Read Case Study 5.1. Answer Questions 1, 2, and 3 at the end of Case Study 5.1.
Each question should be answered in an essay format of approximately 300 words. Ensure your paper answers the questions and uses concepts studied in the module and from the reading. Support your answers with personal experiences, current events, and references to the reading.
Use the library to locate four to six scholarly sources to support your analysis.
Prepare this assignment according to the APA guidelines.
This work has to be 100% original turnitin will be use
From the start of the U.S. invasion of Iraq in March 2003, a small group of American officers thought the plan for prosecuting the war was counterproductive and that, with a better plan, the war still might be won. These officers believed that the U.S. military had forgotten the experiences of Vietnam and had been training for something resembling World War II—not counterinsurgency warfare or low-intensity warfare. The generals never expected to fight a guerrilla insurgency in Iraq; and once it began, they concentrated almost entirely on killing and capturing as many insurgents as possible. So, villages were surrounded, doors kicked down, and scores of suspects apprehended. These practices alienated Iraqi civilians and produced new recruits for the insurgency.
By the summer of 2006, Iraq was in a state of anarchy. In Baghdad, 50 people were being kidnapped every day, often by the police. Increasingly, the kidnappers’ targets were children, fewer and fewer of whom were being allowed by their parents to venture outside. Once snatched, the victims were typically offered for sale to one of the many kidnapping gangs. The violence in Iraq was not random but had specific purposes and specific causes. Al Qaeda sought to start a full-scale sectarian war between the Sunnis and Shiites, believing such a war was their only hope of victory. To this end, that terrorist
group unleashed suicidal attacks on Shiite civilians, hoping to provoke a backlash and a wider conflict. Indeed, Al Qaeda was increasingly taking over all of Sunni society.
In the first two years of the war, the country’s Shiite leadership had held its fire in the face of the Sunni onslaught. Then came the elections in December 2005 that brought to power a Shiite dominated government. Now, Iraq’s new leaders were determined to crush the Sunni insurrection at any cost. Police and paramilitary units were turned loose in the Sunni neighborhoods, where they began massacring military-age men. In the face of all this, the Americans decided to back away. From the summer of 2004 onward,
The objective of the American strategy was less the defeat of the Sunni insurrection than the training and equipping of Iraqis to fight it for them. “As they stand up, we will stand down,” President Bush was fond of saying. Iraq security forces had grown in quantity if not in quality and were taking over larger and larger pieces of the war. It was difficult in the summer of 2 ...
Books of The TimesFrom Planning to Warfare to Occupation, How Ir.docxhartrobert670
Books of The Times
From Planning to Warfare to Occupation, How Iraq Went Wrong
Top of Form
Bottom of Form
By MICHIKO KAKUTANI
The New York Times, July 25, 2006
The title of this devastating new book about the American war in Iraq says it all: “Fiasco.” That is the judgment that Thomas E. Ricks, senior Pentagon correspondent for The Washington Post, passes on the Bush administration’s decision to invade Iraq and its management of the war and the occupation. And he serves up his portrait of that war as a misguided exercise in hubris, incompetence and folly with a wealth of detail and evidence that is both staggeringly vivid and persuasive.
Chip Somodevilla/Getty Images, for Meet the Press
Thomas E. Ricks
FIASCO
The American Military Adventure in Iraq
By Thomas E. Ricks
482 pages. The Penguin Press. $27.95.
By virtue of the author’s wealth of sources within the American military and the book’s comprehensive timeline (beginning with the administration’s inflammatory statements about Saddam Hussein in the wake of 9/11, through the invasion and occupation, to the escalating religious and ethnic strife that afflicts the country today), “Fiasco” is absolutely essential reading for anyone interested in understanding how the United States came to go to war in Iraq, how a bungled occupation fed a ballooning insurgency and how these events will affect the future of the American military. Though other books have depicted aspects of the Iraq war in more intimate and harrowing detail, though other books have broken more news about aspects of the war, this volume gives the reader a lucid, tough-minded overview of this tragic enterprise that stands apart from earlier assessments in terms of simple coherence and scope.
“President George W. Bush’s decision to invade Iraq in 2003 ultimately may come to be seen as one of the most profligate actions in the history of American foreign policy,” Mr. Ricks writes. “The consequences of his choice won’t be clear for decades, but it already is abundantly apparent in mid-2006 that the U.S. government went to war in Iraq with scant solid international support and on the basis of incorrect information — about weapons of mass destruction and a supposed nexus between Saddam Hussein and Al Qaeda’s terrorism — and then occupied the country negligently. Thousands of U.S. troops and an untold number of Iraqis have died. Hundreds of billions of dollars have been spent, many of them squandered. Democracy may yet come to Iraq and the region, but so too may civil war or a regional conflagration, which in turn could lead to spiraling oil prices and a global economic shock.”
Much of the material dealing with the time just before the war has been chronicled in earlier books (not to mention an outpouring of newspaper and magazine articles), but Mr. Ricks provides a succinct narrative that emphasizes how this period “laid the shaky foundation for the derelict occupation that followed.” He reminds us that when it came to the threa ...
This research analyzes the sectarian violence that was an end product of the destruction of the golden dome of the mosque of al-Askari on February 22nd, 2006 and the effectiveness of US military responses to that event. According to many policy think tanks, the destruction of the golden dome was simply a catalyst of sectarian strife of an unexplained origin.i This on-the-spot characterization of the mosque bombing as an igniter of sectarian warfare does not give justice to the deep historical nature of the religious complexities of the violence which the bombing caused; any violent event of equivalent magnitude (a similar attack at Karbala or Najaf for example) would have spurred similar reactions.
Instead this study of an effective counterinsurgency theory will utilize primary sources such as interviews from ex-military personnel, Iraqi weblogs composed around the year 2006 and recent scholarly works concerning counterinsurgency theory and tactics (such as FM 3-24) in order to better frame the issue on why the mosque bombing had such violent responses and an explanation on how the US responded (in Baghdad). Contrary to common viewpoint that the mosque bombing in Samarra was the source of sectarian violence in Iraq, it was simply an event in a larger mosaic that comprises the history of Islamic sectarian conflict in Iraq, the endgame of which is currently out of reach.
This study also addresses the shortcomings of conventional thinking (as evidence by veteran interviews) that the regular military operates under when it comes to post-invasion standard operating procedures in the months preceding the mosque bombing in Samarra and after it. These interviews will address the fact that in order to combat sectarian violence in Iraq, the occupying force must work in tandem with local security forces focusing on the desires of the population. The operations that will be analyzed (and taken into context within the veteran interviews and Iraqi weblogs) are those that were conducted in the city of Baghdad due to the city’s near resemblance of the ethnic composition of Iraq and the socio-political importance that the city holds on Iraq’s national stage.
The findings of research concluded that there were several factors that were present in Baghdad during the months after the mosque bombing that influenced the feelings of the population and the response of US forces. These factors include (but are not limited to): the perception of al Qaeda to occupying forces and local inhabitants, the influence of Iran with regards to sectarian groups and Sunni and Shiite relations. This research advocates that standard operating procedures need to be replaced with unconventional strategy and tactics (akin to Special Forces, for example) which tends to be more population-centric when dealing with known and unknown challenges.
The Decision to Go to War with Iraq James P. Pfiffner .docxmehek4
The Decision to Go to War with Iraq
James P. Pfiffner
prepared for
Public Administration: Concepts and Cases, 8th edition
edited by Richard J. Stillman II
In order to understand how the United States decided to go to war with Iraq, it is
necessary to go back to the Gulf War of 1991. When Saddam Hussein invaded Kuwait
in 1990, President George H.W. Bush assembled a broad international coalition to
confront Saddam and throw his troops out of Kuwait. After a buildup of nearly half a
million troops in the area and a bombing campaign, U.S. ground forces were able to
defeat the Iraqis in just 100 hours. As U.S. troops drove the Iraqis out of Kuwait,
President Bush made the decision not to slaughter the retreating Iraqi troops on the
““highway of death”” from Kuwait City back to Basra in Iraq. More importantly, the
president decided not to invade and occupy Iraq.
To have done so would have exceeded the U.N. mandate and would have moved
well beyond the coalition’’s support and the U.S. military mission. President Bush and
his assistant for national security affairs, Brent Scowcroft, put it this way:
Trying to eliminate Saddam, extending the ground war into an occupation of Iraq,
would have violated our guideline about not changing objectives in midstream,
engaging in ““mission creep,””. . . .We would have been forced to occupy
Baghdad and, in effect, rule Iraq. The coalition would instantly have collapsed,
the Arabs deserting it in anger and other allies pulling out as well. Under those
circumstances, there was no viable ““exit strategy”” we could see. . . . Had we
gone the invasion route, the United States could conceivable still be an occupying
power in a bitterly hostile land.
President George H.W. Bush’’s restraint in limiting the coalition’’s military victory to
driving the Iraqi army out of Kuwait without completely destroying it and invading Iraq
was to come under considerable criticism from a group of public figures and defense
intellectuals known as neoconservatives (neocons).
This loosely connected group of critics of U.S. defense policy believed that the
decision not to remove Saddam Hussein was a profound mistake. The neocons organized
““The Project for the New American Century,”” and published a ““Statement of
Principles”” in 1997. The statement noted that the United States was the sole remaining
superpower, and advocated an assertive U.S. foreign policy and increased defense
spending in order to ““accept responsibility for America’’s unique role in preserving and
extending an international order friendly to our security, our prosperity, and our
principles.”” In 1998 the organization wrote an open letter to President Clinton arguing
that Saddam’’s Iraq was a major threat to the United States and a destabilizing force in
the Middle East. They stated that U.S. national security strategy ““should aim, above all,
at the removal of Saddam Hussein’’s regime ...
