Saturday, August 31, 2019

Buying Tesla and the Social Class of Green Technology

Electric Cars are not a new concept, but are finally gaining a market share in todays car market. These cars are extremely efficient and produce the least pollution out of any other car, however they have also become a symbol of status and wealth exemplified by Tesla Motor's fast and status-oriented automobile models.The article â€Å"Positive and Negative spillover effects from Electric Car Purchase to usage† by Klockner states how research resulted in the understanding that individuals who buy lectric cars have no deduction in the amount of miles put on the annual mileage of their gas using cars. In other words, buying an electric car does not change Tesla owner's consumption patterns. The ultimate green automobile is used more as a status symbol and companies such as Tesla Motors understand this and market primarily to the wealthy.This has created a form of â€Å"Green Aesthetic† which makes some consumers believe this is the way to gain entrance into an environmenta lly concerned upper class if they own these electric cars. Heider defines class as an order of which society divides people into sets based on perceived social or economic status. Even though individuals may want to reduce the overall carbon footprint, they lack the necessary financial stability to purchase a fuel efficient car like a Tesla.Owning such vehicles has become a type of â€Å"Electric Cool† where a status oriented society sees owning a tesla as being a method of exemplifying social strata. The middle and lower class have been encouraged to use much cheaper methods to educe their carbon footprint such as recycling, further confirming the previous notions of the â€Å"Green upper class. † Tesla claims to market to all buyers to build a customer base for the next ten years, however it is quite relevant that they target the base of people who can afford such high costs.The idea to create electric cars Is not new to the world, however the only way to make an act ual Impact on consumption patterns Is to locate more affordable electric vehicles, creating a Tesla line of ffordability. Tesla Motors is a multibillion dollar corporation that has the proper tools and minds to make an actual change happen on a global scale, however due to the high cost, still only the wealthy sector can currently afford these vehicles. Cheaper electric cars will not be developed by larger car manufacturers or marketed to the middle and lower class for years to come.Tesla is going lower In price and hopefully they will continue to do so. Buying Tesla and the Social Class of Green Technology By kiansthebest –Buying Tesla and the Social Class of Green Technology– â€Å"Positive and Negative spillover effects from Electric Car Purchase to Usage† by base of people who can afford such high costs. The idea to create electric cars is not new to the world, however the only way to make an actual impact on consumption patterns is to locate more affordable electric vehicles, creating a Tesla line of to the middle and lower class for years to come.

Friday, August 30, 2019

Fun Water Sports Essay

There are so many fun activities to do in, on, and around the water; thus, making it a difficult choice a as to which way to spend a day in the sun. Whether it’s a creek, lake, river or the ocean, there are may ways to have fun in the water, and stay cool. Surfing is a water sport in which the wave rider, referred to as a â€Å"surfer,† rides on the forward face of a wave, which is most often carrying the surfer towards the shore. Waves suitable for surfing are primarily found in the ocean, however, modern-day surfing can also be done in man-made sources such as wave pools. Snorkeling is a form of recreational diving that allows swimmers to explore the surface of oceans or lakes, and dive to shallow depths. Basic equipment used in snorkeling are the dive mask, fins and a snorkel. The dive mask allows clear vision of the underwater environment without damage to the eyes. Fins allow a swimmer to propel, his or her self, through the water efficiently and with minimal disturbance to the environment. The snorkel is designed to allow you to submerge your face and head at the surface of the water, and still breath. Additional snorkeling equipment includes; snorkel, vests for floatation, and protective wet suits for cold water diving conditions. Tubing is a water sport that usually takes place on a large body of water such as a lake or river. One or more tube riders, (often called â€Å"tubers†) tether their tubes to a powered watercraft, such as a ski boat or a pontoon boat. The riders are then towed through the water by the watercraft. Noodling is a type of fishing for the thrill seeker. Although the concept of catching fish with only the use of the arm in the water is simple enough, the process of noodling is more complicated. The choice of catfish as the prey is not arbitrary, but comes from the circumstances of their habitat. Flathead catfish live in holes or under brush in rivers and lakes, thus making the fish easy to capture. To begin, a noodler (fisherman) goes underwater to depths ranging from only a few feet, up to twenty feet, and places his hand inside a discovered catfish hole. Assuming all goes as planned, the catfish will swim forward and latch onto the fisherman’s hand, usually as a defensive maneuver, as an attempt to protect it’s hole. The fish can be particularly large, in which case, the noodler can hook his hand around its gills to retrieve his catch. This sport has been outlawed in several states due to the many dangers, and risks of the sport. As you can see there are a verity of water sports to choose from when you plan your next out door adventure. From surfing crystal blue waters, to taking chanced in a merry catfish hole, there is a water spot to suit every type of thrill seeker.

Thursday, August 29, 2019

Bipolar Disorder

Bipolar Disorder Essay Bipolar Disorder Essay Bipolar affective disorder has been a mystery since the 16th century. History has shown that this disorder can appear in almost anyone. Even the great painter Vincent Van Gogh is believed to have had bipolar disorder. It is clear that in our society many people live with bipolar disorder; however, despite the amount of people suffering from it, we are still waiting for explanations for the causes and cure. The one fact of which we are aware is that bipolar disorder severely undermines its victims ability to obtain and maintain social and occupational success. Because bipolar disorder has such debilitating symptoms, it is important that we keep looking for explanations of its causes and for more ways to treat this disorder. Bipolar has a large variety of symptoms, divided in two categories. One is the manic episodes, the other is depressive. The depressive episodes are characterized by intense feelings of sadness and despair that can turn into feelings of hopelessness and helplessness. Some of the symptoms of a depressive episode include disturbances in sleep and appetite, loss of energy, feelings of worthlessness, guilt, difficulty thinking, indecision, and reoccurring thoughts of death and suicide. The manic episodes are characterized by elevated or irritable mood, increased energy, decreased need for sleep, poor judgment and insight, and often reckless or irresponsible behavior. These episodes may alternate with profound depressions characterized by a deep sadness, almost inability to move, hopelessness, and disturbances in appetite, sleep, problems with concentrations and driving. Bipolar affective disorder affects approximately one percent of the population (approximately three million people) in the United States. It occurs in both males and females. Bipolar disorder is diagnosed if an episode of mania occurs whether depression has been diagnosed or not. Most commonly, individuals with manic episodes do experience a period of depression. Symptoms include elated, excited, or irritable mood, hyperactivity, pressure of speech, flight of ideas, inflated self-esteem, decreased need for sleep, distractibility, and excessive involvement in reckless activities. As the National Depressive and Manic Depressive Association (MDMDA) has found out in their research, bipolar disorder can create marital and family disruptions, occupational setbacks, and financial disasters. Many times, bipolar patients report that the depressions are longer and increase in frequency as the person ages. Many timess bipolar states and psychotic states are misdiagnosed as schizophrenia. The onset of Bipolar disorder usually occurs between the ages of 20 and 30 years of age, with a second peak in the mid-forties for women. A typical bipolar patient may experience eight to ten episodes in their lifetime. However, those who have rapid cycling may experience more episodes of mania and depression that follow each other without a period of remission. The three stages of mania begin with hypomania, in which patients report that they are energetic, extroverted and assertive. Hypomania progresses into mania and the transition is marked by extreme loss of judgment. Often, euphoric grandiose characteristics are displayed, and paranoid or irritable characteristics begin. The third stage of mania is evident when the patient experiences paranoid delusions. Speech is generally rapid and hyperactive behavior sometimes turns into violence. Sometimes both manic and depressive symptoms occur at the same time. This is called a mixed episode. Those affected are at special risk because there is a combination of hopelessness, agitation, and anxiety that make them feel like they could jump out of their skin. Up to 50% of all patients with mania have a mixture of depressed moods. Patients report feeling dysphoric, depressed, and unhappy; yet, they have the energy associated with mania. Rapid cycling mania is another form of bipolar disorder. Mania may be present with four or more episodes within a 12 month period. Lithium has been the primary treatment of bipolar disorder since its introduction in the 1960s. Its main function is to stabilize the cycling characteristic of bipolar disorder. In four controlled studies by F. K. Goodwin and K. R. Jamison, the overall response rate for bipolar subjects treated with Lithium was 78% (1990). Lithium is also the primary drug used for long- term maintenance of bipolar disorder. .

Wednesday, August 28, 2019

Proffesional project report on leaflet ordering (to be edited) Essay

Proffesional project report on leaflet ordering (to be edited) - Essay Example These provide customers with comprehensive information regarding tenancy, ownership, entitlements, neighborhood plans, safety, security, and all supportive systems forming part of the housing scheme. www.k-h-t.org This report presents the findings from a project undertaken to meet the assessment requirements of the FDSC in Housing Practice. The project was undertaken for KHT, the organization that sponsored the project leader on the FDSC. The overall aim of the project was to put a new system in place for ordering leaflets within the workplace. This involved developing a new system for ordering, storing and displaying leaflets, and gaining feedback from staff and service users on whether the changes had enhanced the availability of leaflets. The project report that follows provides an explanation of the context and rationale for the project, an outline of the previous system for ordering and displaying leaflets and its weaknesses; a description of the changes introduced identifying how each has helped to overcome weaknesses in the previous system; an outline of how the project was undertaken (i.e. the methodology); and findings from the initial evaluation and recommendations. The purpose of this project was to investigate the process and effectiveness of changes implemented in the ordering and displaying of customer information leaflets at KHT’s six offices across the borough. It was picked up on a short notice inspection that some leaflets that were being displayed were out of date. A new system of leaflet ordering was required to ensure the provision of current and up-to-date information to customers. Furthermore, in view of the need for cost-cutting during the current recession, it was considered essential to order all leaflets at one time, specifying accurately the total number of each type of leaflet required by all the offices. Additionally, an effective review process was required to ensure that the

Tuesday, August 27, 2019

The Australian Federal Government has proposed the mandatory filtering Essay

The Australian Federal Government has proposed the mandatory filtering of internet content, to make certain types of illegal content unavailable - Essay Example Through this, the people will know what they’re dealing with and will be able to create preventive measures on their own. Filtering of information can be considered as taking away a person’s right to get knowledge and learn from that information. With the filtering act, getting materials and information needed for studies and prevention, say for example child pornography and terrorism, will be limited, or even restricted. Access to the sites related to these extreme actions, including violence and sex, will allow people to figure out how to deal with these social problems and even eliminate it. Everyone has the right to know and learn, but if the public can only access limited information, people will crave for more to get the information and might result to more law violations and criminal acts. Even the rarest of the law that has ever been passed or implemented had violations on record, and since almost every person on earth is aware about the existence of internet and how materials for any reason can be accessed through it, people would still try to find a way to access it and obtain that information. With the technology nowadays, there are always means and ways to hack accounts. And the more restriction put into accessing certain websites would result to more incidents of hacking and infiltration. Aside from this, since the filtering act is a government project, the government may and can actually restrict information that would expose the bad side of the government. (Australia to Implement, 2008). Aside from television, radios and newspapers, the internet is also a reliable source to get information in current events. A lot of things happen in the government everyday and words spread faster in the internet. With the filtering act, the government can actually sort out information that they don’t want the

