact that it could’ve gotten farther as in suicide. It teaches you to be aware and it s hows that school administrators have a personal responsibility to protect students from harassment. Jamie wanted the school district and the school administration to suffer just like he did and he wanted to do it as a change for others who went through or are going through the same fear. In Jamie’s story not a lot of people were on his side like some teachers and other people outside. The bystanders that Jamie was being encountered by were some of his teachers, the assistant principal and the principal. They turned him down and told him that it was because he was a homosexual and they couldn’t do anything about it. Jamie’s final days in high school was torture from getting beat up so bad that he had to get surgery, physical abuse and constant harassment Jamie decided to drop

Saturday, February 22, 2020

Norms are Informal Rules in Society Essay Example | Topics and Well Written Essays - 500 words

Norms are Informal Rules in Society - Essay Example The first example is where an individual of high status quo decides to use his bicycle to travel to work despite having a vehicle and the availability of public means of transport, the individual will have behaved against the norms of the society as depicted by the roles and code of behavior associated with his rank and status in the society. The sanctions that the society will impose on such an individual will include the decline in respect and status attached to the individual by his work mates and society. His workmates who have lower prestige jobs in the work place may doubt the individuals capability to be in such a position and this might lead to the loss of the job by the individual because the individual does not act according to the roles attached to him and also he does behave according to the societies norms to maintain his status and prestige according to the role he or she plays in the society. The other example is when an individual may decide to wear two different types or make of shoes, one make on the left foot and the other on the right, those who notice may decide that this is a mere joke but the society may decide to sanction you because of breaking the social norms associated with wearing shoes by trying to embarrass yo

Wednesday, February 5, 2020

Evolution of Family Law in an Ever Changing Society Essay

Evolution of Family Law in an Ever Changing Society - Essay Example Most writers and philosophers argue that family law has evolved to suit modern society and still has to further evolve in the future generations to come. Family law deals with what are highly emotional issues objectively and legally. Despite the strength of emotion involved in many family law cases, justice must still be served to each party. Society grows with time and circumstances and as it achieves growth it must attain development as well. Laws regarding family life have been in place since a long time amidst the growth of a number of civilizations and kingdoms around the world and with time, these laws have been witnessing changes and amendments because what might have been accepted yesterday may not be taken well with the general public today. In yesteryears, it was considered fine for a man to have a number of wives in ancient societies of Greece and the Middle East. Today however, this concept has undergone a certain amount of change keeping in mind the views and aspirations of women. Polygamy might still be accepted but must follow certain rules in order to be in place. In the olden times, it was enough for the older people in the family to lay down the rules to be obeyed by the younger generations. Couples tend to seek legal advice prior to their marriage in order to understand their financial and educational situations and whether or not they are equipped to start a family. In earlier days, arranged marriages were more common where the parents of the newlyweds to be would meet and discuss legal matters in terms of sharing child custody, sharing finances and ownership of assets. These terms were usually negotiated with the groom’s side gaining more than the bride. However, as society evolved, so did the concept of marriage. Today, marriage is seen as a celebration of two individuals and not just their families. It is important for the man and woman themselves to seek legal advice and come to terms with each other’s assets and liabilities. They must have a clean slate in order to proceed with the terms of marriage as it is seen as a contract after all. New rules of negotiation involve both parties acceding their assets and liabilities to each other. In todayâ€℠¢s world, most of the times women still hold on to their apartments