RAND Corporation Chapter Title The U.S. Invasion of .docxaudeleypearl
RAND Corporation
Chapter Title: The U.S. Invasion of Iraq, 2003
Book Title: Blinders, Blunders, and Wars
Book Subtitle: What America and China Can Learn
Book Author(s): David C. Gompert, Hans Binnendijk and Bonny Lin
Published by: RAND Corporation. (2014)
Stable URL: https://www.jstor.org/stable/10.7249/j.ctt1287m9t.21
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
RAND Corporation is collaborating with JSTOR to digitize, preserve and extend access to
Blinders, Blunders, and Wars
This content downloaded from 80.227.100.60 on Sun, 03 Nov 2019 12:25:27 UTC
All use subject to https://about.jstor.org/terms
161
ChAPter FOUrteen
The U.S. Invasion of Iraq, 2003
States like [Iraq, Iran, and North Korea] and their terrorist allies constitute an axis of
evil. . . . By seeking weapons of mass destruction, these regimes pose a grave and growing
danger. . . . I will not wait on events while dangers gather.
—President George W. Bush, State of the Union, January 29, 2002
For us, war is always the proof of failure and the worst of solutions, so everything must
be done to avoid it.
—President Jacques Chirac to a joint session of the French and German parlia-
ments, January 2003
Dividends of Misjudgment
President George W. Bush’s decision to invade Iraq on March 20, 2003, was not a
blunder on the scale of those of Napoleon, Hitler, and Tojo.1 There was a case to be
made on several grounds for operations against Saddam Hussein. The initial phase of
combat was highly successful, and some still argue that the American investment was
worth the cost of toppling the Saddam regime. Bush was reelected in November of
2004 as much because of as despite his invasion of Iraq. His subsequent 2007 decision
to launch the “surge” did limit some of the damage.
The main premise for the war was that Saddam had weapons of mass destruction
(WMDs) and that these were at risk of falling into the hands of terrorists. In the end,
however, there were no such weapons, and Saddam’s links to al Qaeda were unproven.2
This robbed the invasion of legitimacy. The insurgency that ensued after initial combat
operation robbed the invasion of success. Today, the United States has less influence
in Baghdad than Iran does. Iraq is a Shia-dominated state with an alienated Sunni
minority, rampant violence, and virtually no control over the Kurdish north. At least
134,000 Iraqis died as a direct result of the American invasion, and the violence there
continues.
This content downloaded from 80.227.100.60 on Sun, 03 Nov 2019 12:25:27 UTC
Al ...
Books of The TimesFrom Planning to Warfare to Occupation, How Ir.docxhartrobert670
Books of The Times
From Planning to Warfare to Occupation, How Iraq Went Wrong
Top of Form
Bottom of Form
By MICHIKO KAKUTANI
The New York Times, July 25, 2006
The title of this devastating new book about the American war in Iraq says it all: “Fiasco.” That is the judgment that Thomas E. Ricks, senior Pentagon correspondent for The Washington Post, passes on the Bush administration’s decision to invade Iraq and its management of the war and the occupation. And he serves up his portrait of that war as a misguided exercise in hubris, incompetence and folly with a wealth of detail and evidence that is both staggeringly vivid and persuasive.
Chip Somodevilla/Getty Images, for Meet the Press
Thomas E. Ricks
FIASCO
The American Military Adventure in Iraq
By Thomas E. Ricks
482 pages. The Penguin Press. $27.95.
By virtue of the author’s wealth of sources within the American military and the book’s comprehensive timeline (beginning with the administration’s inflammatory statements about Saddam Hussein in the wake of 9/11, through the invasion and occupation, to the escalating religious and ethnic strife that afflicts the country today), “Fiasco” is absolutely essential reading for anyone interested in understanding how the United States came to go to war in Iraq, how a bungled occupation fed a ballooning insurgency and how these events will affect the future of the American military. Though other books have depicted aspects of the Iraq war in more intimate and harrowing detail, though other books have broken more news about aspects of the war, this volume gives the reader a lucid, tough-minded overview of this tragic enterprise that stands apart from earlier assessments in terms of simple coherence and scope.
“President George W. Bush’s decision to invade Iraq in 2003 ultimately may come to be seen as one of the most profligate actions in the history of American foreign policy,” Mr. Ricks writes. “The consequences of his choice won’t be clear for decades, but it already is abundantly apparent in mid-2006 that the U.S. government went to war in Iraq with scant solid international support and on the basis of incorrect information — about weapons of mass destruction and a supposed nexus between Saddam Hussein and Al Qaeda’s terrorism — and then occupied the country negligently. Thousands of U.S. troops and an untold number of Iraqis have died. Hundreds of billions of dollars have been spent, many of them squandered. Democracy may yet come to Iraq and the region, but so too may civil war or a regional conflagration, which in turn could lead to spiraling oil prices and a global economic shock.”
Much of the material dealing with the time just before the war has been chronicled in earlier books (not to mention an outpouring of newspaper and magazine articles), but Mr. Ricks provides a succinct narrative that emphasizes how this period “laid the shaky foundation for the derelict occupation that followed.” He reminds us that when it came to the threa ...
This research analyzes the sectarian violence that was an end product of the destruction of the golden dome of the mosque of al-Askari on February 22nd, 2006 and the effectiveness of US military responses to that event. According to many policy think tanks, the destruction of the golden dome was simply a catalyst of sectarian strife of an unexplained origin.i This on-the-spot characterization of the mosque bombing as an igniter of sectarian warfare does not give justice to the deep historical nature of the religious complexities of the violence which the bombing caused; any violent event of equivalent magnitude (a similar attack at Karbala or Najaf for example) would have spurred similar reactions.
Instead this study of an effective counterinsurgency theory will utilize primary sources such as interviews from ex-military personnel, Iraqi weblogs composed around the year 2006 and recent scholarly works concerning counterinsurgency theory and tactics (such as FM 3-24) in order to better frame the issue on why the mosque bombing had such violent responses and an explanation on how the US responded (in Baghdad). Contrary to common viewpoint that the mosque bombing in Samarra was the source of sectarian violence in Iraq, it was simply an event in a larger mosaic that comprises the history of Islamic sectarian conflict in Iraq, the endgame of which is currently out of reach.
This study also addresses the shortcomings of conventional thinking (as evidence by veteran interviews) that the regular military operates under when it comes to post-invasion standard operating procedures in the months preceding the mosque bombing in Samarra and after it. These interviews will address the fact that in order to combat sectarian violence in Iraq, the occupying force must work in tandem with local security forces focusing on the desires of the population. The operations that will be analyzed (and taken into context within the veteran interviews and Iraqi weblogs) are those that were conducted in the city of Baghdad due to the city’s near resemblance of the ethnic composition of Iraq and the socio-political importance that the city holds on Iraq’s national stage.
The findings of research concluded that there were several factors that were present in Baghdad during the months after the mosque bombing that influenced the feelings of the population and the response of US forces. These factors include (but are not limited to): the perception of al Qaeda to occupying forces and local inhabitants, the influence of Iran with regards to sectarian groups and Sunni and Shiite relations. This research advocates that standard operating procedures need to be replaced with unconventional strategy and tactics (akin to Special Forces, for example) which tends to be more population-centric when dealing with known and unknown challenges.
The Decision to Go to War with Iraq James P. Pfiffner .docxmehek4
The Decision to Go to War with Iraq
James P. Pfiffner
prepared for
Public Administration: Concepts and Cases, 8th edition
edited by Richard J. Stillman II
In order to understand how the United States decided to go to war with Iraq, it is
necessary to go back to the Gulf War of 1991. When Saddam Hussein invaded Kuwait
in 1990, President George H.W. Bush assembled a broad international coalition to
confront Saddam and throw his troops out of Kuwait. After a buildup of nearly half a
million troops in the area and a bombing campaign, U.S. ground forces were able to
defeat the Iraqis in just 100 hours. As U.S. troops drove the Iraqis out of Kuwait,
President Bush made the decision not to slaughter the retreating Iraqi troops on the
““highway of death”” from Kuwait City back to Basra in Iraq. More importantly, the
president decided not to invade and occupy Iraq.
To have done so would have exceeded the U.N. mandate and would have moved
well beyond the coalition’’s support and the U.S. military mission. President Bush and
his assistant for national security affairs, Brent Scowcroft, put it this way:
Trying to eliminate Saddam, extending the ground war into an occupation of Iraq,
would have violated our guideline about not changing objectives in midstream,
engaging in ““mission creep,””. . . .We would have been forced to occupy
Baghdad and, in effect, rule Iraq. The coalition would instantly have collapsed,
the Arabs deserting it in anger and other allies pulling out as well. Under those
circumstances, there was no viable ““exit strategy”” we could see. . . . Had we
gone the invasion route, the United States could conceivable still be an occupying
power in a bitterly hostile land.
President George H.W. Bush’’s restraint in limiting the coalition’’s military victory to
driving the Iraqi army out of Kuwait without completely destroying it and invading Iraq
was to come under considerable criticism from a group of public figures and defense
intellectuals known as neoconservatives (neocons).
