Saturday, August 31, 2019

Great Fire of London

The Great Fire of London was a major conflagration that swept through the central parts of the English city of London, from Sunday, 2 September to Wednesday, 5 September 1666. [1] The fire gutted the medieval City of London inside the old Roman City Wall. It threatened, but did not reach, the aristocratic district of Westminster, Charles II's Palace of Whitehall, and most of the suburban slums. [2] It consumed 13,200 houses, 87 parish churches, St. Paul's Cathedral, and most of the buildings of the City authorities. It is estimated that it destroyed the homes of 70,000 of the City's 80,000 inhabitants. 3] The death toll from the fire is unknown and is traditionally thought to have been small, as only six verified deaths were recorded. This reasoning has recently been challenged on the grounds that the deaths of poor and middle-class people were not recorded anywhere, and that the heat of the fire may have cremated many victims, leaving no recognisable remains. The Great Fire started at the bakery of Thomas Farriner (or Farynor) on Pudding Lane, shortly after midnight on Sunday, 2 September, and it spread rapidly west across the City of London.The use of the major firefighting technique of the time, the creation of firebreaks by means of demolition, was critically delayed due to the indecisiveness of the Lord Mayor of London, Sir Thomas Bloodworth. By the time large-scale demolitions were ordered on Sunday night, the wind had already fanned the bakery fire into a firestorm which defeated such measures. The fire pushed north on Monday into the heart of the City. Order in the streets broke down as rumours arose of suspicious foreigners setting fires.The fears of the homeless focused on the French and Dutch, England's enemies in the ongoing Second Anglo-Dutch War; these substantial immigrant groups became victims of lynchings and street violence. On Tuesday, the fire spread over most of the City, destroying St. Paul's Cathedral and leaping the River Fleet to threat en Charles II's court at Whitehall, while coordinated firefighting efforts were simultaneously mobilising. The battle to quench the fire is considered to have been won by two factors: the strong east winds died down, and the Tower of London garrison used gunpowder to create effective firebreaks to halt further spread eastward.

Friday, August 30, 2019

A Critical Review of Healing the Wounds of Sexual Addiction Essay

A Critical Review of Healing the Wounds of Sexual Addiction Pamela D. McKoy Liberty University Abstract This critical review will attempt to summarize the book â€Å"Healing the Wounds of Sexual Addiction† written by, Dr. Mark R. Laaser. Highlighting all the central themes and giving an in-depth analysis of Dr. Laaser’s work on the subject of sexual addiction. It will give his perspective and evidence to support it from the book and other sources. In this review you will find that Dr. Laaser has added valuable insight to the subject on a personal level. It will also show how Dr. Laaser’s faith comes into play, being that the book is written from a Christian point of view using a Biblical worldview. This review will show that the book can and should be used by lay and professionals alike when dealing with those who suffer from the pain and sin of sexual addiction. Keywords: sexual addiction, worldview Summary Dr. Mark Lasser’s book â€Å"Healing the Wounds of Sexual Addiction† gives hope for those who are in the throes of sexual addiction and those who suffer with them. Laaser feels that this book is important because of the pain and desperation that he experienced from sexual addiction; he now wants to share what he has learned about the power of the Lord and healing. In this book he relates how sexual addiction has grown to epidemic proportions (Laaser, 2004, pp.17). The internet has been the source of much of that growth, with a bevy of materials of a sexual nature being readily available to everyone with computer access. The internet has just what they are looking for in the form of pornography for sexual gratification and release. Those who are not seeking this are also bombarded with unwanted pop-ups advertising sexual related materials. Mark Laaser writes about the secret sin, it is one often times not seen or heard, sexual addiction. He feels that it starts in  childhood continuing into adolescence, where it is most time seen as a normal developmental phase. When the person reaches adulthood untreated it becomes worse over time, if left along it could lead to death. He feels that it is an addictive disease that has been around since the beginning of time. It has been misnamed and has gone undiagnosed for centuries, there still is a few who does not believe in its existence (Lasser, 2004, pp.15). With this book Laaser hopes to address this issue with Christians, bringing to the forefront a problem that has plagued the Christian community for hundreds of years (Lasser, 2004, pp.16). This is problem that has been whispered about, causing many to leave their faith and seek other means of peace. There is much shame and disgrace for the person and their family, so it is hidden from all. With sound help and education th e healing process starts. Major themes of â€Å"Healing the Wounds of Sexual Addiction† are listed below with explanation: Part 1: What is Sexual Addiction? Here you will find that sexual addiction is a sin. That fantasy, pornography and masturbation are building block behaviors. The types of sexual addiction: cyber, prostitution, rape and incest etc. Understanding and identifying characteristics of sexual addiction. Part 2: The Roots of Sexual Addiction (how and why) sexual addiction happens. Unhealthy family dynamics: boundaries, rules, roles and addictions Family abuse: emotional, physical, sexual and spiritual How sex addicts cope with abuse: escape and codependency Part 3: Healing the Wounds of Sexual Addiction The journey of healing Confronting the sex addict: one on one intervention and group intervention Treatment issues in sexual addiction Healing for couples: important and critical issues that face couples Part 4: Healing the Wounds of the Church Sexually addicted Pastors and priests: characteristics of their sexual addiction Healing for the congregations: primary victims and secondary victims (Lasser, 2004) The information provided in this book is a detailed look at the problem of addiction and the hope of recovery. Laaser wrote this book to educate the church (Laaser, 2004, pp.223). Analysis Mark Laaser’s point of view is one that comes from suffering from the secret sin of sexual addiction and being a Christian enjoying the life of recovery. He approaches this subject with a Biblical worldview, this is appropriate because we all fall short with sin. God offers help with His Word to break free of addiction in 1 Corinthians, 6:18 it said â€Å"Flee fornication. Every sin that a man doeth is without the body; but that he committeth fornication sinneth against his own body (Bible KVJ). In the book â€Å"Healing the Wounds of Sexual Addiction† he exhibits his faith for the readers to see. This in turn makes the Christian comfortable enough to read the text and get an understanding. Many experts have found that 10% of Christians in America are sexually addicted. If this is a fact then a congregation with 500 members would mean that 50 of them are sex addicts. Experts say that the percentages are on the rise. Two-thirds of all Christian men admitted to watching pornography as well as 40% of Pastors (Laaser, 2004, pp.15). The church can no longer ignore this problem, families cannot duck in shame this has to be addressed and this book is Mark Laaser’s way of doing just that. Laaser knows that there is no cure for sexual addiction but expresses that it is an ongoing process on a day to day basis. That this is a healing process not a cure, addicts must deal with their demons and have a Spiritual healing (Laaser, 2004, pp.223). This Spiritual healing is part of the process that Laaser writes about within the church and the part that they should play. The role of the Christian community is one of healing and hope for those sexually addicted. The church should create an environment of safety, welcome and honesty for them, since sexual addiction is one of loneness. Sexually addicted people need to be held accountable this is another role of the church (Hinson, 2009, pp.53). All these views are shared by Laaser and many others in the Christian community. This is strong evidence that Laaser is on track with this book and his ideas. When researched â€Å"sexual addiction in the Christian community† you will find that Laaser is a resounding voice which is use often and his views shared by many. Laaser said to provide support for the sexually addicted is not easy but very doable . To help the individual, he promotes giving them the help to overcome inappropriate coping mechanism and behaviors. Compassion and empathy must be present in those giving the help. When dealing with the  addicted person, we cannot be judgmental or make assumptions about them, but give them what God gave us, love and acceptance. Laaser writes that the addict needs to want to get well before you attempt to help them. Then you must establish accountability for the addict, a Spiritual journey of rebirth is required to let old sin and self pass away to be able to experience a new life. This is a long process one that takes a life time of being ever watchful of your actions. Laaser outlines individual and group addiction intervention strategies that are based on a Biblical model of discipline in the Gospel in the book of Matthew. This model targets the building blocks of addiction with a 90 day abstinence contract in force (Laaser, 2004. pp.149). The outcome depends totally on the work that the addict puts into they can heal if they desire it. This book is written in a straight forward manner it pulls no punches and the reader is pulled into the commentary. This is an excellent book for those in need of information pertaining to sexual addiction and how to recover from it. The reader can almost feel the care and love that went into writing the book even if they are not Christian. Conclusion With much research, I have concluded that Laaser is on to something that is heaven sent and wonderful in the field of sexual addiction. He lays his faith and innermost thoughts out for all to see, you can see the care that he took with this book. He writes from the left side of addiction as a person who has been there and knows what it takes to heal. A passive approach is not the way that gives us this book nor should we use it passively. The information provided in this book is factual. I have a friend who has suffered the hurt of sexual addiction and Laaser’s books and model were used in her treatment. You could honestly see the rebirth she had over a course of a year. This works and I personally would recommend anyone who is suffering or in the field to buy it and keep it close. I feel also that sexual addiction is as a disease where alcoholism was 50 years ago. This is not even listed as a condition in the American Psychiatric Association’s Diagnostic and Statistical Manual of Mental Disorders. Experts are not in agreement that problematic sexual behaviors should be classified as an addiction. They all seem to agree with Laaser that the behaviors are about shame and low self-esteem. I feel that  Laaser’s book takes the right tone and approach, one of love, concern and action to deal with the problem. This book is offering a solution to healing the healthy Godly way. I find that the Spiritual aspects of the book to be for all who read it. When he relate the story about Nehemiah rebuilding Jerusalem after it was destroyed, I saw the correlation of sexual addiction destroying lives both to be rebuilt by the Lord. All I all it will be my go to book in my professional career and I will present it to the church as a tool of guidance for those in need. References Laaser, R. M., (2004) Healing the Wounds of Sexual Addiction. Zondervan, Grand Rapids, Michigan 49530 Hinson, W. R. & Parker, D., (2009) Sexual Addictions: Problems and solutions for the Christian community, 17, 1, Art, 12, Leaven

