Tuesday, August 25, 2020

In Search of Room-Temperature Superconductors

In Search of Room-Temperature Superconductors Envision a world where attractive levitation (maglev) trains are typical, PCs are extremely quick, power links have little misfortune, and new molecule indicators exist. This is the world wherein room-temperature superconductors are a reality. Up until now, this is a fantasy of things to come, however researchers are nearer than at any other time to accomplishing room-temperature superconductivity. What Is Room-Temperature Superconductivity? A room temperature superconductor (RTS) is a sort of high-temperature superconductor (high-Tc or HTS) that works nearer to room temperature than to outright zero. Be that as it may, the working temperature aboveâ 0  °C (273.15 K)â is still well underneath what the vast majority of us think about ordinary room temperature (20 to 25  °C). Underneath the basic temperature, the superconductor has zero electrical opposition and removal of attractive transition fields. While its a distortion, superconductivity might be thought of as a condition of immaculate electrical conductivity. High-temperature superconductors display superconductivity above 30 K (âˆ'243.2  °C). While a customary superconductor must be cooled with fluid helium to get superconductive, a high-temperature superconductor can be cooled utilizing fluid nitrogen. A room-temperature superconductor, conversely, could be cooled with conventional water ice.â The Quest for a Room-Temperature Superconductor Raising the basic temperature for superconductivity to a handy temperature is a sacred goal for physicists and electrical designers. A few specialists accept room-temperature superconductivity is incomprehensible, while others point to propels that have just outperformed beforehand held convictions. Superconductivity was found in 1911 by Heike Kamerlingh Onnes in strong mercury cooled with fluid helium (1913 Nobel Prize in Physics). It wasnt until the 1930s that researchers proposed a clarification of how superconductivity functions. In 1933, Fritz and Heinz London clarified the Meissner impact, in which a superconductor ousts interior attractive fields. From Londons hypothesis, clarifications developed to incorporate the Ginzburg-Landau hypothesis (1950) and infinitesimal BCS hypothesis (1957, named for Bardeen, Cooper, and Schrieffer). As per the BCS hypothesis, it appeared superconductivity was prohibited at temperatures over 30 K. However, in 1986, Bednorz and Mã ¼ller found the primary high-temperature superconductor, a lanthanum-based cuprate perovskite material with a change temperature of 35 K. The disclosure earned them the 1987 Nobel Prize in Physics and opened the entryway for new revelations. The most noteworthy temperature superconductor to date, found in 2015â by Mikhail Eremets and his group, is sulfur hydride (H3S). Sulfur hydride has a change temperature around 203 K (- 70  °C), yet just under very high tension (around 150 gigapascals). Analysts anticipate the basic temperature may be raised above 0  °C if the sulfur iotas are supplanted by phosphorus, platinum, selenium, potassium, or telluriumâ and still-higher weight is applied. Be that as it may, while researchers have proposed clarifications for the conduct of the sulfur hydride framework, they have been not able to recreate the electrical or attractive conduct. Room-temperature superconducting conduct has been asserted for different materials other than sulfur hydride. The high-temperature superconductor yttrium barium copper oxide (YBCO) may get superconductive at 300 K utilizing infrared laser beats. Strong state physicist Neil Ashcroft predicts strong metallic hydrogen ought to be superconducting close to room temperature. The Harvard group that professed to make metallic hydrogen announced the Meissner impact may have been seen at 250 K. In light of exciton-interceded electron matching (not phonon-intervened blending of BCS hypothesis), its conceivable high-temperature superconductivity may be seen in natural polymers under the correct conditions. The Bottom Line Various reports of room-temperature superconductivity show up in logical writing, so starting at 2018, the accomplishment appears to be conceivable. Be that as it may, the impact once in a while keeps going long and is malevolently hard to reproduce. Another issue is that outrageous weight might be required to accomplish the Meissner impact. When a steady material is delivered, the most evident applications incorporate the improvement of proficient electrical wiring and incredible electromagnets. From that point, anything is possible, undoubtedly. A room-temperature superconductor offers the chance of no vitality misfortune at a viable temperature. The vast majority of the utilizations of RTS still can't seem to be envisioned. Key Points A room-temperature superconductor (RTS) is a material fit for superconductivity over a temperature of 0  °C. Its not really superconductive at typical room temperature.Although numerous analysts guarantee to have watched room-temperature superconductivity, researchers have been not able to dependably duplicate the outcomes. Be that as it may, high-temperature superconductors do exist, with change temperatures between âˆ'243.2  °C and âˆ'135  °C.Potential utilizations of room-temperature superconductors incorporate quicker PCs, new techniques for information stockpiling, and improved vitality move. References and Suggested Reading Bednorz, J. G.; Mã ¼ller, K. A. (1986). Conceivable high TC superconductivity in the Ba-La-Cu-O framework. Zeitschrift fã ¼r Physik B. 64 (2): 189â€193.Drozdov, A. P.; Eremets, M. I.; Troyan, I. A.; Ksenofontov, V.; Shylin, S. I. (2015). Traditional superconductivity at 203 kelvin at high weights in the sulfur hydride framework. Nature. 525: 73â€6.Ge, Y. F.; Zhang, F.; Yao, Y. G. (2016). First-standards showing of superconductivity at 280 K in hydrogen sulfide with low phosphorus replacement. Phys. Fire up. B. 93 (22): 224513.Khare, Neeraj (2003). Handbook of High-Temperature Superconductor Electronics. CRC Press.Mankowsky, R.; Subedi, A.; Fã ¶rst, M.; Mariager, S. O.; Chollet, M.; Lemke, H. T.; Robinson, J. S.; Glownia, J. M.; Minitti, M. P.; Frano, A.; Fechner, M.; Spaldin, N. A.; Loew, T.; Keimer, B.; Georges, A.; Cavalleri, A. (2014). Nonlinear cross section elements as a reason for upgraded superconductivity in YBa2Cu3O6.5. Nature. 516 (7529): 71â€73. Moura chkine, A. (2004). Room-Temperature Superconductivity. Cambridge International Science Publishing.