This loosely connected group of critics of U.S. defense policy believed that the
decision not to remove Saddam Hussein was a profound mistake. The neocons organized
““The Project for the New American Century,”” and published a ““Statement of
Principles”” in 1997. The statement noted that the United States was the sole remaining
superpower, and advocated an assertive U.S. foreign policy and increased defense
spending in order to ““accept responsibility for America’’s unique role in preserving and
extending an international order friendly to our security, our prosperity, and our
principles.”” In 1998 the organization wrote an open letter to President Clinton arguing
that Saddam’’s Iraq was a major threat to the United States and a destabilizing force in
the Middle East. They stated that U.S. national security strategy ““should aim, above all,
at the removal of Saddam Hussein’’s regime ...
RAND Corporation Chapter Title The U.S. Invasion of .docxaudeleypearl
RAND Corporation
Chapter Title: The U.S. Invasion of Iraq, 2003
Book Title: Blinders, Blunders, and Wars
Book Subtitle: What America and China Can Learn
Book Author(s): David C. Gompert, Hans Binnendijk and Bonny Lin
Published by: RAND Corporation. (2014)
Stable URL: https://www.jstor.org/stable/10.7249/j.ctt1287m9t.21
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
RAND Corporation is collaborating with JSTOR to digitize, preserve and extend access to
Blinders, Blunders, and Wars
This content downloaded from 80.227.100.60 on Sun, 03 Nov 2019 12:25:27 UTC
All use subject to https://about.jstor.org/terms
161
ChAPter FOUrteen
The U.S. Invasion of Iraq, 2003
States like [Iraq, Iran, and North Korea] and their terrorist allies constitute an axis of
evil. . . . By seeking weapons of mass destruction, these regimes pose a grave and growing
danger. . . . I will not wait on events while dangers gather.
—President George W. Bush, State of the Union, January 29, 2002
For us, war is always the proof of failure and the worst of solutions, so everything must
be done to avoid it.
—President Jacques Chirac to a joint session of the French and German parlia-
ments, January 2003
Dividends of Misjudgment
President George W. Bush’s decision to invade Iraq on March 20, 2003, was not a
blunder on the scale of those of Napoleon, Hitler, and Tojo.1 There was a case to be
made on several grounds for operations against Saddam Hussein. The initial phase of
combat was highly successful, and some still argue that the American investment was
worth the cost of toppling the Saddam regime. Bush was reelected in November of
2004 as much because of as despite his invasion of Iraq. His subsequent 2007 decision
to launch the “surge” did limit some of the damage.
The main premise for the war was that Saddam had weapons of mass destruction
(WMDs) and that these were at risk of falling into the hands of terrorists. In the end,
however, there were no such weapons, and Saddam’s links to al Qaeda were unproven.2
This robbed the invasion of legitimacy. The insurgency that ensued after initial combat
operation robbed the invasion of success. Today, the United States has less influence
in Baghdad than Iran does. Iraq is a Shia-dominated state with an alienated Sunni
minority, rampant violence, and virtually no control over the Kurdish north. At least
134,000 Iraqis died as a direct result of the American invasion, and the violence there
continues.
This content downloaded from 80.227.100.60 on Sun, 03 Nov 2019 12:25:27 UTC
Al ...
According to Davenport (2014) social media and health care are c.docxmakdul
According to Davenport (2014) social media and health care are collaborating in meeting the needs of health care providers and patients. Social media is taking a step towards focusing on an analytic model to evaluate the value of social media in healthcare. For this assignment you research and investigate the areas of social media that might embrace and benefit from an analytic model combining acquired data and value-based analytics. You will then evaluate the resource addressing the following points:
· Five major stakeholder roles of social media—patients, physicians (and other outpatient care), hospitals, payers (employers, health plans), and health information technology (IT)
· Will social media improve a practice? How so? Provide a thorough rationale.
· Provide a conclusion with the main points .
format:
· Must be two to four
· Must use at least three scholarly sources
.
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
According to (Fatehi, Gordon & Florida, N.D.) theoretical orientation represent styles of mind for understanding reality. This theoretical orientation can be organized as a continuum from theoretical constructs that are independent and concrete as with the Behavioral/ CBT theories, to theoretical constructs that are interdependent and abstract as with the Psychodynamic theories (Fatehi, Gordon & Florida, N.D.). Family systems and Humanistic/Existential are theoretical midpoints (Fatehi, Gordon & Florida, N.D.). Trait theory tends to focus on the premise that we are born with traits or characteristics that make us unique and explain our behaviors (Cervone& Pervin, 2019). For example, introversion, extroversion, shyness, agreeableness, kindness, etc. all these innate characteristics that we are born help to explain why we behave in a certain manner according to the situations we face, (Cervone& Pervin, 2019). Psychoanalytic perspective on the other hand focuses on childhood experiences and the unconscious mind which plays a role in our personality development, (Cervone& Pervin, 2019).
According to Freud, (Cervone& Pervin, 2019) our unconscious mind includes all our hidden desires and conflicts which form the root cause of our mental health issues or maladaptive behaviors. The main difference between these two perspectives is that trait theory helps to explain why we behave in a certain manner, whereas psychoanalytic theory only describes the personality and predicting behavior and not really explaining why we behave the way we do. There is no such evident similarity between the two perspectives, but kind of rely on underlying mechanisms to explain personality. Also, there is some degree of subjectivity present in both the perspectives. Trait theories involve subjectivity regarding interpretations of which can be considered as important traits that explain our behaviors, and psychoanalytic theory is subjective and vague in the concepts been used like the unconscious mind. My opinions accord with the visible contrasts between the two, one focused on internal features describing our behaviors in clearer words, whilst other concentrating on unconscious mind in anticipating behavior which is ambiguous and harder to grasp.
References
Cervone, D., & Pervin, L. A. (2019). Personality: Theory and research (14th ed.). Wiley.
Fatehi, M., Gordon, R. M., & Florida, O. A Meta-Theoretical Integration of Psychotherapy Orientations.
.
According to Libertarianism, there is no right to any social service.docxmakdul
According to Libertarianism, there is no right to any social services besides those of a night-watchman state, protecting citizens from harming each other via courts, police, and military.
Consider this town
that decided to remove fire rescue as a basic social service. To benefit from it, one had to pay a yearly fee. Do you think libertarians would generally have to support such a policy in order to be consistent? Why or why not? Also, can you think of any other social services that might no longer exist in a libertarian society? (Btw, none has ever existed).
.
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions performed in that action group.
.
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
According to cultural deviance theorists like Cohen, deviant subcultures have their own value system that often opposes those of society at large. These contradictory "values" have been embraced by generations within that culture—and as a way to act out against the majority value system from which they feel excluded. Write an essay of 750-1,000 words that addresses the following:
How has rap culture perpetuated subcultural values, and promoted violence and crime among young men?
Given its sharp deviation from conventional values and norms, how and why would theorists explain the persistence and popularity of this subculture? (See examples Tupac Shakur page 109-110 and 50 Cent page 135).
Be sure to cite three to five relevant scholarly sources in support of your content
.
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
According to Gray et al, (2017) “critical appraisal is the process of carefully and systematically assessing the outcome of all aspects of a study, judging the strengths, limitation, trustworthiness, meaning, and its applicability to practice”. The steps involved in critical appraisal include “identifying the study's elements or processes, determining the strengths and weaknesses, and evaluating the credibility and trustworthiness of the study” (Gray et al., 2017). The journal article chosen is
“change in staff perspectives on indwelling urinary catheter use after implementation of an intervention bundle in seven Swiss acute care hospitals: a result of a before/after survey study”
by Niederhauser, Zullig, Marschall, Schweiger, John, Kuster, and Schwappach. (2019).
Identifying the study's elements or processes
A significant issue addressed by the study is the nursing “staffs’ perspective towards indwelling urinary catheter (IUC) and evaluation of changes in their perspectives towards indwelling urinary catheter (IUC) use after implementation of a 1-year quality improvement project” (Niederhauser et al, 2019). the process of the research was conducted in “seven acute care hospitals in Switzerland” (Niederhauser et al, 2019). With a “sample size of 1579 staff members participated in the baseline survey and 1527 participated in the follow-up survey. The survey captures all nursing and medical staff members working at the participating hospitals at the time of survey distribution, using a multimodal intervention bundle, consisting of an evidence-based indication list, daily re-evaluation of ongoing catheter needs, and staff training were implemented over the course of 9 months” (Niederhauser et al, 2019).
Determining the strengths and weaknesses
A great strength of the study is a large sample size of over 1000 and the use of well-constructed and easy-to-read heading for better understanding. Also, the use of figures, graphs, and tables make the article less cumbersome to read. Another strength is the implementation of the ethical principles of research by enabling informed consent and voluntary participation as well as confidentiality and anonymity of information.
On the other hand, the study has several weaknesses such as the use of “the theory of planned behavior to model intentions to reduce catheter use, but it is not possible to know if changes observed in staff perception led to a true change in practice” (Niederhauser et al, 2019). Another weakness of the study is the repeated survey design which allows assessment of changes in staff perspectives after implementation of a quality improvement intervention but the sustainability of the effects over time could not be evaluated.
Evaluating the credibility and trustworthiness of the study
Although the study used a larger sample size of over 1000, the “use of a single-group design and no control group weakens its credibility and trustworthiness because there are no causal inferences abou.