Thursday, August 29, 2019

Briefly examine the place of ethno-religious identity and affiliation Essay

Briefly examine the place of ethno-religious identity and affiliation within the rise of the group calling itself IS ect. and how this group should be opposed - Essay Example The sympathizers of the group argue that it is only applying Islam fully, an argument it uses to justify the killing of its opponents. The IS was founded by Abu Musab al-Zarqawi. In 2003, the group attacked a UN compound in Baghdad in one of its biggest attacks. The attack claimed 22 lives, among them the UN special representative Sergio Vieira de Mello. The attack was closely followed by the killing of 150 people in twin attacks in Baghdad and Shiite during the Ashura festival. The group’s leader also personally beheaded American and British hostages in the year 2004. It is in the same year that group joined Al-Qaeda to be known as Al-Qaeda in Iraq (AQI). It is said that the group was part of Al-Qaeda and was expelled from Afghanistan for being too extreme and radical. In fact, it participated in the war against American forces after the death of President Saddam Hussein. In 2013, the group was actively involved in the Syrian Civil War, where it grew its tenets. In fact, the Islamic state emphasized more on building an Islamic state rather than the regime change that was so desired. The group has been on a growth trajectory ever since as is evidenced by the establishment of an Islamic caliphate in mid 2014. The group’s caliph was declared to be Abu Bakr al-Baghdadi. The group, in 2006, planned to enforce its sharia laws in Iraq but was opposed by the local community. Tribal militias, with the support of American forces, fought against the ISIS group pushing it off Iraqi. Following the Iraq government’s failure to recruit the tribal militias in the security forces, they turned and joined ISIS. Between 2013 and 2014, the group built its base in Syria, specifically in Raqqa district. The struggle to seize this area, however, was not an easy one because they faced challenges from other rebel groups. The group used the tactic of divide and rule to strengthen its allies and weaken its antagonists. This strategy effectively helped IS to

Wednesday, August 28, 2019

Australiana Literature Essay Example | Topics and Well Written Essays - 500 words

Australiana Literature - Essay Example e again tends to generates a dedoublement, one that there is no mistaking this time, and one that, if only for the reason that Whites tributary insertion of Dostoevskys The Brothers Karamazov into his own text, is noticeably self-referring. Is its resolution of this crisis - if that is what it is - recognizable as well? To answer in terms of Whites theme of representation-at-the-margin a good number of his story White holds out an optimism of an Australian vernacular writing that will yet remain in touch with a parent European Writing (Wilke p 97). Finally, however, what has seemed a bearable, if problematic relationship between Arthur and Waldo - and we are talking constantly regarding possibilities of representation - proves to be non-viable. As a replacement for of making for a productive synthesis, the narratives in the novel are known as "Arthur" and "Waldo" is but the same crisis of potentially aggressive confusion seen from somewhat different viewpoints. except the fact that white sees a number of positive sacrificial meaning at this point only obvious conclusion in The Solid Mandala is collapse or regression into an undifferentiated condition, into the extremely confusion of Same as well as Other it has tried to reconcile: Waldo Brown, dead of spite, in addition to his non-identical twin Arthur, sent to a mental institution, and keeping just one of his four solid mandalas. The conflict never affected their relationship as Arthur said at one occasion Ill kill," Arthur continued to bellow, "the pair of you bloody buggers if you touch," he choked, "my brother."( White p45) this showed how one brother protected the other Bound together in conflict, Waldo and Arthur represent duality in totality. Separate yet whole, the brothers symbolize the two opposing halves of the self. White advocates the need for both parts as well as for balance between the two. For example, Arthur’s insight—his almost visionary capability—is too otherworldly for this

Tuesday, August 27, 2019

Intro to chinese culture Research Paper Example | Topics and Well Written Essays - 1500 words - 1

Intro to chinese culture - Research Paper Example Doug Guthrie informs that Chinese government has taken three key measures to drive forward the economic reforms in China. The first was bringing in gradual reforms driven by state government in order to make China a global economy. The Chinese government introduced both external and internal economic policies. The second was the decentralization of economic decision-making while the third was to allow private economic sector to emerge to a certain extent without authorizing rapid privatization and keeping state owned industries as such. The industries continued to remain in governmental control, but the introduction of private sector initiated competition between industries that was healthy for the economy wholly. These three measures will be discussed in detail in the following sections. The Chinese government brought reforms on global level as well as on domestic level in order to strengthen China as a global economy. The economic reforms included creation of new institutions locally as well as internationally, creation of innovated industrial strategies, development of special economic zones to attract domestic and foreign investors to invest in China and adoption of trading, exporting and developmental strategies to represent China as an economy interested in investments from internal as well as external sector (Guthrie, 2009). Export-oriented coastal development strategy implemented by Zhao played a crucial role in creating China as a leading trading economy. With this reform policy, the coastal regions became more autonomous and provided solutions for two issues, which were â€Å"employment of the surplus labor from the rural areas and improvement in industrial competitiveness† (Guthrie, 2009, p. 113) along with generating income for industrial firms. The coastal development strategy facilitated Chinese economy in many ways such as converting it â€Å"into a primary producer of goods across a number of different sectors†, bringing in â€Å"huge infusion

Monday, August 26, 2019

Answering questions for case study Essay Example | Topics and Well Written Essays - 1000 words

Answering questions for case study - Essay Example Starbucks capabilities are a combination of innovation, ownership, talented employees, merchandising, image building, and retailing. 2. Today, Starbucks have to leverage its resources and capabilities to achieve growths in the retail sales by expanding consumer base and market opportunities. To start with, Starbucks needs to consider its financial standing which currently does not support rapid expansion. Continuing with joint ventures and relying on their network of distribution and marketing would be a wise decision. But since Starbucks core business model is dependent on retail outlets and property ownership then it would be prudent to extend its brands through expansion in the brick-and-mortar environment. Starbucks has the option to develop its growth through increased presence in new markets or transfer its technology through franchising. I would suggest that Starbucks take on franchising partly and continue with expansion on its own. For example one main store in a country with franchises in smaller urban settings. This would ensure that increased baristas without expensive investment in human resources, property, marketing, and logistics without losing the essence of its organizational culture, standards, values and business strategy. Alternatively, if Starbucks continue to expand with its own investment by planting stores in new and emerging markets, in the long term it would have more investment returns and values, but slowdown on achieving strategic objectives. 3. Given the market conditions of the specialty coffee and mushrooming of coffee houses and bars, I would not respond to McDonalds offer. This is because 1) the McDonalds brand is associated with low-price food solutions whereas Starbucks has established itself as high priced specialty coffee distributor and provider of high quality coffee experience; 2) because McDonalds offer means channeling into the basic coffee market whereas Starbucks needs to concentrate on the

Sunday, August 25, 2019

Personal experience Essay Example | Topics and Well Written Essays - 1250 words

Personal experience - Essay Example Disagreements may be inevitable at times, but being a good listener will avoid unnecessary clash of ideas and lead the group to think together, look at one another’s views logically and proceed from a crude set of ideas to the natural progression of significant and pragmatic solutions that carries the weight of experience and good will from the part of all. Maintaining eye contact and connecting with people, no matter whether you are in the work place or in other public spaces, will make others feel comfortable in your company. One can make clear with facial expressions that others are welcome to occupy their spaces next to oneself. A smiling countenance will lift up the spirits of others in most cases whereas an indifferent mouthing of greetings may just create space for the same from others. Words are very much important in a community but the facial expressions that convince others of one’s genuineness are more important. People usually like to be acknowledged for their contributions in public life. Recognizing even the smallest forms of contributions, even through their little acts or thoughts of kindness may thus be significant. Being a good listener and observer makes you a kind, perceptive person in the group. Neglecting those who do not follow your thought processes or acts may have a negative impact. It is necessary to draw others’ attention to one’s opinions and views with the help of proper presentation. Persuasive and convincing arguments that do not discount the possibilities of others ways of looking at it usually brings people closer to one and the willingness to listen to the ideas of everyone else will drive people together to valuable, proactive resolutions. When one witnesses a heated argument between people, it may be helpful and relaxing to make use of some sense humor. But one has to remember that no reference should be made that hurts the feelings of anyone who is involved in the argument. It

Saturday, August 24, 2019

Arabic Culture Essay Example | Topics and Well Written Essays - 500 words - 6

Arabic Culture - Essay Example ooked the issue of gender and are very unenthusiastic to take in hand this flaming concern in view of the fact that they want to uphold their status quo. The Arabic woman’s social status has persistently remained low right from her residence, learning institutions and as a final point in matrimony. It all over again begins from marriage flipside to the social order. Discrimination and male chauvinism in Arabic world may be termed as a circular progression. Incredibly, few women have dared fighting back. The question is can they win? How is it possible? Where will they get the bravery? According to the Arabic culture, men are reputed to be superior to their female matching part. Males are alleged to be the favorite sex and enjoy immeasurable freedom even in the public. Male child is ideal than feminine and in fact, a man would be disappointed if he gets a female baby. Men are encouraged to marry as many wives as they can care for to amplify their probability of having a male child. The female sex would at times receive grave resistance even from their own husbands for bearing female children (Samovar, Porter & McDanie 64). In some cultures, such as in Iran, marriage was more of a business done by the female father and the groom without informing the bride and at times, a man would organize for dowry devoid of the daughter’s consent. Feminine youngster was offered for marriage while still young. In addition, women are not allowed to socialize, actually, women go to separate mosques and madrasas to avoid mingling with men. Women, in some Arabic cultures are not allowed to work in the midst of their male counterparts. Moreover, wives are believed to totally give in to their men. Traditionally, men are contemplated to be working as women stay behind to nature and care for the home. Women, in some Arabic culture are deemed to be sex objects (Samovar, Porter & McDanie 64). The Arabic woman code of dressing is predetermined by their culture. Although human being

