Wednesday, October 30, 2019

Data-Collection Method Comparison-Sheila Essay Example | Topics and Well Written Essays - 1500 words

Data-Collection Method Comparison-Sheila - Essay Example The data is collected directly from the field that enables the research to draw accurate and reliable conclusions. Both of them are usually constructed into culture of a given society and provide information from the ancient times to the current periods and must be interpreted by the researcher for a good conclusion to be arrived at. However, artifacts are more honest than the stories. This is because; in artifacts the researcher views for her/himself and can identify the hidden meaning (Goertz, & Mahone, 2012). On the other hand, stories can sometimes be made up that suits the researchers and at times the participant may lie. This provides false data that compromises the research. Both the criteria try to seek information from a particular source to a particular problem. They are methods of inquiry into a particular study regarding a research problem. The data must be then analyzed for interpretation. Never the less, primary data uses firsthand information from the field and can be used for comprehensive analysis. They are done to acquire new solutions to a particular problem and interact with the participant directly (Tracy, 2013). However, secondary data secondary data uses already stored data to improve on the existing analysis, or for references purposes and do not meet with the participant. Both methods involve direct actions of the researcher and the responded hence obtains first hand information. This ensures actions such biasness; lies and inaccurate information’s are minimized hence ensuring an honest data. Furthermore, both the interview and observations must notify the responded of their presence, intentions and how they would involve them in the study if they are to succeed in the study (Tracy, 2013). Interviews are usually well structured that provides an easier way to collect data from the field. The questions are made simple and clear.