Saturday, August 22, 2020

Strategic hr management Essay Example | Topics and Well Written Essays - 750 words

Vital hr the board - Essay Example Adopting the vital strategy to HRM commits one to deal with the acts of work force the executives and spotlight more on the operational issues. The HRM group centers around building a solid corporate culture that make an interpretation of the company’s targets into a particular and simple procedure (Mello 2011, p156). To help the necessities of the General Electric, the recently recruited HR experts went to Human Resources Leadership Program (HRLP) (Mello 2011, 157). The fundamental motivation behind this gathering was to prepare the recently employed HR proficient with sufficient abilities that would enable the organization to accomplish its set objectives and destinations. In light of this investigation, it is clear that taking a key to Human Resource Management includes concentrating on key issues influencing the organization. It obliges one to have sufficient aptitudes to completely see how to encourage powerful administration that expand development and builds efficiency. Preparing is significant as it encourages HRs to deal with vital issues viably that influence the organization. 2. Clarify the 4 jobs that describe vital H.R.M. as far as what it conveys to its inside clients. Initial, a HR should turn into an accomplice in system execution. He ought to be liable for the hierarchical structure and its way of life. To guarantee that the association is developing at a high rate, the HR should direct a hierarchical review to help chiefs recognize zones that need improvement and change (Mello 2011, p158). Furthermore, it is the duty of the HR to recognize techniques for redesigning achievement in the association. For this situation, a vital H.R.M guarantees that the association works viably and conveys quality items and administrations to its inside clients. Thirdly, the key job of H.RM ought to be to reinforce the representative and boss relationship. HR supervisors ought to define a workforce procedure that features the authoritative objectives that should be met (Fegley and Society for Human Resource Management (U.S.), 2006).â Lastly, it is critical to make a workplace that is liberated from risks. The key advancement of the working environment wellbeing obliges the need to direct hazard the executives and relieve potential misfortunes that may rise in the working environment. The H.R.M. should make a solid effort to increment employees’ fulfillment as this straightforwardly influences how they relate with customers. Fulfilled and skillful representatives consistently anticipate serve customers with enthusiasm. In this way, it is fundamental for the H.R.M. to construct a solid workforce that comprehends the significance of addressing customers’ needs. In this unique situation, it is essential to make a solid corporate culture that centers around the significance of fulfilling inner clients. The H.R.M. should anticipate convert its first time customers to successive and potential customers. This ought to persuad e representatives to try sincerely and give out the best administrations that pull in a wide number of customers. It should establish a solid framework for workers to accomplish the set objectives and destinations. 3. Name and depict every one of the 4 jobs HR must play in an information based economy so as to construct vital believability. A HR must be a relationship developer. He ought to create