Monday, August 26, 2019

Homework Assignment Example | Topics and Well Written Essays - 250 words - 3

Homework - Assignment Example ng if or not the kanban system is the modern equivalent of Economic Quantity Research system and whether or not, the operating conditions are more important than the reorder point system used. According to the World Wide Web, kanban may be defined as a system that is designed to ensure that sufficient tools/supplies for workers for when and where they need it. In other words this production system is designed for continuous manufacturing. This system is most times compared to a supermarket. For example a supermarket that uses a Point-of-sale (POS) system, once a customer pays for something through the cash point and the items are scanned, at the end of the day, it sends the sale history to the warehouse. From there they will know what to order to replenish stock. In contrast to the Economic Order Quantity Research (EOC), which is basically an equation used to determine minimum and maximum stock levels they perform the same duties and provide satisfactory results. I believe they are similar in more ways than one but the main difference is the way they are carried out. 2. There is considerable evidence that getting the correct operating conditions is more important than the choice between MRP, kanban, or reorder point methods in the MPC system. How general do you believe this situation to be? Generally, I agree reason being, all the methods mentioned above provide basically the same results with little difference in calculation methods and time. So most definitely the only thing that would hinder positive and profitable results would be conditions under which they are

CASE review Study Example | Topics and Well Written Essays - 500 words

Review - Case Study Example manufacture of its furniture seeking to reduce costs at through relations with suppliers in cost-efficient labour countries and sourcing different parts from different countries. The other way in which IKEA was very involved in furniture manufacture is through IKEA’s engineers determining the kind of materials to use ensuring high quality yet at the lowest cost. Selection and manufacture of the best furniture were achieved through the internal competition of IKEA’s ten designers and freelancers allowing IKEA to have the best designs in the market. Flat Packaging is the other important point for IKEA in several aspects including reduced costs in shipping and labour and allowed IKEA to meet consumer need for low-cost furniture augmenting its market share and providing more success in both domestic and international markets. Another important factor for IKEA’s success is bright and inviting large (15000-35000 square feet) showrooms with huge price tags on the furniture and model rooms for the consumers increasing visibility. Listening to customer complaints allowed IKEA to overcome challenges in the American market through the incorporation of designs and product specification including measurement in inches and augmenting product size to fit American tastes and preferences. Having a self-service ethos through self-assembling of furniture, well explained pricing and specification in stores, and self-service strollers are well envisaged in IKEA’s business allowing for low-cost production and supply. Johnson developed original ideas for the success of J.C. Penny but demonstrated a lack of foresight and thinking in terms of operations, finance, and logistics that could have been the cause of his failures. He brought new designs and strategies that could have been more successful through the â€Å"Fair and Square† strategy if he envisioned its development with better thinking on operationalizing the plans without much impact and changes to the loyal customer

Sunday, August 25, 2019

Information for decision making Essay Example | Topics and Well Written Essays - 2500 words

Information for decision making - Essay Example Making decisions is an intelligent action that any normal human being performs several times each day, starting from the time one decides to get up out of bed and ending with what one decides to think about as one falls asleep at the end of the day. In between are thousands of decisions that are made following a few basic and simple rules, but these decisions may differ in their complexity. Some decisions are simple and have short-term consequences, such as deciding what to wear to school or at work, but some may be complex because they have long-term consequences, such as deciding what academic programme to take up in the university. The complexity of decision-making depends on several factors, of which the time frame – of making the decision and the consequences of the decisions made – is only one. Examples of other factors are the impact of the decisions on the person, the number of people involved in making the decision and who would be affected by the consequences of that decision, and the risks to which decision-makers are willing to expose themselves and their resources. Organisations, being made up of several people with a common set of objectives, are subject to these same factors that affect the way that decisions are made. However, unlike personal decisions that may affect only one person, i.e., the decision-maker, organisational decisions have an impact on everyone in the organisation, on the customers that the organisation exists to serve, the owners of the business, and on other parts of society in which the organisation operates. Thus, organisational decisions carry greater risks, which is the probability that the perceived effect of the decision would not be the same as or even close to what is originally intended. Decisions are made to achieve a specific outcome, and in the case of a business organisation, such an outcome is intended to be in line with the purpose and business of the organisation (Sitkin

Saturday, August 24, 2019

Resume Assignment Example | Topics and Well Written Essays - 750 words - 1

Resume - Assignment Example duated with a master’s degree in business administration and am highly competent to undertake the roles and responsibilities expected from an office manager. I have excellent communication and interpersonal skills; have proven leadership and conflict negotiation skills from the length of service working as an engineer. I possess commendable work ethics with manifested talent in problem-solving and in decision-making, within the scope of responsibilities. I have had extensive training and experience in undertaking the functions of planning, organizing, directing and controlling teams of subordinates from one’s work experiences. Finally, I can easily adapt and adjust to different work environments and value conformity to an organization’s code of discipline and adherence to ethical behavior. I am very much interested to becoming an instrumental part of your organization’s further growth and development. I assure you that the working relationship would be symbiotic and mutually beneficial. I am hereby including my resume for your perusal. I could be reached at any of the stipulated contact numbers indicated therein. I would be looking forward to hearing from you soon. OBJECTIVE To work in a global organization that uses both my education and experience for the application of managerial expertise, as well as research and development of new products relating to renewable resources. Thank you so much for the opportunity that you have accorded me during the scheduled interview yesterday, 31 August 2012. It was very illuminating that the candidate for the position of an office manager for your headquarters office would be given challenging responsibilities that range from managing, not only a diversely creative and innovative team, but also the chance to contribute one’s knowledge on designing, inspecting, and materials testing of the organization’s products to ensure quality at all stages of manufacturing, of which I am most capable of. I was advised by

Friday, August 23, 2019

Society in the 1905 Movie Review Example | Topics and Well Written Essays - 500 words

Society in the 1905 - Movie Review Example Instead of being morally upright, people were wicked; Shane was drowned uncomfortably to Sharret’s wholesomely lovely wife, Miriam (You tube). When Shane and other homesteaders went to town, He got involved in fist fighting with Ryker’s men. They ended up beating these men with Joe’s help, and the salesperson ordered them out. Ryker asserts that, with the help of his men, they will slay the next time when either Joe or Shane goes back to the town. This shows that, in this society, war was inevitable anywhere at any time. As tensions build up between the parties, Ryker hires an experienced gunslinger Wilson. After Wilson had murdered ex-confederate Frank Stonewall Torrey, a high tempered Alabama homesteader who was stopping him, homesteaders organized a funeral. Most of the homesteaders planed to leave the valley upon death of their strongman. This shows that, in this society, only the fittest could survive (You tube). The society was administered by warlords who kill others mercilessly. Joe Sterrett decides to execute Wilson and Ryker by firing several bullets on them. His first objective was to save the town. Joe continues to be free, and no action is taken against him. Could there be structured administration, Joe could have faced trial. The homesteaders felt unsecure since they are not strong enough to defend themselves. The society had vengeful characters; this is shown when the homesteaders saw a fire burning at a distance after funeral. The fire was set by Ryker’s men on one of the homesteaders’ house. A certain section of the society was forgiving but fearful. This is shown when the homesteaders decided to stop fighting, they re-embark on construction of their houses, even though, they fear that their houses could be set a blaze by their rivals. Joe decides to kill Wilson and his counterpart with the aim of saving the town. This