Tuesday, January 28, 2020

Civil War In Chad History Essay

Civil War In Chad History Essay After getting the independence from France in 1960, the north-central African nation of Chad has undergone four civil wars. These Chadian Civil Wars were against France, Libya, Sudan, Zaire/Congo, and the United States. . The current civil war is also connected to the neighbourers Sudan. Following are the civil wars that had been happened so far: 1.   First Chad Civil War (1965-1979) 2. Second Chad Civil War (1979-1982) 3. Third Chad Civil War (1998-2002) 4. Fourth Chad Civil War (2005-present)   First Chad Civil War (1965-1979) : The First Chadian Civil War started in 1965/66, with riots and insurgency against Chadian president Franà §ois Tombalbayes rule, known for its authoritarianism and distrust of democracy. By January 1962, Tombalbaye had banned all political parties except his own Chadian Progressive Party (PPT), and started immediately concentrating all power in his own hands. His treatment of opponents, real or imagined, was extremely harsh, filling the prisons with thousands of political prisoners. What was even worse was his constant discrimination against the central and northern regions of Chad, where the southern Chadian administrators came to be perceived as arrogant and incompetent. A long civil war began as a tax revolt in 1965 and soon set the Muslim north and east against the southern-led government. Even with the help of French combat forces, the Tombalbaye government was never able to quell the insurgency. Tombalbayes rule became more irrational and brutal, leading the military to carry out a coup on April 13, 1975 (in which Tombalbaye was killed), and to install Gen. Felix Malloum, a southerner, as head of state. In 1978, Malloum government was broadened to include more northerners. Internal dissent within the government led the northern prime minister, Hissà ¨ne Habrà ©, to send his forces against the national army in the capital city of NDjamena in February 1979. The resulting civil war amongst the 11 emergent factions was so widespread that it rendered the central government largely irrelevant. At that point, other African governments decided to intervene. Second Chad Civil War (1979-1982): The Translational Government of National Unity was coalition government of armed group that ruled Chad from the time period between 1979 to1982, during the most chaotic phase of the long running civil war which happened in 1965 to 1979.The GUNT replaced the fragile alliance led by Felix Malloum and Hissene Habre, which was collapsed in February 1979. The characteristics of the GUNT can be find out by the intense rivalries that led to armed confrontations and Libyan intervention in 1980. Libya intervenes in the support of the GUNT President Goukouni Oueddei against the former GUNT Defence Minister Hissà ¨ne Habrà ©. Because of international pressures and uneasy relations between Goukouni and Libyan leader Muammar al-Gaddafi, Goukouni asked the Libyans to leave Chad in November 1981; they were replaced by an Inter-African Force (IAF). The IAF showed itself unwilling to confront Habrà ©s militia, and on June 7, 1982, the GUNT was ousted by Habrà ©; Goukouni fled into exile. A series of four international conferences held first under Nigerian and then Organization of African Unity (OAU) sponsorship attempted to bring the Chadian factions together. At the fourth conference, held in Lagos, Nigeria, in August 1979, the Lagos accord was signed. This accord established a transitional government pending national elections. In November 1979, the National Union Transition Government (GUNT) was created with a mandate to govern for 18 months. Goukouni Oueddei, a northerner, was named President; Colonel Kamougue, a southerner, Vice President; and Habrà ©, Minister of Defense. This coalition proved fragile; in January 1980, fighting broke out again between Goukounis and Habrà ©s forces. With assistance from Libya, Goukouni regained control of the capital and other urban centers by years end. However, Goukounis January 1981 statement that Chad and Libya had agreed to work for the realization of complete unity between the two countries generated intense internationa l pressure and Goukounis subsequent call for the complete withdrawal of external forces. Libyas partial withdrawal to the Aozou Strip in northern Chad cleared the way for Habers forces to enter NDjamena in June. French troops and an OAU peacekeeping force of 3,500 Nigerian, Senegalese, and Zairian troops (partially funded by the United States) remained neutral during the conflict. Third Chad Civil War (1998-2002) The CSNPD, led by Kette Moise and other southern groups entered into a peace agreement with government forces in 1994, which later broke down. Two new groups, the Armed Forces for a Federal Republic (FARF) led by former Kette ally Laokein Barde and the Democratic Front for Renewal (FDR), and a reformulated MDD clashed with government forces from 1994 to 1995. Talks with political opponents in early 1996 did not go well, but Deby announced his intent to hold presidential elections in June. Deby won the countrys first multi-party presidential elections with support in the second round from opposition leader Kebzabo, defeating General Kamougue (leader of the 1975 coup against Tombalbaye). Debbys MPS party won 63 of 125 seats in the January 1997 legislative elections. International observers noted numerous serious irregularities in presidential and legislative election proceedings. By mid-1997 the government signed peace deals with FARF and the MDD leadership and succeeded in cutting off the groups from their rear bases in the Central African Republic and Cameroon. Agreements also were struck with rebels from the National Front of Chad (FNT) and