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
According to article "Insecure: Policing Under Racial Capitalism" by Robin D.G. Kelley and the article "Yes, We Mean Literally Abolish the Police" by Mariame Kaba, the police are no longer an attribute of safety and security. The facts that are given in the articles are similar within the meaning of the content. The police do not serve for the benefit of the whole community. Racial and class division according to social status became the basis of lawlessness and injustice on the part of the police. Kaaba in his article cites several stories confirming the racial hatred that led to the murder of African Americans. After that, people massively took to the streets of many cities in several countries, demanding an end to racial discrimination and the murder of African Americans. Kelley's article describes numerous manifestos where demands for police abolition have been raised, but all have been rejected. In the protests, people suggested that they themselves would take care of each other, which the police could not do. I understand that the police system is far from ideal and the permissiveness of police representatives should be limited. Ruth Wilson Gilmore says that "capitalism is never racial." I think that this phrase she wants to say that the stronger people take away from the weak people and use them for their own well-being. And since the roots of history go back to slavery, then African Americans are the weak link. In this regard, a huge number of prisons and police power appeared. The common and small class do not feel protected, on the contrary; they expect a threat from people who must protect them. The police take an oath to respect and protect human and civil rights and freedoms, regardless of skin color and social status. If this does not happen, then you need to change the system.
.
Abstract In this experiment, examining the equivalence poi.docxmakdul
Abstract:
In this experiment, examining the equivalence point in a titration with NaOH identified an
unknown diprotic acid. The molar mass of the unknown was found to be 100.78 g/mol with pKa
values of 2.6 and 6.6. The closest diprotic acid to this molar mass is malonic acid with a percent
error of 3.48%.
Introduction:
The purpose of the experiment was to determine the identity of an unknown diprotic acid. The
equivalence and half-equivalence points on the titration curve give important information, which
can then be used to calculate the molecular weight of the acid. The equivalence point is the
moment when there is an equal amount of acid and NaOH. Knowing the concentration and
volume of added NaOH at that moment, the amount of moles of NaOH can be determined. The
amount of moles of NaOH is then equivalent to the amount of acid present. Dividing the original
mass of the acid by the moles present gave the molar mass of the acid.
In this particular titration, there were two equivalence points as the acid is diprotic.
Consequently, the titration curve had two inflection points. The acid dissociated in a two-step
process with the net reaction being:
H2X + 2 NaOH Na2X + 2 H2O
This was important to take into consideration when calculating the molar mass of the diprotic
acid. If the first equivalence point was to be used, the ratio of acid to NaOH was 1:1. If the
second equivalence point was used in the calculations, the ratio became 1:2 as now a second
set of NaOH molecules reacted with the acid to dissociate the second hydrogen ion. The
titration curve also showed the pKa values of the acid. This happened at the half-equivalence
point where half of the acid was dissociated to its conjugate base (again, because of the diprotic
properties of the acid, this happens twice on the curve). The Henderson Hasselbalch equation
pH = pKa+log(A-/HA)
shows that at the half-equivalence point, the pKa value equaled the pH and was visually
represented by the flattest part of the graphs.
Discussion:
The titration graph showed that the data was consistent with the methodology and proved to be
an precise execution of the procedure and followed the expected shape. One possible source of
error was the actual mass of the acid solid. While transferring the dust from the weigh boat to
the solution, some remained in the weigh boat this could have altered the molar mass
calculations and shifted the final the final mass lighter than actual.
The Vernier pH method was definitely a much more concrete method of interpreting the results.
It was possible to see which addition of NaOH gave the greatest increase in pH ( greatest 1st
derivative of the titration graph). The relying solely on the indicator color would make it very
difficult to judge at which precise point the color shifted most, as the shift was a lot more gradual
compared to the precise numbers. This may have been a more reliable method if there was a
de.
ACC 403- ASSIGNMENT 2 RUBRIC!!!
Points: 280
Assignment 2: Audit Planning and Control
Criteria
UnacceptableBelow 60% F
Meets Minimum Expectations60-69% D
Fair70-79% C
Proficient80-89% B
Exemplary90-100% A
1. Outline the critical steps inherent in planning an audit and designing an effective audit program. Based upon the type of company selected, provide specific details of the actions that the company should undertake during planning and designing the audit program.
Weight: 15%
Did not submit or incompletely outlined the critical steps inherent in planning an audit and designing an effective audit program. Did not submit or incompletely provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Insufficiently outlined the critical steps inherent in planning an audit and designing an effective audit program. Insufficiently provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Partially outlined the critical steps inherent in planning an audit and designing an effective audit program. Partially provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Satisfactorily outlined the critical steps inherent in planning an audit and designing an effective audit program. Satisfactorily provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Thoroughly outlined the critical steps inherent in planning an audit and designing an effective audit program. Thoroughly provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
2. Examine at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Identify the accounts that you would test, and select at least three (3) analytical procedures that you would use in your audit.
Weight: 15%
Did not submit or incompletely examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Did not submit or incompletely identified the accounts that you would test; did not submit or incompletely selected at least three (3) analytical procedures that you would use in your audit.
Insufficiently examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Insufficiently identified the accounts that you would test; insufficiently selected at least three (3) analytical procedures that you would use in your audit.
Partially examined at least two (2) performance ratios that you would use in order to determine which analytical tests .
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
ACC 601 Managerial Accounting
Group Case 3 (160 points)
Instructions:
1. As a group, complete the following activities in good form. Use excel or
word only. Provide all supporting calculations to show how you arrived at
your numbers
2. Add only the names of group members who participated in the completion
of this assignment.
3. Submit only one copy of your completed work via Moodle. Do not send it to
me by email.
4. Due: No later than the last day of Module 7. Please note that your professor
has the right to change the due date of this assignment.
Part A: Capital Budgeting Decisions
Chee Company has gathered the following data on a proposed investment project:
Investment required in equipment ............. $240,000
Annual cash inflows .................................. $50,000
Salvage value ............................................ $0
Life of the investment ............................... 8 years
Required rate of return .............................. 10%
Assets will be depreciated using straight
line depreciation method
Required:
Using the net present value and the internal rate of return methods, is this a good investment?
Part B: Master Budget
You have just been hired as a new management trainee by Earrings Unlimited, a distributor of
earrings to various retail outlets located in shopping malls across the country. In the past, the
company has done very little in the way of budgeting and at certain times of the year has
experienced a shortage of cash. Since you are well trained in budgeting, you have decided to
prepare a master budget for the upcoming second quarter. To this end, you have worked with
accounting and other areas to gather the information assembled below.
The company sells many styles of earrings, but all are sold for the same price—$10 per pair. Actual
sales of earrings for the last three months and budgeted sales for the next six months follow (in pairs
of earrings):
January (actual) 20,000 June (budget) 50,000
February (actual) 26,000 July (budget) 30,000
March (actual) 40,000 August (budget) 28,000
April (budget) 65,000 September (budget) 25,000
May (budget) 100,000
The concentration of sales before and during May is due to Mother’s Day. Sufficient inventory should
be on hand at the end of each month to supply 40% of the earrings sold in the following month.
Suppliers are paid $4 for a pair of earrings. One-half of a month’s purchases is paid for in the month
of purchase; the other half is paid for in the following month. All sales are on credit. Only 20% of a
month’s sales are collected in the month of sale. An additional 70% is collected in the following
month, and the remaining 10% is collected in the second month following sale. Bad debts have been
negligible.
Monthly operating expenses for the company are given below:
Variable:
Sales commissions 4 % of sales
.
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
Academic Integrity:
A Letter to My Students[1]
Bill Taylor
Professor of Political Science
Oakton Community College
Des Plaines, IL 60016
[email protected]
Here at the beginning of the semester I want to say something to you about academic integrity.[2]
I’m deeply convinced that integrity is an essential part of any true educational experience, integrity on
my part as a faculty member and integrity on your part as a student.
To take an easy example, would you want to be operated on by a doctor who cheated his way through
medical school? Or would you feel comfortable on a bridge designed by an engineer who cheated her
way through engineering school. Would you trust your tax return to an accountant who copied his
exam answers from his neighbor?
Those are easy examples, but what difference does it make if you as a student or I as a faculty member
violate the principles of academic integrity in a political science course, especially if it’s not in your
major?
For me, the answer is that integrity is important in this course precisely because integrity is important in
all areas of life. If we don’t have integrity in the small things, if we find it possible to justify plagiarism or
cheating or shoddy work in things that don’t seem important, how will we resist doing the same in areas
that really do matter, in areas where money might be at stake, or the possibility of advancement, or our
esteem in the eyes of others?
Personal integrity is not a quality we’re born to naturally. It’s a quality of character we need to nurture,
and this requires practice in both meanings of that word (as in practice the piano and practice a
profession). We can only be a person of integrity if we practice it every day.
What does that involve for each of us in this course? Let’s find out by going through each stage in the
course. As you’ll see, academic integrity basically requires the same things of you as a student as it
requires of me as a teacher.
I. Preparation for Class
What Academic Integrity Requires of Me in This Area
With regard to coming prepared for class, the principles of academic integrity require that I come having
done the things necessary to make the class a worthwhile educational experience for you. This requires
that I:
reread the text (even when I’ve written it myself),
clarify information I might not be clear about,
prepare the class with an eye toward what is current today (that is, not simply rely on past
notes), and
plan the session so that it will make it worth your while to be there.
What Academic Integrity Requires of You in This Area
With regard to coming prepared for class, the principles of academic integrity suggest that you have a
responsibility to yourself, to me, and to the other students to do the things necessary to put yourself in
a position to make fruitful contributions to class discussion. This will require you to:
read the text before.