Monday, October 28, 2019

Humanistic Theory According To Abraham Maslow Education Essay

Humanistic Theory According To Abraham Maslow Education Essay This is the psychological perspective popularized by Carl Rogers and Abraham Maslow that emphasizes the human capacity for choice and growth. The overriding assumption is that humans have free will and are not simply fated to behave in specific ways or are zombies blindly reacting to their environment. The humanists stated that the subject matter or psychology is the human subjective experience of the world how human experience things, why they experience things, etc. Humanistic psychologists look at human behavior not only through the eyes of the observer, but through the eyes of the person doing the behaving. Humanistic psychologists believe that an individuals behavior is connected to his inner feelings and self-image. Unlike the behaviorists, humanistic psychologists believe that humans are not solely the product of their environment. Rather humanistic psychologists study human meanings, understandings, and experiences involved in growing, teaching and learning. They emphasize characteristics that are shared by all human beings such as love, grief, caring and self worth. Humanistic psychologists study how people are influenced by their self-perceptions and the person meanings attached to their experiences. Humanistic psychologists are not primarily concerned with instinctual drives, responses to external stimuli, or past experiences. Rather, they consider conscious choices, responses to internal needs, and current circumstances to be important in shaping human behavior. Humanistic theory is based upon the idea that everyone has the potential to make a contribution to society and be a good and likeable person if their needs are fulfilled. Abraham Maslow and Carl Rogers led the humanistic theory movement and it was Maslow who developed the pyramid of needs. Maslow believed that fulfilling the needs in the correct order would allow individuals to become self actualised, fully able persons. So only after the basic physiological needs such as food, shelter, warmth are met can individuals move on to the next stages; the need to feel secure, to be loved and accepted etc. Maslow developed his theory not by studying mentally ill patients, which is where much psychological knowledge had derived from up to that point, but by studying healthy, productive, creative individuals lives and careers. He concluded that there were common characteristics which were shared by successful individuals including self acceptance, openness and respect for other individuals. Carl Rogers felt that, in addition to Maslows hierarchical needs, in order for a person to develop fully that they needed to be in an environment which would provide them with genuineness, acceptance and empathy and that without such a nourishing environment healthy personalities and relationships would be unable to flourish. Humanistic theory is basically about the development of the individual. It was very popular in the 1970s but seems to be slightly out of favour today as Western nations have generally moved slightly towards the political right and there is more emphasis on conforming and contributing to, a slightly more conservative society. Of course, whilst humanistic theory does have a very strong focus on the individual, it is based upon the belief that well developed, successful individuals are best placed to make a positive contribution to society. Humanistic theory suggests that the achievement of happiness is frequently dependent upon achieving, or giving yourself the licence to, investigate and pursue your own deepest interests and desires. Humanistic Theory according to Abraham Maslow Abraham Maslow has been considered the Father of Humanistic Psychology. Maslows theory is based on the notion that experience is the primary phenomenon in the study of human learning and behavior. He placed emphasis on choice, creativity, values, self-realization, all distinctively human qualities, and believed that meaningfulness and subjectivity were more important than objectivity. For Maslow, development of human potential, dignity and worth are ultimate concerns. Maslow rejected behaviorist views and Freuds theories on the basis of their reductionistic approaches. He felt Freuds view of human nature was negative, and he valued goodness, nobility and reason. Also, Freud concentrated on the mentally ill, and Maslow was interested in healthy human psychology. Maslow and his colleagues came to refer to their movement as third force psychology, the first two being psychoanalysis and behaviorism. The third force is based on philosophies of existentialism and humanism. He is famous for proposing that human motivation is based on a hierarchy of needs. The lowest level of needs are physiological and survival needs such as hunger and thirst. Further levels include belonging and love, self-esteem, and self-actualization. From Maslows perspective, the drive to learn is intrinsic. The purpose of learning is to bring about self-actualization, and the goals of educators should include this process. Learning contributes to psychological health. Maslow proposed other goals of learning, including discovery of ones vocation or destiny; knowledge of values; realization of life as precious, acquisition of peak experiences, sense of accomplishment, satisfaction of psychological needs, awareness of beauty and wonder in life, impulse control, developing choice, and grappling with the critical existential problems of life. Maslows theory of learning highlighted the differences between experiential knowledge and spectator knowledge. He regarded spectator, or scientific, knowledge to be inferior to experiential. Properties of experiential learning include: immersion in the experience without awareness of the flow of time momentarily not being self-conscious transcending time, place, history, and society by being beyond and unaffected by them merging with that which is being experienced being innocently receptive, as a child, uncritical suspending temporarily evaluation of the experience in terms of its importance or unimportance lack of inhibition, subsiding of selfishness, fear, defensiveness experience unfolds naturally without striving or effort suspending criticism, validation, and evaluation of the experience trusting experience by passively letting it happen; letting go of preconceived notions disengaging from logical, analytical, and rational activities Maslows Hierarchy of Needs Physiological Needs They consist of needs for oxygen, food, water, and a relatively constant body temperature. They are the strongest needs because if a person were deprived of all needs, the physiological ones would come first in the persons search for satisfaction. We need these for basic survival. Maslows theory said that you need to satisfy first the basic needs like Physiological needs and Safety needs, to get motivation to truly attain the higher-level needs like social needs and esteem. Safety Needs When all physiological needs are satisfied and no longer dominating our thoughts and behaviors, we progress to safety needs. A persons attention turns to safety and security for himself/ herself to be free from the threat of physical and emotional harm. Such needs might be fulfilled by: Living in a safe area Medical insurance Job security Financial reserves These include the need for security. We often have little awareness of these, except in times of emergency disorganization in social structure (war time, terrorist acts, domestic violence, natural disasters). Maslows hierarchy said that, if a person feels that he or she is in harms way, higher needs would not be attained that quickly. Belongingness Love needs When a person has attained the lower level like Physiological and Safety needs, higher level needs become important, the first of which are social needs. Social needs are those related to interaction with other people like: Need for friends Need for belonging Need to give and receive love When safety and physiological needs are met, we desire, to be loved by others and to belong. Maslow states that people seek to overcome feelings of loneliness alienation. This involves both giving receiving love, affection the sense of belonging (family, friends, social groups). Esteem Needs After the first 3 classes of needs are met, the needs for esteem can become dominant. These involve needs for both self-esteem for the esteem a person gets from others. Esteem needs may be classified as internal or external. Self respect and achievement are some examples of Internal esteem needs. Social status and recognition are some examples of External esteem needs. Some esteem needs are: Self-respect Achievement Attention Recognition Reputation Humans have a need for a stable, firmly based, high level of self-respect, respect from others. When these needs are satisfied, the person feels self-confident valuable as a person in the world. When these needs are frustrated, the person feels inferior, weak, helpless worthless. Need for Self-Actualization When all of the foregoing needs are satisfied, then only then are the needs for self-actualization activated. The last necessity is the Self Actualization or Fulfillment Needs. This includes purposed, personal growth, and the full realization of ones potentials. This is the point where people start becoming fully functional, acting purely on their own volition, and having a healthy personality. Maslow describes self-actualization as a persons need to be do that which the person was born to do. A musician must make music, an artist must paint, and a poet must write. These needs make themselves felt in signs of restlessness (person feels edgy, tense, lacking something, restless.) The person must be true to his or her own nature, be what you are meant to be. Maslow believed that very few people reach the state of self-actualization. Although we all have the need to move toward the goal of reaching our full potential, other needs may get in the way. Misconceptions about Maslows Hierarchy of Needs Maslow himself agreed that his 5-level need hierarchy oversimplifies the relationship between needs behavior. The order of needs makes sense for most of us, though there may be some notable exceptions (e.g., some people need to satisfy their needs for self-esteem respect before they can enter a love relationship). We may so desire fulfilling a need that we sacrifice others below it. For example, a person with a passion for acting might sacrifice his or her hunger, which is one of physiological needs, to pursue a career in acting even though the payment is barely enough and struggling to live while trying to make a name for themselves in the business. Maslow was interested in studying people who are psychologically healthy. These were people who had become self-actualized. He interviewed these people to see how they were able to satisfy all of the needs on the hierarchy. He conducted what he called a holistic analysis in which he sought general impressions from his efforts to understand these people in depth. What are Self-Actualized People Like? They tend to accept themselves for what they are. They freely admit their weaknesses, but do make attempts to improve. They dont worry excessively over the mistakes they have made, but instead focus on improving. They respect feel good about themselves. However, this self love is healthy not narcissistic. They are less restricted by cultural norms than the average person. They feel free to express their desires, even if contrary to the popular view. These people have frequent peak experiences, in which time place are transcended, anxieties are lost, a unity of self with the universe is obtained (birth of a child, marriage, deciding to go to school). Humanistic Theory according to Carl Rogers Carl Rogers was a central figure in the humanistic movement of personality psychology. He lived from 1902 till 1987. In the span of his life, he was an instrumental figure in the understanding of the individual as a central point of the study of human potential. He believed that within each individual lies an innate desire and motivation to learn in order to progress to a higher level of achievement and self-development. Both Abraham Maslow and Carl Rogers work became popularly known in the mid-1980s as the human potential movement. This categorization of their work became the ground where psychologists used their conceptual framework to study the impact on ones personality as well as in the field of education, among others. One of his famous quotes epitomized his conceptual framework, The only person who is educated is the one who has learned how to learn and change. This quotation reflected his theoretical conception that people must be able to create a learning curve that will enable them to change towards a new chapter in their self-development. According to Rogers (1951), people can be tuned to learn to unlock themselves from an environment that constricts their potential because of preconceived notions of how they should be. Rogers believed that people who are restricted by their perception of the environment in which they exist in have a debilitating effect on how they may view their potential. However, if an individual is able to overcome the faulty perception(s) of the environment, and learn to acknowledge the potential to grow, then the individual may initiate steps as well as processes towards this end. Rogers strongly advocated that a growing individual is on where he or she is aware of a progress of ongoing internal change, and an acceptance of oneself. Rogers further emphasized that individuals will inevitably experience positive development if they are exposed to supportive environmental condition. By his understanding of supportive environmental condition, Rogers believed that social factors contribute to positive development. Rogers (1982), quoted by Pfaffenberger. A, 2007, p 508, emphatically stated that in his opinion, all humans will display compassion and cooperation if they are provided with the appropriate environmental supports. Therefore, Rogers was of the view that learning in a supportive environmental condition was crucial to the development of oneself. In a much later publication, Rogers (1982) also placed emphasis on growth-enhancing relationships that facilitate inner awareness and congruence which allowed motivation of effort towards a certain objective. Rogers postulated that relationships that provide for an awareness of oneself in differing situations can lead to personal growth. For example, if a child learns that he or she is nurtured in a caring family and with acceptance (relationship factor), he or she is more adapted to see situational variables (such as studies, or skill based acquisition) as motivation towards achieving objectives. However, it is notable that this presumption of Rogers may be faulty because it is argued that situational variables can also work to the detriment of the individual. In contrast, Abraham Maslow (1968) explicitly acknowledged that difficult circumstances can also be growth-enhancing. Much research had been conducted to investigate how growth-enhancing relationships and situational variables may trigger different affect. One of the more definitive studies was conducted by L. King (2001), (quoted by Pfaffenberger. A, 2007, p 510). In this study, King investigated the influence of challenging and limiting life events on personality development as measured by Loevingers (1976) SCT Sentence Completion Test. The study concluded that cognitive abilities and personality structures interact with life circumstances, and that the nature of this interaction is relevant to whether growth occurs (p, 511). This study also supports Rollo Mays (1958) theory of existential therapy, where clients are taught to constructively work with their limitations and to create freedom so that they can choose values, meanings, and their levels of commitment. Theoretical orientations of Rogers humanistic concept: The humanistic orientation of Rogers theory can be essentially encapsulated using two (2) theories. The two (2) theories are the person-centred personality theory and the self-determination theory. Person-centred theory For almost fifty (50) years since his earlier publication of A Theory of Therapy, Personality and Interpersonal Relationships, developed under the Client-centred Framework, Rogers (1959), the person-centred movement and client-centred approach towards counselling and psycho-therapy are also generalized to other fields of knowledge. The crux of the person-centred personality theory is the assumption that human beings have an inherent tendency towards growth, development, and optimal functioning. According to Rogers (1959), quoted by Patterson and Joseph, 2007, p 120, the person-centred approach offers a dynamic, process-focused account of personality development and functioning,à ¢Ã¢â€š ¬Ã‚ ¦ What this means is that, every human is born with an innate motivational drive, known as the actualizing tendency. Actualizing tendency is defined by Rogers (1959) as, the inherent tendency of the organism to develop all of its capacities in ways which serve to maintain or enhance the organismà ¢Ã¢â€š ¬Ã‚ ¦development towards autonomy and away from heteronomy, or control by external forces. (p 196) (Quoted by Patterson and Joseph, 2007, p 120) Every individual possesses some capacity that allows him or her to realize the inherent potential within. One of the key implications of Rogers actualizing tendency lies in how individuals undertake to bring out the potential. According to Rogers, the impact of the environmental conditions is a determining factor. Under favourable social-environmental conditions, Rogers proposed that the individuals self-concept actualizes in accordance with his or her organismic valuing process (OVP). The OVP refers to the evaluation of experiences in a manner consistent with ones intrinsic needs: Rogers summed it by declaring that, the human infant is seen as having an inherent motivational system and a regulatory system (the valuing process) which by its feedback keeps the organism on the beam of satisfying his motivational needs. (Rogers, 1959, p 222). Even from young, every individual is keen to fulfil some of his or her intrinsic needs; those that are not dependent on externalities or due to any prior learning. An example is how children recognize the importance of exploration whilst learning and/or playing. In the process, children discover more about themselves, about the environment, about others and about life in general. As children learn to correlate these experiences into their organization of self-concept, they begin to instil a sense of their OVP learning to evaluate the experiences based on their intrinsic needs. The concept of OVP is important to the central theme of Rogers theoretical framework. Important to Rogers understanding is his (1957) terminology of a fully functioning person an ideal of autonomous psychological functioning that occurs when self-actualization is organismically congruent. This concept is similar to Maslow (1970) and presupposes that individuals must firstly satisfy their most fundamental needs. In his later works, Rogers (1963 and 1964) proposed that the attitudes and behaviours of more fully functioning individuals are consistent with certain internally generated value directions. The value directions include moving toward increasingly socialized goals, where sensitivity to others and acceptance of others is positively valued and where deep relationships are positively valued, and moving in the direction of greater openness to experience, where the person comes to value an openness to all of his or her inner and outer experience ( Rogers, 1964, p 166). Rogers acknowledged that conditions or the social-environmental factors are not always ideal for the emergence of a fully functioning person. Situations like this give rise to a state of incongruence. There is a state of tension and internal confusion. When an unfavourable social environment is present, the actualizing tendency is thwarted, Rogers (1959). The actualizing tendency is compromised by the conditions of worth. Conditions of worth are conceptualized as the values that are introjected by the individual from his or her social interactions and that stem from the developing infants need for positive regard from significant others in his or her social environment. In this respect, if an infant receives positive regard that is conditional, then he or she learns to evaluate experiences according to whether or not they satisfy the externally imposed conditions. As the child develops, the conditions of worth are introjected, meaning that they act as an internalized social order and replacing organismic valuing as the principle governing the individuals attitudes and behaviour. Self-Determination Theory This is a contemporary organismic theory formulated by Deci, E.L and Ryan, R. M, (1985, 1991, 2000) that focused on motivation and personality functioning that emphasizes the central rule of the individuals inner resources for personality development and behavioural self-regulation. This theory is similar to the person-centred theory in that self-determination theory views the individual as an active growth-oriented organism, attempting to actualize his or her potentialities within the environment in which he or she functions. A summary of the self-determination theory carries the following elements: Human beings are inherently proactive; have potential to act on and master both the inner forces and the external, Human beings, as self-organizing systems, have an inherent tendency toward growth, development, and integrated functioning, For people to actualize their inherent nature and potentials, people require nutrients from the social environment. Adapted from Deci and Vansteenkiste, 2004, pp 23-24, (quoted by Patterson and Joseph, 2007, p 124) In self-determination theory, one of the major sources of motivation and/or OVP is the recognition whether the behaviour is intrinsically or extrinsically motivated. Intrinsic motivation/regulation is equivalent to acting in accordance with OVP. At the same time, there are three (3) subcategories of extrinsic motivation that may account for extrinsic regulations. Perceived locus of causality/ Locus of evaluation describe the individuals perception as to whether the motivation is located internally or externally = person-centred construct of locus of evaluation (Rogers, 1959), Basic needs/ Necessary and Sufficient conditions need for competence, relatedness, and autonomy; essential for facilitating psychological growth and integration, social development, and personal well-being. Competence refers to our need to control outcomes, and to be efficacious in our environment, autonomy refers to the individuals attempts to be a self-determining agent of his or her own attitudes and behaviour, while relatedness describes the urge to be in relationship with others, caring for others, and being cared for by others. Self-determination theory hypothesized that, for the individual to experience an ongoing sense of integrity and well-being, each of these three basic needs must be met throughout the life-span. This hypothesis supports the contention that certain, social-environmental conditions nurture self-regulation based on organismic valuing and lead to a process of growth and change in the direction of healthy functioning and psychological well-being. Contingent Self-Esteem/Conditional Self-Regard refers to the influence of people viewed as significant others (Deci Ryan, 1995; Ryan Brown, 2003). This is similar to the person-centred view of conditional self-regard. There exists a great amount of similarities between the person-centred and the self-determination theory. Both theories postulate that the path to psychological well-being involves following an innate guidance mechanism. This understanding is important to the field of learning because each individual has a different subset of characteristics that may promote and/or hinder learning. In this respect, knowing what triggers effective learning, providing conducive environment, taking into account an individuals OVP, social factors, as well as structuring the curriculum are necessary to enhance the optimal level of learning. Humanistic theory proposed understanding humans as a state of being, a dynamic and ever-changing situation where each individual is seen as always striving to fulfil the potential within. APPLICATION IN EDUCATION In the field of education, humanistic theory grants educators important conceptual understanding about the role of learners. From Maslow and Rogers, educators have a better insight into the elements of learners style and dimensions of absorption of knowledge and utilization of skills and abilities. In his paper, Humanistic Self-Instruction, the author, R. Craig Hogan (1978) suggested that instructors/educators should demonstrate their appreciation and value of the individual learners by viewing them as objects that have unique and specific needs. The negative implications of treating the learners as empty jars or blank slates is that many instructors/educators feel that learners are passive receivers only; filling the learners as the instructors/educators wish. This negative implications are serious to warrant attention as instructors/educators may force learners to be receptive and have no obligation whatsoever to consider his or her individuality and autonomy in learning. According to Chris Argyris, in his book, Intervention Theory and Method: A Behavioural Science View, 1970, pp 15-16, we see them (learners) and they see themselves as autonomous, responsible individuals committed to the direction the intervention is taking, making free choices based on sufficient valid information about the means and ends. It is a common error that most instructors/educators as well as educational institutions assume that learners need to be instructed as to their learning. This assumption works on the premise that effective learning must follow certain syllabus, instructional method(s) and assessment grading. The education system in most countries is mostly rigid; built along the tried and tested formula of the existing structure of instructed teaching. In cases such as these, the classroom may contain students of varying levels of interest, self-management skill, independence versus dependent minded, industrious versus sluggard and bright as well as lesser bright ones. The methodology of teaching would be uniform across all All are fed the same the same fare at the same rate in the same way. The classroom atmosphere suppresses individuality, autonomy, and freedom by stifling students initiative to manage their own learning at every level of responsibility. Self-directed learning is minimized (Hogan, 1978, pp 262-263) Combination of group contingencies and cooperative learning in adopting humanistic principles The conceptual understanding of group contingencies is that it is primarily derived from behavioural learning theory (Bandura, 1969). The theory behind group contingencies is that a group is rewarded if it collectively meets some standard; and the members of the group apply social sanctions to one another to encourage group members to do what is necessary to ensure that the group will be successful (Slavin 1987). Group contingencies are also workable if the reward/sanction is used in tangent to the efforts of individual member of the group. This creates a situation where each individual makes him or herself liable and responsible for the success of the group. In this, the humanist tendencies are activated in each of the individual. Cooperative learning refers to a set of instructional methods in which students are encouraged or required to work together on academic tasks. Cooperative learning methods may be as simple as having students sit together to discuss or help one another with classroom tasks. Rewards may be offered; as in group contingencies but are not essential (Slavin, 1987, p 31). An aspect of cooperative learning that is vital is the element of peer interaction. The quality of the peer interaction determines the extent of the learning and the success of the completion of tasks. The effectiveness of cooperative learning is best seen in two (2) studies (Hulten DeVries, 1976; Slavin, 1980) which found that providing recognition to student teams based on the sum of their individual learning increased student achievement even if students were not permitted to interact in class. In the same vein, a German study, (Huber, Bogatzki, Winter, 1982) found that providing students an opportunity to study together did not increase their achievement, but adding group rewards based on individual learning did lead to enhanced achievement. (Slavin, 1987, p 33) Therefore, the researches listed above clearly supports the position that cooperative reward structures, or group contingencies, based on individual learning of group members are necessary for the success of these methods in improving student achievement. Peer interaction is also found to be important to the success of cooperative strategies. [Webb, (1985), Peterson Janicki, (1979)] Students are motivated to engage in elaborated, cognitively involving explanations and discussions if the learning of their group mates is made important by the provision of group rewards based on individual learning performances (Slavin, 1983). One of the important findings of Slavins study has found positive effects of cooperative learning non race relations, attitudes, self-esteem and other non-academic outcomes (1983). Humanistic understanding of education is not specifically confined to the individual per se but rather emphasizes on how learners/students are able to gain the right concept of themselves and pursue towards growth. In this, cooperative learning has a major role if the outcomes point to similar outcomes. Humanistic theory and learning in Adult Education Humanistic application is most seen in adult learning. For most adults, the adage of more is caught than taught is true. According to a paper presentation by Jackson, Sanetta. George, Cooks, Alyce; Hackney, Darwyn; Stevens, Claude; and Zumwait, Dave, (2002), this adage refers to the informal and incidental learning that takes place on a daily basis and in most situations. In these situations, the learning revolves around human relationships. It is common knowledge that the psychological learning environment of adults and non-adults are significantly different. By virtue of adults ability to make decisions regarding their personal growth and development; especially in learning, humanistic theory provides for a deeper insight into understanding the psychological learning environment of adults. The psychological learning environment is defined as creating a climate in which both learners and teachers are able to engage in genuine exchange. (Jackson, et.al) For teachers, this means that learners need to feel a sense of welcome and at ease, attending to the fears and doubts that adult