Movement for Social Justice and Democracy in October 1997. However, peace was short-lived, as FARF rebels clashed with government soldiers, finally surrendering to government forces in May 1998. Barde was killed in the fighting, as were hundreds of other southerners, most civilians. Since October 1998, Chadian Movement for Justice and Democracy (MDJT) rebels, led by Yusuf Togoimi until his death in September 2002, have skirmished with government troops in the Tidbits region, resulting in hundreds of civilian, government, and rebel casualties, but little ground won or lost. No active armed opposition has emerged in other parts of Chad, although Kette Moise, following senior postings at the Ministry of Interior, mounted a small scale local operation near Moundou which was quickly and violently suppressed by government forces in late 2000. Deby, in the mid-1990s, gradually restored basic functions of government and entered into agreements with the World Bank and IMF to carry out substantial economic reforms. Oil exploitation in the southern Dobra region began in June 2000, with World Bank Board approval to finance a small portion of a project aimed at transport of Chadian crude through a 1000-km. buried pipeline through Cameroon to the Gulf of Guinea. The project establishes unique mechanisms for World Bank, private sector, government, and civil society collaboration to guarantee that future oil revenues benefit local populations and result in poverty alleviation. Success of the project will depend on intensive monitoring efforts to ensure that all parties keep their commitments. Debt relief was accorded to Chad in May 2001. Fourth Chad Civil War (2005-present): The current civil war in Chad began in December 2005. The conflict involved Chadian government forces and several Chadian rebel groups. These include the United Front for Democratic Change, United Forces for Development and Democracy, Gathering of Forces for Change and the National Accord of Chad. The conflict has also involved the Janjaweed, while Sudan allegedly supported the rebels, while Libya mediated in he conflict, as well as diplomats from other countries. In 2005, Chadian President Idriss Deby changed the constitution so that he could run for a third term in office, which sparked mass desertions from the army. The large-scale desertions from the army in 2004 and 2005, which forced Deby to disband his presidential guard and form a new elite military force, weakened the presidents position and encouraged the growth of armed opposition groups. The Rally for Democracy and Liberation (RDL) was formed in August 2005, and the Platform for Unity, Democracy and Change (SCUD), two months later, to overthrow the current government, accusing it of being corrupt and totalitarian. Later that year, the RDL and SCUD joined six other groups to form the United Front for Democracy and Change (FUCD).The situation was made worse by the alleged accumulation of oil wealth by Deby and his entourage. On 6 January 2006, Janjaweed militants crossed the border from Sudan into Chad and attacked the cities of Borota, Ade, and Moudaina. Nine civilians were killed a nd three were seriously injured.The Chadian government stated, The Sudanese militias attacked the settlements of Borota, Ade, Moudainayesterday killing nine and injuring three among the civilian population The Chadian government once again warns the Sudanese government against any hasty action because aggression by Sudanese militias will not go unpunished for much longer. In February 2007, a coalition of four rebel groups claimed to have taken the eastern border town of Adre. Chad rejected a plan to have U.N. troops along its eastern border. Victims from this attack were documented in the film Google Darfur. In March Former rebel Mahamat Nour Abdelkerim became defence minister. Government said Sudanese Janjaweed militia attacked and destroyed two villages in east Chad. On 26 October 2007, a peace agreement was signed between the government of Chad and four rebel groups: the Movement for Resistance and Change, the National Accord of Chad and two factions of the United Forces for Development and Democracy. In late November 2007, the rebel leader Mahamat Nouri accused Idriss Deby of ordering an attack on his fighters in the east of Chad. The army said on public radio there were several hundred dead and several injured among the Union of Forces for Democracy and Development (UFDD) fighters. Abakar Tollimi, secretary-general of the UFDD, disputed the army toll, saying only 17 rebels were killed. We have killed more than 100 from among the army ranks, he said after the clashes. On 30 November 2007, the UFDD declared a state of war against French and foreign military forces in an apparent warning to EUFOR Chad/CARà ¢Ã¢â€š ¬Ã… ½, comprising 3,700 European Union peacekeeping troops, who should deploy in eastern Chad on a U.N. mission to protect camps housing more than 400,000 Chadian and Sudanese refugees. Steps to be taken to stop the civil war in Chad: The main reason for the first civil war in Chad was the president of the Chad. He can stop those riots but he did not do so. Because he want all the power of Chad in his hand. First of all he should listen the need of the rebel groups. All the talk can be done by the violence but he did not do that. By spreading the violence it would be stopped. Efforts to end the war and resort to peace talks have been made, including by the U.S. government. There have been democratic advances, including the creation of a High Court and a Constitutional Court, the introduction of multi party elections and an increasingly free press. But Chad still remains highly divided along ethnic, cultural, political and regional lines and widespread repression by Debbys security forces continues.