Wednesday, August 5, 2020

Judd Logan is my homeboy

Judd Logan is my homeboy Every time I give a presentation about MIT, I always try to emphasize the quality of people here at The Institute. Judd Logan is yet another addition to this wonderful community. I really love this place. Its all because of the people. On another note, doesnt the name Judd Logan sound like a super heros day name? Kind of like Clark Kent by day Superman by night. For the MIT people, Tony Stark a/k/a Ironman.. Just my thoughts Thanks Matt ;-) ______________________________________________________________________________________ From Cattaraugus Reservation To MIT CATTARAUGUS INDIAN RESERVATION A Western New York teen is one of only 1,000 high school seniors across the nation to have earned a Bill and Melinda Gates Millennium Foundation Scholarship. And he comes from a place where college just isnt in the cards for many kids. Judd Logan was prepared to accepted a full academic scholarship to Syracuse University, until the prestigious Massachusetts Institute of Technology offered a similar deal. So in less than a month Logan will pack his bags for Boston. It is not surprising that scholarship offers of such magnitude would come to someone like Logan. He did after all attain a 98.9 grade point average before graduating second in his class at Gowanda High School. Nonetheless, Logan is going where very few from his home have, as a resident of the Cattaraugus Indian Reservation. I dont know many people anywhere that went to MIT, so hes a pretty big fish in a little pond right now, said his mother Lisa Maybee, who like her son grew up on the reservation and has called it home for her entire life save for a stint in the military. According to the National Center for Education Statistics, only about 13% percent of children who grow up on American Indian reservations attain a four-year college degree. Logan would like to be a computer scientist or engineer. But after earning his degree he would also like to return to live on the reservation where, according to the U.S Census Bureau, 42% of people his age and younger live in poverty. I want to leave and experience everything and then bring my experience back and say (to kids) if I can do it, surely theres other people who can, Logan told WGRZ-TV. It is remarks like that which make his already proud mother even more proud of her son. Thats something we both feel strongly about, returning something back to the community giving some people some inspiration. Hes amazing and I just dont know where it comes from but thats just who Judd is, she said. With MIT extending Logan a full-ride, he didnt need the Gates Millennium Foundation scholarship he was also awarded to pay for his undergraduate degree. But the foundation has notified him that it will be kept in reserve for him to use for graduate school. Click on the video icon to watch the story from 2 On Your Side Reporter Dave McKinley and Photojournalist Andy Golebiowski.

Saturday, May 23, 2020

Macbeth, By William Shakespeare - 1986 Words

Not All is as it Seems The crafty serpent appears next to Eve. The evil creature encourages her to eat fruit from the Tree of Knowledge, which God had specifically warned her not to do. The woman, unaware of the serpent’s true intentions, eats from the tree and gives some to Adam. Eventually, the pair realizes that they have been deceived by the snake, and they are consequently exiled from paradise. Sometimes acts which appear honest and good are really meant to mask the hidden desires of wicked people. These desires often have irreversible repercussions, which only accelerate the degeneration of morals and character. Throughout William Shakespeare’s Macbeth, the idea of murderous actions and their dire consequences establishes the†¦show more content†¦The idea of violence is brought up in each instance and too aids in the revelation of motive. In the play, Macbeth’s troubling hallucination of the bloody dagger reveals his secret longing to become king. Macbeth questions whether or not the dagger is a figment of his guilty conscious, stating, â€Å"Or art thou but / A dagger of the mind, a false creation, / †¦ There’s no such thing. / It is the bloody business which informs / thus to mine eyes† (2.1.37-49). Here it is evident that the dagger is a product of Macbeth’s imagination, and therefore there is a difference between what he sees and what is really there. Although it may seems as if the dagger symbolizes Macbeth’s guilt, it is more so a symbol of how Macbeth’s faà §ade differs so greatly from his true intentions. The reality which lies behind Macbeth’s will to kill the king, displays itself in the form of the ghostly dagger. When King Duncan first arrives at the Macbeths’ castle, they greet him with kind smiles and the foolish old man is all but unaware of the evil which resides in his hosts; this evil reveals itself in the form of the bloody dagger. The bloo d not only foreshadows the demise of Duncan, but unveils Macbeth’s inner demons and how he is really not the loyal kinsman he claims to be. The blood imagery present also assists in the development of the idea that the dagger, which literally leads Macbeth to kill the king, represents the lack of morals required to carry out such a deed. Hence, it