Friday, August 23, 2019

Concretely, colonial policies in Africa were driven by economic Essay

Concretely, colonial policies in Africa were driven by economic factors and not by concerns about the type of society colonial rule would bring about. Discuss - Essay Example This is what came to be known as the "Scramble for Africa". Many historians debate on the reasons as to why European nations rushed to establish colonies and territories in Africa, finding it hard to agree upon a single cause. One thing is very clear though; the colonial policies in Africa were driven by economic factors and not by concerns about the type of society colonial rule would bring about. Colonialism, whether it was by the Belgian, British, German, French or any power was not supposed to be a kind enterprise. The reason behind colonialism was one: exploitation of human labor and economic surplus accumulation. Consequently, capitalism did not spare labor exploitation even if it took spilling blood so as to fulfill the agenda. Britain developed and became a post-industrial nation with financial services increasingly becoming important in its economy. The financial exports kept Britain going, especially its capital investments based outside Europe. The surplus capital was profitably invested not in Britain but overseas, where abundant raw materials, limited competition, and cheap labor made bigger premiums possible. Imperialism inducement arose due to raw materials demand, unavailable in Britain and Europe. These included rubber, copper, tea, cotton, and tin. In Africa, the European’s capital investment was relatively little compared to the other continents. The companies which were involved in commerce were not relatively big, apart from De Beers Mining Company owned by Cecil Rhodes, who carved out north and south Rhodesia for himself and his company, as did King Là ©opold II with the Congo Free State and later Belgian Congo. Europe was experiencing an economic depression during the late 1800’s.as a result, the colonial governments did not have enough for spending on economic development, political administration, and social programs in their new colonies. A policy was formulated for the colonies to â€Å"pay for themselves.† In

New Product Introduction (NPI) and The Technology and Application of Essay

New Product Introduction (NPI) and The Technology and Application of Programmable Logic Controllers (PLCs) - Essay Example When a given company realizes that their products are comprehending competitions from other emerging opponents, the entire corporation within an institution raises awareness of its members and departments which may be out of the business cycle, unites them together and decides to provide another product that goes parallel with what they are doing for the purpose of harmonizing the company reputation. However, new product introduction is a process that needs time management; thus, while the entire team realizes competition, they work promptly to avoid resilience in marketing with an aim of producing a synchronized, qualified and timely fashionable product (Bernstein, 2001). Computer aided engineering in regard to its design, analysis and manufacture creates competence when included in the new product introduction process. As we consider technology globally, many companies worldwide use specialized computer aided software that helps various investors and entrepreneurs to scrutinize the growth of their business, manipulates customers’ feedback and competition within a given region; hence, the essence of effectiveness and time is addressed when technology is instituted within this process (Bernstein, 2001). Computer aided engineering is a process that encompasses the design work of given special software by specific manufacturers with an aim of creating substantial programs that can solve a given problem that people are facing globally. A manufacturer includes, at times, a single company or a group of companies that comes up with a given idea arising from their research, thus, creating software that can be run in a computer based operating system, and this program should meet both their design policies and computer requirements (Russell, 1985). Computer aided engineering professionals are capable of creating sensitive programs using special software. This software is designed in a special manner that can make various analyses within the shortest

Thursday, August 22, 2019

Social Media Paper Essay Essay Example for Free

Social Media Paper Essay Essay The advantage of obtaining information easily is to have the information fast and without a hassle. Before the Internet people had to request information from other sources by mail. In return the information would take up to a month before they could receive a response. A different method would be to research. Students would visit a nearby library to research for a school project. The disadvantage with obtaining information easily is that not all information will be creditable. People need to put in practice a basic skill to think critically. This way the information been request over the Internet will be narrow down to your needs. Thinking critically will help to find reliable sources and the sources will be creditable. The advantage of social media is no News and Media the world will not work properly for so long. The news provides a real life image of the world around us. The media helps us to know and grow with our knowledge. We learn to think critically to search for information in Internet, newspapers, and all sources of media. If media would disappear no one will know what is happening in their country and the world. People will be surprise if a natural disaster would happen in their community or city. The disadvantage of social media is people lose interest in the real world because of social networking. Another disadvantage is that people’s attention span shortens due to the lack of thinking critically. People now a day does prefer to stay in doors to do social networking like Face book, Twitter, and YouTube. They lose interest in knowing about their daily activities. Knowing these advantages and disadvantages can alter the way people can use social media because they would use this source to hack computers and have access to sensible information. Other people use social media like Face book with cyber bullying. A few people will use this social media to find old high school friends, and college friends. This source also helps reunite family friends and find friends and family. The credibility issues that can rise from information found on the Internet are trustworthy, bias and conflict of  interest. People need to check for trustworthy information. Is the source reliabl e? How many reviews has this source received? People will need to learn how to avoid having a bias mentality in regards to their reading. They need to read and learn from both sides of stories to maintain a neutral side and make the appropriate decisions.

Wednesday, August 21, 2019

The Feminine Roles In Dracula English Literature Essay

The Feminine Roles In Dracula English Literature Essay Bram Stokers novel, Dracula was written during the late nineteenth century and is commonly classified as a horror novel. Further analysis however, has brought to light the buried symbols and themes of sexuality that the novel holds within it. Due to its female sexual symbolism, the novel draws the attention of mostly men, as exploring these female forbidden themes were more of a fantasy for them than reality. As Dracula was set in the Victorian culture, it is shown to encompass all the beliefs and prejudices of the society, especially in regards to the social gender roles of men and women. Women were known to be suppressed and put down socially while men were lifted up and known for the authority and freedom they possessed. Through the two main female characters of his novel, Mina and Lucy, Stoker presents both the ideal Victorian model of what a woman should be, and the opposite of this model illustrating what a woman should not be; for the second becomes a threat to patriarchal Vic torian society and will ends up in ruin. Mina and Lucy are very significant to the novel as they are the only female characters, and narrators, who are depicted in a large amount of detail by Stoker. He juxtaposes Mina and Lucy throughout his novel to describe and contrast the two different categories of women that he believed existed in the Victorian era: the ideal, innocent, submissive women and the dangerous, rebellious women who wish to take risks and break free from the confining features of society. Although they hold different views on which of the two categories a woman should take her place in, they both acknowledge the conventional belief that men are more dominant in Victorian society than women: My dear Mina, why are men so noble when we women are so little worthy of them? (Stoker 96). Stoker uses Mina to illustrate his version of what an exemplary Victorian woman is like. Van Helsing describes Mina in the novel as one of Gods women, fashioned by His own hand to show us men and other women that there is a heaven where we can enter, and that its light can be here on earth. So true, so sweet, so noble, so little an egoistà ¢Ã¢â€š ¬Ã‚ ¦ (Stoker 306). Mina is an intelligent, educated woman who uses her attained skills solely to better her husband, Jonathan Harker. Stoker uses Minas speech in the novel to emphasize her dedication to her husband: I have been working very hard lately, because I want to keep up with Jonathans studies, and I have been practicing shorthand very assiduously (Stoker 86). Although she works fulltime, she tirelessly takes on other commitments such as perfecting her shorthand so that she would be useful to Jonathan (Stoker 86). She is also seen thinking very highly of men in general and their independence from women: a brave mans hand can speak for itself; it does not even need a womans love to hear its music (Stoker 386). Lucy on the other hand, falls into Stokers second category of Victorian women. She is not seen committed physically and emotionally to one man alone throughout the novel. She is described as a voluptuous, beautiful woman who is approached with three proposals from three different suitors. Lucy complains to Mina asking her: Why cant they let a girl marry three men, or as many as want her, and save all this trouble? (Stoker 96). Although she would do this if she were allowed to, she recognizes that she has uttered words of heresy after saying them. This shows that although such a thought is seen as utterly promiscuous, immoral, and forbidden in the Victorian culture, it does not stop her from mentally crossing the boundaries set up by the social conventions of the society. Lucy is portrayed as someone who is driven by her sexual openness and flirtatious, tempting nature. Her physical beauty holds the interest of all her suitors and she enjoys the attention she would not get otherwise from the men of her society. This, in a way, helps Lucy to equalize herself to the same male gender that is claimed to be superior to females. Conversely, Mina is shown to be content with her monogamous status in society and does not feel the need to use her feminine sensuality to prove anything. In fact, Minas sexual desires, if any, remain unknown throughout the novel. By presenting Mina in this way, Stoker provides a stark contrast between the sexuality of Lucy and Mina. Minas perspective on the subject is left untold to illustrate that it shouldnt be a womans concern to think about such things, and that all a Victorian womans role entails is succumbing to a mans sexual needs and desires. Lucys character does not agree with this. Because she cannot live out her sexual appetites in the public sphere, she does it in the private through sleepwalking. In the state of sleepwalking, she can unconsciously and quite freely express her thoughts and longings. It is in this state that she is first bitten by Count Dracula. As this sequence occurs more often, she is made into a vampire and openly expresses her suppressed sexual desires. This defiles her purity and makes her a voluptuous wantonness (Stoker 342). Lucy as a vampire represents all of her built up, yet restrained sexual urges and passions. Her ravenous, insatiable sexual hunger becomes increasingly more obvious all the way through to the killing of her life as a vampire. Because Mina is not full of sexual neediness like Lucy, she has a lot less to restrain. She rather, uses her energy on being a maternal figure to those who need it. She feels the need to use her natural maternal instincts to better the men around her. She allows Arthur and Quincey to cry on her shoulder not long after encountering them in the novel just so that they would feel the comfort of a mother: He stood up and then sat down again, and the tears rained down his cheeks. I felt an infinite pity for him, and opened my arms unthinkingly. With a sob he laid his head on my shoulder, and cried like a wearied child, whilst he shook with emotion. We women have something of the mother in us that makes us rise above smaller matters when the mother-spirit is invoked; I felt this big, sorrowing mans head resting on me, as though it were that of the baby that some day may lie on my bosom, and I stroked his hair as though he were my own child (Stoker 372-373). Lucy, on the other hand, is shown as someone who does not take interest in the maternal qualities of women and mistreats little children in the novel. With a careless motion, she flung to the ground, callous as a devil, the child that up to now she had clutched,  strenuously to her breast, growling over it as a dog growls over a bone. The child gave a sharp cry, and  lay there moaning (Stoker 343). This shows that her craving is more important to her than the maternal quality of caring for a child; she would rather feed on the child than feed the child itself. Although both Mina and Lucy are attacked by the Count, the reasons for the attack differ for both characters. When Count Dracula threatens Jonathan during his attempt to attack Mina, Mina does what the Victorian culture would expect in a situation like this and puts her husbands life and safety before hers. Through the final attack on innocent Mina, Stoker illustrates the raw desire of men exploiting innocent women and testing their submissiveness. He also shows through this incident his belief of how weak and vulnerable women are. Conveniently, the first thing Mina does is succumb to the strange mans behaviour: I was bewildered, and strangely enough, I did not want to hinder him (Stoker 466). However, as soon as she realizes her purity is being defiled, she becomes revolted by the unclean event that has occurred and cries out Unclean! Unclean! (Stoker 461). Unable to change what has happened to her, she uses the incident to help the men who are in pursuit of Count Dracula. Lucy on t he other hand, is attacked and killed for another reason. Men want to see her destroyed because they see her beauty and sexual openness as a threat to Victorian society. Stoker uses Lucy to illustrate that sexually aggressive women who use their beauty to gain a certain power over men will not last in the Victorian culture. Instead of being physically ruined, they will be socially demeaned and out-casted. This social punishment is depicted through the staking and killing of Lucy by her own husband, Arthur. He is used in the passage to bring her back under Victorian social order and purity: There, in the coffin lay no longer the foul Thing that we had so dreaded and grown to hate that the work of her destruction was yielded as a privilege to the one best entitled to it, but Lucy as we had seen her in life, with her face of unequalled sweetness and purity (Stoker 351). This destruction of Lucy restores the confidence of the male audience of this novel as they are given back their plac e of superiority and are left knowing that they could continue to repress any liberating power women try to attain. Minas life is spared in the novel for her socially correct behaviour throughout the story. She uses her intelligence, her organization skills, and her resourcefulness to service the men and help them track down Count Dracula. Van Helsing describes her intellect as a trained like a mans brain, proving the belief that intellect is not something women naturally possess (Stoker 551). Mina is also always seen putting men above herself, even if it means giving up her own life: without a moments delay, drive a stake through me and cut off my head, or do whatever else may be wanting to give me rest!(Stoker 537). She asks her husband to take the responsibility of killing her before she becomes a danger to mens lives. To conclude, Stoker uses Mina and Lucy to confirm his sexist Victorian beliefs about the roles of men and women in society. The social construct of the time involved women being inferior to men in all areas of life, with the exception of child bearing and child upbringing. Their value was only seen in their maternal qualities and their submissiveness to men. Through Minas character, Stoker exhibits the ideal, virtuous, Victorian woman and shows, through her survival, what the benefits of following this model are. He also goes to show what happens to women when they feel that they should be seen as equals to men. Women who attempt to use their sexuality to attain power and break free from the patriarchal boundaries of Victorian society will end up ruined, just like Lucy.