Friday, October 25, 2019

Minimalism Essay example -- Essays Papers

Minimalism In order to understand minimal artists’ tendency to produce objects and not images, we need to define minimalism. Michael Delahunt at Artlex (1) refers to minimalism as â€Å"A twentieth century style of art stressing the idea of reducing a work of art to the minimum number of colors, values, shapes, lines and textures†. But I think this definition does not completely reflect what minimal artists did. They did not get interested in ‘complex’ things as colors, values, lines etc. They preferred objects to images or I would rather say ‘brushstrokes’. Because that they believed that â€Å"less is more†, even brushstrokes were too much for them. Minimalists were against self expression. They wanted to use the meaning a ready made object already has in it. This was totally suitable for their purpose of using minimum effort and material for an artwork. Preparing an image would consume too much of the artists’ time and effort. And what’s more, it would have self expression in it. They also believed that art could be concieved by mind before execution. That is, one must be able to explain an artwork to another who hasn’t seen it. For example Mohology-Nagy gave instructions by phone to a factory for one of his works(2). This can be thought as a instruction manual for an artwork (I think we can call minimalism as D.I.Y. art!). But you can’t do this kind of art with a painting. Can you think of it? â€Å"put some yellow there, mix red with brown and put it on the tree with ...

Wednesday, October 23, 2019

Post Traumatic Stress Disorder- the Things They Carried

Taylor Lineberger Mrs. Eddins English 3 CP December 5, 2012 Post-Traumatic Stress Disorder (PTSD) is a type of anxiety disorder. PTSD usually occurs after someone has seen or experienced a traumatic event that involved the threat of injury and death. It is commonly associated with the soldiers who have fought in wars or conflicts. All of the symptoms of PTSD are classified and categorized into three distinct groups: â€Å"reliving†, avoidance, and arousal. Some of these symptoms include flashbacks, repeated nightmares, detachment, hyper-vigilance, and being easily angered, along with many others. (PubMed Health, PTSD) (*1). According to a survey conducted by the Veteran’s Administration, some 500,000 of 3 million troops suffered from PTSD after the Vietnam War. The survey also states that rates of divorce, suicide, and alcoholism and drug addiction were higher among Vietnam veterans. † (History, Vietnam War) (*2). We may never fully know how much this disorder has truly affected our troops. Most veterans are not open about their condition, however some have accepted it and open up about it. So, how much does PTSD really affect someone? The trauma that causes PTSD is just as unique as the suffering individual themselves. Any fearful trauma can produce symptoms of PTSD. Being in the Vietnam War did not help any of this. These soldiers were torn away from the only things and the home they had ever known and dropped into a foreign place where the situation was â€Å"kill or be killed. † They had no other choice but to be exposed to the unimaginable horrors that awaited them. Cases of people with PTSD are famous for their abuse of drugs or alcohol; however, ex-soldiers have an additional addiction that often lands them in trouble, or jail: an addiction to adrenaline. The one thing that caused them to have this condition may very well be the one thing that decides their fate. Inside every person with PTSD is a time bomb. It is merely a matter of time before symptoms begin to show up. One may exhibit all manner of symptoms in nearly everything they do, and still live what appears to be a normal life. However, it doesn’t take much to bring out full-blown symptoms of a case of PTSD. Retirement and additional stress can be a catalyst to cause the occurrence of symptoms to appear sooner than they normally would. Wellness Directory MN, Post Traumatic Stress Disorder) (*3). â€Å"The war was over and there was no place in particular to go† (O’Brien, 131). Thoughts of sorrow and loss overwhelm the Vietnam veterans upon their return back home. Crushed from the horror of war, they have to come back to even bigger disappointments and sadness. Instead of the calm lives they lead before they left their country and the presence of warm and caring everyday life, most of them encounter empty beds, a cold family and overall loss. Already physically and emotionally defeated, they find betrayal instead of recuperating trust. There is nothing to nourish them; they do not find anything to rely on. Even in instances of supportive partners, the inevitable horrors of the war haunt them in sleep or come back to them in daydreaming. They all came back with multitude of disorders, mostly with a post-traumatic stress disorder with the common symptoms of recurring nightmares, hypersensitivity, avoidance behavior, and intrusive thoughts, feelings and memories-commonly found in war vets. â€Å"The Things They Carried† is a documentary novel written by Tim O’Brien, a Vietnam War veteran. There are many stories within the novel that show various examples of post-traumatic stress disorder. According to O'Brien, upon their arrival home the veterans imagine, or even hallucinate, what things would have been like if they had not suffered through the war. Examples of such occurrences exist in the stories â€Å"Speaking of Courage† and â€Å"The Man I Killed. † Norman Bowker in â€Å"Speaking of Courage† dreams and fancies of talking to his ex-girlfriend, now married to another guy, and of his dead childhood friend, Max Arnold. He lives his unfulfilled dream of having his Sally beside him and having manly conversations with Max. He cannot stop day dreaming and dwelling in the past. Unemployed and overwhelmed by inferiority and disappointment, Bowker lacks a motivating force for life. Emotionally stricken, he only finds satisfaction in driving slowly and repeatedly in circles around his old neighborhood in his father's big Chevy, â€Å"feeling safe,† and remembering how things used to be when â€Å"there has not been a war† (O’Brien, 158). These recurring events also spring memories f the beautiful lake where Norman used to spend a lot of time with his now married ex-girlfriend Sally Kramer and his high school friends. The lake invokes nostalgic and sentimental memories both of his girlfriend and his long gone – drowned – best friend, Max Arnold. Nothing fulfills Norman Bowker anymore. Instead, a terrible confusion has taken over his mind in the form of blur and chaos. He d esperately needs someone to talk to. The guys go crazy in their unsuccessful attempts to maintain healthy balance of their minds and spirits. However, even though they might not realize it, or not at least at the time, most of the veterans end up losing sanity. They act upon and laugh at the most bizarre things. In â€Å"How to Tell a True War Story,† Rat Kiley thinks of â€Å"a gore of about twenty zillion dead gook fish† as the â€Å"the funniest thing in world history† (O’Brien, 65). The result of the post traumatic experience of seeing his nineteen-year-old best friend, Curt Lemon’s, body being blown up into pieces by a grenade, is that Rat Kiley takes his anger out on a baby buffalo by shooting him pieces by pieces multiple times. He shoots the animal, until â€Å"nothing moved except the eyes, which were enormous, the pupils shiny black and dumb† at which Dave Jensen, one of the two who collected Lemon's body pieces off of the tree, gets childishly amused† (O’Brien, 76-79). Not realizing his new condition of mental imbalance, Dave Jensen goes on to make jokes and sing about the â€Å"Lemon Tree. † This is a parallel to Dave Jensen's insanity, O'Brian, even after twenty years, still gets woken up by the memories of this event: â€Å"Twenty years later I can see the sunlight on Lemon's face† (O’Brien, 80). As a consequence of PTSD, O'Brien both despises and values the war. Even though Tim O'Brien might not sound very convincing with the credibility of his own memories as a narrative, the post-traumatic stress disorder remains a scientific certainty. The results of the trauma soldiers suffered in the war, along with the emotional baggage, (grief, terror, love, and longing) show of all of the veterans' post-war turmoil and heartache.Sources:*1: Vorvick, Linda J. and Timothy Rogge. â€Å"Post-traumatic Stress Disorder (PTSD). † PubMed Health. N. p. , 13 Feb. 2012. Web. 5 Dec. 2012. . *2: â€Å"Vietnam War. † History. N. p. , 2003. Web. 5 Dec. 2012. . *3: â€Å"Post Traumatic Stress Disorder. † Wellness Directory MN. N. p. , 2006. Web. 5 Dec. 2012. .