Monday, May 11, 2020

Mitigating The Impact of Disasters Essay - 1001 Words

Both disasters and catastrophes are the result of a hazard or hazards coming into contact with humans in a vulnerable position. (Mileti, 1999) A beachfront row of condominiums along the US Gulf coast is an example of a disaster waiting to happen. If the condominiums aren’t there and the beach is in a natural state when a hurricane blows in there will be no disaster or catastrophe because humans wouldn’t be impacted. Although the characteristics of disasters and catastrophes have many differences, the thing they do have in common is that they both require the ingredients of not just a natural hazard but also that the hazard intersects with humans. Natural hazards are inherently part of the environment of the earth. Blizzards,†¦show more content†¦Also, building new hospitals using construction methods that minimize impact and maximize safety and ensuring they are equipped and provisioned to be self-sufficient and operational post-impact are important proactive s teps. Other considerations that should be addressed are staffing demands and evacuation procedures in the event the building itself is impacted. Are there agreements in place with regional, out of state, federal and international medical and transportation organizations and facilities? Many of the mitigation activities regarding health and status capacity compliment the activities in the preparedness phase of EM but the preparedness efforts must also include education of the public and responders, specific emergency plans and hazard-specific training. Ideally the training exercises should involve all community groups as well as key players from outside the potential catastrophe impact area. Of course, not all catastrophic risks can be known before hand but events like massive earthquakes or direct-impact hurricanes can be planned for and should be known from the results of thorough risk analysis and hazard vulnerability studies. Knowing the hazard specific risks and vulnerabilities will facilitate the preparedness, response and recovery efforts regarding the health status of the citizens’ pre and post-impact. Is there a Veterans Administration Hospital or Home inShow MoreRelatedThe Importance of a Disaster Recovery Plan1296 Words   |  5 PagesDisasters are occurrences one cannot control. The economic movements are unpredictable as technologies, effects of climate change, and health issues continue to persist; these among other disasters cause shifts in activity in the global financial market. Business companies in return are the last entity to carry the loads of aftermath of these circumstances. They become pressed in crisis of recovery when for example a calamity struck an entire nation. Disaster recovery planning and risk managementRead MoreArticle Summary And Critique Of Intranets Can Mitigate Business Risks By James Robertson1072 Words   |  5 Pagesobjectives. The paper will also have a critique of the chosen article. Overview of the Paper A quick summary of this paper is that it entails how the intranet can be used in mitigating business risks and provide practical approaches to these solutions. Also, the article brings out clearly the causes of business risks and the impacts to the organizations. Summary of the Article Intranets Can Mitigate Business Risks The article is all about the approaches that an organization may use the intranet in itsRead MoreThe Importance Of Hazards931 Words   |  4 Pagespriority. When disaster strike, nations with limited economic resilience not only suffered from the impacts on the human life, physical infrastructure, economic assets and environment, but also effected to the nations development endeavour (Shook, 1997). Everyday many individuals and organizations invest their money in buying insurance to transfer potential risk to avoid uncertainty from the disasters by paying a certain premium. Risk transfer mechanism has been used for centuries, mitigating the financialRead MoreThe Department Of Homeland Securities 2014 Essay1078 Words   |  5 Pagesnot only for the local communities, but the nation as a whole. There are a number of ways for states, local communities, and tribal organizations to prioritize and assess the greatest risks applicable to them, and the means in which to implement mitigating measures to reduce the risk from identified threats and hazards. The National Preparedness Goal under the direction of Presidential Policy Directive 8 outlines the means to which all facets of the nation can prepare. The stated objective of theRead MoreBusiness Impact Analysis of Russell Landing Marina Essay582 Words   |  3 PagesBusiness impact analysis is the process of systematically addressing all of the risks associated with a solution and identifying if it actually worked. Many formulas exist, designed to show what factors are included when compiling an analysis. The simple formula of multiplying threats by your asset and dividing that total by mitigating factors represents an impact analysis. Threats are those instances that cause an operational or financial strain on your organization. These occurrences are the causeRead MoreHazards And Hazards Of Disaster Prevention928 Words   |  4 PagesImpediments to Disaster Prevention in Major Cities Reporting to the Japanese Cabinet, a panel researching on potential disasters reported the potential of 30-35 meters high disaster hitting Tokyo and other regions in future. The over-reliance on nuclear energy in some of these regions also poses a major threat whenever such disasters strike. The Southwestern Ohi Nuclear power plant was restarted amidst protests from the public. This shows some degree of awareness on the public’s side. Indeed, previousRead MoreEssay on Phases of Emergency Management915 Words   |  4 Pagesthis paper we will look at definitions and descriptions of each phase or component of emergency management, the importance of understanding interrelationships and responsibilities for each phase, some newer language and associated concepts (e.g., disaster resistance, sustainability, resilience, business continuity, risk management), and the diversity of research perspectives. Emergency management has been described for the past three decades as a â€Å"four phase† process, involving: †¢ Mitigation; †¢ Preparedness;Read MoreThe Problem Of Disaster Prevention933 Words   |  4 PagesMod 1 Case 2 LP Impediments to Disaster Prevention in Major Cities Reporting to the Japanese Cabinet, a panel researching on potential disasters reported the potential of 30-35 meters high disaster hitting Tokyo and other regions in future. The over-reliance on nuclear energy in some of these regions also poses a major threat whenever such disasters strike. The Southwestern Ohi Nuclear power plant was restarted amidst protests from the public. This shows some degree of awareness on the public’sRead MoreDisaster And Emergency Management894 Words   |  4 PagesVulnerability can be represented in a specific physical or geographic location, or those within a certain socioeconomic status, or demographic. The discussion of social vulnerability frequents the field of Disaster and Emergency Management, as it is an important factor in the planning and execution of mitigating possible risks that varying populations may face. Emergency managers in The United States of America use the Social Vulnerability Index (SVI) which uses U.S. census data to help identify communitiesRead MoreFeasibility Analysis Of Arnold Bakerys Business Impact Analysis Report701 Words   |  3 PagesArnold Bakery’s Business Impact Analysis Report The proposed electronic records system is the solution Arnold Bakery has been waiting for because the ingenious move to electronically capture all company records, will transform all operations at Arnold Bakery by increasing efficiency and effectiveness within Arnold Bakery. The designed feasibility analysis aims at explaining to all stakeholders of Arnold Bakery the importance of implementing this new proposed project. The employees of Arnold Bakery