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
Access the Center for Disease Control and Prevention’s (CDC’s)
“Nutrition, Physical Activity, and Obesity: Data, Trends and Maps”
database. Choose a state other than your home state and compare their health status and associated behaviors. What behaviors lead to the current obesity status?
Initial discussion post should be approximately 300 words. Any sources used should be cited in APA format.
.
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
According to DSM 5 This patient had very many symptoms that suggested Major Depressive Disorder.
Objective(s)
Analyze psychometric properties of assessment tools
Evaluate appropriate use of assessment tools in psychotherapy
Compare assessment tools used in psychotherapy
.
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
Acceptable concerts include professional orchestras, soloists, jazz, Broadway musicals and instrumental or vocal ensembles, and comparable college or community groups performing music relevant to the content of this class. (Optionally, either your concert report
or
your concert review - but not both unless advance permission is given - may be based on a concert of non-western music selected from events on the concert list.)
Acceptable concerts include the following:
• Symphony orchestras • Concert bands and wind ensembles • Chamber Music (string quartets, brass and woodwind quintets, etc.) • Solo recitals (piano, voice, etc.) • Choral concerts • Early music concerts • Non-western music • Some jazz concerts • Opera• Broadway Musicals• Flamenco• Ballet• Tango
Assignment Format
The following are required on the concert review assignment and, thus, may affect your grade.
• Must be typed• Must be double-spaced• Must be between
2 and 4 pages
in length
not including the cover sheet
.• Must use conventional size and formatting of text - e.g. 10-12 point serif or sans serif fonts with normal margins. • Must include the printed program from the concert and/or your ticket stubs. Photocopies are unacceptable. (Contact me at least 24 hours before due date if any materials are unavailable.)• All materials (text, program, ticket stub) must be
stapled
together securely. Folded corners, paper clips, etc. instead of staples will not be accepted.• Careful editing, proofreading, and spelling are expected, although minor errors will not affect your grade.
Papers that do not follow these format guidelines may be returned for resubmission, and late penalties will apply.
Concert Review Assignment Content
I. Cover Sheet:
Include the following on a cover sheet attached to the front of your review:
• Title or other description of the event/performers you heard, along with the date and location of the performance. For example:
New World Symphony Orchestra
1258 Lincoln Road
Saturday, June 5, 2013
Lincoln Road Theater, Miami Beach
• Your name, assignment submission date, course. For example:
Pat Romero
October 31, 2013
Humanities 1020 MWF 8:05 a.m.
II. Descriptions
The main body of the concert review should include brief discussions of
three of the
pieces
in the concert you attend. In most cases, a single paragraph for each piece should be sufficient, although you may wish to break descriptions of longer pieces into separate short paragraphs, one per movement.
Your description of each piece (song) should include:
• The title of the piece and the composer's name if possible, as listed in the concert program.• A brief description of your reaction to the piece. For example:
When the piece started I thought it was going to be slow and boring, but the faster section in the first movement made it more exciting. A really great flute solo full of fast and high notes in the third movement caught my attention. I'm not sure, but I thought that som.
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
ACA was passed in 2010, under the presidency of Barack Obama. Prior to this new act, there were plenty of votes that did not agree with the notion of accessible insurance. Before 2010, The private sector had been given coverage in such a way that Milstead and Short (2019) called it sickness insurance; meaning companies will risk incurring medical expenses as long as it was balanced by healthy people. They were doing so by excluding people that had pre-existing conditions, becoming a very solvent business (Milstead & Short, 2019). After ACA was passed that was no longer the case. When President Trump came into term he did so by bringing his own healthcare agenda, which attempted to repeal ACA, but ultimately failed to come up with a replacement.
In 2016, the Republican's party platform was to repeal ACA, while continuing Medicare and Medicaid, but on the other hand, democrats put down that Obamacare is a step towards the goals of universal health care, and that this was just the beginning (Physicians for a National Health Program, n.d.). As for the cost analysis of repealing the Affordable Care Act, this would increase the number of uninsured people by 23 million, and it will cost about 350 billion through 2027, as well as creating costly coverage provisions to replace it (Committee for a Responsible Federal Budget, 2017).
(2 references required)
.
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
Access the FASB website. Once you login, click the FASB Accounting Standards Codification link. Review the materials in the FASB Codification, especially the links on the left side column. Next, write a 1-page memo to a friend introducing and explaining this new accounting research resource that you have found. Provide at least one APA citation to the FASB Codification and reference that citation using the APA guidelines.
.
Academic Paper Overview This performance task was intended to asse.docxmakdul
Academic Paper Overview This performance task was intended to assess students’ ability to conduct scholarly and responsible research and articulate an evidence-based argument that clearly communicates the conclusion, solution, or answer to their stated research question. More specifically, this performance task was intended to assess students’ ability to: • Generate a focused research question that is situated within or connected to a larger scholarly context or community; • Explore relationships between and among multiple works representing multiple perspectives within the scholarly literature related to the topic of inquiry; • Articulate what approach, method, or process they have chosen to use to address their research question, why they have chosen that approach to answering their question, and how they employed it; • Develop and present their own argument, conclusion, or new understanding while acknowledging its limitations and discussing implications; • Support their conclusion through the compilation, use, and synthesis of relevant and significant evidence generated by their research; • Use organizational and design elements to effectively convey the paper’s message; • Consistently and accurately cite, attribute, and integrate the knowledge and work of others, while distinguishing between their voice and that of others; and • Generate a paper in which word choice and syntax enhance communication by adhering to established conventions of grammar, usage, and mechanics.
.
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
Academic Research Team Project Paper
COVID-19 Open Research Dataset Challenge (CORD-19)
An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House
(1) FULL-LENGTH PROJECT
Dataset Description
In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.
Call to Action
We are issuing a call to action to the world's artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.
A list of our initial key questions can be found under the
Tasks
section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats)
research topics
and the World Health Organization’s
R&D Blueprint
for COVID-19.
Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.
In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure .
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
Abstract
Structure of Abstract
Background on the problem
purpose/objective of the study
Method used
Interpretation of results
Conclusion&Recommendation for future research
.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
According to Davenport (2014) social media and health care are c.docxmakdul
According to Davenport (2014) social media and health care are collaborating in meeting the needs of health care providers and patients. Social media is taking a step towards focusing on an analytic model to evaluate the value of social media in healthcare. For this assignment you research and investigate the areas of social media that might embrace and benefit from an analytic model combining acquired data and value-based analytics. You will then evaluate the resource addressing the following points:
· Five major stakeholder roles of social media—patients, physicians (and other outpatient care), hospitals, payers (employers, health plans), and health information technology (IT)
· Will social media improve a practice? How so? Provide a thorough rationale.
· Provide a conclusion with the main points .
format:
· Must be two to four
· Must use at least three scholarly sources
.
According to (Fatehi, Gordon & Florida, N.D.) theoretical orient.docxmakdul
According to (Fatehi, Gordon & Florida, N.D.) theoretical orientation represent styles of mind for understanding reality. This theoretical orientation can be organized as a continuum from theoretical constructs that are independent and concrete as with the Behavioral/ CBT theories, to theoretical constructs that are interdependent and abstract as with the Psychodynamic theories (Fatehi, Gordon & Florida, N.D.). Family systems and Humanistic/Existential are theoretical midpoints (Fatehi, Gordon & Florida, N.D.). Trait theory tends to focus on the premise that we are born with traits or characteristics that make us unique and explain our behaviors (Cervone& Pervin, 2019). For example, introversion, extroversion, shyness, agreeableness, kindness, etc. all these innate characteristics that we are born help to explain why we behave in a certain manner according to the situations we face, (Cervone& Pervin, 2019). Psychoanalytic perspective on the other hand focuses on childhood experiences and the unconscious mind which plays a role in our personality development, (Cervone& Pervin, 2019).
According to Freud, (Cervone& Pervin, 2019) our unconscious mind includes all our hidden desires and conflicts which form the root cause of our mental health issues or maladaptive behaviors. The main difference between these two perspectives is that trait theory helps to explain why we behave in a certain manner, whereas psychoanalytic theory only describes the personality and predicting behavior and not really explaining why we behave the way we do. There is no such evident similarity between the two perspectives, but kind of rely on underlying mechanisms to explain personality. Also, there is some degree of subjectivity present in both the perspectives. Trait theories involve subjectivity regarding interpretations of which can be considered as important traits that explain our behaviors, and psychoanalytic theory is subjective and vague in the concepts been used like the unconscious mind. My opinions accord with the visible contrasts between the two, one focused on internal features describing our behaviors in clearer words, whilst other concentrating on unconscious mind in anticipating behavior which is ambiguous and harder to grasp.
References
Cervone, D., & Pervin, L. A. (2019). Personality: Theory and research (14th ed.). Wiley.
Fatehi, M., Gordon, R. M., & Florida, O. A Meta-Theoretical Integration of Psychotherapy Orientations.
.
According to Libertarianism, there is no right to any social service.docxmakdul
According to Libertarianism, there is no right to any social services besides those of a night-watchman state, protecting citizens from harming each other via courts, police, and military.
Consider this town
that decided to remove fire rescue as a basic social service. To benefit from it, one had to pay a yearly fee. Do you think libertarians would generally have to support such a policy in order to be consistent? Why or why not? Also, can you think of any other social services that might no longer exist in a libertarian society? (Btw, none has ever existed).
.
According to Kirk (2016), most of your time will be spent working wi.docxmakdul
According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions performed in that action group.