Monday, January 20, 2020

Revenge In The Odyssey :: essays research papers

The Greeks, as portrayed by Homer, are a very vengeful people. Throughout The Odyssey, a theme of vengeance is dominant. These displays of retribution come from different entities for fairly different reasons. So why is revenge such a factor in The Odyssey? Fear and the overwhelming feeling of payback are two answers. Homer gives numerous examples of how certain characters demonstrate their power in a fury of rage. He writes of the payback Zeus gives to those who break the rules, of Poseidon’s hatred towards Odysseus, and of Odysseus’s revenge to those who have dishonored his home.   Ã‚  Ã‚  Ã‚  Ã‚  Zeus is the most powerful of all gods. All the Greeks with sense know not to cross him. A major practice in their culture is to invite in visitors that come to their doorsteps. This practice involves caring for the visitor by bathing and feeding them. After the visitor has been cared for, the host and visitor discuss the lineage of the visitor. This is done with the fear of Zeus and those who don’t follow the practice are dealt with. Those who don’t follow this practice are considered barbarians. Homer gives a clue into the extent of the fear when he writes that Telemakhos was “irked with himself / to think a visitor had been kept their waiting…'; (5). One example in The Odyssey is when Odysseus comes to the home of the Kyklops. Odysseus states:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  “We will entreat you, great Sir, have a care   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  for the gods’ courtesy; Zeus will avenge the unoffending guest'; (153). Kyklops just answers that, “We Kyklopes care not for your thundering Zeus…';(153). This is a big mistake because directly after this statement, the Kyklops eats some of Odysseus’s men. Zeus does avenge the men through Odysseus. Odysseus gets the Kyklops drunk and stabs out his eye, allowing an escape. One thing that is bad for Odysseus, though, is the fact that Kyklops is the son of Poseidon, god of the earthquake. This now spurs a new challenge for Odysseus: he must get home with Poseidon’s obstacles.   Ã‚  Ã‚  Ã‚  Ã‚  Poseidon has never really liked Odysseus. When Odysseus tries to make it onto the shore of Skheria, Poseidon “…calls up wind / from every quarter, and sends a wall of rain…'; (89). Consequently, it is a safe assumption that Poseidon will really have it in for Odysseus. He states, “I thought he should suffer all the way [home]'; (233). After Odysseus returns home, Poseidon talks to Zeus and says he wants to put a mountain ring around the city and crush the ship of the Phaiakians.