Tuesday, August 20, 2019

Metrics and Models in Software Testing

Metrics and Models in Software Testing How do we measure the progress of testing? When do we release the software? Why do we devote more time and resources for testing a particular module? What is the reliability of software at the time of release? Who is responsible for the selection of a poor test suite? How many faults do we expect during testing? How much time and resources are required to test a software? How do we know the effectiveness of test suite? We may keep on framing such questions without much effort? However, finding answers to such questions are not easy and may require significant amount of effort. Software testing metrics may help us to measure and quantify many things which may find some answers to such important questions. 10.1 Software Metrics â€Å"What cannot be measured, cannot be controlled† is a reality in this world. If we want to control something we should first be able to measure it. Therefore, everything should be measurable. If a thing is not measurable, we should make an effort to make it measurable. The area of measurement is very important in every field and we have mature and establish metrics to quantify various things. However, in software engineering this â€Å"area of measurement† is still in its developing stage and may require significant effort to make it mature, scientific and effective. 10.1.1 Measure, Measurement and Metrics These terms are often used interchangeably. However, we should understand the difference amongst these terms. Pressman explained this clearly as [PRES05]: â€Å"A measure provides a quantitative indication of the extent, amount, dimension, capacity or size of some attributes of a product or process. Measurement is the act of determining a measure. The metric is a quantitative measure of the degree to which a product or process possesses a given attribute†. For example, a measure is the number of failures experienced during testing. Measurement is the way of recording such failures. A software metric may be average number of failures experienced per hour during testing. Fenton [FENT04] has defined measurement as: â€Å"It is the process by which numbers or symbols are assigned to attributes of entities in the real world in such a way as to describe them according to clearly defined rules†. The basic issue is that we want to measure every attribute of an entity. We should have established metrics to do so. However, we are in the process of developing metrics for many attributes of various entities used in software engineering. Software metrics can be defined as [GOOD93]: â€Å"The continuous application of measurement based techniques to the software development process and its products to supply meaningful and timely management information, together with the use of those techniques to improve that process and its products.† Many things are covered in this definition. Software metrics are related to measures which, in turn, involve numbers for quantification, these numbers are used to produce better product and improve its related process. We may like to measure quality attributes such as testability, complexity, reliability, maintainability, efficiency, portability, enhanceability, usability etc for a software. We may also like to measure size, effort, development time and resources for a software. 10.1.2 Applications Software metrics are applicable in all phases of software development life cycle. In software requirements and analysis phase, where output is the SRS document, we may have to estimate the cost, manpower requirement and development time for the software. The customer may like to know cost of the software and development time before signing the contract. As we all know, the SRS document acts as a contract between customer and developer. The readability and effectiveness of SRS document may help to increase the confidence level of the customer and may provide better foundations for designing the product. Some metrics are available for cost and size estimation like COCOMO, Putnam resource allocation model, function point estimation model etc. Some metrics are also available for the SRS document like number of mistakes found during verification, change request frequency, readability etc. In the design phase, we may like to measure stability of a design, coupling amongst modules, cohesion of a module etc. We may also like to measure the amount of data input to a software, processed by the software and also produced by the software. A count of the amount of data input to, processed in, and output from software is called a data structure metric. Many such metrics are available like number of variables, number of operators, number of operands, number of live variables, variable spans, module weakness etc. Some information flow metrics are also popular like FANIN, FAN OUT etc. Use cases may also be used to design metrics like counting actors, counting use cases, counting number of links etc. Some metrics may also be designed for various applications of websites like number of static web pages, number of dynamic web pages, number of internal page links, word count, number of static and dynamic content objects, time taken to search a web page and retrieve the desired information, similarity of web pages etc. Software metrics have number of applications during implementation phase and after the completion of such a phase. Halstead software size measures are applicable after coding like token count, program length, program volume, program level, difficulty, estimation of time and effort, language level etc. Some complexity measures are also popular like cyclomatic complexity, knot count, feature count etc. Software metrics have found good number of applications during testing. One area is the reliability estimation where popular models are Musas basic executio n time model and Logarithmic Poisson execution time model. Jelinski Moranda model [JELI72] is also used for the calculation of reliability. Source code coverage metrics are available that calculate the percentage of source code covered during testing. Test suite effectiveness may also be measured. Number of failures experienced per unit of time, number of paths, number of independent paths, number of du paths, percentage of statement coverage, percentage of branch condition covered are also useful software metrics. Maintenance phase may have many metrics like number of faults reported per year, number of requests for changes per year, percentage of source code modified per year, percentage of obsolete source code per year etc. We may find number of applications of software metrics in every phase of software development life cycle. They provide meaningful and timely information which may help us to take corrective actions as and when required. Effective implementation of metrics may improve the quality of software and may help us to deliver the software in time and within budget. 10.2 Categories of Metrics There are two broad categories of software metrics namely product metrics and process metrics. Product metrics describe the characteristics of the product such as size, complexity, design features, performance, efficiency, reliability, portability, etc. Process metrics describe the effectiveness and quality of the processes that produce the software product. Examples are effort required in the process, time to produce the product, effectiveness of defect removal during development, number of defects found during testing, maturity of the process [AGGA08]. 10.2.1 Product metrics for testing These metrics provide information about the testing status of a software product. The data for such metrics are also generated during testing and may help us to know the quality of the product. Some of the basic metrics are given as: (i) Number of failures experienced in a time interval (ii) Time interval between failures (iii) Cumulative failures experienced upto a specified time (iv) Time of failure (v) Estimated time for testing (vi) Actual testing time With these basic metrics, we may find some additional metrics as given below: (i) (ii) Average time interval between failures (iii) Maximum and minimum failures experienced in any time interval (iv) Average number of failures experienced in time intervals (v) Time remaining to complete the testing. We may design similar metrics to find the indications about the quality of the product. 10.2.2 Process metrics for testing These metrics are developed to monitor the progress of testing, status of design and development of test cases and outcome of test cases after execution. Some of the basic process metrics are given below: (i) Number of test cases designed (ii) Number of test cases executed (iii) Number of test cases passed (iv) Number of test cases failed (v) Test case execution time (vi) Total execution time (vii) Time spent for the development of a test case (viii) Total time spent for the development of all test cases On the basis of above direct measures, we may design following additional metrics which may convert the base metric data into more useful information. (i) % of test cases executed (ii) % of test cases passed (iii) % of test cases failed (iv) Total actual execution time / total estimated execution time (v) Average execution time of a test case These metrics, although simple, may help us to know the progress of testing and may provide meaningful information to the testers and project manager. An effective test plan may force us to capture data and convert it into useful metrics for process and product both. This document also guides the organization for future projects and may also suggest changes in the existing processes in order to produce a good quality maintainable software product. 10.3 Object Oriented Metrics used in Testing Object oriented metrics capture many attributes of a software and some of them are relevant in testing. Measuring structural design attributes of a software system, such as coupling, cohesion or complexity, is a promising approach towards early quality assessments. There are several metrics available in the literature to capture the quality of design and source code. 10.3.1 Coupling Metrics Coupling relations increase complexity, reduce encapsulation, potential reuse, and limit understanding and maintainability. The coupling metrics requires information about attribute usage and method invocations of other classes. These metrics are given in table 10.1. Higher values of coupling metrics indicate that a class under test will require more number of stubs during testing. In addition, each interface will require to be tested thoroughly. Metric Definition Source Coupling between Objects. (CBO) CBO for a class is count of the number of other classes to which it is coupled. [CHID94] Data Abstraction Coupling (DAC) Data Abstraction is a technique of creating new data types suited for an application to be programmed. DAC = number of ADTs defined in a class. [LI93] Message Passing Coupling. (MPC) It counts the number of send statements defined in a class. Response for a Class (RFC) It is defined as set of methods that can be potentially executed in response to a message received by an object of that class. It is given by RFC=|RS|, where RS, the response set of the class, is given by [CHID94] Information flow-based coupling (ICP) The number of methods invoked in a class, weighted by the number of parameters of the methods invoked. [LEE95] Information flow-based inheritance coupling. (IHICP) Same as ICP, but only counts methods invocations of ancestors of classes. Information flow-based non-inheritance coupling (NIHICP) Same as ICP, but only counts methods invocations of classes not related through inheritance. Fan-in Count of modules (classes) that call a given class, plus the number of global data elements. [BINK98] Fan-out Count of modules (classes) called by a given module plus the number of global data elements altered by the module (class). [BINK98] Table 10.1: Coupling Metrics 10.3.3 Inheritance Metrics Inheritance metrics requires information about ancestors and descendants of a class. They also collect information about methods overridden, inherited and added (i.e. neither inherited nor overrided). These metrics are summarized in table 10.3. If a class has more number of children (or sub classes), more amount of testing may be required in testing the methods of that class. More is the depth of inheritance tree, more complex is the design as more number of methods and classes are involved. Thus, we may test all the inherited methods of a class and testing effort well increase accordingly. Metric Definition Sources Number of Children (NOC) The NOC is the number of immediate subclasses of a class in a hierarchy. [CHID94] Depth of Inheritance Tree (DIT) The depth of a class within the inheritance hierarchy is the maximum number of steps from the class node to the root of the tree and is measured by the number of ancestor classes. Number of Parents (NOP) The number of classes that a class directly inherits from (i.e. multiple inheritance). [LORE94] Number of Descendants (NOD) The number of subclasses (both direct and indirectly inherited) of a class. Number of Ancestors (NOA) The number of superclasses (both direct and indirectly inherited) of a class. [TEGA92] Number of Methods Overridden (NMO) When a method in a subclass has the same name and type signature as in its superclass, then the method in the superclass is said to be overridden by the method in the subclass. [LORE94] Number of Methods Inherited (NMI) The number of methods that a class inherits from its super (ancestor) class. Number of Methods Added (NMA) The number of new methods added in a class (neither inherited, nor overriding). Table 10.3: Inheritance Metrics 10.3.4 Size Metrics Size metrics indicate the length of a class in terms of lines of source code and methods used in the class. These metrics are given in table 10.4. If a class has more number of methods with greater complexity, then more number of test cases will be required to test that class. When a class with more number of methods with greater complexity is inherited, it will require more rigorous testing. Similarly, a class with more number of public methods will require thorough testing of public methods as they may be used by other classes. Metric Definition Sources Number of Attributes per Class (NA) It counts the total number of attributes defined in a class. Number of Methods per Class (NM) It counts number of methods defined in a class. Weighted Methods per Class (WMC) The WMC is a count of sum of complexities of all methods in a class. Consider a class K1, with methods M1,†¦Ã¢â‚¬ ¦.. Mn that are defined in the class. Let C1,†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.Cn be the complexity of the methods. [CHID94] Number of public methods (PM) It counts number of public methods defined in a class. Number of non-public methods (NPM) It counts number of private methods defined in a class. Lines Of Code (LOC) It counts the lines in the source code. Table 10.4: Size Metrics 10.4 What should we measure during testing? We should measure every thing (if possible) which we want to control and which may help us to find answers to the questions given in the beginning of this chapter. Test metrics may help us to measure the current performance of any project. The collected data may become historical data for future projects. This data is very important because in the absence of historical data, all estimates are just the guesses. Hence, it is essential to record the key information about the current projects. Test metrics may become an important indicator of the effectiveness and efficiency of a software testing process and may also identify risky areas that may need more testing. 