Wednesday, May 6, 2020

Provides the following Free Essays

A Study Guide, which provides the following: a. An orientation of each chapter, along with an outline of the important topics being addressed. B. We will write a custom essay sample on Provides the following or any similar topic only for you Order Now Sample problems for the student to complete, with the worked-out solutions. C. Self-test questions (true/false and multiple choice) with answers. D. A tutorial on understanding the internal rate of return. E. An In-depth self-teaching supplement on capital-budgeting techniques. 2. Companion Website online study gulled for the student Includes true/false, multiple hooch, and short answer quizzes for each chapter. From my. Prenatal. Com/shown students can also access the Internet exercises, current events articles with questions, and Excel spreadsheets for the end-of-chapter problems. For the teacher: 1. A Test Item File provides more than 1600 multiple-choice, true/false, and short- answer questions with complete and detailed answers. It is designed for use with the Prentice Hall Custom Test, a computerized package that allows users to custom design, save, and generate classroom exams. 2. Companion Website provides academic support for faculty adopting this text. From the www. Prenatal. Com/shown text website, you can download supplements and lecture aids such as instructor’s manuals, lecture notes, Powering presentations, problems and case solutions, and chapter outlines. Register online or call your Prentice Hall sales representative to get the necessary surname and password to access these detail supplements or contact Prentice Hall Sales directly at 3. Powering lecture notes. These Powering graphics provide individual lecture outlines to accompany Foundations of Finance. These lectures are class tested and can be used as is or easily modified to reflect your specific presentation needs. 4. Color transparencies for the primary chapters of the text, including a brief overview of the chapter, some of the exhibits in the text, and example problems that are useful in lectures. 5 Excel spreadsheet solutions to end-of-chapter problems downloaded from www. Prenatal. Com/shown. For any teacher wanting information about the supplements, please contact the Prentice-Hall field representative for your area. Also, feel free to call any of the authors with any questions you may have. By calceolaria e. An in-depth self-teaching supplement on capital-budgeting techniques. 2. Companion Website online study guide for the student includes true/false, multiple choice, and short answer quizzes for each chapter. From www. Prenatal. Com/shown students can also access the internet exercises, current events articles with the necessary surname and password to access these digital supplements or contact Prentice Hall Sales directly at college_sales@prenhall. Com. 3. Powering as is or easily modified to reflect your specific presentation needs. How to cite Provides the following, Papers