Tuesday, October 22, 2019

March Bloch essays

March Bloch essays Marc Blochs Strange Defeat: A Statement of Evidence Written in 1940, was the result of his experiences during the Nazi invasion of France during World War Two. As the title describes, this Memoir was written in 1940 but was not published until after the war in 1946. This work was written while Bloch was in hiding from the Nazis in Guret France during the months following the Nazi occupation of France. Bloch, who joined the war effort against the Nazis in 1939 at the age of fifty-four, was of jewish heritage and realized he was a prime target for their hate. Despite his age and the French policy excusing him from duty, Bloch was dedicated to protecting his home. Bloch vanished into the French resistance and by 1943 he was a leader of the resitance group Francs-Tireur. Bloch was finally captured by the Nazis in 1944 and was killed by them along with a number of other members of the resistance. Although the original language of the document was French, it has been translated into Engli sh. Bloch was born in Lyon France on July 6, 1886 to an upper middle class Jewish family. Much like his father, Bloch became a professor of history after he fought in the first World War. Bloch served in the infantry and was awarded a number of commendments including the Legion of Honor. His first teaching position was at Strasbourg University as a professor of Medieval history. He remained at Strasbourg until 1936 when he took over the chair of economic history at the Sorbonne. Strange Defeat seems to be directed at the French people as well as the French government. The document outlines the flaws of the French policies during the nazi invasion and analyzes what could have been done differently to avoid occupation. Because of the nature of the work, people all over the world can read Strange Defeat and learn a great deal about a nations foreign and domestic policies and how they correspond with the execution of them. ...

Monday, October 21, 2019

Free Essays on Jay Leno

Jay Leno, known by many as the king of late night television. But little do they know of the ridiculous steps and missteps that took him to the top. In Jay Leno’s autobiography, Leading With My Chin, Jay analyzes his journey to fame and fortune. He begins with his childhood and the situations that sparked his love for comedy. After reading his book I found myself a bit disappointed. The book was very funny, but it did not contain that â€Å"cut and dry† sense of humor he is known for. It consists mainly of short, humorous episodes about how he works his way up through the ranks as a stand-up comedian. He spends a lot of time conversing about childhood and college mishaps. This bothered me, seeing that mostly adults were reading his book, I don’t think the readers would be interested in his childhood problems or college pranks. Furthermore, he does not convey many personal feelings, does not gossip or put anyone down like Howard Stern. Also, he does not elaborate on his sexual exploits (a few of which he mentions). These are just some of the things I would like to know more about. But he has paid his dues, and deserves to be where he is today. It was a twenty-year struggle to the top, a struggle most people would have given up. Although Jay Leno is probably hands-down one of the funniest comedians in showbiz, I did not think as highly about his book. Yes, there were some parts worth reading about, but there is so much more he could have told us. There is so much more that people wanted to know about. Such as the controversial falling-out with his agent/producer, or his feelings concerning Johnny Carson. If you ask me, this book was not worth the thirteen dollars I paid for it. But the odd thing is that after reading his book, I do not feel any different about him, or his work, and I will continue to watch his show. I guess the visual portion of entertainment had a stronger influence than the text did.... Free Essays on Jay Leno Free Essays on Jay Leno Jay Leno, known by many as the king of late night television. But little do they know of the ridiculous steps and missteps that took him to the top. In Jay Leno’s autobiography, Leading With My Chin, Jay analyzes his journey to fame and fortune. He begins with his childhood and the situations that sparked his love for comedy. After reading his book I found myself a bit disappointed. The book was very funny, but it did not contain that â€Å"cut and dry† sense of humor he is known for. It consists mainly of short, humorous episodes about how he works his way up through the ranks as a stand-up comedian. He spends a lot of time conversing about childhood and college mishaps. This bothered me, seeing that mostly adults were reading his book, I don’t think the readers would be interested in his childhood problems or college pranks. Furthermore, he does not convey many personal feelings, does not gossip or put anyone down like Howard Stern. Also, he does not elaborate on his sexual exploits (a few of which he mentions). These are just some of the things I would like to know more about. But he has paid his dues, and deserves to be where he is today. It was a twenty-year struggle to the top, a struggle most people would have given up. Although Jay Leno is probably hands-down one of the funniest comedians in showbiz, I did not think as highly about his book. Yes, there were some parts worth reading about, but there is so much more he could have told us. There is so much more that people wanted to know about. Such as the controversial falling-out with his agent/producer, or his feelings concerning Johnny Carson. If you ask me, this book was not worth the thirteen dollars I paid for it. But the odd thing is that after reading his book, I do not feel any different about him, or his work, and I will continue to watch his show. I guess the visual portion of entertainment had a stronger influence than the text did....

Sunday, October 20, 2019

Definition and Examples of Heat Energy

Definition and Examples of Heat Energy Most people use the word heat to describe something that feels warm, however in science, thermodynamic equations, in particular, heat is defined as the flow of energy between two systems by means of kinetic energy. This can take the form of transferring energy from a warm object to a cooler object. More simply put, heat energy, also called thermal energy or simply heat, is transferred from one location to another by particles bouncing into each other. All matter contains heat energy, and the more heat energy that is present, the hotter an item or area will be. Heat vs. Temperature The distinction between heat and  temperature  is  subtle  but very important. Heat refers to the transfer of energy between systems (or bodies), whereas temperature is determined by the energy contained within a singular system (or body). In other words, heat is energy, while temperature is a measure of energy. Adding heat will increase a bodys temperature while removing heat will lower the temperature, thus changes in temperature are the result of the presence of heat, or conversely, the lack of heat. You can measure the temperature of a room by placing a thermometer in the room and measuring the ambient air temperature. You can add heat to a room by turning on a space  heater. As the heat is added to the room, the temperature rises. Particles have more energy at higher temperatures, and as this energy is transferred from one system to another, the fast-moving particles will collide with slower moving particles. As they collide, the faster particle will transfer some of its energy to the slower particle, and the process will continue until all the particles are operating at the same rate. This is called thermal  equilibrium. Units of Heat The SI unit for heat is a form of energy called the joule (J). Heat is frequently also measured in the calorie (cal), which is defined as the amount of heat required to raise the temperature of one gram of water from 14.5 degrees Celsius to 15.5 degrees Celsius. Heat is also sometimes measured in British thermal units or Btu. Sign Conventions for Heat Energy Transfer In physical equations, the amount of heat transferred is usually denoted by the symbol Q. Heat transfer may be indicated by either a positive or negative number. Heat that is released into the surroundings is written as a negative quantity (Q 0). When heat is absorbed from the surroundings, it is written as a positive value (Q 0). Ways of Transferring Heat There are three basic ways to transfer heat: convection, conduction, and radiation. Many homes are heated through the convection process, which  transfers heat energy through gases or liquids. In the home, as the air is heated, the particles gain heat energy allowing them to move faster, warming the cooler particles. Since hot  air is  less dense than cold air, it will rise.  As the cooler air falls, it can be drawn into our heating systems which will again allow the faster particles to heat up the air. This is considered a circular flow of air and is called a  convection current.  These currents  circle  and heat  our homes. The conduction process is the transfer of heat energy from one solid to another, basically, two things that are touching. We can see an example of this can be seen when we cook on the stove. When we place the cool pan down on the hot burner, heat energy is transferred from the burner to the pan, which in turn heats up. Radiation is a process in which heat moves through places where there are no molecules, and is actually a form of electromagnetic energy. Any item whose heat can be felt without direct connection is radiating energy. You can see this in the heat of the sun, the feeling of heat coming off a bonfire thats several feet away, and even in the fact that rooms full of people will naturally being warmer than empty rooms because each persons body is radiating heat.