Sunday, January 12, 2020

Mobile Query and Processing in Mobile Database Environment

MOBILE QUERY AND PROCESSING IN MOBILE DATABASE ENVIRONMENT Agustinus Borgy Waluyo1 1 Bala Srinivasan1 David Taniar2 School of Computer Science and Software Engineering, Monash University, Australia {Agustinus. Borgy. Waluyo, Bala. Srinivasan}@infotech. monash. edu. au. 2 School of Business Systems, Monash University, Australia David. [email  protected] monash. edu. au Abstract Mobile database is a new context of database application in wireless environment. It introduces unique type of queries, and query-processing strategies that are different to traditional databases. We classify mobile database query into two categories, especially context-awareness query and adhoc query. Context-awareness query is further classified into location dependent, context dependent, and hybrid query. As for the query processing, we define three strategies namely mobile client, on air, and server strategy. Mobile client and on air strategy relates to caching strategy and broadcast strategy respectively. Finally, we include some challenges in mobile databases. 1. Introduction Recent advances in wireless technology have led to mobile computing, a new dimension in data communication and processing. Many predict a new emerging, gigantic market with millions of mobile users carrying small, battery-powered terminal equipped with wireless connection [1,2,10]. The mobile computing environment provides database applications with useful aspects of wireless technology, which is known as mobile databases. This advance technology has created a new age of nomadic database users. Basically, these users are simply accessing a database through a network. However, the network is now applied in wireless environment, and has several novel properties, which include user’s locations are constantly changing, the likelihood of losing connections is much greater than in a traditional network, and asymmetric communication environment in which the wireless bandwidth for uplink communication is smaller than downlink communication [11]. In general, mobile user communicates with a Mobile Base Station (MBS) to carry out any activities such as transaction and information retrieval. MBS has a wireless interface to establish communication with mobile client and it serves a large number of mobile users in a specific region called cell. In mobile environment architecture, each MBS is connected to a fixed network as illustrated in Figure 1(a). Mobile units or mobile clients in each cell can connect to the fixed network via wireless radio, wireless Local Area Network (LAN), wireless cellular, or satellite. Each of the wireless networks provides a different bandwidth capacity. However, the wireless bandwidth is too small as compared to the fixed network such as ATM (Asynchronous Transfer Mode) can provide speed up to 155Mbps [7]. 55 Wireless Network Mobile Base Station Mobile Base Station Wireless Network High speed Wired Network Fixed Host Fixed Host Crossing Crossing Mobile Client Query Query Processing Strategy Data Repository Query Result 2 Mobile Base Station Mobile Base Station Query Taxonomy = Mobile Client = Wireless Network 1 (a) Mobile Environment Architecture (b) Query Application in Mobile Environment Figure 1. Mobile Environment Architecture and Query Processing Figure 1(b) depicts the query processing in mobile databases. Mobile client initiates a query, and retrieve the data from data repository. The data repository is available in the fixed network. The query is transmitted through wireless channel, and the result is obtained using certain query processing strategies. As can be seen in Figure 1b, a sign of number 1, and 2, which is attached in query taxonomy, and query processing strategy respectively, correspond to the main content of this paper. Driven by differences between wired and wireless environment results in differences of type of queries, query processing mechanisms as well as communication technology. It is the aim of this paper to provide comprehensive query taxonomy, and processing strategy in mobile databases. Figure 2 shows a detailed structure of this paper. Subsequent sections in this paper are organized as follows. Section 2 describes query taxonomy in mobile databases. Section 3 contains the query processing strategies, and section 4 discusses some challenges in mobile databases. Finally, section 5 concludes the paper. In this paper, the term mobile client, mobile device, mobile user, user and client are used interchangeably Location D ependent Q ueries C ontext Aw areness Taxonomy C ontext D ependent Q ueries Hybrid Q ueries A d Hoc Q ueries M obile Q uery and Processing M obile C lient Processing Strategy O n Air Server Figure 2. Structure of Paper 56 2. Query Taxonomy In this section, we classify type of queries in mobile databases. The queries can be entirely new and specifically applied in the wireless environment, while the other can be a common type of query in traditional databases. 2. Context Awareness The word ‘context’ implies a variety of aspects. [14] defines the word context into three categories namely computing context, user context, and physical context. Computing context relates to computing resources such as network connectivity, bandwidth, printer, and workstations. User context associates with user’s needs, preferences, roles, profile, and alike. Physical co ntext involves environment issue, which include lighting, noise, traffic, temperature, and humidity. [5] adds another category of context called ‘time context’, which refers to time of a day, week, month, year, etc. 6] defines context as either the aspect of physical world or condition and activities in the virtual world. It is further described that context information can either be transient when the context associates with the environment at a point of time or persistent when the context involves a history of transient context. In simple words, we can always define that context relates to who, when, where, and what. Context awareness creates a new class of applications in mobile computing. With context awareness, mobile device is expected to adapt constantly in a wide range of dynamically and continually changing situations. It is important for the device to be able to aware of the situation, environment, and tasks that the mobile client is performing as well as will be performing in the near future. The utilisation of context information in an application minimises the amount of user involvement in a service by providing related information. Having known the context of the query enables the device to pre-fetch all data that is highly related and likely to be queried in the near future. With this query, client only initiates a single request and all related data will be retrieved implicitly. This technique avoids client to have multiple request that result in energy efficiency. Example: To find restaurants information in current region. The query will result of retrieving restaurants based on user’s preferences such as Italian, Chinese or fast food as well as pre-fetching maps, traffic and weather condition, which is likely to be queried next. Most applications have been focusing on location awareness rather than context awareness as a whole. Thus, we classify mobile database queries into location dependent queries, context dependent queries, and the combination thereof. 