Thursday, August 22, 2019

DVD Technology Essay Example for Free

DVD Technology Essay It is truly a fact that we are living in this modern world which all technologies are advanced and improved. One of these technologies is in the DVD technology. Before, we normally used CDs as main novelty to the PC’s world but now, DVD is more used and preferred by multitudes of masses due to its admirable features which the CD doesn’t have. DVD was formerly represented as Digital Video Disc but then changed into Digital Versatile Disc and is considered as the next generation of the optical disc storage technology which is predicted and awaited to quickly substitute the CD-ROM disc along with audio compact disc around the following several years. DVD contains 4. 7 information’s gigabytes on one of its both sides or sufficient for a 133-minute movie. Having two layers on every of its both sides, it will keep up to 17 gigabytes of audio, video and other data. DVD-Video is the typical term for the DVD format designed for full-length motion pictures and which will drive with our television set. The DVD-ROM keeps computer information and is read through a DVD-ROM drive which is connected to a computer, the DVD-RAM is the writeable version while the DVD-Audio is a player which is designed to substitute our compact disc player (see Bellis, Mary. â€Å"DVD†. http://inventors. about. com/library/inventors/bldvd. htm). A DVD with correctly structured and formatted video substance is a DVD-Video. The DVDs with correct structured and formatted audio are termed as DVD-Audio discs. And everything as well is named as a DVD-Data disc as well as the other types of DVD discs which have video (Wikipedia, free encyclopedia. August 27, 2006). The purposes of this study are to: (1) know the history of DVD technology; and (2) be acquainted with its useful features and its functions; and how it is being distinct from CD. History The invention of DVD was all started in early of 1990s which two high-density optical storage standards were being technology advanced: the first one was the MultiMedia Compact Disc which was supported by Sony and Philips; and the second one was the Super Density disc which was approved and accepted by Time-Warner, Hitachi, Pioneer, JVC, Mitsubishi Electric, Toshiba, Thomson, and Matsushita Electric. The IBM president named Lou Gertsner has exerted an effort to join and bring together the two companies to back up solitary standard, getting ahead a repeat of the expensive and inflated format war amongst Betamax and VHS in 1980s (Wikipedia, free encyclopedia. August 27, 2006). In 1994 of May, Philips and Sony promulgated that they would be willingly and jointly develop a newfangled high-density medium popularly known as Digital Video Disc or DVD. This new technology was considered as the successor to compact discs or CD-ROM for computers and substitute laserdiscs and VHS tapes in the amusement industry. Just like a CD, DVD discs have similar diameter-about 120mm and thickness is about 1. 2 mm- just as Compact disc has but DVD is more advance and useful due to its capability to use both discs’ sides for data storage. The large video games which need and require a number of CDs would merely necessitate only one DVD disc. Later on, newfangled technology’s development instantaneously induced dilemmas of a political nature. The Warner Home Entertainment and Toshiba declared their own project to work out the same but yet precisely distinct from DVD technology at the same time. Associations like the Hollywood Digital Video Disc Advisory Group had a sensible and rational interest in this technology’s development. Movie suppliers started to stir up disagreements and controversies which concern the essential of copy protections in the DVD requirement and description. But then, Sony was the first to display its DVD technology. In 1995, John Eargle explained and illustrated the presentation which was conducted at the Winter Consumer Electronics Show. In his writings entitled â€Å"The Great DVD debate† stated that: â€Å"its color and sharpness was more than a match for the Laserdisc â€Å". But Eargle’s attention was on the technological requirements which had been formally and legitimately promulgated in December of the same year. The DVD’s intensification and enlargement data density was credited to a laser of a color advanced in the light spectrum and a technology that were being technologically advanced with 3M which permit the laser to be focus again to one second â€Å"layer† in the disc. It has a double-layer disc which amplifies the volume and dimensions to 7. 4 gigabytes. Throughout the spring of 1995, the disagreement of both developers had been stimulated through Toshiba’s personal growth and advancement of a two-layer disc named as SD or Super density (Chapin, R. â€Å"History of DVD†). DVD recordable and rewritable DVD recordable and DVD rewritable denote to DVD optical disc formats which can be â€Å"burned† either rewritable or write once format. DVD recordable is an overall name which denotes to both rewritable and writes-once formats, while DVD writable denotes solely to rewritable formats. The DVD promoted and marketed as 4. 7 GB might seem to keep not more than that for the reason that manufacturers quote the volume of a writable DVD disc utilizing decimal prefixes instead of the binary prefixes utilized by number of software. On the other hand, a 4. 7 GB DVD can be able to accumulate 4. 7 billion bytes, utilizing the binary prefixes which has similar capacity is approximately 4. 38 GiB (Wikipedia, free encyclopedia. August 18, 2006). Dual Layer Recording Dual Layer recoding permits DVD-R and DVD+R discs to accumulate and put in storage extensively more info or data which is capable of 8. 5 Gigabytes per disc, when contrasted with 4. 7 Gigabytes designed for single-layer discs. The DVD-R DL or â€Å"dual layer† was technologically advanced for the DVD Forum by the Pioneer Corporation while the DVD+R DL or â€Å"dual layer† was technologically advanced intended for the DVD+RW Alliance by Sony. Below are the two figures of DVD-R DL and DVD+R DL (Wikipedia, free encyclopedia. August 28, 2006). Figure of DVD-R DL Double Layer DVD+R Its Restrictions The DVD-Video includes four corresponding systems designed to limit and constraint the DVD user in a variety of procedures and these are the Content Scrambling System, Region codes, disabled user operations (UOP) and Macrovision. *Content Scrambling System* It is a Digital Rights Management or DRM plan make used on various DVDs. It make uses a weak, proprietary 40 bit stream cipher algorithm which has successively been compromised. It was in 1996 that the system was presented and established (wikipedia, free encyclopedia. August 26, 2006). *Region Codes* it is the programming practice, chip, physical barrier, or code which is make used to stop or block the playing media designed for a device which comes from a place where it is introduced and distributed on the version of similar device distributed in another place. It is a kind of a form of vendor lock-in (Wikipedia, free encyclopedia. August 26, 2006). *Disabled User Operations* DVD-Video permits the disc to identify or indicate whether or not the handler may carry out any operation like skipping chapters, rewinding or forwarding, selecting a menu which is fundamentally any function on the remote control. This system is named as Prohibited User Operations or User Operation Prohibitions. *Macrovision* It is a company which makes electronic prevention plans and was established in 1963. The term is occasionally used to denote to specific video copy prevention plans which were technologically advanced by the company. Its features Some of the DVDs main features are: (1) copy protection built into standard; (2) DVD-ROM for improved multimedia and games applications; (3) every format uses a common file system; (4) DVD-Audio for advanced quality music, graphics and other features and surround sound and optical video and many others; (5) Backwards compatibility with current CD media and many others (see DVD (Digital Versatile Disk)†. http://www. usbyte. com/common/dvd. htm#Introduction). Hence, DVD it is widely used now globally. ______________________________________________________________________________ References: 1. Bellis, Mary. â€Å"DVD†. http://inventors. about. com/library/inventors/bldvd. htm) 2. †DVD†. August 28, 2006. http://en. wikipedia. org/wiki/DVD 3. Chapin, R. â€Å"History of DVD†. http://www. miqrogroove. com/writing/History%20of%20DVD. html 4. â€Å"DVD recordable†. Wikipedia, the free encyclopedia. August 18, 2006http://en. wikipedia. org/wiki/DVD_recordable 5. â€Å"Content Scramble System†. August 26, 2006. http://en. wikipedia. org/wiki/Content_Scrambling_System 6. â€Å"DVD (Digital Versatile Disk)†. http://www. usbyte. com/common/dvd. htm#Introduction

Wednesday, August 21, 2019

Education in Pakistan Essay Example for Free

Education in Pakistan Essay Education in Pakistan is overseen by the governments Ministry of Education and the provincial governments, whereas the federal government mostly assists in curriculum development, accreditation and in the financing of research. The article 25-A of Constitution of Pakistan obligates the state to provide free and compulsory quality education to children of the age group 5 to 16 years. â€Å"The State shall provide free and compulsory education to all children of the age of five to sixteen years in such a manner as may be determined by law†. [3] The education system in Pakistan is generally divided into five levels: primary (grades one through five); middle (grades six through eight); high(grades nine and ten, leading to the Secondary School Certificate or SSC); intermediate (grades eleven and twelve, leading to a Higher Secondary (School) Certificate or HSC); and university programs leading to undergraduate and graduate degrees. [4] The literacy rate ranges from 87% in Islamabad to 20% in the Kohlu District. [5] Between 2000—2004, Pakistanis in the age group 55–64 had a literacy rate of almost 30%, those aged between 45–54 had a literacy rate of nearly 40%, those between 25–34 had a literacy rate of 50%, and those aged 15–24 had a literacy rate of 60%. [6] Literacy rates vary regionally, particularly by sex. In tribal areas female literacy is 7. 5%. [7]Moreover, English is fast spreading in Pakistan, with 18 million Pakistanis[8] (11% of the population)[8] having a command over the English language, which makes it the 9th Largest English Speaking Nation[9] in the world and the 3rd largest in Asia. [8] On top of that, Pakistan produces about 445,000 university graduates and 10,000 computer science graduates per year. [10] Despite these statistics, Pakistan still has one of the highest illiteracy rates in the world. [11] Education Expenditure as Percentage of GDP Public expenditure on education lies on the fringes of 2 percent of GDP. However, the government recently approved the new national education policy, which stipulates that education expenditure will be increased to 7% of GDP,[22] an idea that was first suggested by the Punjab government. [23] Author of an article, which reviews the history of education spending in Pakistan since 1972, argues that this policy target raises a fundamental question: What extraordinary things are going to happen that would enable Pakistan to achieve within six years what it has been unable to lay a hand on in the past six decades? The policy document is blank on this question and does not discuss the assumptions that form the basis of this target. Calculations of the author show that during the past 37 years, the highest public expenditure on education was 2. 80 percent of GDP in 1987-88. Public expenditure on education as a percentage of GDP was actually reduced in 16 years and maintained in 5 years between 1972–73 and 2008-09. Thus, out of total 37 years since 1972, public expenditure on education as a percentage of GDP either decreased or remained stagnant for 21 years. The author argues if linear trend were maintained since 1972, Pakistan could have touched 4 percent of GDP well before 2015. However, it is unlikely to happen because the levels of spending have had remained significantly unpredictable and unsteady in the past. Given this disappointing trajectory, increasing public expenditure on education to 7 percent of GDP would be nothing less than a miracle but it is not going to be of godly nature. Instead, it is going to be the one of political nature because it has to be invented by those who are at the helm of affairs. The author suggests that little success can be made unless Pakistan adopts an unconventional approach to education. That is to say, education sector should be treated as a special sector by immunizing budgetary allocations for it from fiscal stresses and political and economic instabilities. Allocations for education should not be affected by squeezed fiscal space or surge in military expenditure or debts. At the same time, there is a need to debate others options about how Pakistan can invent the miracle of raising education expenditure to 7 percent of GDP by 2015. [24]