.
According to cultural deviance theorists like Cohen, deviant sub.docxmakdul
According to cultural deviance theorists like Cohen, deviant subcultures have their own value system that often opposes those of society at large. These contradictory "values" have been embraced by generations within that culture—and as a way to act out against the majority value system from which they feel excluded. Write an essay of 750-1,000 words that addresses the following:
How has rap culture perpetuated subcultural values, and promoted violence and crime among young men?
Given its sharp deviation from conventional values and norms, how and why would theorists explain the persistence and popularity of this subculture? (See examples Tupac Shakur page 109-110 and 50 Cent page 135).
Be sure to cite three to five relevant scholarly sources in support of your content
.
According to Gray et al, (2017) critical appraisal is the proce.docxmakdul
According to Gray et al, (2017) “critical appraisal is the process of carefully and systematically assessing the outcome of all aspects of a study, judging the strengths, limitation, trustworthiness, meaning, and its applicability to practice”. The steps involved in critical appraisal include “identifying the study's elements or processes, determining the strengths and weaknesses, and evaluating the credibility and trustworthiness of the study” (Gray et al., 2017). The journal article chosen is
“change in staff perspectives on indwelling urinary catheter use after implementation of an intervention bundle in seven Swiss acute care hospitals: a result of a before/after survey study”
by Niederhauser, Zullig, Marschall, Schweiger, John, Kuster, and Schwappach. (2019).
Identifying the study's elements or processes
A significant issue addressed by the study is the nursing “staffs’ perspective towards indwelling urinary catheter (IUC) and evaluation of changes in their perspectives towards indwelling urinary catheter (IUC) use after implementation of a 1-year quality improvement project” (Niederhauser et al, 2019). the process of the research was conducted in “seven acute care hospitals in Switzerland” (Niederhauser et al, 2019). With a “sample size of 1579 staff members participated in the baseline survey and 1527 participated in the follow-up survey. The survey captures all nursing and medical staff members working at the participating hospitals at the time of survey distribution, using a multimodal intervention bundle, consisting of an evidence-based indication list, daily re-evaluation of ongoing catheter needs, and staff training were implemented over the course of 9 months” (Niederhauser et al, 2019).
Determining the strengths and weaknesses
A great strength of the study is a large sample size of over 1000 and the use of well-constructed and easy-to-read heading for better understanding. Also, the use of figures, graphs, and tables make the article less cumbersome to read. Another strength is the implementation of the ethical principles of research by enabling informed consent and voluntary participation as well as confidentiality and anonymity of information.
On the other hand, the study has several weaknesses such as the use of “the theory of planned behavior to model intentions to reduce catheter use, but it is not possible to know if changes observed in staff perception led to a true change in practice” (Niederhauser et al, 2019). Another weakness of the study is the repeated survey design which allows assessment of changes in staff perspectives after implementation of a quality improvement intervention but the sustainability of the effects over time could not be evaluated.
Evaluating the credibility and trustworthiness of the study
Although the study used a larger sample size of over 1000, the “use of a single-group design and no control group weakens its credibility and trustworthiness because there are no causal inferences abou.
According to article Insecure Policing Under Racial Capitalism by.docxmakdul
According to article "Insecure: Policing Under Racial Capitalism" by Robin D.G. Kelley and the article "Yes, We Mean Literally Abolish the Police" by Mariame Kaba, the police are no longer an attribute of safety and security. The facts that are given in the articles are similar within the meaning of the content. The police do not serve for the benefit of the whole community. Racial and class division according to social status became the basis of lawlessness and injustice on the part of the police. Kaaba in his article cites several stories confirming the racial hatred that led to the murder of African Americans. After that, people massively took to the streets of many cities in several countries, demanding an end to racial discrimination and the murder of African Americans. Kelley's article describes numerous manifestos where demands for police abolition have been raised, but all have been rejected. In the protests, people suggested that they themselves would take care of each other, which the police could not do. I understand that the police system is far from ideal and the permissiveness of police representatives should be limited. Ruth Wilson Gilmore says that "capitalism is never racial." I think that this phrase she wants to say that the stronger people take away from the weak people and use them for their own well-being. And since the roots of history go back to slavery, then African Americans are the weak link. In this regard, a huge number of prisons and police power appeared. The common and small class do not feel protected, on the contrary; they expect a threat from people who must protect them. The police take an oath to respect and protect human and civil rights and freedoms, regardless of skin color and social status. If this does not happen, then you need to change the system.
.
Abstract In this experiment, examining the equivalence poi.docxmakdul
Abstract:
In this experiment, examining the equivalence point in a titration with NaOH identified an
unknown diprotic acid. The molar mass of the unknown was found to be 100.78 g/mol with pKa
values of 2.6 and 6.6. The closest diprotic acid to this molar mass is malonic acid with a percent
error of 3.48%.
Introduction:
The purpose of the experiment was to determine the identity of an unknown diprotic acid. The
equivalence and half-equivalence points on the titration curve give important information, which
can then be used to calculate the molecular weight of the acid. The equivalence point is the
moment when there is an equal amount of acid and NaOH. Knowing the concentration and
volume of added NaOH at that moment, the amount of moles of NaOH can be determined. The
amount of moles of NaOH is then equivalent to the amount of acid present. Dividing the original
mass of the acid by the moles present gave the molar mass of the acid.
In this particular titration, there were two equivalence points as the acid is diprotic.
Consequently, the titration curve had two inflection points. The acid dissociated in a two-step
process with the net reaction being:
H2X + 2 NaOH Na2X + 2 H2O
This was important to take into consideration when calculating the molar mass of the diprotic
acid. If the first equivalence point was to be used, the ratio of acid to NaOH was 1:1. If the
second equivalence point was used in the calculations, the ratio became 1:2 as now a second
set of NaOH molecules reacted with the acid to dissociate the second hydrogen ion. The
titration curve also showed the pKa values of the acid. This happened at the half-equivalence
point where half of the acid was dissociated to its conjugate base (again, because of the diprotic
properties of the acid, this happens twice on the curve). The Henderson Hasselbalch equation
pH = pKa+log(A-/HA)
shows that at the half-equivalence point, the pKa value equaled the pH and was visually
represented by the flattest part of the graphs.
Discussion:
The titration graph showed that the data was consistent with the methodology and proved to be
an precise execution of the procedure and followed the expected shape. One possible source of
error was the actual mass of the acid solid. While transferring the dust from the weigh boat to
the solution, some remained in the weigh boat this could have altered the molar mass
calculations and shifted the final the final mass lighter than actual.
The Vernier pH method was definitely a much more concrete method of interpreting the results.
It was possible to see which addition of NaOH gave the greatest increase in pH ( greatest 1st
derivative of the titration graph). The relying solely on the indicator color would make it very
difficult to judge at which precise point the color shifted most, as the shift was a lot more gradual
compared to the precise numbers. This may have been a more reliable method if there was a
de.
ACC 403- ASSIGNMENT 2 RUBRIC!!!
Points: 280
Assignment 2: Audit Planning and Control
Criteria
UnacceptableBelow 60% F
Meets Minimum Expectations60-69% D
Fair70-79% C
Proficient80-89% B
Exemplary90-100% A
1. Outline the critical steps inherent in planning an audit and designing an effective audit program. Based upon the type of company selected, provide specific details of the actions that the company should undertake during planning and designing the audit program.
Weight: 15%
Did not submit or incompletely outlined the critical steps inherent in planning an audit and designing an effective audit program. Did not submit or incompletely provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Insufficiently outlined the critical steps inherent in planning an audit and designing an effective audit program. Insufficiently provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Partially outlined the critical steps inherent in planning an audit and designing an effective audit program. Partially provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Satisfactorily outlined the critical steps inherent in planning an audit and designing an effective audit program. Satisfactorily provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
Thoroughly outlined the critical steps inherent in planning an audit and designing an effective audit program. Thoroughly provided specific details of the actions that the company should undertake during planning and designing the audit program, based upon the type of company selected.
2. Examine at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Identify the accounts that you would test, and select at least three (3) analytical procedures that you would use in your audit.
Weight: 15%
Did not submit or incompletely examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Did not submit or incompletely identified the accounts that you would test; did not submit or incompletely selected at least three (3) analytical procedures that you would use in your audit.
Insufficiently examined at least two (2) performance ratios that you would use in order to determine which analytical tests to perform. Insufficiently identified the accounts that you would test; insufficiently selected at least three (3) analytical procedures that you would use in your audit.
Partially examined at least two (2) performance ratios that you would use in order to determine which analytical tests .
ACC 601 Managerial Accounting Group Case 3 (160 points) .docxmakdul
ACC 601 Managerial Accounting
Group Case 3 (160 points)
Instructions:
1. As a group, complete the following activities in good form. Use excel or
word only. Provide all supporting calculations to show how you arrived at
your numbers
2. Add only the names of group members who participated in the completion
of this assignment.
3. Submit only one copy of your completed work via Moodle. Do not send it to
me by email.
4. Due: No later than the last day of Module 7. Please note that your professor
has the right to change the due date of this assignment.
Part A: Capital Budgeting Decisions
Chee Company has gathered the following data on a proposed investment project:
Investment required in equipment ............. $240,000
Annual cash inflows .................................. $50,000
Salvage value ............................................ $0
Life of the investment ............................... 8 years
Required rate of return .............................. 10%
Assets will be depreciated using straight
line depreciation method
Required:
Using the net present value and the internal rate of return methods, is this a good investment?