2. 1. Location Dependent Queries Location dependent query is a class of queries that are motivated by mobile clients. In this type of query, the location of the mobile client is a parameter of the query. The value of the location parameter can be provided by the client or a global positioning system (GPS). An example of this query is a traveler’s information system that provides information on hotels, restaurant, bars and the like, to motorists. Processing of queries must be based on knowledge of the user’s location. For queries services that are ahead of the current route, direction of motion and speed are necessary to be taken into account. Recent technology provides a new feature in automobiles, which offers 57 navigational aids as a built-in feature. In general, each location updates generate two direct costs, particularly transmission cost, which refers to the cost to inform the server of the new location, and server processing cost, which corresponds to the cost of updating the system containing the location of the mobile unit. The location parameter can be in any objects, such as taxis, trucks, and helicopters. This class of query can be further classified into two categories: (i) Continuous query, and (ii) On-demand query. Continuous query The continuous type of query includes real-time monitoring of mobile objects. This is different compared with conventional queries, which are based on an instant of the database at some moment in time. Real-time monitoring queries are continuous for monitoring purposes [3, 13]. Examples: (i) To request information about nearby tourist attractions, hotels, or shopping center while traveling. With this type of query, users only need to send a query once and notification of the updated information about nearby tourist attractions, hotels, or shopping center will be sent automatically as they move to different regions. ii) This query also helps tourists whenever they are close to a certain situation such as dangerous zone or traffic jam by providing some alerts to mobile user. Figure 3 shows an illustration of real-time query monitoring. In this application, the system must be able to provide the accurate query results and update them in real time whenever some mobile cl ients enters or exits the region defined by the query. This class of query can be referred as range-monitoring queries. The range-monitoring queries are removed from the system only when the user explicitly ends the query. Server End Query Query i Response i New Region Updated response i Region 1 Mobile Client 1 Moves to Region 2 Mobile Client 1 Figure 3. Continuous Query On demand query The on demand location dependent query is different from continuous query in a way that its database management does not manage the query but only the location of each mobile units in specified regions. Figure 4 illustrates on demand query. Every mobile unit is registered under one location server that manages the user profiles and is called the home location server. Location information of mobile clients can be stored at predefined sites like the user’s home location server in a network. Consequently, the search space for a user’s location can be reduced. However, when a mobile user crosses any boundaries of a cell, the information at the predefined site has to be updated accordingly. This type of query does not have to specify when to end the query since the server does not keep the query but the location [12]. Examples: To retrieve nearby hospital, police station or petrol station in the area. 58 Server Q uery i R esponse i Q uery j R esponse j Region 1 M obile C lien t 1 M oves to Region 2 M obile C lien t 1 Figure 4. On Demand Query When the parameter is an object, and mobile client requests an object that satisfies location criteria, then the situation becomes different. Figure 5 illustrates on demand query with location object parameter [8,15]. Examples: (i) Taxi operator wants to see how many free taxis are currently in a certain region. They can find free taxis and allocate them to another region that require more taxis or send them directly to the nearby customer. (ii) Tourists who come to the country, where there are no designated bus’ stops, nor timetable. They can utilize mobile device to retrieve incoming buses within a pre-defined time. Server Object Query Object Result Location Tracking Location Info Mobile Client Object Figure 5. On Demand Query with Location Object Parameter 2. 1. 2 Context Dependent Queries This type of query requires maintenance of an internal representation of user’s needs, preferences, roles, profile, etc. With these parameters, application will be able to decide the situation and task that a user is currently performing, and adapt to change of user needs and roles. This enables mobile device not to just retrieve the required information but also some other information that is highly relevant [6,8]. Examples: (i) Tourist wants to see list of restaurants in a town. Rather than retrieving the entire list of restaurants, the query retrieves the restaurants based on user’s preferences and need such as cuisine preference, price, occasion, etc. (ii) A business person wants to check the closest meeting schedule. The query retrieves the time as well as previous history of the meeting, people involved, client accounts, meal preferences, required data, etc. 9 2. 1. 