Saturday, October 19, 2019

Issues in crime Essay Example | Topics and Well Written Essays - 1500 words - 1

Issues in crime - Essay Example They are directly not involved in the unscrupulous activity. (1) At this point, it also needs to be specifically highlighted that even employees are immensely benefited by corporate crimes, for their jobs are safeguarded along with getting promotions. To put the matter in a nutshell, the very livelihood of the employees becomes dependent on them being active participants in acts of corporate crime. (1) The motives for carrying out these acts (of corporate crime) vary from one case to the other. Yet, it has been seen that the following three are the primary objectives propelling all corporate crimes: A) To bring about both a rise in profits and also a drop in costs. B) To enable a rise in demand as well as a decline in competition. C) To exercise strong control over workers, markets and supplies. (1) Factors abetting corporate crimes It can conveniently be maintained that corporate crimes started to exist from the same time when commercial organizations first began their operations. I n the contemporary era, there has been a surge in instances of corporate crime, and there indeed are highly valid reasons behind that. The various features of a typical corporate organization have now become more complex than ever, and the conventional systems of internal control are now obsolete. Additionally, the rapid growth in information technology has ensured that the power now wielded by the corporate is without a precedent. This is so much so that the modern-day corporate organizations are making sure that they are in total control of their governance. (2) The biggest factor to which the growth in corporate crimes is attributable is inadequate corporate governance. Corporate governance encompasses various policies, procedures and laws, etc, which endeavor to make sure that persons employed in an organization are made accountable. As mentioned in the preceding paragraph, they (corporate organizations) are now fully empowered to govern themselves, with the related laws being n ot so stringent. This is more so when the corresponding scenario of the past is taken into consideration. As has been stated earlier, the existing systems are being rendered powerless in ensuring accountability of corporate organizations. In addition, since the recent past, there has been a tremendous increase in the number of commercial transactions of corporate organizations. This has made things even more difficult for the prevalent laws in preventing the crimes (corporate). Last but in no way the least, the lengthy formal procedures pertaining to the governance have just further compounded the issue. This is in the sense that, they (procedures) have transformed the scenario as being more conducive for carrying out corporate crimes. (2) Various surveys that have been carried out in the recent past point out to a highly disturbing fact. A substantial chunk of corporate crimes of the present-day era are those that have been perpetrated by the managements of huge business houses. At this juncture, it also has to be noted that the losses resulting from such acts are very huge, and thus exerting an adverse impact on the economy. (2) Seriousness of corporate crimes Corporate crime is more serious an issue that what it is actually considered to be, by many people. In this context, it needs to be

Friday, October 18, 2019

Russia In Central Asia Essay Example | Topics and Well Written Essays - 2500 words

Russia In Central Asia - Essay Example e themselves under the tag of â€Å"Central Asia† and rejected their traditional Soviet designation â€Å"Srednieia Aziia I Kazakhstan† (i.e., â€Å"Middle Asia and Kazakhstan†) (Rosset and Svarin 245). The declaration was the first step of these states towards establishing own identity and reduce the Soviet influence. However, economics and politics have been strongly interwoven in the rich historical relationship between Central Asia (Turkmenistan, Tajikistan, Uzbekistan, Kyrgyzstan, and Kazakhstan) and Russia, which couldn’t separated so easily (Rosset and Svarin 245-247). The current active political involvement of Russia in Central Asia is based on various political and economical interests. The purpose of this paper is to analyze Current Russia’s role in Central Asian region, historical background, political structure, issues, and Russian policies towards Central Asia. Russia’s political interests in Central Asia over the last 20 years can be distinguished into three basic periods. During the initial period, i.e. from the collapse of Soviet Union in 1991 to the mid-1990s, Russia had neither any interest in Central Asian region nor any foreign policy to deal with the Central Asian states. The negligence towards Central Asia was economical, political, cultural, and even ideological (Oliphant 3). The second period, from the mid-1990s to the late 1990s, witnessed a change in Russia’s approach and was highly influenced by the Primakov’s principle to reestablish Russia’s influence in the former Soviet states (Oliphant 3). This policy was partially successful. The third period can be categorized from the beginning of Putin administration in 2000 till the present, focusing on the Russia’s active engagement in Central Asia (Oliphant 3). Russia’s growing involvement in the region has political, security, and economi c dimensions. Massive numbers of Russian armed forces were presented in the Central Asia during the early 1990s. All newly created Central

Code of ethics guideliness Essay Example | Topics and Well Written Essays - 750 words

Code of ethics guideliness - Essay Example (ANA Provision 3) In such a scenario, I would not give out any information about the patient despite their popularity in the society; moreover, the patient being a prominent public figure does not give a reason to invade their privacy as a patient. Additionally, every nurse has a duty to maintain confidentiality of all patient information so as to avoid peril, especially when there is a strong relationship between the nurse and the patient, and the nurse acquires redundant information about the patient. Significantly, in such a situation, it is my duty and responsibility as a nurse to let the information being requested confidential both for the safety of my patient, which is the primary factor and also the safety of my profession as a nurse. Being offered a reasonable amount of money, in such a case should not have any impact on my judgment or decision; as a nurse I’m required to act appropriately to all situations put the well being of the patient first. Accepting bribes is an unprofessional act especially when it relates to invading their privacy; am expected to maintain and preserve my integrity and moral respect as a nurse. (ANA, Provision 5) Description and Purpose of ANA Code of Ethics Code of ethics for nurses are used and considered to be a guide for practicing nursing responsibilities and duties in a way consistent with quality in nursing care and the profession’s ethical obligations. The American Nurses Association (ANA) code of ethics is a summary of the significant wide-ranging values, duties and responsibilities that are consistent with the role of being a nurse. The professional to code relationship is an important feature of the practitioner’s moral life that requires interpretation at times. (ANA 2001) The American Nurses Association (ANA) defines three key purposes of the code of ethics even though they are other general aspects and principles of the code; these three major purposes are considered to be normative and autho ritarian. The first purpose of the code is to provide moral rules that help steer the deeds of the nurses in general while the second is that it pertains across the scale of the common nursing roles like research, patient care and education; and recognizing the nurses’ obligations and placing them in moral relationship to the society is the third purpose of the code. Generally, the code of ethics is also said to be an expression of professionalism i.e. nursing, since having it corresponds to everyone in the system and environment of the specific profession. Another implied purpose of the code of ethics is to define the sane meaning of being a nurse, encouraging a more articulate, inclusive professional identity. (ANA 2001) How I Plan to Use the Code of Ethics to My Advantage As a professional nurse, I will strive to ensure that I use all the provisions of the code of ethics as a basis or foundation of my profession in all situations putting the patients first above everything else and not forgetting myself as of the fifth provision. I will ensure that all patient information is kept confidential and only accessible to the concerned parties or in cases where I’m required to provide the information as a reference to be used in ensuring the well being of that particular patient. I rightfully understand the

Law and the Media Case Study Example | Topics and Well Written Essays - 1500 words

Law and the Media - Case Study Example The reason that was given for this was that it seemed that these file-sharing companies were not innocent by reason of lack of knowledge as they had, The court unanimously agreed that "distributors of technology that enables copyright infringement can be found liable for their users' actions, but only if a plaintiff can point to evidence that the distributor took "affirmative steps" to foster infringement."4 The court also said that actual knowledge was required to prove that these ISPs (Internet Service Providers) were liable for the copyright infringement. It is misleading to call this case "Grokster" because this company and the other jointly accused companies opted for an out of court settlement with the plaintiffs and Steam Cast was the only company that decided to go on to contest the case. This company then moved for a summary judgement at the US District Court for the Central District of California, and was not allowed to keep its communications and business plans privileged and confidential. It was found that Stream Cast was guilty of devising the Morpheus software and the Open Nap network to find itself the same consumer base as Napster. Its open advertising to promote its business and blatantly allowed its users to infringe copyrights of Music companies and was even guilty of encouraging and assisting them in such means. The whole business model was based on copyright infringement according to the presiding Judge Wilson5 .The Company was freely distributing this software and relying on sponsor revenues. The fact that it took no "meaningful" steps to halt its activities or prevent its customers from doing so . The only flimsy excuse that the company had was that it had given a warning to its customers in its user-agreement, yet it did little to enforce this agreement. Judge Wilson said in his concluding speech that, "This court finds that no reasonable fact finder can conclude that Stream Cast provided Open Nap services and distributed Morpheus [software] without the intent to induce infringement".6 Legal issues and academic opinion arising from the case The age of information technology has made the internet the copyright infringer's playground. The convenience and low cost at which this has been done has prompted the law enforcement authorities to stand up to the challenges of the protection of intellectual property rights .This problem arose in the case of peer-to-peer (P2P) file-sharing. This judgement has given a new dimension to the law of Copyright.