10.4.1 Time We may measure many things during testing with respect to time and some of them are given as: 1) Time required to run a test case. 2) Total time required to run a test suite. 3) Time available for testing 4) Time interval between failures 5) Cumulative failures experienced upto a given time 6) Time of failure 7) Failures experienced in a time interval A test case requires some time for its execution. A measurement of this time may help to estimate the total time required to execute a test suite. This is the simplest metric and may estimate the testing effort. We may calculate the time available for testing at any point in time during testing, if we know the total allotted time for testing. Generally unit of time is seconds, minutes or hours, per test case. Total testing time may be defined in terms of hours. Time needed to execute a planned test suite may also be defined in terms of hours. When we test a software, we experience failures. These failures may be recorded in different ways like time of failure, time interval between failures, cumulative failures experienced upto given time and failures experienced in a time interval. Consider the table 10.5 and table 10.6 where time based failure specification and failure based failure specification are given: Sr. No. of failure occurrences Failure time measured in minutes Failure intervals in minutes 1 12 12 2 26 14 3 35 09 4 38 03 5 50 12 6 70 20 7 106 36 8 125 19 9 155 30 10 200 45 Table 10.5: Time based failure specification Time in minutes Cumulative failures Failures in interval of 20 minutes 20 01 01 40 04 03 60 05 01 80 06 01 100 06 00 120 07 01 140 08 01 160 09 01 180 09 00 200 10 01 Table 10.6: Failure based failure specification These two tables give us the idea about failure pattern and may help us to define the following: 1) Time taken to experience ‘n failures 2) Number of failures in a particular time interval 3) Total number of failures experienced after a specified time 4) Maximum / minimum number of failures experienced in any regular time interval. 10.4.2 Quality of source code We may know the quality of the delivered source code after reasonable time of release using the following formula: Where WDB: Number of weighted defects found before release WDA: Number of weighted defects found after release The weight for each defect is defined on the basis of defect severity and removal cost. A severity is assigned to each defect by testers based on how important or serious is the defect. A lower value of this metric indicates the less number of error detection or less serious error detection. We may also calculate the number of defects per execution test case. This may also be used as an indicator of source code quality as the source code progressed through the series of test activities [STEP03]. 10.4.3 Source Code Coverage We may like to execute every statement of a program at least once before its release to the customer. Hence, percentage of source code coverage may be calculated as: The higher value of this metric given confidence about the effectiveness of a test suite. We should write additional test cases to cover the uncovered portions of the source code. 10.4.4 Test Case Defect Density This metric may help us to know the efficiency and effectiveness of our test cases. Where Failed test case: A test case that when executed, produced an undesired output. Passed test case: A test case that when executed, produced a desired output Higher value of this metric indicates that the test cases are effective and efficient because they are able to detect more number of defects. 10.4.5 Review Efficiency Review efficiency is a metric that gives insight on the quality of review process carried out during verification. Higher the value of this metric, better is the review efficiency. 10.5 Software Quality Attributes Prediction Models Software quality is dependent on many attributes like reliability, maintainability, fault proneness, testability, complexity, etc. Number of models are available for the prediction of one or more such attributes of quality. These models are especially beneficial for large-scale systems, where testing experts need to focus their attention and resources to problem areas in the system under development. 10.5.1 Reliability Models Many reliability models for software are available where emphasis is on failures rather than faults. We experience failures during execution of any program. A fault in the program may lead to failure(s) depending upon the input(s) given to a program with the purpose of executing it. Hence, time of failure and time between failures may help us to find reliability of software. As we all know, software reliability is the probability of failure free operation of software in a given time under specified conditions. Generally, we consider the calendar time. We may like to know the probability that a given software will not fail in one month time or one week time and so on. However, most of the available models are based on execution time. The execution time is the time for which the computer actually executes the program. Reliability models based on execution time normally give better results than those based on calendar time. In many cases, we have a mapping table that converts execution time to calendar time for the purpose of reliability studies. In order to differentiate both the timings, execution time is represented byand calendar time by t. Most of the reliability models are applicable at system testing level. Whenever software fails, we note the time of failure and also try to locate and correct the fault that caused the failure. During system testing, software may not fail at regular intervals and may also not follow a particular pattern. The variation in time between successive failures may be described in terms of following functions: ÃŽ ¼ () : average number of failures upto time ÃŽ » () : average number of failures per unit time at time and is known as failure intensity function. It is expected that the reliability of a program increases due to fault detection and correction over time and hence the failure intensity decreases accordingly. (i) Basic Execution Time Model This is one of the popular model of software reliability assessment and was developed by J.D. MUSA [MUSA79] in 1979. As the name indicates, it is based on execution time (). The basic assumption is that failures may occur according to a non-homogeneous poisson process (NHPP) during testing. Many examples may be given for real world events where poisson processes are used. Few examples are given as: * Number of users using a website in a given period of time. * Number of persons requesting for railway tickets in a given period of time * Number of e-mails expected in a given period of time. The failures during testing represents a non-homogeneous process, and failure intensity decreases as a function of time. J.D. Musa assumed that the decrease in failure intensity as a function of the number of failures observed, is constant and is given as: Where : Initial failure intensity at the start of testing. : Total number of failures experienced upto infinite time : Number of failures experienced upto a given point in time. Musa [MUSA79] has also given the relationship between failure intensity (ÃŽ ») and the mean failures experienced (ÃŽ ¼) and is given in 10.1. If we take the first derivative of equation given above, we get the slope of the failure intensity as given below The negative sign shows that there is a negative slope indicating a decrementing trend in failure intensity. This model also assumes a uniform failure pattern meaning thereby equal probability of failures due to various faults. The relationship between execution time () and mean failures experienced (ÃŽ ¼) is given in 10.2 The derivation of the relationship of 10.2 may be obtained as: The failure intensity as a function of time is given in 10.3. This relationship is useful for calculating present failure intensity at any given value of execution time. We may find this relationship Two additional equations are given to calculate additional failures required to be experienced to reach a failure intensity objective (ÃŽ »F) and additional time required to reach the objective. These equations are given as: Where à ¢Ã‹â€ Ã¢â‚¬  ÃŽ ¼: Expected number of additional failures to be experienced to reach failure intensity objective. : Additional time required to reach the failure intensity objective. : Present failure intensity : Failure intensity objective. and are very interesting metrics to know the additional time and additional failures required to achieve a failure intensity objective. Example 10.1: A program will experience 100 failures in infinite time. It has now experienced 50 failures. The initial failure intensity is 10 failures/hour. Use the basic execution time model for the following: (i) Find the present failure intensity. (ii) Calculate the decrement of failure intensity per failure. (iii) Determine the failure experienced and failure intensity after 10 and 50 hours of execution. (iv) Find the additional failures and additional execution time needed to reach the failure intensity objective of 2 failures/hour. Solution: (a) Present failure intensity can be calculated using the following equation: (b) Decrement of failure intensity per failure can be calculated using the following: (c) Failures experienced and failure intensity after 10 and 50 hours of execution can be calculated as: (i) After 10 hours of execution (ii) After 50 hours of execution (d) and with failure intensity objective of 2 failures/hour (ii) Logarithmic Poisson Execution time model With a slight modification in the failure intensity function, Musa presented logarithmic poisson execution time model. The failure intensity function is given as: Where ÃŽ ¸: Failure intensity decay parameter which represents the relative change of failure intensity per failure experienced. The slope of failure intensity is given as: The expected number of failures for this model is always infinite at infinite time. The relation for mean failures experienced is given as: The expression for failure intensity with respect to time is given as: The relationship for additional number of failures and additional execution time are given as: When execution time is more, the logarithmic poisson model may give large values of failure intensity than the basic model. Example 10.2: The initial failure intensity of a program is 10 failures/hour. The program has experienced 50 failures. The failure intensity decay parameter is 0.01/failure. Use the logarithmic poisson execution time model for the following: (a) Find present failure intensity. (b) Calculate the decrement of failure intensity per failure. (c) Determine the failure experienced and failure intensity after 10 and 50 hours of execution. (d) Find the additional failures and additional and failure execution time needed to reach the failure intensity objective of 2 failures/hour. Solution: (a) Present failure intensity can be calculated as: = 50 failures = 50 failures = 0.01/falures Hence = 6.06 failures/hour (b) Decrement of failure intensity per failure can be calculated as: (c) Failure experienced and failure intensity after 10 and 50 hours of execution can be calculated as: (i) After 10 hours of execution (ii) After 50 hours of execution (d) and with failure intensity objective of 2 failures/hour (iii) The Jelinski Moranda Model The Jelinski Moranda model [JELI72] is the earliest and simples software reliability model. It proposed a failure intensity function in the form of Where = Constant of proportionality N = total number of errors present i = number of errors found by time interval ti. This model assumes that all failures have the same failure rate. It means that failure rate is a step function and there will be an improvement in reliability after fixing an error. Hence, every failure contributes equally to the overall reliability. Here, failure intensity is directly proportional to the number of errors remaining in a software. Once we know the value of failure intensity function using any reliability model, we may calculate reliability using the equation given below: Where ÃŽ » is the failure intensity and t is the operating time. Lower the failure intensity and higher is the reliability and vice versa. Example 10.3: A program may experience 200 failures in infinite time of testing. It has experienced 100 failures. Use Jelinski-Moranda model to calculate failure intensity after the experience of 150 failures? Solution: Total expected number of failures (N) = 200 Failures experienced (i) =100 Constant of proportionality () = 0.02 We know = 2.02 failures/hour After 150 failures = 0.02 (200-150+1) =1.02 failures/hour Failure intensity will decrease with every additional failure experience. 10.5.2 An example of fault prediction model in practice It is clear that software metrics can be used to capture the quality of object oriented design and code. These metrics provide ways to evaluate the quality of software and their use in earlier phases of software development can help organizations in assessing a large software development quickly, at a low cost. To achieve help for planning and executing testing by focusing resources on the fault prone parts of the design and code, the model used to predict faulty classes should be used. The fault prediction model can also be used to identify classes that are prone to have severe faults. One can use this model with respect to high severity of faults to focus the testing on those parts of the system that are likely to cause serious failures. In this section, we describe models used to find relationship between object oriented metrics and fault proneness, and how such models can be of great help in planning and executing testing activities [MALH09, SING10]. In order to perform the analysis we used public domain KC1 NASA data set [NASA04] The data set is available on www.mdp.ivv.nasa.gov. The 145