Tuesday, August 20, 2019

Genesis Of Army Air Defence History Essay

Genesis Of Army Air Defence History Essay What happened in Kuwait Iraq necessitates a review of the attitude towards the army air defence and the countrys entire AD systemà ¢Ã¢â€š ¬Ã‚ ¦.. When we ask ourselves, did it work in Iraq, we have the answer, mostly it did not. Russian Minister of Defence Yazov NATO defines air defence as all measures designed to nullify or reduce the effectiveness of hostile air action. They include ground and air based weapon systems, associated sensor systems, command and control arrangements and passive measures. It may be to protect naval, ground and air forces wherever they are. However, for most countries the main effort has tended to be homeland defence. NATO refers to airborne air defence as counter-air and naval air defence as anti-aircraft warfare  [2]  . Missile defence is an extension of air defence as are initiatives to adapt air defence to the task of intercepting potentially any projectile in flight. In some countries, such as Britain and Germany in World War II, the Soviet Union and NATOs European Command, ground based air defence and air defence aircraft have been under integrated command and control. Nevertheless, while overall air defence may be for homeland defence including military facilities, forces in the field, wherever they ar e, invariably deploy their own air defence capability generally referred to as Army Air Defence. A surface based air defence capability can also be deployed offensively to deny the use of airspace to an opponent. This is the central idea of this article. THE EVOLUTION There are two things that make Air Defence (AD) necessary something to defend and an airborne threat. The threat from air existed earlier than the airplane. There existed a concept of air defence much before the Write Brothers flew the first aircraft in 1903. In August 1861, an American Aeronaut while on his balloon, reported the first anti aircraft fire  [3]  . This was one of the pioneering attempts in active air defence. The air defence artillery (ADA) began its evolution, when Col RP Davidson of USA built the first automatic AD weapon around 1909  [4]  . However, very little work was done in the field of AD Doctrine, as the military leaders were yet to realize the importance of air defence. The substantial air threat encountered in World War I triggered the development of dedicated ADA. In 1914, when the Allied air attacks on Germany became more persistent, the Germans exploited this new weaponry and called it Flugzug Abwehr Kanomen or Flak  [5]  . Sound location and search lights were the main means of surveillance. The establishment of London Air Defence Area (LADA) in July 1917, was pivotal as it was the first step towards centralization integration of assets like FF units, AA Gun Batteries Search Light Batteries into one entity. At the end of World War I, to facilitate quick demobilization, the AD elements of great powers were broken up. During the inter-war period with the evolution of AF, to control Englands airspace Air Defence Great Britain (ADGB) was formed in 1925. This was the first time AF was integrated for the AD which had two distinct elements: Royal AF Bombing Formations and the Fighting Area. Fighting Area was made up of ten sectors under GOC Ground Troops who would control all ground base elements of AD  [6]  . The Garrison Artillery was also abolished and its AD units were transferred to Field Artillery. In 1930s the development of radars brought about another renaissance for the AD and fostered induction of surveillance radars and better guns. The Abyssinian Crisis in October 1935 saw the first overseas deployment of AD, when the 1st AD Brigade was deployed in Egypt to protect the English against Italian attacks. The Ground Commander continued to be in charge of the local air defences as he could coordinate allocation of resources, Passive AD (PAD) measures and deception. Procedural Air Control measures were conceived by the Japanese after the US Doolittle Raids on Japan in 1942  [7]  . However, at no time were the interceptors and ADA placed under a single commander  [8]  . The Japanese defeat through air power is one classic example of the enormous price a nation had for inadequacies and poor air defences. It was Japanese air threat in SE Asia during the Second World War which forced British Government to raise AD units in India. Thus the history of AD Artillery in India began 1939 onwards when a few Indian troops began to be trained in the use of the 3 inch gun as part of the Anti-aircraft (AA) Batteries of Hongkong and Singapore Royal Artillery (HKSRA) and Indian Artillery. From 1941 onwards AA units and training establishments began to be raised in India.  [9]  The orgaisation of AA units and formations, though akin to artillery for command and control, evolved on the basis of gun density requirement for protection of Vulnerable Points and Areas. During the World War II, the Indian LAA Regiments were awarded for their dedication and acts of valour in the face of the enemy. At the time of partition only two AD Artillery units viz 26 LAA and 27 LAA Regiments came to India while the oldest AA Establishment the 1 Training Battery failed to survive the partition  [10]  . We have come a long way since then, graduating from ACK ACK (AA) to the Air Defence Branch of Regiment of Artillery, creation of a separate Corps of AD Artillery in 1994 and then renaming it as Corps of Army Air Defence in 2005  [11]  . However, a lot of ground still remains uncovered and today in spite of having AIR DEFENCE ARTILLERY OF USA Air Defence Artillery originated from the Coast Artillery Corps which was created after the Revolutionary War to defend the US coasts against naval attack and bombardment. As the US entered World War I in 1917, Coast Artillery units were detailed as Anti Aircraft Artillery(AAA) units. Weapons for these units were procured from France (75 mm Guns) but there was no doctrine. These units entered World War II beginning with the engagement of the Japanese at Pearl Harbor. German V2 Rockets led to the development of US field missile systems. Today AAA refers to the combat group that specializes in anti-aircraft weapons (such as surface to air missiles). In the US Army, these groups are composed of mainly air defence systems such as the PATRIOT Missile System, Terminal High Altitude Air Defence(THAAD), and the Avenger Air Defense system which fires the FIM-92 Stinger missiles. The Air Defence Artillery branch descended from the Anti-Aircraft Artillery (part of the Field Artillery) into a se parate branch on 20 June 1968  [12]  . Eqpt. Corps AD/EAC DIVAD FUTURE DEVP REMARKS PAC 2 GEM (100KM/ 55KM)* AVENGER SLAMRAAM *RANGE/ ALTITUDE PAC 3 (100/ 55) STINGER MEADS THAAD (200/ 150) BSFV C-RAM LINEBACKER SLAMRAAM :Surface Launched Advance Medium Range Air to Air Missile MEADS: Medium Extended AD System BSFV: Bradley Stinger Fighting Vehicle C-RAM: Counter Rocket, Arty Mortar Division Air Defence(DIVAD) Units. These are Short Range Air Defence (SHORAD) battalions tailor made for the formations they support with each of them having about three to four batteries. Infantry, Mechanised Infantry, Armoured, Air Assault and Air Borne Divisions have their own DIVAD battalions. Non DIVAD units. These are High and Medium Air Defence(HIMAD) Battalions at both Corps and Echelons Above Corps (EAC) levels equipped with Patriot THAAD systems. The Patriot Battalions have about five batteries. Patriot is a long-range, high and medium altitude, all-weather Air Defence system to counter Tactical Ballistic Missiles(TBMs), cruise missiles and advanced air craft. The current force of 12 Patriot Bns, 13 Avenger Bns four AMD Bns is planned to be reorganized into 16 AMD Bns ( equipped with MEADS/ THAAD) nine SLAMRAAM Bns. The 32d Army Air and Missile Defense Command (AAMDC) is a one-of-a-kind theater level Army air and missile defense multi-component organization with a worldwide, 72-hour deployment mission. 32d AAMDC consists of two brigades, 11th Air Defense Artillery and 35th Air Defense Artillery; both stand ready to accomplish any mission anywhere, anytime in support of the warfighting CINC. Recent contingency deployments to Southwest Asia and an intense exercise schedule in Korea exemplify the vital role and mission that the organization plays  [13]  . The Army Air and Missile Defence Command (AAMDC) is the Armys combat organization for planning, coordinating, integrating, and executing AD operations in support of the army service component commander (ASCC), the Army forces (ARFOR) commander, the joint force land component commander (JFLCC).  [14]  A majority of air and missile defence (AMD) coordination of interest to ADA occurs between the Area Air Defence Commander (AADC) and the JFLCC in most theatres. The JFLCC integrates Army capabilities into joint air and missile defence efforts through close coordination with the AADC. When the AAMDC is in theatre, the AAMDC commander will normally be designated the DAADC and will be the principal integrator for the JFLCC to the AADC on air and missile defence. An AAMDC liaison team works closely with the AADC and his staff and the BCD (Battle Space Coordination Center) to accomplish air and missile defence integration  [15]  . THE AIR DEFENCE OF RUSSIA The first Soviet AD Units was raised with the est of 1st AAA Regt at Leningrad in 1924. The air def directorate was formed in 1932. In November 1941, motivated by increasing German raids on Moscow Leningrad, National Air Defence Forces or PVO Strany was formed and in 1948 it became a separate service  [16]  . The organisation of PVO was very peculiar as it had its separate AD air crafts. The Air Defence Forces formerly the Air Defense Troops of the Nation (Russian: à Ã¢â‚¬â„¢Ãƒ Ã‚ ¾Ãƒ Ã‚ ¹Ãƒâ€˜Ã‚ Ãƒ Ã‚ ºÃƒ Ã‚ ° à Ã… ¸Ãƒ Ã¢â‚¬â„¢Ãƒ Ã… ¾, Voyska ProtivoVozdushnoy Oborony, Voyska PVO and formerly ProvitoVozdushnaya Oborona Strany, PVO Strany) was the air defence branch of the Soviet Armed Forces  [17]  . By 1958 separate service , AD of ground troops PVO SV was established which was responsible for AD of army assets. Operating two different ADs, PVO Strany PVO SV and also two different AFs had its inherent command control problems. So, in 1981 PVO Strany was reorga nised and its name was changed to Voyska PVO (AD Tps). The Army Air Def was made subordinate branch to Voyska PVO and was called the AD of Troops (Voyskovaya PVO). Prior to dissolution of Soviet Union, PVO was the second largest independent service of Soviet armed Forces and it consumed major share of military allocation.  [18]  On disintegration of the Soviet Union, President Yeltsin signed a new defence policy document in Aug 1998 which established a single system of military administrative division of Russian territory. This replaced the earlier military districts with six integrated strategic areas or Zones. In 1998 the AD was merged with the Air Force (VVS) and by 2003 the RVSN i.e Strategic Missile Force Army Aviation units were merged with AF. The AF is organised into six Air AD armies which are operationally under op control of military zone/district commanders. Each zone is divided into AD Districts Districts are further divided into AD Sectors . Air defence of impor tant areas is under Missile Bdes. Air surveillance and intelligence is responsibility of Radio Brigades. The overall AD system of Russian includes :- Space defence troops. AD troops (Strategic). Army AD Troops. Naval Anti Aircraft Troops. D:Documents and SettingsAdm TrgDesktopCapture456.PNG Eqpt. MISSILE BRIGADES ARMY AD TROOPS FUTURE DEVP REMARKS SA-3 PECHORA (25KM/ 15KM)* SA-6 KVADRAT/ SA- 11 GRADFLY SA-20 TRIUMF S-400(400/30) *RANGE/ ALTITUDE SA-10 GRUMBLE (200/ 90) SA -8 OSA AK/ SA-15 PANTZYR S1 SPAD (4/6) SA-12 GLADIATOR (90/ 15) SA-19 TUNGUSKA DZHIGIT(SA 16/18) SA-17 BUK M2 (42/25) $ SA-18 IGLA 2/S ANTEY 2500/ S-300 VM (200/30) $ 4 TH GENERATION SA-5 GAMMON (200/20) KS 30/ S-60/ ZU 23 @ @ GUN SYS Russian AD doctrine is defensive in nature. The anti aircraft fire is coordinated by the AD Sector and AD Missile Brigades are responsible for fire control in a specific sector. The overall AD network is completely integrated with Ranzir CP, Baikal IE systems and Polyana 4E systems  [19]  , for each level, which get inputs from AWACS through compatible integrated data transfer system. They have developed the S- 300 series S-400 series of Missiles which are Counter Missile system. The deployment of S-400 began in 2007 and is likely to be completed by 2015.  [20]  The Russian R D is now focusing on point AD systems Counter missile Systems. Russia with the help of Commonwealth of Independent States (CIS) countries is developing a comprehensive AD structure which could give depth to Russian Air space. THE AIR DEFENCE OF CHINA Armed with a formidable arsenal of nuclear weapons and rapidly maturing delivery capabilities, China has little to worry about in terms of major invasion. Since China is surrounded by potential adversaries, particularly the US Pacific Forces it deploys strong ground-based air-defenses to protect itself against sudden air attacks. The official terms for the PLAAFs AAA troops is gaoshepao bing/gaopaobing and the SAM troops is dikong daodan bing/didao bing/daodan bing. However, the PLAAF occasionally refers to its AAA troops as first artillery (yipao), and SAM troops as second artillery (erpao), which is often confused with Chinas Second Artillery Corps (erpao).  [21]   During the 1950s, the Soviets exported air defence equipment to China. But the Khrushchev-era tensions put an end to that, and over time China proceeded to reverse engineer all of these Soviet designs. On 6 February 1964, during his meeting with Dr Qian Xuesen (Father of Chinese Rocketry), Chairman Mao again expressed his views on the importance of the missile defence capability. According to Mao, missile defence capability should not be dominated by the two superpowers only, and China must also develop its own missile defence weapons, no matter how long it would take. This conversation, later known as 640 Directive, led to a missile defence system that could defend the country against nuclear-armed strategic missile attacks  [22]  . Early models SA-2 Guidelines from USSR were reverse engineered and entered service as the HQ-1 and soon after HQ-2 systems. Since the year 2000, HQ-2 remains a major cornerstone of Chinese air defenses  [23]  . In the 1960s-80s the main strategic adversary was USSR and consequently most air defenses are concentrated in the north of the country  [24]  . Chinese attempts at indigenous SAMs were somewhat poor even after an injection of Western technologies during the 1970s and 80s. In the 1990s and 2000s the focus had returned to the financial hub of Shanghai (and now Hong Kong) and the Taiwan Straits. PLAAF has upgraded its air defense (non-aircraft) capabilities which involves three of the PLAAFs branches: SAM, AAA, and radar troops. It is expending tremendous effort establishing an Integrated Air Defence System (IADS) at both the strategic (SADS) and tactical (TADS) levels.  [25]  SADS Integrates Naval, Space ABM TADS Integrates PLAAF PLA AD as explained in the figure below. The Automated Air Defense Command and Control System [IBACS] identifies targets, evaluates threats, allocates forces, and guides fighters. It also commands surface-to-air missiles (SAMs) and antiaircraft artillery (AAA), and it includes tactical air defense systems (TADS) and fixed radars. A sector operations center is linked with three TADS, various air bases, AAA sites, SAM units, radars, and ground and naval units  [26]  . Eqpt. REGIONAL AD FIELD AD FUTURE DEVP REMARKS HQ 9 (90KM/ 30KM)* TOR M1 ( SA-15) HQ -15 (SUPER S-300 )(200/25) *RANGE/ ALTITUDE SA-10 GRUMBLE (200/ 90) S-300 PMU HQ -7 (FM -80) HQ 16 (SUPER TOR M1 (35/20) HQ-12 KS 1(50/ 25) HQ 64 (LY -60) HQ 17 (30/17) HQ -2 B(90/20) QW-3/ TY-90 HQ 18 (400/35) PL-9/ HQ 61 A ABM SYS MANPADS ( QW  [27]  1,2,3 HN 5) QW [emailprotected] @ 4 TH GENERATION 14.5MM/ 23 MM/ 25MM/ 35 MM/ 57 MM/ 85MM GUNS. TYPE 95 GUN MISSILE SYSTEM GUN SYSTEMS The Chinese AD Doctrine post 2006 follows an Active AD Strategy with offensive and defensive character. Its deployment follows Three Strike or San Da concept which is a three ring layered deployment which is Key Area/ Key Point centric. Overall the countrys AD posture follows a front light and rear heavy pattern with institutionalized Passive Air Defence (PAD) measures. Despite significant improvement in military C4I, Chinese ability to control sophisticated military operations still lags behind current western standards and its varied AD equipment are yet to be battle tested. PAKISTAN Since most of our discussions all these years have been Pak centric, the readers would be familiar with its AD organization and setup. However, I wish to bring out certain salient aspects which are some recent developments:- Pak AD Studies (AADS 2000) and Study by HQ 4 AD Division in Jan 2008 has led to development of CLIAD (Comprehensive Layered Integrated Air Defence) Capability. This has ushered in era of variety of SAMs which are planned to be a mix of Western (30%) and Chinese (70%) equipment to be employed as under :- Combat Zone. It would primarily consist of RBS -70, FIM-90 (Chinese) and a variety of SHORADS (Short Range Air Defence Systems). Communication Zone. Low and Medium Altitude AD Systems (LOMAD) consisting of BAMSE (Sweden) and KS 2/ LY 60 D (China). Rear Areas. HIMADS comprising LD 2000 (China) and Phalanx (US). Both these systems are also capable of tackling all forms of missile threat. It has already authorized integral AD Regiments to its Infantry Artillery Divisions and is reorganizing the existing units to absorb new equipment thereby increasing the density of AD in Combat Zone. Redefining the Mission Of Army AD. Existing Mission. To provide ground based air defence to operationally critical assets/areas in harmony with visualized land air operations, nullifying or reducing the effectiveness of hostile air attacks and surveillance Redefined Mission . Provide AD cover against Low, Med and High alt air threat to national and tri Service VAsIVPs and field formations during defensive and offensive ops In the new mission Pakistan is not only looking to cover its air defence in all the spectrums but is also seeking for a better integration between the air defence forces with the other ground forces. Integrated AD concept implies provision of terminal def to PAF bases, CZ, VAs of national imp and create cone of AD wpns in specific areas of CZ in harmony with own air-land ops in order to cause max attrition on adversarys (Indian) air force.