Friday, May 1, 2020

Innovative Research in Computer and Communication †Free Samples

Question: Discuss about the Innovative Research in Computer and Communication. Answer: Introduction This report is about Headspace - the association that works with youth whose age is between 12 and 25 and suffering from mental ill health. The stress as well as anxiety are the main cause of their mental health. The suicide cases of young people in territorial NSW between 16 to 24 age group has been especially a cause of alarm, between Indigenous youth. The main issue was that the young one who is suffering from some dysfunctional behavior can analyze various experts before visiting any specialist. Every time he has to discuss his story again and again which is very much irritating for him. It can be a General Practitioner, a clinician, or a psychiatrist. Firstly, the patient has to go to the manager of Headspace, then after that they need to discuss the same with medical staff. The main objective of hospital is to address the health as well as prosperity issues of youngsters by giving a comprehensive stage of care. This would give comfort to young people that their help will be coo rdinated by primary care and concentrate on the 'ailment' as well as social incorporation and recuperation. The Non-Functional Requirements (NFR) may be characterized as the auxiliary class prerequisite that are mainly overlooked during the development procedure of an application. These requirements remain hidden, dominated or we can say are dismissed or overlooked. These requirements are very hard to manage and are the most costly in specific cases. NFRs turn out to be even more imperative with cloud framework on the grounds that the simultaneous load and reaction idleness are more helpless utilizing public systems as compared to being used on private systems. Comparatively much efforts are required to map NFR models into programming code. Building up a cloud based framework with useful prerequisites just isn't sufficient to develop a good as well as useful programming. NFRs ought to wind up noticeably an essential part of development process. Neglecting to address NFRs requirements in the designing process can make the product fail as its difficulty in the usage in spite of the fact all the functional requirements are fulfilled. By including non-functional requirements into the development process, the software application can handle all the requirements as well as it can provide the ease of use as indicated by the current principles. These requirements show how the framework acts and incorporates necessities managing framework execution, operation, required assets and costs, confirmation, documentation, security, portability as well as dependability. Fulfilling non-functional requirements is very important to build up a cloud based application speed up the opportunity to-the-marketing process. The main non-functional requirements are as following: (Devata, S. Olmsted, A., 2016). Usability The main users for the cloud based system solution will be the doctors team who can view the status of particular system online. The system will be easy to adopt. The condition of patient who really need the doctor assistance is entered into the system by doctor or medical staff, so that information once entered can be accessed by authorized users whenever required. (Kaur, H. Ahamad, S., 2015). Reliability - Easily accessibility, its accessibility as well as its reliability make cloud computing system a better answer for medicinal services interoperability issues. While frequently referred to as a potential obstacle to open cloud reception, expanded requirement for security and dependability prompts economies of scale because of its fixed part of speculation which is required to accomplish operational security for a reliable system. In case of hiring cloud computing space from the supplier, it makes cloud computing a minimal cost with more security. Coordinated Exchange empowers Headspace project to effortlessly and safely send the patient data, like lab reports and results, patient referrals, patient condition etc. to another specialist. This data is sent over the Internet in an encoded, secure, and reliable path from one specialist to another. (Telecom Regulatory Authority of India, 2016). Performance - The performance of the cloud framework is defined as the limit of the framework or programming in order to process the equal transactions every time as it is submitted to it without facing any error. Regardless of the way that the framework is functional as well as dependable when it neglects to make productive utilization of assets like CPU cycles, disk space etc. Its execution isn't great that is the execution of the framework isn't up to the check. Performance of the system is that how the execution of framework can perform regardless of in spite of the fact that the product will be able to reach its response time targets. It also finds that how the cloud based framework in Headspace project must have the ability to scale with incalculable