Thursday, October 17, 2019

Global currency Essay Example | Topics and Well Written Essays - 750 words

Global currency - Essay Example From the chart above, there are signs that the Rand attempts to gain against the US Dollar periodically by moving down to around 6.5 to a Dollar. However, in most of the times, it fluctuates and reaches highs of about 7.3 against the Dollar. Over the past month or so though, the Rand has really lost grounds to the US Dollar and has risen to highs of about 8.4 per Dollar. This indicates that there is potential for further escalations in the value of the Dollar against the Rand. The Rand can therefore be seen as a weaker currency in relation to the US Dollar and on the global markets. Figure 2 above shows the relationship between the South African Rand and the European common currency, the Euro. It is also seen that the Euro is stronger than the Rand. On the average, the Rand trades at about 9.5 to the Euro. Although there were times that the Rand gained and got to almost 8.5 to the Euro, most of the time, the Rand remains above the 9.5 mark. However, in the past three months, the Euro has strengthened further at levels over R10 per Euro. It is currently trading at 11 Rands per Euro. This shows that there is room for further appreciation of the Euro against the Rands. Aliber stated in 1970 that â€Å"the stronger a countrys currency, the more likely it is to invest in another country and the weaker the currency, the less likely it is to invest in another country† (Goldstein,1991 p1976). This assumption Aliber made is tried and tested in numerous empirical tests. Aliber & Click (1993, p97) identifies that there is a capital market bias towards businesses from a stronger currency nation. In this case, it will be better for a US based business to operate in South Africa. Sharan (2002, p70) explains that the reason why businesses from countries with stronger currencies succeed in weaker currency nation is that it is much more easier to capitalize income in a weaker

Motivational Plan Research Paper Example | Topics and Well Written Essays - 1250 words

Motivational Plan - Research Paper Example This is based on the identification of the factors that are in correlation to values, emotions and attitude of the team members. The paper also offers a summary of the different modes of identifying the factors and providing conclusions that are overtly related to influencing the performance of the team positively. There has been a focus on business design as a necessary component of motivating a team in an organization. In order to achieve motivation, performance and satisfaction, every organization needs to have a working design. Through having a working design, there is a boost to the effectiveness of a given team. However, the behavior of the term is shaped by the individuals’ values, personalities, emotions and attitudes. Working as a mentor that manages a Shipping Department for Athletic Equipment, there is a need to have a grip on these matters and get to understand, evaluate and analyze the different attributes of each and every team member. This is the means through which effective work design and efficient team layout can be put in place. Moreover, having individuals with different personalities, attitudes and emotions mean there is s need for the establishment of a comprehensive motivational plan. For instance, at the department, there are three individuals with different per sonalities (Keller, 2009). Pursia and Cleveland are impressed while Lydia is an interactive person. This, therefore, implies a need for a comprehensive motivational plan if the potential of the team members is to be exploited. Worthy to note is the fact that those team members who seem not too ecstatic about their work are more often not comfortable with the concept of the team. In order to build a progressive team, one needs to use personalities, values, attitudes and the emotions of the employees in order to motivate the performance of the team. Attitude refers to the perception of an individual with regards to other people, items or events. Attitude can

Wednesday, October 16, 2019

Global currency Essay Example | Topics and Well Written Essays - 750 words

Global currency - Essay Example From the chart above, there are signs that the Rand attempts to gain against the US Dollar periodically by moving down to around 6.5 to a Dollar. However, in most of the times, it fluctuates and reaches highs of about 7.3 against the Dollar. Over the past month or so though, the Rand has really lost grounds to the US Dollar and has risen to highs of about 8.4 per Dollar. This indicates that there is potential for further escalations in the value of the Dollar against the Rand. The Rand can therefore be seen as a weaker currency in relation to the US Dollar and on the global markets. Figure 2 above shows the relationship between the South African Rand and the European common currency, the Euro. It is also seen that the Euro is stronger than the Rand. On the average, the Rand trades at about 9.5 to the Euro. Although there were times that the Rand gained and got to almost 8.5 to the Euro, most of the time, the Rand remains above the 9.5 mark. However, in the past three months, the Euro has strengthened further at levels over R10 per Euro. It is currently trading at 11 Rands per Euro. This shows that there is room for further appreciation of the Euro against the Rands. Aliber stated in 1970 that â€Å"the stronger a countrys currency, the more likely it is to invest in another country and the weaker the currency, the less likely it is to invest in another country† (Goldstein,1991 p1976). This assumption Aliber made is tried and tested in numerous empirical tests. Aliber & Click (1993, p97) identifies that there is a capital market bias towards businesses from a stronger currency nation. In this case, it will be better for a US based business to operate in South Africa. Sharan (2002, p70) explains that the reason why businesses from countries with stronger currencies succeed in weaker currency nation is that it is much more easier to capitalize income in a weaker

Tuesday, October 15, 2019

Managing crisis in Nigeria Oil Sector Case Study

Managing crisis in Nigeria Oil Sector - Case Study Example held their gang members captive. Buerk rejects prospects to evaluate the classified descriptions other concluding remarks: that Shell "make worse conflict" through the issuing of stipends and contracts to those folks who live around delta as well as the offering of stay-at-home-benefits" for disoriented teenagers. The absentia of answerability promotes residents to wage war against Shell, and the whole scenario is abject pandemonium; feuds emerge in towering propositions, the rationale has always been to control a share of the proceeds coming from oil. On the extreme end felony has been propagated through version in the astringent development as well as the compensating through rescue, hence making felony a lucrative, money-spinning game. That Shell's Corporate Social function was flawed and no sooner than soon will it wither. The community living around delta lives under debilitating conditions despite the vast wealth generated from oil fields. Lay blame on oil companies that conspire with Nigeria's regime to drum up divisions flanking rival societal clusters in a move to annihilate oil proceeds from reaching them. Statements of Problem The oil predicament in Nigeria fastidiously what is happening around Niger delta has attracted so much prose writings from historians, political analysts, news media commentators, and many more. And yet less stands to be documented on the functions of the corporate organizations with a global presence; in reference to Shell and their role in establishing a ceasefire flanking the alarming parties of the remote setting, the regime and the Multi National Corporations. This study will endeavor to unearth the function and impact of the strategy as well as decision making by transnational administrators in containing the Oil predicament in Nigeria. Objectives the Study To decisively review the rationale for the existing disaster in terms of partners in the Nigeria oil industry. To inspect the observation of executives in the Nigeria oil commerce with a view to establish their belief on the oil predicament as well as the preeminent channels to resolving the same. To recognize resolutions and originate an approach for solving disaster. To discover key issues and make recommendations to government and industry for the execution of tactic. The Oil Crisis in Nigeria Rationale for the existing predicament Partners in the Nigeria oil Territory: Shell as a case in mind The oil pandemonium witnessed in Nigeria I presented with intricate truth of the Niger Delta- society discontentment, frail and a regime that does not respond to the needs of the people, safekeeping force mistreatments and inter-neighborhood aggression. The case of the environment In responding to allegations,