Monday, August 19, 2019

The Second World War (WWII) - News Article :: World War 2 II Two

The Bomb Was Dropped Today is the day after the mass destruction of Hiroshima. On Monday, August 6th the first atomic bomb to be used in war fare was dropped. The atomic bomb â€Å"Little Boy† as they called it was drooped at approximately 8:15am Japanese standard time. The B-29 Bomber â€Å"Enola Gay† was the one to have dropped the atomic bomb yesterday which caused mass destruction. When the bomb reached approximately 2,000 feet above the surface it was detonated. Reports say that â€Å"Little Boy† caused a massive wind that leveled houses up to 1.5 miles from the center of the explosion. â€Å"A bright light filled the plane," wrote Lt. Col. Paul Tibbets, the pilot of the Enola Gay, the B-29 that dropped the first atomic bomb. "We turned back to look at Hiroshima. The city was hidden by that awful cloud...boiling up, mushrooming." He was astonished at what they have done. Today the day after the drop of â€Å"Little Boy† it is unknown of the amount of deaths and it is believed to be in the tens of thousands. What will happen next? Will we see Japan surrender the war? In the up coming days we will see how this concludes. Today is the day after the mass destruction of Hiroshima. On Monday, August 6th the first atomic bomb to be used in war fare was dropped. The atomic bomb â€Å"Little Boy† as they called it was drooped at approximately 8:15am Japanese standard time. The B-29 Bomber â€Å"Enola Gay† was the one to have dropped the atomic bomb yesterday which caused mass destruction. When the bomb reached approximately 2,000 feet above the surface it was detonated. Reports say that â€Å"Little Boy† caused a massive wind that leveled houses up to 1.5 miles from the center of the explosion. â€Å"A bright light filled the plane," wrote Lt. Col. Paul Tibbets, the pilot of the Enola Gay, the B-29 that dropped the first atomic bomb.

Sunday, August 18, 2019

A Clockwork Orange :: essays research papers

The narrator, 15-year-old Alex, and his gang - Dim, Pete, and Georgie - run amok in futuristic London. When the foursome isn't downing drug-laced milk in the Korova Milkbar and speaking in the Slavic-influenced slang of nadsat, they are robbing, beating, and raping socialist London's citizens. On this particular night, they beat up an old man with science books and a homeless man, get into a fight with a rival gang led by Billybob, and steal a car and take it for a joyride to the country. At a cottage labeled "HOME," they beat up the author of "A Clockwork Orange" - a manuscript celebrating human free will and denouncing any infringement upon it - and rape his wife. Back at the Korova Milkbar, Alex hits Dim for interrupting a woman singing a piece from an opera - Alex is a great lover of classical music, especially Beethoven, and he always imagines himself engaging in violent and sexual acts while listening to it. Alex's parents are ineffectual, and his farcical Post-Corrective Adviser, P.R. Deltoid, cannot fathom why London's youth has turned to criminality. The next night, Alex gets into a fight with Dim and Georgie to assert his leadership. The gang proposes they rob a rich old woman's house. After an unsuccessful attempt to get the woman to open the door, Alex sneaks into the house while his friends wait outside. He gets into a fight with the woman and her cats, but the police soon arrive. His friends betray him, temporarily blinding him while they flee, and Alex is arrested. The police brutalize Alex and are elated to have caught him. Alex soon discovers the woman has died, and he is sentenced to 14 years of jail for murder. Alex, now known as number "6655321," spends two years in State jail, dealing with brutal wardens, homosexual prisoners, and mindless labor. He relates that Georgie has died. His one supporter in prison is the chaplain, who has taken Alex under his wing since Alex got interested in the Bible - little does he know that Alex entertains violent fantasies when reading the book. Alex asks about a new treatment - Ludovico's Technique - which frees the prisoner and ensures he remains free. The chaplain is skeptical about the treatment, as it eliminates the subject's power to choose. A cell scuffle results in Alex's killing a new prisoner, and the powerful Minister of the Interior asks the prison Governor to use Alex as a guinea pig for the new treatment.