Part B: Master Budget
You have just been hired as a new management trainee by Earrings Unlimited, a distributor of
earrings to various retail outlets located in shopping malls across the country. In the past, the
company has done very little in the way of budgeting and at certain times of the year has
experienced a shortage of cash. Since you are well trained in budgeting, you have decided to
prepare a master budget for the upcoming second quarter. To this end, you have worked with
accounting and other areas to gather the information assembled below.
The company sells many styles of earrings, but all are sold for the same price—$10 per pair. Actual
sales of earrings for the last three months and budgeted sales for the next six months follow (in pairs
of earrings):
January (actual) 20,000 June (budget) 50,000
February (actual) 26,000 July (budget) 30,000
March (actual) 40,000 August (budget) 28,000
April (budget) 65,000 September (budget) 25,000
May (budget) 100,000
The concentration of sales before and during May is due to Mother’s Day. Sufficient inventory should
be on hand at the end of each month to supply 40% of the earrings sold in the following month.
Suppliers are paid $4 for a pair of earrings. One-half of a month’s purchases is paid for in the month
of purchase; the other half is paid for in the following month. All sales are on credit. Only 20% of a
month’s sales are collected in the month of sale. An additional 70% is collected in the following
month, and the remaining 10% is collected in the second month following sale. Bad debts have been
negligible.
Monthly operating expenses for the company are given below:
Variable:
Sales commissions 4 % of sales
.
Academic Integrity A Letter to My Students[1] Bill T.docxmakdul
Academic Integrity:
A Letter to My Students[1]
Bill Taylor
Professor of Political Science
Oakton Community College
Des Plaines, IL 60016
[email protected]
Here at the beginning of the semester I want to say something to you about academic integrity.[2]
I’m deeply convinced that integrity is an essential part of any true educational experience, integrity on
my part as a faculty member and integrity on your part as a student.
To take an easy example, would you want to be operated on by a doctor who cheated his way through
medical school? Or would you feel comfortable on a bridge designed by an engineer who cheated her
way through engineering school. Would you trust your tax return to an accountant who copied his
exam answers from his neighbor?
Those are easy examples, but what difference does it make if you as a student or I as a faculty member
violate the principles of academic integrity in a political science course, especially if it’s not in your
major?
For me, the answer is that integrity is important in this course precisely because integrity is important in
all areas of life. If we don’t have integrity in the small things, if we find it possible to justify plagiarism or
cheating or shoddy work in things that don’t seem important, how will we resist doing the same in areas
that really do matter, in areas where money might be at stake, or the possibility of advancement, or our
esteem in the eyes of others?
Personal integrity is not a quality we’re born to naturally. It’s a quality of character we need to nurture,
and this requires practice in both meanings of that word (as in practice the piano and practice a
profession). We can only be a person of integrity if we practice it every day.
What does that involve for each of us in this course? Let’s find out by going through each stage in the
course. As you’ll see, academic integrity basically requires the same things of you as a student as it
requires of me as a teacher.
I. Preparation for Class
What Academic Integrity Requires of Me in This Area
With regard to coming prepared for class, the principles of academic integrity require that I come having
done the things necessary to make the class a worthwhile educational experience for you. This requires
that I:
reread the text (even when I’ve written it myself),
clarify information I might not be clear about,
prepare the class with an eye toward what is current today (that is, not simply rely on past
notes), and
plan the session so that it will make it worth your while to be there.
What Academic Integrity Requires of You in This Area
With regard to coming prepared for class, the principles of academic integrity suggest that you have a
responsibility to yourself, to me, and to the other students to do the things necessary to put yourself in
a position to make fruitful contributions to class discussion. This will require you to:
read the text before.
Access the Center for Disease Control and Prevention’s (CDC’s) Nu.docxmakdul
Access the Center for Disease Control and Prevention’s (CDC’s)
“Nutrition, Physical Activity, and Obesity: Data, Trends and Maps”
database. Choose a state other than your home state and compare their health status and associated behaviors. What behaviors lead to the current obesity status?
Initial discussion post should be approximately 300 words. Any sources used should be cited in APA format.
.
According to DSM 5 This patient had very many symptoms that sugg.docxmakdul
According to DSM 5 This patient had very many symptoms that suggested Major Depressive Disorder.
Objective(s)
Analyze psychometric properties of assessment tools
Evaluate appropriate use of assessment tools in psychotherapy
Compare assessment tools used in psychotherapy
.
Acceptable concerts include professional orchestras, soloists, jazz,.docxmakdul
Acceptable concerts include professional orchestras, soloists, jazz, Broadway musicals and instrumental or vocal ensembles, and comparable college or community groups performing music relevant to the content of this class. (Optionally, either your concert report
or
your concert review - but not both unless advance permission is given - may be based on a concert of non-western music selected from events on the concert list.)
Acceptable concerts include the following:
• Symphony orchestras • Concert bands and wind ensembles • Chamber Music (string quartets, brass and woodwind quintets, etc.) • Solo recitals (piano, voice, etc.) • Choral concerts • Early music concerts • Non-western music • Some jazz concerts • Opera• Broadway Musicals• Flamenco• Ballet• Tango
Assignment Format
The following are required on the concert review assignment and, thus, may affect your grade.
• Must be typed• Must be double-spaced• Must be between
2 and 4 pages
in length
not including the cover sheet
.• Must use conventional size and formatting of text - e.g. 10-12 point serif or sans serif fonts with normal margins. • Must include the printed program from the concert and/or your ticket stubs. Photocopies are unacceptable. (Contact me at least 24 hours before due date if any materials are unavailable.)• All materials (text, program, ticket stub) must be
stapled
together securely. Folded corners, paper clips, etc. instead of staples will not be accepted.• Careful editing, proofreading, and spelling are expected, although minor errors will not affect your grade.
Papers that do not follow these format guidelines may be returned for resubmission, and late penalties will apply.
Concert Review Assignment Content
I. Cover Sheet:
Include the following on a cover sheet attached to the front of your review:
• Title or other description of the event/performers you heard, along with the date and location of the performance. For example:
New World Symphony Orchestra
1258 Lincoln Road
Saturday, June 5, 2013
Lincoln Road Theater, Miami Beach
• Your name, assignment submission date, course. For example:
Pat Romero
October 31, 2013
Humanities 1020 MWF 8:05 a.m.
II. Descriptions
The main body of the concert review should include brief discussions of
three of the
pieces
in the concert you attend. In most cases, a single paragraph for each piece should be sufficient, although you may wish to break descriptions of longer pieces into separate short paragraphs, one per movement.
Your description of each piece (song) should include:
• The title of the piece and the composer's name if possible, as listed in the concert program.• A brief description of your reaction to the piece. For example:
When the piece started I thought it was going to be slow and boring, but the faster section in the first movement made it more exciting. A really great flute solo full of fast and high notes in the third movement caught my attention. I'm not sure, but I thought that som.
ACA was passed in 2010, under the presidency of Barack Obama. Pr.docxmakdul
ACA was passed in 2010, under the presidency of Barack Obama. Prior to this new act, there were plenty of votes that did not agree with the notion of accessible insurance. Before 2010, The private sector had been given coverage in such a way that Milstead and Short (2019) called it sickness insurance; meaning companies will risk incurring medical expenses as long as it was balanced by healthy people. They were doing so by excluding people that had pre-existing conditions, becoming a very solvent business (Milstead & Short, 2019). After ACA was passed that was no longer the case. When President Trump came into term he did so by bringing his own healthcare agenda, which attempted to repeal ACA, but ultimately failed to come up with a replacement.
In 2016, the Republican's party platform was to repeal ACA, while continuing Medicare and Medicaid, but on the other hand, democrats put down that Obamacare is a step towards the goals of universal health care, and that this was just the beginning (Physicians for a National Health Program, n.d.). As for the cost analysis of repealing the Affordable Care Act, this would increase the number of uninsured people by 23 million, and it will cost about 350 billion through 2027, as well as creating costly coverage provisions to replace it (Committee for a Responsible Federal Budget, 2017).
(2 references required)
.
Access the FASB website. Once you login, click the FASB Accounting S.docxmakdul
Access the FASB website. Once you login, click the FASB Accounting Standards Codification link. Review the materials in the FASB Codification, especially the links on the left side column. Next, write a 1-page memo to a friend introducing and explaining this new accounting research resource that you have found. Provide at least one APA citation to the FASB Codification and reference that citation using the APA guidelines.
.
Academic Paper Overview This performance task was intended to asse.docxmakdul
Academic Paper Overview This performance task was intended to assess students’ ability to conduct scholarly and responsible research and articulate an evidence-based argument that clearly communicates the conclusion, solution, or answer to their stated research question. More specifically, this performance task was intended to assess students’ ability to: • Generate a focused research question that is situated within or connected to a larger scholarly context or community; • Explore relationships between and among multiple works representing multiple perspectives within the scholarly literature related to the topic of inquiry; • Articulate what approach, method, or process they have chosen to use to address their research question, why they have chosen that approach to answering their question, and how they employed it; • Develop and present their own argument, conclusion, or new understanding while acknowledging its limitations and discussing implications; • Support their conclusion through the compilation, use, and synthesis of relevant and significant evidence generated by their research; • Use organizational and design elements to effectively convey the paper’s message; • Consistently and accurately cite, attribute, and integrate the knowledge and work of others, while distinguishing between their voice and that of others; and • Generate a paper in which word choice and syntax enhance communication by adhering to established conventions of grammar, usage, and mechanics.