Monday, October 14, 2019

Mechanism Of Electromechanical Induction Meter Information Technology Essay

Mechanism Of Electromechanical Induction Meter Information Technology Essay As the dismal economy spawns desperate measures, most of the residents of our beloved city, Karachi are resorting to a hazardous practice which is stealing electricity. Many utilities say energy theft has risen sharply during the recent economic downturn. Culprits include residential customers whose power is turned off when they fall behind on the bills and small businesses struggling to keep their doors open. They are using a wide array of tactics. Some run wires from utility lines directly into a circuit-breaker panel to bypass the electric meter. Others attached cables on either side of a meter, swipe meters from vacant houses when theirs are removed or tamper with meters to lower their electric bills. People from KESC are finding more and more people are stealing electricity because of the poor economy, said by the sources of electricity supplying corporation. It has been investigated that 3,197 cases of theft in January and February, a 28% jump over the year-ago period. Customers have stolen power for decades, costing utilities 1% to 4% of revenue or about RS 49 billion industry wide each year, according to Electric Light Power magazine. Losses are borned by other customers. Many thieves operate home-based marijuana farms that use lots of lights and power. But the problem is basically mushrooming. Meanwhile, consulting firm Detectent has identified a double-digit arise in business thefts the past six months, many by energy-guzzling restaurants. In Landhi, Deen Baksh, 48, was charged last fall with3 meter rigging. DTE Energy says he helped about 50 downtown businesses cut their gas and electric bills by more than RS.1 million or 30% to 50% each the past several years. The practice is actually dangerous. Touching a power line may burn or even kill an untrained person. In Philadelphia this month, an illegal electricity hookup in a row house resulted in a spark a fire that killed a 30-year-old woman and her 8-year-old daughter. Utilities often learn of thefts from meter readers, neighbors or may be abnormal use patterns. They expect to detect fraud earlier as they roll out smart meters that can remotely monitor electricity usage. Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, or unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are studied. The evidence shows that theft is increasing in most of the regions of the world. The financial impacts of theft has reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with higher peaks of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Electricity theft can be lowered by applying technical solutions such as tamper-proof meters, managerial methods such as inspection and monitoring, and in some cases restructuring power systems ownership and regulation. The main purpose of our report is to present solution to economic problems and then economy rate will become higher. And that loss which KESC have to bear due to this problem will be decreased. Economically this idea has great benefit both for masses and society. Once the theft of electricity would be detected then steps will be taken to stop it which will yield in discouraging the people using electricity illegally. Energy will be distributed to everyone justly thus everyone will be paying charges of only the amount they consume. Energy generating and distributing bodies will not be having extra load over their lines thus no power trips and break downs will occur so no extra money required for correcting such problems. CHAPTER NO 01 ELECTRIC METER 1.1 ELECTRIC METERS: An electric meter or energy meter is equipment that can measure the amount of electrical energy consumed by a residence, business, or an electrically powered device. Electric meters are usually calibrated in billing units; the most common is the kilowatt hour. Periodic readings of electric meters give billing cycles and energy used during a cycle. In settings when energy savings during certain periods are desired, meters may measure demand which is the maximum use of power in some interval. In some areas, the electric rates are higher during specific times of day for encouraging reduction in use. Also, in some areas meters have switches to turn off nonessential equipment. Electricity meters work by continuously measuring the instantaneous voltage (volts) and current (amperes) and then finding the product of these to give instantaneous electrical power (watts) which is afterwards integrated against time to give energy used (joules, kilowatt-hours etc.). Meters for smaller services (for instance small residential customers) can be connected directly in-line between source and customer. For larger loads, i.e. more than about 200 amps of load, current transformers are used, so that the meter can be located other than in line with the service conductors. The meters fall into two basic categories, electromechanical and electronic. 1.1.1 Mechanism of electromechanical induction meter. 1. Voltage coil many turns of fine wire encased in plastic, connected in parallel with load. 2. Current coil three turns of thick wire, connected in series with load. 3.Stator-concentrates and confines magnetic field. 4.Aluminum rotor disc. 5. Rotor brake magnets. 6. Spindle with worm gear. 7. Display dials note that the 1/10, 10 and 1000 dials rotate clockwise while the 1, 100 and 10000 dials rotate counter-clockwise. The electromechanical induction meter operates by counting the revolutions of an aluminum disc which is made to rotate at a speed proportional to the power. The number of revolutions is thus proportional to the energy usage. It consumes a small amount of power, typically around 2 watts. The metallic disc is acted upon by two coils. One coil is connected in such a way that it produces a magnetic flux in proportion to the voltage and the other produces a magnetic flux in proportion to the current. The field of the voltage coil is delayed by 90 degrees using a lag coil.[16] This produces eddy currents in the disc and the effect is such that a force is exerted on the disc in proportion to the product of the instantaneous current and voltage. A permanent magnet exerts an opposing force proportional to the speed of rotation of the disc. The equilibrium between these two opposing forces results in the disc rotating at a speed proportional to the power being used. The disc drives a register mechanism which integrates the speed of the disc over time by counting revolutions, much like the odometer in a car, in order to render a measurement of the total energy used over a period of time. The type of meter described here is basically used on a single-phase AC supply. Different phase configurations use additional voltage and current coils in them. 1.1.2 CURRENT TRANSFORMER (CT) METERING: Huge businesses or multi storey buildings use so much power that they cant be connected to the network via the usual methods so in order for these sites to be metered, the load needs to be broken down so the meter will be able to cope with it and then be multiplied out again in order to get the full amount of power being used. This is known as CT metering. Actually the load comes into a CT chamber from where it is then distributed from buzz bars containing transformers to CT links and then into the meter. The CT chamber also goes into the customers switchboard. The rating of the transformers finds out the multiplier to be applied when calculating true usage. 1.1.3 METER USED IN THE PROJECT: The meter used in our final year project is electromechanical induction meter. 1.2 UNIT OF MEASUREMENT: Kilowatt hour is the most common unit of measurement on the electricity meter which is equal to the amount of energy used by a load of one kilowatt over a period of one hour, or 3,600,000 joules. Some electricity companies also use the SI mega joule instead. Remote current and voltage sensors are be read and programmed remotely by modem and locally by infra-red. The circle with two dots is the infra-red port give the reading. Tamper-evident seals are also present in some meters. Demand is usually measured in watts, but averaged over a period, most often a quarter or half hour 1.3 ELECTRICITY THEFT: Meters can be controlled to make them under-register, effectively permitting power use without paying for it. This theft or fraud can be dangerous and also dishonest. Electricity theft can be in the form of i)fraud (meter tampering) ii)stealing (illegal connections) iii)billing irregularities iv)Unpaid bills. Another common method of tampering on older meters is to attach magnets to the outside of the meter. They magnetically saturate the coils or current transformers, preventing the alternating current from forming eddy currents in the rotor, or inducing voltages in the current transformer. Also rectified DC loads cause mechanical (but not electronic) meters to under-register. DC current does not cause the coils to make eddy currents in the disk so this causes reduced rotation and a lower the bill. Some combinations of capacitive and inductive load can also interact with the coils and mass of a rotor and cause reduced or reverse motion. 1.3.1 Basic Layout Of The Project Including Electricity Theft Possibilities: Bypass wire Breaker to cut out the meter Home Neutral Wire, neutral current iN Phase wire, phase current iP Earth wire Meter Case 1: If there is no bypassing of the meter and the entire load is OFF. iN (Neutral current) = iP (Phase Current) = 0 Case 2: If there is no bypassing of the meter and the entire load is ON. iN (Neutral Current) = iP (Phase current) = some value Case 3; If there is meter bypassing and the entire load is ON. iP (Phase current ) = 0 iN (Neutral Current) = load The first target is to sense / measure phase and neutral current. And if case 3 is verified than it will be a theft case. 1.3.2 Outcomes Of Electricity Theft: The evidence shows that theft is vastly increasing in most regions of the world. The financial impacts of theft have resulted in reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely concerned to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Power theft has surely become an infamously prevalent practice in many parts of the country, both rural and urban. Many cases go unreported in various cities and villages, costing a lot to our countries burdened economy. People actually pay some local electrician a little money to reverse the electricity meter of the house and/or slow its pace. Some people also learn the trick from an electrician and help their family/friends steal electricity. 1.3.3 General Methods To Reduce Electricity Theft: Electricity theft can be reduced by Applying technical solutions such as tamper-proof meters. Managerial methods such as inspection and monitoring. Restructuring power systems ownership and regulation.. A common method of tampering on older meters is to attach magnets to the outside of the meter. These magnetically saturate the coils or current transformers, preventing the alternating current from forming eddy currents in the rotor, or inducing voltages in the current transformer. Rectified DC loads cause mechanical (but not electronic) meters to under-register. DC current does not cause the coils to make eddy currents in the disk, so this causes reduced rotation and a lower bill. Some combinations of capacitive and inductive load can interact with the coils and mass of a rotor and cause reduced or reverse motion. CHAPTER NO 02 MEASUREMENT OF AC CURRENT: 2.1 DESCRIPTION: Here we have considered household power is single-phase electric power, with two or three wired contacts at each outlet. The live wire (also known as phase, hot or active contact), carries alternating current between the power grid and the household. The neutral wire completes the electrical circuit by also carrying alternating current between the power grid and the household. The neutral is staked into the ground as often as possible, and therefore has the same electrical charge as the earth. This prevents the power circuits from rising beyond earth, such as when they are struck by lighting or become otherwise charged. The earth wire or ground connects cases of equipment to earth ground as a protection against faults (Electric Shock). 2.2 MEASUREMENT OF AC CURRENT: Its very difficult to measure ac current and produce voltage proportional to it. For measurement of ac current Hall Effect devices are mostly used. They produce the voltage proportional to the magnetic field in the air gap by inserting Hall Effect magnetic field sensor in the current transformer core air gap. The circuits below measure the ac current without using Hall Effect devices. 