Comparing Themes in Cat’s Cradle and Slaughterhouse Five Essay

Comparing Themes in Cat’s Cradle and Slaughterhouse Five  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Throughout his career, Kurt Vonnegut has used writing as a tool to convey penetrating messages and ominous warnings about our society. He skillfully combines vivid imagery with a distinctly satirical and anecdotal style to explore complex issues such as religion and war. Two of his most well known, and most gripping, novels that embody this subtle talent are Cat's Cradle and Slaughterhouse-Five. Both books represent Vonnegut’s genius for manipulating fiction to reveal glaring, disturbing and occasionally redemptive truths about human nature. On the surface, Cat’s Cradle and Slaughterhouse-Five are dramatically different novels, each with its own characters, symbols, and plot. However, a close examination reveals that both contain common themes and ideas. Examining and comparing the two novels and their presentation of different themes provides a unique insight into both the novels and the author – allowing the reader to gain a fuller understanding of Vonnegutâ₠¬â„¢s true meaning. One of the most prevalent themes in Vonnegut’s works is religion. In the early pages of Cat’s Cradle, Vonnegut submits his contention that "a useful religion can be founded on lies (Vonnegut, Cats Cradle 16)," meaning that, fundamentally, religion is about people, not about faith or God. Reminiscent of Karl Marx’s description of religion as the "opiate of the masses," he describes all religions as mere collections of "harmless untruths" that help people cope with their lives. The Book of Bokonon in Cat's Cradle represents this portrait of religion at both its dreariest and its most uplifting, Bokononism is contradictory, paradoxical, and founded on lies; its followers are aware of this... ...refree tone highlights them by providing irony and contrast. This unparalleled ability to seamlessly combine a light tone with serious theme is what distinguishes Kurt Vonnegut from other writers, Although Cat's Cradle and Slaughterhouse-Five share common themes, the presentation of each of the themes is different in each book. The two novels complement each othe, and comparing both can provide a higher level of understanding for each. Vonnegut never forces his opinions - he makes statements by asking questions, and presents his themes through subtle, but powerful stories, His goal is to get readers to re-examine, not necessarily to change, their lives, morals, and values. Themes such as death, war, and religion are as old as literature itself, yet Vonnegut adds a unique twist to them, inviting the reader to look at these issues from an entirely new perspective.   

Monday, August 19, 2019

The Ethics of Nanotechnology Essay -- Nanotechnology Science Research

The Ethics of Nanotechnology Introduction Imagine a world in which cars can be assembled molecule-by-molecule, garbage can be disassembled and turned into beef steaks, and people can be operated on and healed by cell-sized robots. Sound like science fiction? Well, with current semiconductor chip manufacturing encroaching upon the nanometer scale and the ability to move individual atoms at the IBM Almaden laboratory, we are fast approaching the technological ability to fabricate productive machines and devices that can manipulate things at the atomic level. From this ability we will be able to develop molecular-sized computers and robots, which would give us unprecedented control over matter and the ability to shape the physical world as we see fit. Some may see it as pure fantasy, but others speculate that it is an inevitability that will be the beginning of the next technological revolution. Laboratories, such as the Stanford Nanofabrication Facility (SNF), have already been researching nanofabrication techniques with applications in fiber optics, biotechnology, microelectromechanical systems (MEMS), and wide variety of other research fields relevant to today's technology. MEMS, "tiny mechanical devices such as sensors, valves, gears, mirrors, and actuators embedded in semiconductor chips", are particularly interesting because they are but a mere step away from the molecular machines envisioned by nanotechnology. MEMS are already being used in automobile airbag systems as accelerometers to detect collisions and will become an increasing part of our everyday technology. In 1986, a researcher from MIT named K. Eric Drexler already foresaw the advent of molecular machines and published a book, Engines of Creation, in ... ...searchers in this field put together an ethical set of guidelines (e.g. Molecular Nanotechnology Guidelines) and follow them, then we should be able to develop nanotechnology safely while still reaping its promised benefits. References Drexler, K. Eric Engines of Creation. New York: Anchor Books, 1986. Drexler, K. Eric Unbounding the Future. New York: Quill, 1991. Feynman, Richard P. There's Plenty of Room at the Bottom. 03 March 2002. http://www.zyvex.com/nanotech/feynman.html The Foresight Institute. 03 March 2002. http://www.foresight.org/ Institute for Molecular Manufacturing. 03 March 2002. IMM.org National Nanotechnology Initiative. 03 March 2002. http://www.nano.gov/ Thibodeau, Patrick. "Nanotech, IT research given boost in Bush budget". 03 March 2002. (April 11, 2001) CNN.com [Definitions]. 03 March 2002. Whatis.com

Sunday, August 18, 2019

Persuasive Essay Against Capital Punishment -- Papers Death Penalty Ar

Persuasive Essay Against Capital Punishment â€Å"Kill. (Verb) To make someone or something die.† Does anyone really think they have the right to take another person’s life? Apparently yes. Perhaps we should give the judge a knife and tell her that if she has decided that the accused is guilty, she should stab him herself. Perhaps then she would hesitate. But if many people (hundreds or thousands who operate the judicial system) are involved, it spreads, or even divides the feeling of culpability among many. They may feel less guilty, especially if they believe that they are representing the whole society of their country. What makes it seem more â€Å"humane† is the official perspective of it. Death here is a matter of paperwork, not actually a case of ending someone’s life. I am absolutely opposed to the death penalty. In this essay I will try to explain why I think society should not accept this barbaric punishment. The most common argument in favour of the death penalty is that it is a deterrent, i.e. someone who has murder in mind will think better of it when he realises that he could be facing death. However, I do not agree with this. When a murderer commits a crime he believes that he will not be caught. Numerous studies have tried to prove the deterrence factor, but have been unable to. A criminal dreads a lifetime prison sentence more than, or the same as, the death penalty in any case. There are two types of murders: crimes committed on the â€Å"spur of the moment† (i.e. passion crimes which have not been planned) and pre-meditated murder. If it is a crime of passion, the murderer is not thinking of the consequences at t... ... are then disbarred. They have little incentive to fight for the case when their salary may be under  £4 an hour. Finally, who are we to play with the lives of other people? Each person is just one life – how can one life be allowed to designate when the other must finish? Man is man, not God. Only God should have a divine right over a man’s life. Man is equal to man, and for him to take on the role of a superior being can only cause chaos. I believe that it is the duty of a system of justice to protect society from criminals, either by psychological rehabilitation or by imprisoning them for life if necessary; not by murdering them. Capital punishment is used to condemn the guilty of severe crimes. This means: to teach a criminal how to be humane, they must be killed inhumanely. Does this seem logical?