.
Academic Research Team Project PaperCOVID-19 Open Research Datas.docxmakdul
Academic Research Team Project Paper
COVID-19 Open Research Dataset Challenge (CORD-19)
An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House
(1) FULL-LENGTH PROJECT
Dataset Description
In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.
Call to Action
We are issuing a call to action to the world's artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.
A list of our initial key questions can be found under the
Tasks
section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats)
research topics
and the World Health Organization’s
R&D Blueprint
for COVID-19.
Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.
In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure .
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
Abstract
Structure of Abstract
Background on the problem
purpose/objective of the study
Method used
Interpretation of results
Conclusion&Recommendation for future research
.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Read Case Study 5.1. Answer Questions 1, 2, and 3 at the end of Ca.docx
1. Read Case Study 5.1. Answer Questions 1, 2, and 3 at the end of
Case Study 5.1.
Each question should be answered in an essay format of
approximately 300 words. Ensure your paper answers the
questions and uses concepts studied in the module and from the
reading. Support your answers with personal experiences,
current events, and references to the reading.
Use the library to locate four to six scholarly sources to support
your analysis.
Prepare this assignment according to the APA guidelines.
This work has to be 100% original turnitin will be use
From the start of the U.S. invasion of Iraq in March 2003, a
small group of American officers thought the plan for
prosecuting the war was counterproductive and that, with a
better plan, the war still might be won. These officers believed
that the U.S. military had forgotten the experiences of Vietnam
and had been training for something resembling World War II—
not counterinsurgency warfare or low-intensity warfare. The
generals never expected to fight a guerrilla insurgency in Iraq;
and once it began, they concentrated almost entirely on killing
and capturing as many insurgents as possible. So, villages were
surrounded, doors kicked down, and scores of suspects
apprehended. These practices alienated Iraqi civilians and
produced new recruits for the insurgency.
By the summer of 2006, Iraq was in a state of anarchy. In
Baghdad, 50 people were being kidnapped every day, often by
the police. Increasingly, the kidnappers’ targets were children,
fewer and fewer of whom were being allowed by their parents to
venture outside. Once snatched, the victims were typically
offered for sale to one of the many kidnapping gangs. The
violence in Iraq was not random but had specific purposes and
specific causes. Al Qaeda sought to start a full-scale sectarian
war between the Sunnis and Shiites, believing such a war was
2. their only hope of victory. To this end, that terrorist
group unleashed suicidal attacks on Shiite civilians, hoping to
provoke a backlash and a wider conflict. Indeed, Al Qaeda was
increasingly taking over all of Sunni society.
In the first two years of the war, the country’s Shiite leadership
had held its fire in the face of the Sunni onslaught. Then came
the elections in December 2005 that brought to power a Shiite
dominated government. Now, Iraq’s new leaders were
determined to crush the Sunni insurrection at any cost. Police
and paramilitary units were turned loose in the Sunni
neighborhoods, where they began massacring military-age men.
In the face of all this, the Americans decided to back away.
From the summer of 2004 onward,
The objective of the American strategy was less the defeat of
the Sunni insurrection than the training and equipping of Iraqis
to fight it for them. “As they stand up, we will stand down,”
President Bush was fond of saying. Iraq security forces had
grown in quantity if not in quality and were taking over larger
and larger pieces of the war. It was difficult in the summer of
2006 to drive around Baghdad and see any American soldiers.
The
trouble was that the strategy of Iraqification was manifestly
failing, but the Bush administration kept pushing it anyway. For
all of the dramatic developments in Iraq,
perhaps the greatest drama was taking place in Washington
where very senior officers advocated a different strategy
involving increasing U.S. presence and using U.S. forces to
secure the population from insurgents rather than keeping them
penned in and behind the blast-proof walls. Thomas D. Ricks,
senior Pentagon correspondent for the Washington Post,
chronicles the difficult birth of this “surge” strategy in Iraq and
describes the personalities and events that reversed the U.S.
strategy. There were three key players in the military
establishment who brought about the difficult midcourse
correction of U.S.
strategy:
3. • General David Petraeus was the most prominent player. After
returning from Iraq, where he had commanded the 101st
Airborne Division during the invasion, he was sent to
Leavenworth, Kansas, to command the U.S. Army’s educational
establishment and craft a new counterinsurgency manual.
Drafted by a team familiar with the history of such conflicts,
the manual prescribed a radical shift for the U.S. military, away
from the traditional focus on capturing and killing the enemy to
one of recognizing that the people are the prize.
• General Jack Keane, a retired former Army vice chief of staff,
was the motivating force.
He launched what Ricks calls a “guerrilla campaign” in the
defense establishment to
get these new ideas accepted at the highest level.
• General Raymond Odierno, assistant to the chairman of the
Joint Chiefs of Staff, worked with Keane—largely behind the
scenes and often outside the chain of command—trying to sell
their model of a workable strategy, even as the war was at its
bleakest stage and calls for a pullout were mounting.
Translating ideas into plans is difficult. Surge advocates, for
example, faced entrenched interests
and inflated egos. Fortunately, Petraeus, Keane, and Odierno
would get help from four
key actors outside the military. In June 2006 President Bush met
with sympathetic war critics at Camp David. Elliott Cohen,
Michael Vickers, Fred Kagan, and Robert Kaplan—the first
three men, respected national security experts; the last, an
influential journalist—were generally supportive
of the war but critical of current strategy. They were invited to
tell Bush how it might be better run. The meeting didn’t sway
Bush, but it set in motion a behind-the-scenes effort to change
the course of the war. That effort began to take hold after the
midterm elections in November, when strong gains by the
Democrats led Bush to dismiss Donald Rumsfeld as defense
secretary and replace him with Robert Gates In early December,
Cohen, together with Keane and several others, again met with
4. Bush, and this time the professor was determined to be clearer
and more emphatic than he had been the previous June,
stressing the need for a new strategy, a change in commanders,
and more troops.
Meanwhile, General Odierno was doing the same from Baghdad.
Taking over as the number two commander in Iraq, he became
dissatisfied with the strategy being pursued by the then
commanding officer. The chain of command is normally
sacrosanct in the military, but Odierno, “making one of the most
audacious moves of the entire war,” bypassed two levels of
command above him to talk to officials at the White House
and aides to the Joint Chiefs of Staff. In doing so, Ricks writes,
he “was laying his career on the line.” The efforts of Cohen,
Keane, and Odierno paid off in January 2007: Petraeus became
the new commander in Iraq with a promise of 30,000 extra
troops to support the 126,000 already there. After Petraeus took
over, his counterinsurgency field manual became the
cornerstone of a strategy.To help carry out the plan, Petraeus
assembled
a team dominated by military officers who possessed doctorates
from top-flight universities as well as combat experience. Also
present were many dissidents, skeptics, and outsiders, some of
them foreigners. For example, they included David Kilcullen, a
freewheeling former Australian Army officer who enjoyed semi-
mythical status as
Petraeus’ counterinsurgency adviser and Emma Sky, a pacifist
British expert in Middle East affairs.To her own surprise, Sky
became an admirer of the U.S. military. “I love them,” she said,
adding,“they’re better than the country they serve. That’s the
way I feel about it—America doesn’t deserve its military.”
Petraeus took as his model for what he was trying to achieve the
cowboy painting The Stampede by Frederic Remington. Iraq
was never going to be a case study in democracy; everything
would have to be pretty rough and ready. “Sustainable stability”
was the minimalist objective. In Petraeus’ words: “We’re just
trying to get the cattle to Cheyenne.” The surge worked for a
5. number of reasons, one of the biggest being luck. The
insurgency had always been a many-headed beast, with no
overarching leadership. As the war dragged on, it was the
murderous members of Al Qaeda who gained the upper hand. Al
Qaeda’s gunmen killed everyone—the traditional Sunni tribal
leaders, for instance—who did not share their extreme goals.
But then, in late 2006 came the Sunni backlash. In Arabic, it
was called the Awakening.
Squeezed by Al Qaeda on the one side and the Shiite death
squads on the other, the sheiks turned to the Americans to save
them. Soon American officers were making deals with sheiks
across the Sunni heartland and into western Baghdad. This was
possible in large part because Sunni Iraq is still a tribal society.
Make a deal with the sheik—
promise security, hand him a bag of money—and he can
plausibly deliver the rest of his tribe. Could the surge have
worked without the Awakening? Ricks thinks that this question
is somewhat irrelevant, because as things played out the two
reinforced each other. The surge brought the security that
allowed the sheiks to come forward, and the Awakening rapidly
took thousands of potential enemies out of the war.
Case Questions
1. Which planning model do you think best represents the
events described in this case—the rational planning model
(pages 213–15) or logical incrementalism (214–15)?
2. Governmental planning takes many diverse forms. A very
partial list of large-scale
governmental planning activities would have to include at least
the following: planning for the conservation and use of natural
resources, city planning, planning forfullemployment, planning
for personal and family security, planning for agriculture, and
planning for the improvement of government organization. What
lessons do you see in this case that might be relevant to these
other planning activities?
6. 3. Ricks concludes that the surge, although successful on the
tactical level, faltered on
the strategic one. What do you think he means? Does Petraeu
group bear any responsibility?
Case References
Thomas E. Ricks, The Gamble: General David
Petraeus and the American Military Adventure
in Iraq, 2006–2008 (New York: Penguin Press,
2009); Kimberly Kagan, The Surge: A Military
History (New York: Encounter, 2009).