2.2.1 WORKING: FIG 1: An electric current J2 is introduced in the secondary winding of the coil which is proportional to the primary winding J1.Th secondary current can be controller by means of number of turns on primary and secondary winding. The primary winding either have one turn or a number of turns wrapped around it while the secondary winding has usually multiple turns around it. If the current transformer is ideal then the current in the secondary winding is equal to that in primary winding. But if it is possess non-ideal characteristics then the current in both windings will not be equal due to substantial phase angle, error of ratio, and/or wave shape in its output. They are the function of: The properties possess by magnetic core. How much burden on it. How much dc component present in the primary current. FIG2: Due to burden in the secondary the currents in the secondary and primary arent equal. Fig 2is used to reduce this effect .V4 is the voltage which is proportional to the rate of magnetic flux and is introduced by terminating the sense winding 10 to high impedance; the effective burden can be reduced by applying it tin series to the secondary winding after it is being amplified. Now the currents in secondary will be proportional accurately to that in primary since the magnetic flux changes in the core is reduced to zero. Smaller flux changes and higher accuracy will be achieved by higher gains in the amplifier circuit while on the other hand this leads to instability and associated =oscillations in the circuit. This technique is a better measure of ac current but the problem raised may be due to the dc component in the primary current FIG 3: Compensation voltage is generated by using secondary current as input and this voltage is required for driving the secondary current. The voltage generated V1 is proportional to the driving current J2 and the output voltage V3 is produced as an information signal. The advantage of above circuit is that instead of using Hall Effect sensors ordinary current transformers can be utilized to measure the ac current with a dc component .The above current sensor has the following properties: Even in the presence of primary current the current transformer gives accurate output. This circuit uses a relatively inexpensive and simple magnetic core. Stable over temperature and time. Primary current in in effected by noise. The voltage V3 is utilized further to obtain a dc voltage. For this purpose this ac output is passed by a rectifier circuit in order to obtain a dc voltage at the output. CHAPTER #03: MICROCONTROLLERS 3.1 INTRODUCTION: Microcontrollers are devices that have CPU, RAM, ROM, I/O ports, and timers all on a single chip. In other words all are embedded on a single chip. For applications in which cost and space are critical issue microcontrollers are preferred for their above mentioned features. Microcontroller is one of the major components of this design as it plays key role of the coordination between all the components. It inputs current signal and evaluates the theft. The result is then sent to remote office by connecting mobile to microcontroller. AT commands are used for communication between mobile and microcontroller. Microcontrollers are available with different instruction set, registers, speed, packaging and costs. There are many different types of microcontrollers. Freescales 6811, Intel 8051, Zilogs Z8, and PIC 16X from microchip technology are popular 8 bit microcontrollers. Nowadays 16 bit and 32 bit microcontrollers are also available. Microcontrollers are not compatible with each other because each has a different instruction set and registers. Certain important points must be kept in mind while selecting a microcontroller for a particular application. Firstly it must be able to satisfy all computational needs. These computational needs include capacity and speed. Speed: While choosing a microcontroller it should be operating at the speed that is required for the application Capacity: For certain applications programs are too long and they exceed on chip RAM capacity. Therefore it is necessary to consider on chip RAM memory. Secondly it must be compatible with devices used in application. This is an important issue. There are many microcontrollers which support only a particular baud rate and are incompatible with the devices that operate at the higher baud rate. Thirdly it must be available in required quantities and at the required costs. 3.2 POPULAR MICROCONTROLLERS: Two important microcontrollers that are widely used are 8051 and PIC. 3.2.1 8051 Family: There are many members of 8051 family which are produced by different vendors and have different features. Some of the well known are: 8051: 8051 was originally produced by Intel corporation .It has 4Kbytes ROM and 128bytes on chip RAM .Other products are 8052 and 8031 microcontrollers. These two have additional features such as increased ROM capacity, speed and timers. AT89C51:One of the most widely used 8051 microcontrollers is AT89C51 from Atmel Corporation. It is one of the most widely used from 8051 microcontrollers because of its easy availability and low cost. OTP version of 8051: One time programmable versions of 8051 are also widely used. Because of its low cost it is used for mass production. 3.3 PREVIOUS APPROACH: Earlier for project purpose Atmel89C51 was selected and ADC0808 was used along with it to convert current to digital. 3.3.1 ATMEL 89C51: It is one of the most commonly used controllers. The reasons behind its popularity are: It is widely available. Programming language is very simple. All its development tools are readily available. 3.3.1.1 Features: It is low powered and 8 bit microcontroller. 32 I/O lines. 6 interrupts 2 timers. 4K flash memory Serial programming is also possible. The figure below shows the pins of Atmel AT89C51. If AT89C51 is used for the current implementation then following points need to be considered: 3.3.1.2 Interfacing ADC With Microcontrollers: It does not have built in ADC therefore an external ADC is interfaced to entertain analog inputs. Normally ADC0808 and ADC0848 are used. 3.3.1.3 Serial communication: For serial communication it has built in UART mode. There is a special serial register known as SBUF. 3.3.1.4 ADC0808: As current is analog quantity and 8051 can only accept digital inputs therefore an ADC was needed .For this purpose ADC0808 was preferred as it is easily available in markets and compatible with 8051. Due to the compatibility issue atmel8951 was replaced by pic16F877A. 3.3.2 PIC: PIC stands for programmable Interface controller and it is made by microchip technology. PIC is widely preferred for industrial applications due to their low cost, capacity, extensive features and wide availability of development tools like its programmer, compiler etc. 3.3.2.1Features Of PIC: It follows Harvard architecture that is code and data spaces are separate. They even have a separate bus. This allows program and data to be fetched simultaneously. Code space is implemented as ROM whereas for data space we have general purpose RAM. However addressable data space is small. There is only one accumulator. Most of the PIC controllers are 8-bit microcontroller that all data should be in 8 bits and all operations are also performed in 8 bits chunks. They also support instructions, operations and commands that allow user to work on single bit. It has predefined instruction set with few changes for different versions .The instruction set includes instructions that support direct memory addressing as well as indirect addressing. It also supports conditions and branching. Newer versions of pic also have built in ADC into the microcontroller. PIC have hardware call stack which cannot be accessed through software. They save return addresses. TYPES OF PIC MICROCONTROLLERS: There are many PIC series of which well known are as follows: PIC17 SERIES PIC18 SERIES PIC32 SERIES PIC24 SERIES PIC16 SERIES For the project PIC16f877A is covered in detail therefore PIC 16 series is discussed briefly. 3.3.2.2 PIC16 Series: PIC16 Series are small, fast, and are available in most of areas. There are many different variants of pic16 series in which some have more I/O pins some have ADC, some have more memory. 3.4 CURRENT APPROACH: 3.4.1 PIC16F877A: For this project pic 16f877A has been used .The reasons behind using it were as follows: It is widely available in most of the areas. It has built in 10 bit ADC that was needed for our project. Its compiler and programmer were also easily available. It supports baud rate required for our application and it is compatible with devices that are used. It is relatively easy to program. The details of the pins are provided in the Appendix A 3.4.1.1 Features Of PIC16F877A: It is a 40 pin device 5 I/O ports A, B, C, D and E some pins are multiplexed so that they can be used for peripheral functions. 15 interrupts 8 A/D input channels 35 single word instructions and 1 instruction is composed of 14 bits. 20 MHz operating speed Data memory of 368 bytes EEPROM memory of 256 bytes 3 timers 2 analog comparators. 3.5 HARDWARE SECTION: Hardware design of PIC consists of combining different modules and devices with the controller that work together in order to attain information from the E-meter and read into the micro-controller. In this section ports, oscillators, registers of PIC that are used for implementing the design are briefly discussed: 3.5.1 Oscillator: External oscillator with a frequency of 12 MHz is used in order to achieve clock speed of 8MHz.The baud rate is set at 9600kbps. Internal oscillator of pic is not used. 3.5.2 I/O Ports: As the current has to be sensed through the microcontroller therefore portA is used and is configured for analog input (AN0 to AN7). Its corresponding direction register is TRISA. 3.5.3 Analog to Digital Converter Module: PIC16F877A has eight pins for Analog-to-Digital (A/D) Converter module. The conversion of an analog input signal results in a corresponding 10-bit digital number. It can even operate in sleep mode. The A/D clock must be derived from the A/Ds internal RC oscillator. The AD module has four registers adresh, adresl, adcon0 and adcon1. The 10 bit AD result is stored in adresh and adresl registers.ADCON1 is used for configuration of port pins. The operation of AD module is controlled through ADCON0. 3.5.4 USART: In order to generate alarm at remote office, controller is connected to mobile. The phone is connected to Universal Synchronous Asynchronous Receiver Transmitter (USART) module which is one of the two serial I/O modules of PIC16F877A. USART is also known as a Serial Communications Interface or SCI. USART uses standard Non-Return to- Zero (NRZ) format (one Start bit, eight or nine data bits and one Stop bit). The USART transmits and receives the LSB first. The transmitter and receiver function independently. 3.6 SOFTWARE DESIGN: 3.6.1 Development Tools: The code is written in pic basic pro language. The code is then converted to hex via microcode studio and hex code is loaded into pic16F877A through quad programmer. Microcode studio is used because its free version is easy available on internet. For compiler three header files are made. One file is used by compiler other is used by programmer. The file with the extension .BAS is used by pbp .Pbp then makes .ASM file from it. It then makes .ASM file from it. If code is error free then assembler required output file with hex code in it. This hex code is loaded in the pic by quad programmer. 3.6.2 Program Code: There are multiple parts of the software design, as the micro-controller plays many parts in the coordination of the instrumentation panel. Firstly internal ADC of the PIC16F877A is configured to sense the current. The next step for the code is to check if input is greater than 0 .If it is greater than 0 then a message is sent to remote office through mobile. For this AT commands are used that are specially made for communication between GSM modules and microcontroller. Other than the mentioned AT commands in the following table are in appendix B COMMANDS PURPOSE ATZ AT+CMGF 3. AT+CMGS 4. AT+CMGL Recall Stored Profile Message Format Send Message List Messages CHAPTER NO 04: WIRELESS ACCESS TECHNOLOGIES: 4.1 EVOLVING WIRELESS TECHNOLOGIES IN PAKISTAN: There are two important wireless access technologies that can be used within Pakistan and are feasible for our project and that are: WIMAX GSM 4.2 GSM TECHNOLOGY: For mobile telephony systems in the world, the most popular standard is GSM. The GSM Association estimated that 80% of the global mobile market uses the standard. 1.5 billion People across more than 212 countries and territories uses GSM technology for their benefits. This means that subscribers can use their phones throughout the world between mobile network operators, enabled by international roaming arrangements. GSM is considered a second generation (2G) mobile phone system because GSM differs from its predecessor technologies in that both signaling and speech channels are digital. GSM also facilitates the wide-spread implementation of data communication applications into the system. The GSM standard provides an advantage to both consumers, who may benefit from the ability to roam and switch carriers without replacing phones, and also to network operators, who can choose equipment from many GSM equipment vendors.GSM also pioneered cheapest implementation of the short message service (SMS), also called text messaging, which has since been supported on other mobile phone standards as well. A worldwide emergency telephone number feature is also provided by this standard. GSM also supports indoor coverage and may be achieved by using an indoor picocell base station, or an indoor repeater with distributed indoor antennas fed through power splitters, to deliver the radio signals from an antenna outdoors to the separate indoor distributed antenna system. When a lot of call capacity is needed indoors then these are typically deployed; for example, in airports or shopping centers. However, this is not a prerequisite, since indoor coverage is also achieved by in-building penetration of the radio signals from any nearby cell. The modulation technique used in GSM is Gaussian minimum-shift keying (GMSK). It is a kind of continuous-phase frequency shift keying. In Gaussian minimum-shift keying, the signal to be modulated onto the carrier is first smoothed with a Gaussian low-pass filter prior to being fed to a frequency modulator, so it greatly reduces the interference to neighboring channels (adjacent-channel interference). 4.2.1 GSM CARRIER FREQUENCY: GSM networks operate in a number of different carrier frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G), the most 2G GSM networks operating in the 900Â  MHz or 1800Â  MHz bands. The 850Â  MHz and 1900Â  MHz bands were used instead, Where these bands were already allocated (for example in Canada and the United States). In some countries the 400 and 450Â  MHz frequency bands are assigned In rare cases because they were previously used for first-generation systems. In Europe Most 3G networks operate in the 2100Â  MHz frequency band. Regardless of the frequency selected by an operator, it is divided into timeslots for individual phones to use. That is why it allows eight full-rate or sixteen half-rate speech channels per radio frequency. These eight radio timeslots (or eight burst periods) are further grouped into a TDMA frame. In the same timeslot half rate channels use alternate frames. The channel data rate for all 8 channels is 270.833Â  kbit/s, and the frame duration is 4.615Â  ms. The transmission power limited in a handset to a maximum of 2 watts in GSM850/900 and 1 watt in GSM1800/1900. 4.2.2 NETWORK STRUCTURE: The network is structured into a number of discrete sections: The Base Station Subsystem (the base stations and their controllers). The Network and Switching Subsystem (the part of the network most similar to a fixed network). This is also called the core network. The GPRS Core Network (the optional part which allows packet based Internet connections). For maintenance of the network, the Operations support system (OSS). 4.2.3 SMS MODES IN GSM: We have two types of SMS modes in GSM SMS Text Mode SMS PDU Mode The text mode (It is unavailable on some phones) is simply an encoding of the bit stream. It is represented by the PDU mode. There are several encoding alternatives when displaying an SMS message and Alphabets may differ. The most common options are PCCP437, PCDN, 8859-1, IRA and GSM. These are