3 Hybrid Queries Hybrid queries represent a combination of location dependent and context dependent queries. This type of query requires the system to maintain all parameters of context-awareness queries including location parameter. Examples: (i) A Traveler wants to find restaurants in the region that he/she will enjoy and within 10 minutes of current travel distance, (ii) A teenager wa nts to check movies in the nearby cinemas that he/she will like, and the show time can be met while considering current travel distance. These queries are very useful for nomadic users since it not only considers the users’ preferences and needs but also the location of the user. More sophisticated application utilizes a variety of sensors to monitor the environment as well as user’s action in order to provide assistance of the tasks being performed by the user. This application requires the ability to process data streams in real-time, analyze and interpret it precisely. The main point in context awareness query is to accurately analyze the environment and user’s intention, regardless of where the context information is obtained from. It is a difficult challenge since there is a possibility of conflicting data, and the need to have efficient processing to provide a useful application to the user. 2. 2 Ad Hoc Queries Ad Hoc queries are commonly utilised queries in traditional DBMS. This type of query explicitly mentions the required information in the query statement, and does not involve any context awareness information. Thus, the query result is only based on the actual query itself. Examples: (i) University student wants to retrieve his/her academic record or personal details. ii) Travelling sales person inquires about product availability, price, etc. 3. Query Processing Strategy We divide query-processing strategy for mobile databases into three parts, namely: (i) mobile/client strategy, (ii) on-air strategy and, (iii) server strategy. Mobile/clients strategy relates to how client manipulates and maintains the data in its cache efficiently and effectively. On-air strategy corresponds to data broadcasting stra tegies. With this strategy, the number of mobile users does not affect the query performance. Server strategy relates to designing techniques for the server to accommodate multiple requests so that the request can be processed as efficiently as possible. We claim that query processing for mobile databases is very much centered around the issues of caching, broadcasting, and scheduling. Figure 6 shows the architecture of query processing in mobile databases. 60 C Strategies lient OA n ir Strategies Server Strategies Figure 6. Query Processing in Mobile databases 3. 1 Mobile Client Strategy Mobile client’s strategy defines a number of strategies to maintain cached data items in clients’ local storage. As stated earlier, wireless communication channel in general suffers to narrow bandwidth while it is also inherently asymmetric communication, in which the downstream communication bandwidth from a server to the mobile client is much larger than the upstream communication bandwidth from clients back to server. Due to the above reason, caching of frequently accessed data items in a client’s local storage becomes important for enhancing the performance and data availability of data access queries. Another advantage of caching is the ability to handle fault tolerance. This is related to the characteristics of mobile computing in which each mobile client connects or disconnects from the network frequently. In some situation, the MBS may not be accessible due to problem like signal distortion. However, a query can still be partially processed from caches and at least some of the query results can be returned to the user [9]. Three main issues characterize a caching mechanism. These issues include caching granularity, caching coherence strategy, and caching replacement policy. Caching granularity relates to determining a physical form of cached data items. Caching coherence strategy or invalidation strategy involves cache invalidation and update schemes to invalidate and update an out-dated cached item [4]. Caching replacement policy is needed to retain the frequently accessed database items in a client’s local storage. The more effective a caching replacement policy in keeping the frequently accessed items, the better a query will perform and the more queries could be served during disconnection situation. 3. On Air Strategy In this scheme, the server periodically broadcasts the frequently accessed data items to clients through one or more broadcast channels, but the clients may not cache the data item of interest. This situation might occur when the client does not have enough memory or space to cache the required data. The behavior of this channel is unidirectional which means the server disseminates a set of data periodically, via this type of c hannel to a multiple number of users. A complete broadcast file is referred as a broadcast cycle. In this scheme, the client needs to listen to channel and filter the required data over the channel, which is also generally known as push-mechanism. Figure 7 shows on air query processing. 61 The advantage of broadcasting channel is its scalability. The number of users in the cell and the request rate do not affect the performance of the server. Thus, the utilization of bandwidth is better and the server workload is lower as compared with point to point/on-demand communication. Consequently, the power utilization of the client to retrieve information is also improved. However, it is very important to have good strategies to maintain the overall response time of the client to obtain information from the channel or else the advantages of data broadcast will be diminished. B ro ad cast C h an n el = listen in g to th e chan n el = retriev in g th e d esired data M o bile C lie nt Figure 7. On Air Query Processing 3. 3 Server Strategy This strategy considers the problem of pull-based broadcast scheduling where mobile clients send queries to the server through dedicated or point-to-point channel, server process the query, and send the result back to the client. The strategy concerns with broadcast and disk scheduling. Broadcast scheduling is to determine how queries to be served efficiently in the server considering a number of factors such as the length of the query, the wait time and the popularity of the items. Data scheduling is related to how data is placed on the disk that improves the query response time. The possibility of combining these two methods for query processing strategy is an interesting issue to be explored. B road cast server C ach e S erver D isk S erver T r a n sm itte r S erver Figure 8. Broadcast Server Architecture A database server is able to enhance the data retrieval performance by incorporating its own main memory and cache to store those database items frequently accessed by most mobile clients. Figure 62 8 shows architecture of broadcast server. A query can be processed either in the disk server or cache server. If the relevant data items have been retrieved earlier then the query is processed in the cache server. After processing a query, the results are transmitted to the transmitter queue, which subsequently send the data items through the wireless channel. 