Saturday, August 17, 2019

Code Division Multiple Access Communication Systems

Chapter 2- Communication System Telecommunication systems have now made it possible to pass on with virtually anyone at any clip. Early telegraph and telephone system used Cu wire to transport signal over the earth’ surface and across oceans and high frequence ( HF ) wireless, besides normally called shortwave wireless, made possible inter-continental telephone links.Every communicating system has its ain frequence scope, system, capacity, application execution cost. On the footing of transmittal system there are two types of communicating system †¢ Wired communicating system †¢ Wireless communicating system 2.2 Multiple Access Technique A limited sum of bandwidth is allocated for radio services. A radio system is required to incorporate as many users as possible by efficaciously sharing the limited bandwidth. Therefore, in communicating, the term multiple entree can non be defined as a agency of leting multiple users to at the same time portion the finite bandwidth with least possible debasement in the public presentation of the system. There are four multiple entree methods – a ) Frequency Division Multiple Access ( FDMA ) B ) Time Division Multiple Access ( TDMA ) degree Celsius ) Code Division Multiple Access ( CDMA ) vitamin D ) Space Division Multiple Access ( SDMA )Frequency Division Multiple Accesses ( FDMA )FDMA is one of the oldest multiple entree techniques for cellular systems when uninterrupted transmittal is required for parallel services. In this bandwidth is divided into a figure of channels and distributed among users with a finite part of bandwidth for lasting usage, as illustrated in figure 2.2. The channels are assigned merely when there is a demand of the users. Therefore when a channel is non in usage it consequences in a otiose resource. Fig 2.2Channel Use by FDMA FDMA channels have narrow bandwidth of about 30 KHz, and therefore they are normally implemented in narrow set system. Since the user has his part of bandwidth all the clip, FDMA does non necessitate clocking control, which makes it simple. Even though no two users use the same frequence set at the same clip, guard sets are introduced between sets to minimise channel intervention. Guard sets are fresh frequence slots which separates neighbouring channels. This leads to a wastage of bandwidth. In a non-continuous transmittal bandwidth goes wasted since it is non being utilized for a part of the clip.Time Division Multiple Access ( TDMA )In digital systems, uninterrupted transmittal is non required as the users do non use the allotted bandwidth all the clip. In such systems, TDMA is a O.K.ing technique compared to FDMA. Global Systems for Mobile communications i.e GSM uses the TDMA technique. In TDMA, bandwidth is available to the user but merely for a finite period of clip. In most in stances the bandwidth is divided into fewer channels compared to FDMA and the users are allotted clip slots during which they have the full channel bandwidth at their disposal. This is illustrated in figure 2.3. Fig 2.3Channel Uses by TDMA TDMA requires careful clip synchronism since users portion the bandwidth in the frequence sphere. As the figure of channels are less, channel intervention is about negligible, hence the guard clip between the channels is significantly smaller. Guard clip is spacing clip between the TDMA. In cellular communications, whenever a user moves from one cell to other there is a opportunity that user could see a call loss if there are no free clip slots. TDMA uses different clip slots for transmittal every bit good as response.Code Division Multiple AccessIn CDMA, all the users occupy the same bandwidth, though they are all assigned separate codifications, which distinguishes them from each other as shown in figure 2.4. CDMA systems utilize a spread spectrum technique in which a spreading signal, is uncorrelated to the signal and has a larger bandwidth, is used to distribute the narrow set signal. Direct Sequence Spread Spectrum i.e DS-SS is most normally used for codification division multip le surplus. In Direct sequence spread spectrum, the message signal is multiplied by a Pseudo Random Noise Code, which has a noise like belongingss. Each user has its ain codification which is extraneous to the codification of every other users. In order to feel the user, the receiving system is required to cognize the codeword used by the sender. contrasting TDMA, CDMA does non necessitate clip synchronism between the users. Fig 2.4Channel Uses by CDMA 2.4 CDMA 2.4.1 History Code Division Multiple Access ( CDMA ) is a new construct in wireless communications. It has achieved widespread credence by cellular system operators, that will dramatically increase both their system capacity and the service quality. CDMA is a signifier of spread-spectrum, that have been used in military applications for old ages. The rule of spread spectrum is the usage of noise-like moving ridges and, as the name connote bandwidths much larger than that required for simple point to indicate communicating at the same information rate. foremost there were two motive: To defy enemy attempts to throng the communications ( anti-jam, or AJ ) , or to conceal the fact that communicating was even taking topographic point, from clip to clip called low chance of intercept. It has a history that goes back to the early yearss of World War second. The usage of CDMA for nomadic wireless applications is new. It was planned theoretically in the late fourty’s. profitable applications became promising because of two evolutionary developments. One was the handiness of really low cost, high denseness digital ICs, which cut down the size and cost of the endorser Stationss to an adequately low value. Introduction to CDMA CDMA is a multiple entree technique that allows multiple users to convey independent information within the same bandwidth at the same time. Each user is assigned a pseudo-random codification that is either extraneous to the codifications of all the other users or the codification possesses appropriate cross-correlation belongingss that minimize the multiple entree intervention ( MAI ) . This codification is superimposed on an information signal therefore, doing the signal emerges to be noise like to other users. Merely the intended receiving system has a reproduction of the same codification and uses it to pull out the information signal. This so allows the sharing of the same spectrum by multiple users without doing inordinate MAI. It besides ensures message privateness, since merely the intended user is able to â€Å"decode† the signal. This codification is besides known as a spreading codification, since it spreads the bandwidth of the original informations signal into a m uch higher bandwidth before transmittal. 2.4.2 CDMA Classification Tree Fig 2.6Classification Tree of the assorted types of CDMA Techniques Advantages of CDMA One of the chief advantages of CDMA is that call dropouts occur merely when the phone is at least twice every bit far from the base station. It is used in the pastoral countries where GSM make non acquire to work decently. Another advantage is capacity means it has a really high spectral capacity so that it can suit more users. Disadvantages of CDMA One major job in CDMA engineering is channel pollution, where signals from excessively different cell sites are present in the subscriber’s phone but none of them is foremost. When this state of affairs arises the characteristic of the audio signal degrades. Another disadvantage is when compared to GSM it lacks international roaming capablenesss. 2.5 Spread Spectrum Spread spectrum are the methods in which energy generated at a individual frequence is spread over a broad set of frequences. The basic spread spectrum technique is shown in Figure 2.7. This is done to accomplish transmittal that is robust against the channel damages, and to be able to defy natural interventions or thronging besides to forestall hostile sensing. These techniques were developed by military counsel systems. The technique is said to be spread spectrum if transmittal bandwidth is much greater than minimal bandwidth needed to convey the information.The system achieves spread spectrum if it fulfills the undermentioned demands:Signal occupies bandwidth much larger of the minimal bandwidth necessary to direct information.Spreading is done with the aid of distributing codification signal which is independent of the informations.At the receiving system, de-spreading is done by the correlativity of the received dispersed signal with a synchronised reproduction of the distributi ng signal used to distribute the information.Spread signal bandwidth Undesired signal informations signal recovered informations Spreading code signal Spreading codification signal Fig 2.7Model of Basic Spread Spectrum Technique The chief parametric quantity in dispersed spectrum systems is the treating addition: Is the ratio of transmittal and information bandwidth:Gp =, which is fundamentally the spreading factor. The processing addition calculates the figure of users that can be allowed, the sum of multi-path effects and the trouble to throng a signal. Spread spectrum can be classified as follows – a ) Direct Sequence Spread Spectrum B ) Frequency Hoping Spread Spectrum degree Celsius ) Time Hopping Spread Spectrum 2.5.1 DS-CDMA Direct Sequence is the best Dispersed Spectrum Technique. The DS-CDMA method provides a multiple of benefits in cellular systems including easiness in planing frequence channels and protection against intervention, such that a high procedure addition is used. In DS-CDMA each user has its ain spreading codification. The choice of good codification is of import because auto-correlation belongingss and length of the codification restricts system capacity. The codification can be divided into two categories-Orthogonal codifications ( Walsh codifications )Non-orthogonal codifications ( PN, Gold, Kasami codifications )The informations signal is multiplied by a Pseudo Random Noise Code. A PN codification is a sequence of french friess its scope is -1 and 1 ( polar ) or 0 and 1 ( non-polar ) . This consequences in low cross-correlation values among the codifications and the trouble to throng or observe a information message. A usual manner to make a PN codification is by agencies of at least one displacement registry. The bit rate decides the rate at which distributing signals are transmitted. At the receiver terminal, spread signals are decoded with the aid of correlativity maps. Cross correlativity de-spreads the standard signals and retrieves the familial signal similar to the user’s original signal. The distributing sequences can orthogonal agencies ‘0’ transverse correlativity or random sequences with low cross-correlation belongingss. Y ( T ) m ( T ) C ( T ) Cos ( wt ) Fig 2.8Direct Sequence Spread – Spectrum Modulation System In the DS-CDMA technique, each spots of the users informations are multiplied with a codification in the transmitting terminal. The codification sequence used in conveying terminal performs the function of distributing codification. The baseband theoretical account of a DS-CDMA system is shown in fig 2.8. Let m ( T ) denotes a binary information sequence, degree Celsius ( T ) denotes a codification sequence. The wave forms m ( T ) and c ( T ) denote polar representations in footings of two degrees as  ±1. By multiplying the information spots by the codification, each information spot is divided into a little clip increases that are called french friess. The baseband signal( T ) is filtered to restrict energy within the bandwidth, defined by the codification rate. The bearer transition normally used in dispersed spectrum is phase displacement identifying. Sing the figure we get: ( T ) = m ( T ) C ( T ) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ ( 3.2 ) The baseband signal( T ) is convoluted with the impulse response of the spectrum determining filter to give Y ( T ) : Y ( T ) =( T ) ? H ( T ) , where * denotes convolution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ The set base on balls signal( T ) = [( T ) ? H ( T ) ] cosT ) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. ( 3.4 ) m ( T ) Cos ( wt ) Clock C ( T ) Fig 2.9Matched Filter Spread-Spectrum Receiver. The standard Band base on balls signal( T ) is converted to an tantamount complex low base on balls signal A ( T ) by blending with a locally generated coherent bearer. The complex low base on balls signal A ( T ) =( T ) cost†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. ( 3.5 ) The de-spread signal B ( T ) = A ( T ) [ C ( T ) ? H ( T ) ] †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ ( 3.6 ) The end product of the matched filter D ( T ) =( 3.7 ) . The receiving system decodes the informations: D ( T ) & A ; gt ; 0 decode binary ‘1’ otherwise decode binary ‘0’. -11 1 1 -1 -1 1 -1 -1 1 1 1 -1 -1 1 -1 -1 -1 user’s spot dispersed signal Despread signal Received spot distributing sequence distributing sequence Fig 2.10User Signal in DS-CDMA System Let us believe the first spots of four users. By multiplying each spot with a PN codification, users spots are represented by seven french friess as shown above. User 1 [ 1 ] : 1 C1: -1 -1 1 1 1 -1 1 = & A ; gt ; -1 -1 1 1 1 -1 1 User 2 [ 1 ] : -1 C2: 1 -1 -1 1 1 1 -1= & A ; gt ;-1 1 1 -1 -1 -1 1 User 3 [ 1 ] : 1 C3: -1 1 -1 -1 1 1 1 = & A ; gt ; -1 1 -1 -1 1 1 1 User 4 [ 1 ] : -1 C4: 1 -1 1 -1 -1 1 1= & A ; gt ; -1 1 -1 1 1 -1 – 1 R [ 1 ] : -4 2 0 0 2 -2 2 ( received informations ) The received information consists of information of four users. To retrieve the original spots of users from the received informations, the received informations should multiplied with the codification sequence in the receiving system that is precisely same with that is used for distributing the original informations in sender agencies ( de-spreading ) . We assume that the receiving system operates in perfect synchrony with the sender. As a last measure, determination is made by comparing the consequences with a threshold value as shown below. R [ 1 ] * C1= 4-2+2+2+2= 8 & A ; gt ; 0 = & A ; gt ; 1 R [ 1 ] * C2= -4-2+2-2-2= -8 & A ; lt ; 0 = & A ; gt ; -1 R [ 1 ] * C3= 4+2+2-2+2= 8 & A ; gt ; 0 = & A ; gt ; 1 R [ 1 ] * C4= -4-2-2-2+2= -8 & A ; lt ; 0 = & A ; gt ; -1 Advantages of DS-CDMAIt has an intervention rejection belongings ; every user is identified with a specific codification sequence which is about extraneous to the other users codifications.The DS-CDMA besides excludes the demand of channel spliting therefore all users use the full channel bandwidth.Furthermore, it is stiff to multipath attenuation. Signals in DS-CDMA systems are indistinguishable strength full a broad bandwidth which can pull strings the multipath attenuation to modify the end product.Properties of DS-CDMA.Multiple Access – If multiple users use the channel at the same clip, there will be multiple signals overlapping in clip and frequence. At the receiver terminal coherent demodulation is used to take the codification transition. This method concentrates the power of the desired user in the information bandwidth. If the cross-correlations between the codification of the desired user and the codifications of the interfering users are little, consistent sensing will merely set a little portion of the power of the interfering signals into the information bandwidth.Narrowband Interference- The coherent sensing at the receiving system involves a generation of the standard signal with a locally generated codification sequence. However, as we see at the sender, multiplying a narrowband signal with a wideband codification sequence spreads the spectrum of the narrowband signal so that its power in the information bandwidth decreases by a factor which is equal to the processing addition.2.6 Problem Description Main job with DS-SS is the so called Near –Far consequence. This is described by an illustration. In figure 2.12 this consequence is present when an interfering sender TX ( B ) is closer to the receiving system RX ( A ) than the intended TX ( A ) and, the correlativity between the standard signal from the interfering sender TX ( B ) and RX ( A ) can be higher than the correlativity between the standard signal from the intended sender TX ( A ) and RX ( A ) . The consequence is that proper informations sensing is non possible. Transmitter Tx ( B ) Transmitter Tx ( A ) Fig 2.12Near Far Effect Another job is hidden and exposed terminus in wireless Ad-hoc web. Hidden terminusjob refers- The hit of package at the having node due to the coincident transmittal of those nodes that are non within the direct transmittal scope of the transmitter. Exposed terminusjob refers- The inability of a node which is blocked due to nearby transmission node, to convey another node. For Example if both node S1 and S2 transmit to node R1 at same clip their packages collide at node R1.This happens because both nodes S1 and S2 are hidden from each other as they are non within the direct transmittal scope of each other. This is called concealed terminus job. On the other manus if a transmittal from node S1 to another node R1 is already in advancement, node S3 can non convey to node R2, as it concludes that its neighbour node S1 is in conveying node and hence it should non interface with the on-going transmittal. This job reduces the throughput of web when traffic burden is high. Transmission scope of node S1 Transmission scope of node S2 Fig 2.13Hidden and Exposed Terminal Problems 2.7 Proposed Work The Basic motivation of our undertaking was to analyze and develop an Efficient Mac based DS-CDMA protocol for work outing near far job. A CDMA communicating system requires an efficient design and testing of its subsystems of PN-sequence generator, spectrum spreading and de-spreading digital circuits and digital modulator and detector faculties which give high throughput. Another issue is near far consequence. 2.7.1 Reason for proposed protocol The Near far consequence is created in the uplink of DS-SS CDMA. When a combination of unfastened and closed-loop power control which ensures that each terminus generates the same signal power at the base station. The base station monitors the power of standard signal from each terminus and instructs distant terminuss to increase their signal powers and nearby terminuss to diminish theirs illustration below shows the power control entirely is non plenty to cut down the near–far job in DS SS CDMA ad-hoc Network. Example: – Letdenote the distance between nodes Ks and n. suppose A wants to pass on with B utilizing a given codification and C wants to pass on with D utilizing a different codification. Suppose that tap ? dCD, dCB & A ; lt ; & A ; lt ; tap, and dad & A ; lt ; & A ; lt ; dCD. Then, the MAI caused by C makes it impossible for B to have A transmittal. Similarly, the Multiple entree intervention caused by A makes it impossible for D to have C transmittal. It is of import to observe that the two transmittals can non take topographic point at the same time, irrespective of what transmittal powers are selected if an addition in power is made to battle the MAI at B, this increased power will destruct the response at D. Fig 2.14Example shows the Power Control entirely is non plenty to cut down the Near–Far job in DS-SS CDMA Ad-hoc Network The above Fig. unveils two types of jobs – . 1.Medium entree job: – The usage of two different distributing codifications to happen at the same clip is non possible for two transmittals, this job is referred to as medium entree job. 2. Power control job: – If the terminuss adjust their signal powers so two transmittals can take topographic point at the same clip so that the intervention caused by one transmittal is non big plenty to pulverize package response at other terminuss. This is referred as power control job. So the cardinal solution to the close far job must hold both elements: power control and medium entree. 2.7.2 DESIGN GOAL FOR PROTOCOL The Following are the specifications while planing a MAC protocol for Ad-hoc web:The operation of the protocol should be widen and provide quality of service for existent clip traffic.The protocol must be a non-synchronous, spread operation, every bit good as scalable for big webs. It must besides affect minimum exchange of information and must be suited for real-time execution.The protocol must be scalable to big web. in this protocol should be minimise the consequence of hidden and exposed terminus job.The protocol should hold agencies for adaptative informations rate control and it should hold power control mechanisms in order to expeditiously pull off the energy ingestion of node.The receiving system circuitry should non be complex in the sense that it should non be required to supervise the whole codification set.So we design the DS-SS CDMA system with MAC protocol utilizing VHDL.VHDL Implementation of DS-SS CDMA based Mac protocol for Ad-hoc Networks1