exercises for each second, minute, or hour. Performance is the ability of system that various transaction can be made at the same time whether doctor is accessing the system or medical staff is using the system. It does not affect the database of the system. (Kaur, H. Ahamad, S., 2015). Security As the system which is to be implemented is based on cloud computing, therefore, it needs to be protected from any unauthorized access or malicious threat. These type of threats must not be allowable on the cloud based system. Security initiatives must be based on some standards or laws like HIPPA needs to be implemented on Headspace system because patient information is very confidential and no one has right to use it for wrong purpose. After implementation of cloud based system, strict rules must be implemented. (Md. Rahman, M. Ripon, S., 2013). As the functional requirements are based on the system, how it looks, what type of options it has, on the other hand, non-functional requirements are focused on how to use the system, what are the security concerns, is the system a reliable to use etc. In case of Headspace project, the healthcare system must be focused on what type of information it must save and it is considered as functional requirement. (Goldsmith, R., F., n.d). NFRs have a few qualities that are different as that of FRs. The non-functional requirements are subjective, relative, as well as interfacing. Subjective in light of the fact that they can be seen, deciphered, and assessed contrastingly by various individuals. Relative implies that the translation and significance of them may differ contingent upon the specific framework being created and also the contribution of stakeholder. Cooperating in light of the fact that they have a tendency to meddle, struggle or negate with each other. This implies accomplishing a specific NFRs can harm or help the accomplishment of different NFRs. Dissimilar to FRs, NFRs are more theoretical in nature. In developing a cloud based framework, clients regularly state NFRs as general objectives, for example, convenience, the capacity to recuperate from its failure, or great response time. Subsequently, these obscure objectives leave the issue with various translation among partner. (Mairiza, D. Zowghi, D., 2 009). Review of Cloud Based Solution Strengths - The primary favorable position of cloud computing is that Headspace don't have to pay for framework, its installation, required labor to deal with such foundation and support. In a cloud processing framework, there's a noteworthy workload shift. The recuperation of patient relies on the correct treatment. To get the correct treatment there must be appropriate communication amongst patients and specialists. Coordinating distributed computing and Headspace illuminate many issues. For better treatment consistent therapeutic supervision of interminable patients or habitants at remote, secluded and underserved areas is required. The innovative electronic healthcare administrations are required to be made accessible through a system whenever, wherever and to anybody. Cloud computing can be utilized for capacity as well as processing of gigantic medicinal records. These records will be accessible at cloud and can be easily accessible at any place. Specialists can utilize these r ecords to track and screen understanding patient health status. Patients can likewise see their records. (Chowdhury, C., R., 2014). Weakness - By switching to cloud based solution in Headspace, the main risks can be its security, its accessibility as well as its control to the third party shows that Headspace has positively no influence over where the data is stored. By having trust on the cloud supplier can be against the distinctive significance. Security as well as protection of data must be impenetrable. Other main challenge is its information accessibility, error restrictions, disaster reinforcement and fast response times. The unauthorized access of information brings about serious results to the organization and more cost in its recovery and reestablishing information and also notify the influenced people. (Lusk, R., 2012). The threat to compromise patient data is very high because of the inclusion of numerous groups, devices as well as applications attracted for the control of medicinal information due to an enhanced number of access focuses to the healthcare information of patients that is stored on cloud foundation. It plays an imperative part in keeping up and managing control over Headspace association medicinal information that is being stored crosswise over various remote cloud database areas. The confidentiality of data can be achieved by encrypting techniques and algorithms that incorporate public key sets, symmetric key, and length of the key and administration of the key in the situation of symmetric cipher. Security is thought to be a critical tenant of cloud framework w.r.t HIPPA standard and the trust of the human services associations end. The Headspace project must be given with the translucency in their operations and