Huck Finn - Life on the raft vs land Essay -- essays research papers

In the novel, The Adventures of Huckleberry Finn, by Mark Twain, Huck lives in two different settings. One of the settings is on land with the widow and with his father and the other is on the river with Jim. There are many differences of living on land as opposed to living on the Mississippi River. On land, Huck has more rules to live by and he has to watch himself so as not to upset the widow or his father. On the river, Huck didn't have to worry about anything except people finding Jim. He also had to worry about the king and the duke for a while. Even thought there are many differences of the two living styles, there are also some similarities. Life on land was filled with many difficulties. There were many rules that Huck had to follow set by both the widow and his father. The widow’s main goal was to â€Å"civilize† Huck into a member of society. She expected Huck to go to school, wear clean clothes, sleep in his bed, and go to church. She just wanted him to be like a normal child of his age. Even though Huck bends the rules a bit and tries to sneak a smoke here and there, he eventually grows to like living under the widow’s protection. He proves this point when he says, "Living in a house, and sleeping in a bed, pulled on me pretty tight, mostly, but before the cold weather I used to slide out and sleep in the woods, sometimes, and so that was a rest to me. I liked the old ways best, but I was getting so I liked the new ones, too, a littl...

Saturday, August 17, 2019

Analysis on “How State Budgets Are Breaking Us Schools”

Semester 2 2011/2012 SBLE 2083 Public Speaking (Group E) Prominent Speech Analysis on â€Å"How state budgets are breaking US schools† Lecturer: Nurul Nazifah binti Mat Noh Group Members: Koo Chi Haw205634 Thong Hsien Jin205770 Mohammad Azlan bin Annual206955 Muhammad Noorhafizi bin Noor Azay 207278 Title: How State budgets are breaking US schools In the beginning of the speech, the speaker did gained the attention and interest of the audience by relating the topic to the audience and stating the importance of the topic and relating the topic to the audience.He mentioned that â€Å"And these budgets  are the key for our future;  they're the key for our kids†. This example shows that he was trying to relate the audience about their future and their children. He also mentioned that â€Å"the great universities or community colleges —  most of the money for those things  is coming out of these state budgets†. This means that state budgets are crucial for education spending in the United States. The speaker did not introduce the topic clearly in the beginning of the speech. He begun his speech only by saying â€Å"Well, this is about state budgets. and â€Å"And these budgets  are the key for our future;  they're the key for our kids†. These might only gave hints or questions to audience about the topic that was going to present by the speaker. The speaker did establish credibility by showing the numbers about the state budgets. He mentioned â€Å"State budgets  are big, big money —  I'll show you the numbers†. This means that he has the information that is relevant and is qualified to speak on this topic. The speaker did not really preview the body of the speech.It would not be clear either. He said that the state budgets are important for their future and their kids which only gave hints about how state budgets problems are going to relate to education spending. The speaker should have preview the body of the speech by saying the main points to the audience in the beginning of the speech. The speech indeed related to audience. The speaker already pointed out that the topic is very important for the people to take considerations in the beginning, even though it is boring.The speaker was consistently informing the audience that if the state budget is not enough to cover all the expenses due to deficit of 10%, the young will more likely to be the victims as the majority of spending from the education will be swift to health-care medical for the old ones. It would affect many people of the U. S. in the future. The speaker also used the word â€Å"you† frequently. This indicates that he is trying to relate the audience during the speech. After reviewing the video, the main points are the implications of the imbalanced state budget to the education expenses in current and future.The speaker aided his main points by using an effective visual aids and further explain the main point by detailed elaborations and examples. Such methods are effectives to the audience to understand the topic clearly and relevant. First, the speaker introduced the state budgets and the deficits that occurred. Then, He moved on to the implication on the education spending which is the system will have a big squeeze if the expenses are mostly swift to health-care program by minimizing the expenses for the education in the deficit state budget.If such trend happened, the future education level will be weakened such as no bold experiment, no teacher effectiveness measurement and no incentives for the excellence teachers. The speaker used many type of methods in supporting main points. Firstly, the speaker gave extended example about the cause of the state budgets deficit. He mentioned that â€Å"When Jerry Brown was elected,  this was the challenge that was put to him. That is, through various gimmicks and things,  a so-called balanced budget  had led him to have 25 billion missing  out of the 76 billion in proposed spending.Now he's put together some thoughts:  About half of that he'll cut,  another half,  perhaps in a very complex set of steps,  taxes will be approved. But even so,  as you go out into those future years,  various pension costs, health costs go up enough,  and the revenue does not go up enough. So you get a big squeeze. † Secondly, the speaker also used hypothetical example such as â€Å"But we're spending 36 percent. Well what are we taking in? Simple business question. Answer is 26 percent. Now this leaves 10 percent deficit,  sort of a mind-blowing number. † The speaker also used statistic method to support the main points.For the example, â€Å"But we have a problem. Here's the overall picture. U. S. economy is big —  14. 7 trillion. Now out of that pie,  the government spends 36 percent. † The speaker used a causal order where he first identified the state budgets deficit and what cause these deficits. Finally, he pointed out on how this affects the education spending by the government. The language used by the speaker is overall clear and concise. The speaker did used some familiar words that are easily understand by the audience. The speaker also used many abstract words which refer to ideas or concepts in his speech.For examples, â€Å"medical innovation†, â€Å"gimmicks† and â€Å"big squeeze†. However, the speaker used terms like â€Å"Medicaid† and â€Å"Enron† in his speech that would be not familiar with the audiences who are not living in United States. In the middle of the speech, the speaker also used a repetition as the rhythm of the speech. For example, â€Å"Now how did we get here? How could you have a problem like this? †. The speaker only used signpost as the connective in the speech. The connectives are used as he had begun next main points with questions. For examples, â€Å"Now how did we get her e?How could you have a problem like this? †, â€Å"Well what's going to give? † and â€Å"So what do we need to do? †. This shows that the speaker invited himself to answer and get the audience more involving with the speech. However, the signposts used are not really effective because they did not show the next or previous main points in the speech. In the end of the speech, the speaker signaled the end of the speech by saying, â€Å"And so the bottom line is†, to let the audience know that the speech was going to stop soon. The speaker also used a crescendo ending for his speech.He made a conclusion in which his speech was built to a zenith of power and intensity that influence the audience to care about the state budgets. The speaker said that the state budgets are critical for their kids and their future. â€Å"Now I think this is a solvable problem. It's a great country with lots of people. But we have to draw those people in,  because this is abou t education. † The speaker did reinforce the central idea of the speech by making a dramatic statement. He said, â€Å"And just look at what happened with the tuitions  with the University of California  and project that out for another three, four, five years —  it's unaffordable. †