Friday, August 16, 2019

Mining and India Effects Essay

Illegal mining is illegal because in most countries, underground mineral resources belong to the state. Mineral resources can therefore only be operated by a licensed operator along the laws and regulations set by the local government.Most illegal mining takes place in low grade areas or abandoned mining sites. Low productivity and limited production are therefore the illegal mining main characteristics. It is dangerous because illegal mining are in not in the right place to mine because most of the illegal miners are in low grade areas or abandoned mining sites in can cause danger in the illegal miners. Causes: Illegal mining is acknowledged to be one of the major causes for coal fires. Considering, coal tendency to heat when placed in contact with an oxygen source, illegal mining directly contributes to this massive pollution source. Illegal mining can cause lessen of the minerals in soil and when the mining is too much the minerals can lose or disappear. It can cause lack of nutrients in the soil that the illegal miners where mining because they did not know what are the causes can happen. Places where illegal mining occurred: * Zamboanga del Sur * Palawan * india Effects: * Toxic waste can be a very harmful effect of illegal mining. * If the mining sites are near bodies of water chemicals can also poison the water and the fish, it can also destroy beautiful coral reefs. * Fertile land can also be affected, land can become very hard and dry because of the chemicals as well. * Boiling toxic waste can cause burns on people living near the mining sites. The gas can also be very bad to take into your body. * if you build the mines on forest lands, the habitat of countless land species may be destroyed and those species may die. * It can poison the water and kill fishes * It can destroy coral reefs * It can destroy habitat species, and also kill them * It can affect land to become very hard and dry * It can cause bad effects to our body because of gas Solution Proposal: * helping them to know what are the effects that can harm in our environment * the illegal miners are lack of knowledge in what are the effects that can harm in our environment. * We need to help them to know that it can affect the illegal mining in our environment. * reminding them that mining can harm people too * The illegal miners have lack of knowledge that can harm in people too. * We need to advise them that they need to stop because there are some minerals that can harm into their health * Reminding them what are the causes that can happen in their mining site. * We need to remind them that there are many causes that can happen in their mining site or in our environment. * Reminding them that illegal mining can cause danger * Illegal miners are not in the right place to mine, they mine in the abandoned mining site or in a low grade areas. * They did not know what are the danger that they can be interface when they are mining. * Asking them to stop and limit their illegal mining operations. * We need to tell them to or ask them to stop illegal mining because there many effects that can happen in our environment. * We need to tell them that they need to stop because they are not in the right place to mine or they don’t have any permit