confirmation of security by the cloud provider organizations. (Khattak Abbas, 2015). In developing a cloud based framework for Headspace project, agile method will be used. In Agile method every development procedure appears as something else and the current strategies should be customized all together to best suit the undertaking prerequisites. It gives strategies to evaluate the advancement and dangers and furthermore the bearing all through the development lifecycle. For Headspace project, agile platform will be used because it helps to reduce the expenses as well as change of uncertainty. The main advantages of agile systems are as following: Advantages 1. It understands the necessities as well as changing nature of programming advancement by considering genuine activities regardless of their sizes. It advances cooperation. Everybody engaged with the advancement process cooperate at the same time on various territories of the product. A working programming item is accessible in the early periods of the product. Very few rules are applied to agile development process. It moreover requires the base measure of assets analyzed to different models. Here, planning is a willful stage and makes the procedure simple to oversee and adaptable. (Kannan, V. Jhajharia, S., 2014). Disadvantages - 1. Indistinct timelines: With the majority of its focal points, the adaptability of Agile could leave the door to delaying of project. Since the task needs to be reprioritized as well as developed with every cycle, the time can be extended into boundlessness. Expertise dependent groups: Agile must be intended for small multidisciplinary groups. It is implied to single individual for each part (i.e., the creator). High time duty: Agile is good if everyone is concentrated on the project. This is valid for Agile on the grounds that some part of the technique is centered around dynamic group contribution and up close and personal effort that could be tedious as compared to the conventional approach. Inclination to disregard documentation: The Agile model accentuates working programming over far reaching documentation. (Upwork Global Inc., 2015). References Agile vs. Waterfall: A Side-by-Side Comparison. Upwork Global Inc. (2015). Retrieved from - https://www.upwork.com/hiring/development/agile-vs-waterfall/ Chowdhury, C., R. (2014). A Survey of Cloud Based Health Care System. International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2014. Retrieved from - https://www.ijircce.com/upload/2014/august/17_ASurvey.pdf Consultation Paper on Cloud Computing. Telecom Regulatory Authority of India (2016). Retrieved from - https://www.trai.gov.in/sites/default/files/Cloud_Computing_Consultation_paper_10_june_2016.pdf Devata, S. Olmsted, A. (2016). Modeling Non-Functional Requirements in Cloud Hosted Application Software Engineering. Conference: CLOUD COMPUTING 2016, The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization Cite this publication. Retrieved from - https://www.researchgate.net/publication/301700605_Modeling_Non-Functional_Requirements_in_Cloud_Hosted_Application_Software_Engineering?enrichId=rgreq-b98a0caf80c0ec2f4aba0dbe9fd2277c-XXXenrichSource=Y292ZXJQYWdlOzMwMTcwMDYwNTtBUzozNTYyOTE4NTI2ODUzMTJAMTQ2MTk1ODAwNTUyNg%3D%3Del=1_x_3_esc=publicationCoverPdf Goldsmith, R., F. (n.d). Differentiating between Functional and Nonfunctional Requirements. Retrieved from - https://searchsoftwarequality.techtarget.com/answer/Differentiating-between-Functional-and-Nonfunctional-Requirements Kannan, V. Jhajharia, S. (2014). Agile vs waterfall: A Comparative Analysis . International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 10, October 2014. Retrieved from - https://ijsetr.org/wp-content/uploads/2014/10/IJSETR-VOL-3-ISSUE-10-2680-2686.pdf Kaur, H. Ahamad, S. (2015). A Case Study upon Non-functional Requirements of Online Banking System. International Journal of Computer Applications Technology and Research Volume 4 Issue 4, 220 - 225, 2015, ISSN:- 23198656. Retrieved from - https://ijcat.com/archives/volume4/issue4/ijcatr04041002.pdf Khattak, H., A., K. Abbass, H. (2015). Security Concerns of Cloud-Based Healthcare Systems: A Perspective of Moving from SingleCloud to a Multi-cloud Infrastructure. Retrieved from - https://www.researchgate.net/publication/282730079_Security_Concerns_of_Cloud-Based_Healthcare_Systems_A_Perspective_of_Moving_from_Single-Cloud_to_a_Multi-cloud_Infrastructure Lusk, R. (2012). Cloud Computing in the Health Care Setting: Advantages and Disadvantages. Retrieved from - https://www.enttoday.org/article/cloud-computing-in-the-health-care-setting-advantages-and-disadvantages/ Mairiza, D. Zowghi, D. (2009). Managing Conflicts among Non-Functional Requirements. Retrieved from - https://opus.lib.uts.edu.au/bitstream/10453/10861/1/2009001884.pdf Md. Rahman, M. Ripon, S. (2013). Elicitation and Modeling Non-Functional Requirements A POS Case Study. International Journal of Future Computer and Communication, Vol. 2, No. 5, October 2013. Retrieved from - https://www.ijfcc.org/papers/211-S037.pdf