4. Challenges in Mobile Databases This section discusses some challenges in mobile database environment. The general concept that has been outlined in this paper contains an enormous issue to investigate. However, due to the limitation of page, only a few numbers can be mentioned. Location management is an important issue in mobile database research. Since the number of user population carrying mobile devices increases linearly with the service demand, the communication traffic for locating users also increases accordingly. This situation requires an efficient strategy for location tracking and management. Location management is a very essential factor in providing context awareness services. Context security introduces a new issue to be considered. Since context information may contain a very confidential and private data. It is necessary to ensure privacy issue protection for every user in a network. Caching management strategy, which includes caching granularity, caching coherent issue, and caching replacement strategy, requires a thorough investigation. A good caching management strategy is able to analyse, predict, and adapt to changing of user’s context in order to assist user in performing tasks. As for processing issue, data caching in mobile databases enable clients to obtain a high computing speed as server, by involving a much smaller data items volume. The asymmetric communication in mobile environment has made it a better reason to employ caching strategy. Broadcast scheduling is another issue to investigate. Generally, the more number of data to be broadcast, the more requests will be served from the data broadcast and this will reduce the chance of mobile clients to send the request to the server. However, at a certain point the advantage of the broadcast data will be diminished if there is too many data in the roadcast cycle. Consequently, it will severely affect the query response time since mobile users have to wait for considerably long delay before they receive the desired data. Therefore, it is essential to decide what data to be broadcast that serves most of the requests since the query access pattern is changed dynamically. 5. Conclusions Recent emergence of w ireless technology enables people to conduct activities, business, or transactions anywhere and anytime without any attachment to stationary computer like used to be. Nomadic people are now able to access email, news, weather, and query to the central database server using wireless devices. Mobile database focuses on the query issue that is the dominant operation in mobile computing. Since mobile database is a new dimension of database application, the type of query, query processing strategy, and communication technology that involves in the application are different than what applies in traditional databases. We have defined query taxonomy as well as query processing strategy in mobile databases. Query in mobile databases are categorized into context-awareness query and ad-hoc query. Context- 63 awareness query is further classified into location dependent, context dependent, and hybrid query. Query processing in mobile databases includes mobile client, on air, and server strategy. Mobile client and on air strategy corresponds to caching strategy and broadcast strategy respectively. Finally, we discuss a few challenges that open enormous opportunities for research in mobile databases. 6. References 1. 2. 3. 4. 5. 6. 7. 8. 9. ACHARYA S. , ALONSO R. , FRANKLIN M. AND ZDONIK S. Broadcast Disks: Data Management for Asymmetric Communication Environments, Proceedings of ACM Sigmod, pp. 199-210, May, 1995. BARBARA D. , Mobile Computing and Databases-A Survey, IEEE TKDE, 11(1):108-117, January/February, 1999. CAI Y. AND HUA K. A. , An Adaptive Query Management Technique for Real-Time Monitoring of Spatial Regions in Mobile Database Systems, 21st IEEE IPCCC, pp. 259-266, 2002. CHAN B. Y. , SI A. and Leong H. V. , Cache Management for Mobile Databases: Design and Evaluation, Proceedings of the International Conference on Data Engineering (ICDE), pp. 4-63, 1998. CHEN G. AND KOTZ D. , A Survey of Context-Aware Mobile Computing Research, Technical Report TR2000381, Department of Computer Science, Dartmouth College, November, 2000. EBLING R. M. , HUNT H. D. G. AND LEI H. , Issues for Context Services for Pervasive Computing, Proceedings of Middleware’01 Advanced Workshop on Middleware for Mobile Computing, Heidelberg, November, 2001. ELMASRI R. AND NAVATHE S. B. , Fundamentals of Database Systems, 3’rd Edition, Addison W. , U. S. A. , 2000. FRANKLIN J. M. , Challenges in Ubiquitous Data Management, Informatics, pp. 4-33, 2001. GODFREY P. AND GRYZ J. , Semantic Query Caching for Heterogeneous Databases, Proceedings of the 4th Knowledge Representation meets Databases Workshop (KRDB), pp. 61-66, April, 1997. 10. IMIELINSKI T. AND VISWANATHAN S. , Adaptive Wireless Information Systems, Proceedings of SIGDBS (Special Interest Group in Database Systems) Conference, pp. 19-41, October, 1994. 11. IMIELINSKI T. , VISWANATHAN S. AND BADRINATH B. R. , Data on Air: Organisation and Access, IEEE TKDE, 19(3): 353-371, May/June, 1997. 12. KOTTKAMP H. -E. AND ZUKUNFT O. Location-Aware Query Processing in Mobile Database Systems, ACM Symposium on Applied Computing, pp. 416-423, February, 1998. 13. KUBACH U. AND ROTHERMEL K. , A Map-Based Hoarding Mechanism for Location-Dependent Information, Proceedings of Second Mobile Data Management (MDM), pp. 145-157, January, 2001. 14. SCHILIT B. , ADAMS N. AND WANT R. , Context-Aware Computing Applications, Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pp. 85-90, December, 1994. 15. WOLFSON O. , ET AL, Databases for Tracking Mobile Units in Real Time, Proceedings of ICDT’99, pp. 169186, 1998. 64