Thursday, August 15, 2019

Human Performance Technology Model Essay

The journal I had chosen is â€Å"Minding the gap , identifying performances issues using the Human Performances Technology model (HPT) . † The purpose of this journal is to main a useful model for identifying and addressing employee performance issues in academic libraries , specifically in a Learning Commons . As we know , assessing and improving employee performance , especially library services are always challenging . However , HPT provides methods for evaluating human performances , such as the performance of employees at a service point , and , and provides method in fixing problems that are identified . Most of the time , training is always assumed solution for many performances issues , but HPT suggests that the training is not always the answer and provides a variety of the other solutions referred to intervention . The HPT model created by the International Society for Performance Improvement (ISPI , 2010 a ) was used to evaluate employee performance at the service point in a newly created Learning Commons . Various interventions are also discussed the address performances issues in libraries. The HPT model may help librarians create measurable performance indicators which can be used to set standard of performances for employees. This model is useful for a combination of student workers, paraprofessionals and librarians. The HPT model comes from field of HPT , which is the combination of education , psychology and business . So , HPT is the process of identifying and analyzing the gap between current performances ( where one is ) and ideal performance ( where one wants to be ) using various tools such as models . Closing the gap can be done through a recommend solution called an intervention. â€Å"Intervention† in HPT refers to a course of action taken to improve performance . Each stage of the HPT process helps one understand the behaviors of people in an organization and of the organization as a whole . HPT aims to analyze observable behaviour both individually and collectively. HPT ensures a through of a variety of areas within an organization in order to understand the performance gap. An analysis of values, norms, culture, structure, performance, and environment is recommended . Through an organization analysis , environmental analysis , gap analysis , can cause those who using HPT analysis determine the performance problem or opportunity . Without careful analysis , inappropriate intervention could be implemented . Intervention should be long term , evolutionary and progressive. Learning Commons in Randall Library at the University of North Carolina Wilmington (UNCW ) was using HPT model to evaluate employee performance. The Learning Commons provides a variety of hardware and software, a centralized service point is included in the middle of the Learning Commons. This service point staffed by librarians who are full time faculty members at UNCW and university’s Technology Assistance Center (TAC) student assistant who are hired to work part time at multiple service points , including the Learning Commons service point , in Randall Library . The primary user group of the Learning Commons is UNCW students . The learning Commons applied HPT after three months opens . The performances issues identified after three months after opening . While some performance issues may ‘work themselves out ‘ overtime , if using the HPT model early in the operation can identify the problems immediately and prevents the problems . Application of the model can helps to identify the root of the causes and helps pinpoint appropriate solution for those issues. An assumption that training is always the appropriate solution for all performances problems can be corrected using HPT . As noted in the HPT model , there are several phases of analysis which are performance analysis , organizational analysis , environmental analysis , gap analysis and cause analysis . A â€Å"cause analysis† follows the performance analysis helps to identify a â€Å"lack of environmental support† or a â€Å"lack of repertory behaviour†. â€Å"Intervention selection ,design , and development† follow all analysis phases . That is because after identify all the gaps or problems , then only can select the appropriate intervention to fix the problem . Main Body and Discussion Human Performance Technology (HPT ) is a systematic approach to improving productivity and competence , it is a strategy for solving problems and for realizing opportunities related to the performance of people . It uses a wide range of intervention to improve individual and organizational performance . There are three fundamental processes to go through . There are performance analysis ,cause analysis and intervention selection . It can be applied to individuals , small groups ,and large organizations . Without identified the causes of the issues , the appropriate intervention impossible to created . Learning Commons in Randall Library at the University of North Carolina Wilmington (UNCW) was using HPT model to evaluate employee performance at the service point . First stage of the HPT model calls performance analysis . The â€Å"performance analysis† is to determine if a performance problem exists . A performance analysis includes an organizational analysis , an environmental analysis ,and a gap analysis . The first step in the performance analysis , the organizational analysis , calls for an examination of an organization ‘s vision , mission , values ,goals and strategies . It is important to define the boundaries of the organization before performing this phase in the model . It is useful to examine all departments or offices that closely related to the specific area under examination. The next component of HPT model is environmental analysis . The environmental analysis examines four important factors which are organizational environment, work environment, work, and the worker. In the HPT model, the â€Å"Work Environment† refers to the â€Å"resources, tools, human resources, and policies† of an organization, or in this case, of the Learning Commons. â€Å"Work† is described as â€Å"work flow, procedure, responsibilities, and ergonomics†. â€Å"Worker† refers to the â€Å"knowledge , skill , motivation , expectation and capacity† of an individual . The â€Å"Gap analysis† requires an examination of the actual performance versus the optimal , or desired performance . The information collected through the organizational and environmental analysis . The HPT model shows that the gap falls between the â€Å"Desired workforce performance† and the â€Å"Actual state of workforce performance†. It is important to identify the gaps , then analyze the causes of those gap happens. In Learning Commons , there has a temporary service desk was constructed , new furniture was not yet installed and a formal staff training program was not yet implemented . The performances of Learning Commons service was not optimal and causes a â€Å"gap† between optimal and desired performances . Next is causes analysis . As the HPT model suggests , after the performances gap was identified ,the â€Å"cause analysis† should be completed . The cause analysis can determine why the performance gap exists . Once a cause is identified, one or more interventions can be selected that will be able to close the performance gap . There are some causes for the performances issues . First , data , information and feedback . Initial training and communication of clear roles , responsibilities and expectations were not provided when the Learning Commons initially opened . Second , environment support , resources and tools . Detailed in Learning Commons employee did not exist . The conflict among workers will be happened . Third , consequences , incentives , reward . There were no consequences , incentives or rewards related to performance at the Learning Commons service point . Forth , skill and knowledge . A deficiency in general knowledge of the library services and the role of the librarians at the service point existed among TAC student assistants . Fifth , motivation and expectations . It is unclear what motivates Learning Commons employees and what they expect from themselves . After knowing the causes of the issues , intervention selection , design and development is needed . Closing the performances gap can be done through recommended solutions called interventions. HPT suggests that training is not always the appropriate solution because training will not solve issues related to motivation and expectation . However , an incentives and rewards will address motivation . There are some interventions existed after knowing the causes . There are job description intervention , document and standards intervention , training intervention , performance appraisal intervention . A job description specifically for employment in the Learning Commons would define each position’s duties , responsibilities , working conditions , and job activities , which would help employees understand their own job and the role of the other employees at the Learning Commons services point . Besides that , to remedy problems related to lack of information for job duties and procedures , the recommendation is a documents and standards intervention . The standard operating procedures(SOP) manual would include the job description , expectations , policies , guidelines , and procedures for each position at the service desk . Training intervention is training librarians and TAC students . Training employees would provide expectations for each employee . Performance appraisal intervention show staff that there will be consequences for poor performance and rewards for good performance . On the other hand , feedback should be encouraged in Learning Commons . Positive feedback should be provided and given from all the employees . Negative feedback is also important to correct everyday issues . After implemented all the intervention that suggested, must evaluate their success based on further analysis of performance . In my opinion , HPT is a very good tool to evaluate the individual performance or organizational performance . As we see the problems in Learning Commons , HPT had given a good solution for it in fixing the problem . HPT begins with a comparison of the of the present and the desired levels of individual and organizational performance to identify the performance gap. Once the performance gap and the causes have been determined, the appropriate interventions are designed and developed. These may include measurement and feedback systems, new tools and equipment, compensation and reward systems, selection and placement of employees, and training and development. The interventions are then implemented and the change process managed. After implemented all the intervention , The employees in Learning Commons will clear about their roles , responsibilities . At the same time , The Learning Commons is already providing to be a great resource at UNCW . HPT model must be applied cyclically and systematically over time to evaluate employee performance . However , I do not agree that HPT is always the best tool in solving problem . This is because it might identify wrong data or information during performance analysis . If it is wrong in the beginning of the process , inappropriate intervention might created . This will make the decision maker make the wrong decision . While doing wrong analysis , there might insert a high cost and it’s will be a waste of time if the analysis is wrong . Moreover , HPT has mentioned a few intervention to fix the problems . It’s hard to implement all those intervention at the same time . If cannot implement successfully , the more problem might exists . But if whole process is running smoothly , nonetheless , HPT is a very tool in solving problem . I had compared two models which are HPT model and ADDIE model . The ADDIE model is a systematic instructional design model consisting of five phase which are analysis , design , development ,implementation and evaluation phase . There are a few similarities between HPT model and ADDIE model . They both use process of analysis to look the problem and seek for the solution as well . However , they have a key different between the model . The ADDIE model addresses the â€Å"gaps between desired outcomes or behaviours and the audience’s existing knowledge and skills†. The ADDIE models mainly focus on the individual needs and then design and develop objectives and processes help the individual . Evaluation and implementation do not just happened at the end of the design and development . They are ongoing to inform the designer . So if there any changes, the necessary solution can be made quickly . The HPT model is different because it more focus on the causes of â€Å"performance† gap . The success of the organization is depend on its employees . HPT will look what causes the employees unable to perform the job . HPT’s goal is to increase the bottom line of the company by increasing the individual’s ability to perform the job . In addition , it is important that the HPT is look â€Å" what caused the problem† ,while the ADDIE model looks at â€Å" solving the problem exists † . HPT model design seem to also behaviourist approach because the focus is more changing individual behaviour . The HPT model will look at evaluation of the problem and how it was addressed long after the process . The HPT model has its own advantages . In my view , because HPT model is focused on how the people perform on the job . In my opinion , the workers or the people of the organization is the assets for its organization . So , the performance of the individual affect overall success of the organization . This model takes many variables into the account , that there will affect performance . It humanizes the work place because the individuals are allowed to address their problems. At the same time , it may be necessary to provide training course if the individual unable to perform the work is because of lacking information or unknowledgeable . Beside that , HPT model never ignore the reward or motivation . If they have a good performance , incentive or reward will be given to motivate the employees . Every model has its own disadvantages as well , disadvantage I see is how the technologist ensures lifelong working and the successful using the collected information. Because they wait a while before evaluating. It would seem to me that the worker would want to know immediately if they are doing better so that changes can be made more quickly. Feedback is so important to workers feeling successful and competent. If there is too much focus on negative feedback, it may have a negative impact on the individual. Where as in the ADDIE model, the worker’s deficiencies or the causes problems are not the major focus, and you get feedback at various stages rather than only at the end of the process. If I were a human resource professional in any area , I would use HPT model . As I was also a worker before , I see that would be beneficial for all the subordinates or primary worker . If workers feel supported, they’ll do better than if they’re not supported. It provides a guide to helping individuals be successful in their work. I think someone who feels successful and competent in their work is more likely to suffer less burn out than those individuals who have no one in their corner to mentor or help them solve whatever issue is keeping them from doing their best on the job. I might also use HPT when talking to friends or children about getting jobs and being successful on the job. I can apply it to my own career and be my own trouble shooter as well as look for solutions. This puts a little more power over what I do in my hands because at least I would know that I can change me to help the organization do its job better too. On the other hand , as I mentioned employees are a part of assets of the organization . I think it is the responsibility of the human resource department to choose an appropriate system of performance appraisal . Effective appraisal system motivate the employees all the time rather than joining training . Conclusion In conclusion, HPT model has been described as the systematic and systemic identification and removal of barriers to individual and organizational performance. Nonetheless ,HPT model is an effective tool for uncovering performance issues . The model can be applied to any area in the library where employees must perform and is not limited to public service . In any new service , some performance issues may â€Å" work themselves out† overtime while some may not . In some cases , problems left unidentified or unsolved , it may be quite difficult to fix after an extended period of time . It is same like our daily habit or problems , if a parent identified that a child is beginning to pick up a bad habit , it is certainly easier to change the child’s behaviour when the parent first notices their child’s behaviour . If the parents did not take action to stop their child in the beginning , it is hard to stop their child after maintain a long bad habit . Similarity to any other service , if identify the problems early , then can find out the causes and fix it as fast as possible . The model does require extensive analysis . Without this analysis , a full picture cannot be taken , assumption will be made , and issues or problems cannot be identified . Optimal employee performance is critical in any organization . From the journal , Learning Commons in UNCW is using human performance technology (HPT ) . It is a library . With libraries needing to demonstrate their value and provide assessment data and administration . The HPT model serves as one more useful tool for libraries to accomplish this . I had read a journal , which is about ADDIE model and I had also compared both ADDIE and HPT model . I found that there have many similarities . But when I go deeper for the journal , I found that there is a big differences . ADDIE model focus more on training building program , while in HPT model , training is only one of the tool . HPT model is not only useful in organization , but also useful for every individual . If did not find out the causes properly , a appropriate solution is impossible to created .