Friday, August 16, 2019

The Injustice of Plastics

Disadvantages of Plastics are 1. Flammable – This is definitely an advantage in that they can be melted down, however smoldering plastics can release toxic fumes into the environment. 2. Cost of Recycling – While recycling is a plus, recycling is a very costly endeavor. 3. Volume – In the United States 20% of our landfill is made up of plastics. As more products are being made of plastics, where will this lead us in the future? 4. Durability – This is an advantage as well as a disadvantage. Plastics are extremely durable, which means that they last a long time.Those plastics in the landfill will be there for years. Plastics make our lives easier, however is their cost on the environment worth it? We can only hope that soon someone will invent a way to safely and cheaply melt and reuse plastics. A plastic material is any of a wide range of synthetic or semi-synthetic organic amorphous solids[citation needed] used in the manufacture of industrial products. P lastics are typically polymers of high molecular mass, and may contain other substances to improve performance and/or reduce costs. Monomers of plastic are either natural or synthetic organic compounds.The word plastic is derived from the Greek (plastikos) meaning capable of being shaped or molded, from (plastos) meaning molded. [1][2] It refers to their malleability, or plasticity during manufacture, that allows them to be cast, pressed, or extruded into a variety of shapes—such as films, fibers, plates, tubes, bottles, boxes, and much more. The common word plastic should not be confused with the technical adjective plastic, which is applied to any material which undergoes a permanent change of shape (plastic deformation) when strained beyond a certain point.Aluminum, for instance, is plastic in this sense, but not a plastic in the common sense; in contrast, in their finished forms, some plastics will break before deforming and therefore are not plastic in the technical se nse. There are two types of plastics: thermoplastics and thermosetting polymers. Thermoplastics will soften and melt if enough heat is applied; examples are polyethylene, polystyrene, polyvinyl chloride and polytetrafluoroethylene (PTFE)[3]. Thermosets can melt and take shape once; after they have solidified, they stay solid.Overview Plastics can be classified by chemical structure, namely the molecular units that make up the polymer's backbone and side chains. Some important groups in these classifications are the acrylics, polyesters, silicones, polyurethanes, and halogenated plastics. Plastics can also be classified by the chemical process used in their synthesis, such as condensation, polyaddition, and cross-linking. [4] Other classifications are based on qualities that are relevant for manufacturing or product design.Examples of such classes are the thermoplastic and thermoset, elastomer, structural, biodegradable, and electrically conductive. Plastics can also be classified by various physical properties, such as density, tensile strength, glass transition temperature, and resistance to various chemical products. Due to their relatively low cost, ease of manufacture, versatility, and imperviousness to water, plastics are used in an enormous and expanding range of products, from paper clips to spaceships.They have already displaced many traditional materials, such as wood; stone; horn and bone; leather; paper; metal; glass; and ceramic, in most of their former uses. The use of plastics is constrained chiefly by their organic chemistry, which seriously limits their hardness, density, and their ability to resist heat, organic solvents, oxidation, and ionizing radiation. In particular, most plastics will melt or decompose when heated to a few hundred degrees celsius. [5] While plastics can be made electrically conductive to some extent, they are still no match for metals like copper or aluminum. citation needed] Plastics are still too expensive to replace wo od, concrete and ceramic in bulky items like ordinary buildings, bridges, dams, pavement, and railroad ties. Chemical structure Common thermoplastics range from 20,000 to 500,000 amu, while thermosets are assumed to have infinite molecular weight. These chains are made up of many repeating molecular units, known as repeat units, derived from monomers; each polymer chain will have several thousand repeating units. The vast majority of plastics are composed of polymers of carbon and hydrogen alone or with oxygen, nitrogen, chlorine or sulfur in the backbone. Some of commercial interests are silicon based. ) The backbone is that part of the chain on the main â€Å"path† linking a large number of repeat units together. To customize the properties of a plastic, different molecular groups â€Å"hang† from the backbone (usually they are â€Å"hung† as part of the monomers before linking monomers together to form the polymer chain). This fine tuning of the properties of the polymer by repeating unit's molecular structure has allowed plastics to become such an indispensable part of twenty first-century world.Some plastics are partially crystalline and partially amorphous in molecular structure, giving them both a melting point (the temperature at which the attractive intermolecular forces are overcome) and one or more glass transitions (temperatures above which the extent of localized molecular flexibility is substantially increased). The so-called semi-crystalline plastics include polyethylene, polypropylene, poly (vinyl chloride), polyamides (nylons), polyesters and some polyurethanes. Many plastics are completely amorphous, such as polystyrene and its copolymers, poly (methyl methacrylate), and all thermosets.Almost every market that you go today, you will see people carrying their shopping items in plastic bags. Right from food items to clothes to shoes, there is hardly any item that we do not use a plastic bag to carry. However, before stuffin g your home with different styles, colors and shapes of plastic bags, have you every considered the dangers that are inherent in using them? No? Then, reading through this article is a must for you. Go through the following lines and explore the disadvantages of plastic bags. After reading them, we are sure that you will prefer sticking to paper bags and the like. Dangers Of Using Plastic BagsEnvironmental Damage Plastic bags have been known to cause a lot of environmental damage. A single plastic bag can take up to 1000 years, to decay completely. This makes the bags stay in environments longer, in turn leading to great build-up on the natural landscape (much more than degradable materials like paper). In other words, the more plastic bags you use, the greater the chances of environmental damage. Threat To Animal Life As per Marrickville Council of Australia, as many as 100,000 whales, turtles and birds die have been reported to die every year, mainly because of plastic in their en vironment.Plastic bags not only have adverse effects on our natural habitats, but have also been found to be responsible for the death of many animals, mainly on account of the suffocation encountered on eating them. Suffocation Not only animals, infants and young children have also been reported to have lost their life, on account of plastic bags. Since plastic bags are thin and airtight as well, children often end up blocking their mouths and nostrils with them. In case they are not being monitored by an adult, this leads to suffocation and, in some cases, even death.Pollution Plastic bags are extremely durable. In case you are thinking of this as an advantage, just bring to mind an image of the huge landfill that you visited on the city outskirts, the other day. In most probability, majority of the rubbish present there will comprise of plastic bags only. In other words, plastic bags have led to a great increase in the pollution levels. Fumes Since plastic bags are not bio-degrad able, the only way to get rid of them is to burn them up. Though lighting a match to them is easy, it has more than its fair share of disadvantages.The biggest of them is that smoldering plastics can release toxic fumes into the environment, in turn taking the air pollution to much higher levels. Non-renewable One of the main disadvantages of plastic bags is that they are not renewable. The reason behind this is that they are made of petrochemicals, a non-renewable source of energy. They can be recycled, but not as easily as paper bags. Plastic bags can last for as much as hundred of years. In other words, long after you are no more, the plastic bag used by you will be in existence. Plastics are manufactured from petroleum.This brings a host of issues (destruction of habitat, extraction of crude oil, security issues from the volatile countries where oil is produced, processing of petroleum, chemical manipulation into various types of plastics). The manufacture involves many chemical s, many of which have not been sufficiently tested for their toxicological impact on humans or animals. The final plastic product is often a chemical entity that in and of itself has had insufficient toxicological and ecotoxicological testing. An example would be PVC, forms of which are banned in Europe but exist widely in children's toys in America.Recent controversies over plastic bottles (many toxicologists recommending not re-using plastic water bottles and not storing food in tupperware) have highlighted the potential risks. Exacerbating the problem is that science is only now advancing to where it can detect plastic components in human blood and then trace concentrations and link them to human ailments and diseases. The plastics industry itself often spins plastic and related plastic chemicals into a variety of products, some of which are hazardous and controversial (Teflon, PVC, Polyethylene, polystyrene, various silicones in body and hair care).Plastic-producing companies ar e often chemical companies or subsidiaries of chemical companies, both with poor track records when it comes to their adherence to regulatory compliance and their willingness to perform toxicological analysis on the products they make. Plastics often leech component chemicals, including hazardous chemicals, through common temperature changes. It is for this reason that toxicologists do not recommend storing very cold foods in plastics or heating foods (microwaving especially) in plastics. Plastics are durable materials.Thus, they are hard to eliminate once used and create tremendous waste. While some common plastics can be recycled (#1 and #2 plastics used in common soda and milk bottles), the vast majority cannot. They take up a lot of space in landfills and create air pollution when incinerated. The Disadvantages of Plastic Skylights Although plastic skylights are safer and sturdier than glass skylights, they do pose several long term disadvantages. Firstly, because they are made in single sheets, they can only be curved or bent in one area, which limits design options.Secondly, all plastics deteriorate in strength and light transmission as time passes, due to ultraviolet rays, heat and oxidation (and none can be entirely prevented). And finally, the life and service of plastic materials is highly unpredictable. Therefore choosing the plastics you will use for a plastic skylight requires much research and first hand knowledge. This is where Roof 101 can help – our contractors have worked with all kinds of plastics in plastic skylights, and their first hand experience could greatly assist you in reaching a decision.

Thursday, August 15, 2019

Describe a Place using Soapmaps

Several places exist in all over the world and probably you must have heard of many famous places within London itself like Tower Bridge or Buckingham Palace. However, I would not waste time explaining these places, which you might be already aware of. What I can usually describe well and might be to your interest is my lovely ‘House' – my home. Everyone possesses a home and what makes it special are the people who live in there. Impression of a house is developed from how much you care about it and how well you maintain or look after it. So, let us have a look on how does my house look like and what might be special about it. My house is situated in the South East of London. You might better know my place by the town, Edgware. The bright sunshine in the morning, from east sets my house on fire. The glittering windows from outside reflect my image to make me feel great about myself. The entrance of my house gives a heart welcome to all my guests and bestows good wishes to all my family members each time we trespass there. As you enter the main door, you will find a small lobby in which at the side, you will see a shoe rack lying in the corner and waiting for our footwears to go in there. You would probably consider this as strange but believe me, it is very useful especially in my house where you will find a polite notice reading â€Å"Please take off your shoes† in the lobby. I would myself regard this as ridiculous if I saw this notice at anyone's house but since I moved to this wooden floor house, I understand the importance of doing so. The big drawback of wooden flooring is that it gets dirty very quickly and this is the major factor enforcing us to put off our shoes at the entrance. Moving a few steps forward from the lobby, you will find the narrow stairs running upstairs to the bedrooms. I am not taking you to see my bedroom so early, so let us go a few steps forward instead of running in the stairs on the left. Continuing forward, you will find a glass door, which glistens and sparkles light from the beautiful chandelier inside. As you open the door, a nice room freshener smell fills your nose and you imagine yourself being in heaven. But when you open your eyes, you find yourself in my living room. As you move your eyes around, you see three posh black sofas lie on the corner of the three walls. They appear large enough and above that, they give you the superb comfort, as you would like to have after a hard working day. The centre table in the room displays several magazines and newspapers to read. My dad usually likes reading the newspapers and so do I but if talking about me, it would be sometimes only or you can simply call it occasionally. If you look around the walls, you will find my TV hung around on the corner of the fourth wall, which I would personally describe as the perfect place to put your TV. Firstly, it looks nice, saves space and lastly, it stands in level to your eyes. What else would you expect from this fantabulous TV? And this not the end to the ground floor of my house. There is also a two in one kitchen, which simply means kitchen to cook as well as dining room to eat your meal. The fitted kitchen with cupboards and shelves sometimes make me confuse as almost all shelves open in different direction and some are very strange to your normal expectations. But never mind; living in this house for a year has made me habitual to this everyday use of kitchen and its applications. This is the place I love the most in my house as my mum cooks me some really good food, which I would enjoy eating for days. You can smell this tasty food from the entrance of the house like me when I come to home from school and quickly rush to eat that nice food. Now, let us return back to the stairs, which I showed you at the beginning and I guess you probably wanted to climb up quickly at that time to look what is over there. So let me show you but be careful while climbing up the stairs. I would especially warn you, as the stairs are really narrow and you will probably end up slipping down if you have big feets. I have been through this experience several times and even my younger brother who likes to hang around has been a victim of this funny but painful thing. So, as you climb up those deep ocean blue stairs, you will find my parents' bedroom on the right that stays really neat and clean. You will find each and everything at its place, as my mum is really neat and organised and takes good care of the house as well as of myself. If you look over the red wall at front, you will find a big wallpaper of the ship sailing in the sea. My mum says that this is usually good to put in the house as it generates positive feelings and also represents and inspires your life as you imagine yourself being the ship and you are moving ahead in the world to gain those great heights and destinations. Well, I like my mum's understanding of things and admire her those precious thoughts, which you cannot just think of. So at last, I will show you my bedroom but do not be stunned and may be shocked to see it. As soon as you open the door, you will see large posters hung around on blue coloured walls. There are cartoon pictures and teddy bears, which will appear as sweet as me. On my bed you will find all clothes spread around and the room will appear totally diverse as compared to my parents' neat and clean bedroom. I have also got a computer system placed on the table at the corner of the room on which you will usually find me working. The big shiny mirror on the door of the cupboard reflects my image to appear as a shining star. The bright sunrays penetrate through three large windows just after my bed to reach my eyes and wake me up in the morning for school. I cover my face with my blanket to avoid the bright light but then the clock alarm goes off to wake me up. At last, I give up sleeping and get up to get ready for school in the morning. This is what my bedroom is like where you will find things different and alike. This is what my house offers and this is how my house is like. A great experience with a thrilling chill environment will fill you with freshness and make you cheerful to have a great day out. I hope you enjoyed this adventurous journey of my home and had a good idea of how a good home should be, like my one. Don't you think so?