Wednesday, July 31, 2019

How Mass Media Affects Adolescents

We’ve all heard the expression, â€Å"Well if your friends jumped off a bridge, would you jump, too? † from our parents, or other adult figure-type person. In today’s society, adolescents seem to be taking this phrase to a new level. As the media continues to abuse the popularity of the too-thin actors and actresses, exploit famous persons’ suicides, and portray ‘problems’ in general as being ‘cool’ with TV shows focused on rehab circles featuring those popular people our culture knows and loves, more and more young people are finding reasons to copycat these problematic ‘role models’, resulting in a crisis within the youth. The depression, low self esteem, eating disorder, and suicide rate disaster within the youth can all be traced back to the media, which tends to glamorize such problems, so that they appeal to adolescents as being the next ‘in’ thing. Suicide is a tremendous issue that is heavily influenced by the media. Yourannual List of Ins and Outs, an article which periodically lists tends and fads, listed one year suicide as an â€Å"in†. â€Å"The ‘In’ Way to Look for Help†, 1) Most emotionally secure people would understand that the listing of suicide as an â€Å"in† was a joke and not take it seriously – but mental health practitioners like David Shaffer of Columbia University of Physicians and Surgeons, have done research to prove that the â€Å"adolescent suicide rate may rise when the media glamorize suicide†. (â€Å"The ‘In’ Way to Look for Help†, 1) Suicide is a serious issue, and although this was meant as a joke, there are some children who actually take things like the previously mentioned article literally. Although such people/youth may be emotionally unstable already, this bit of â€Å"pressure† from society adds to the imbalance. The media has also taken advantage of the celebrities who have killed themselves, making them seem â€Å"chic†, or â€Å"cool†. Exploitation of such events gives some less stable individuals the impression that these sort of actions are socially acceptable, and that if they feel the need to â€Å"escape†, they may commence with taking their lives while seeming â€Å"hip† at the same time. In a study done at the University of Auckland in New Zealand, a study was done to find what the youth believed the leading cause of suicide to be was. The â€Å"most frequently cited cause was pressure to conform and/or perform†¦as a consequence of peer pressure†. (Edna Heled, 1) Later, when the subjects were asked to specify the degree of their agreement with 29 possible reasons, two of the most agreed upon items were hearing a lot about suicide in the media, and believing that suicide is acceptable or cool. Edna Heled, 3) When asked for possible solutions to reduce the rate of suicide, there were no suggestions to lessening the coverage of suicide in the media. The adolescent view on body image has become a tricky subject. Television, magazines, and the general media have set a standard for both male and females that is difficult for most to achieve. It is now popular for girls to be scary-skinny, and â€Å"straight as a board†. In a study by Hargreaves and Tiggermann, it was found that watching appearance-related commercials â€Å"heightened appearance schema activation in early adolescent girls†. In another unnamed experiment covered by Meghan Sinton and Leann Birch, it was found that some girls – although not a large percentage of them – were found to be very affected by the commercials. In the same experiment, it was discovered that mass media was especially influential with girls who were already body self-conscious.

Tuesday, July 30, 2019

Body of Speech

About it: This speech can be delivered by any anchor or host, who is member of any NGO/social organization to start a program being organized to spread awareness regarding importance of blood donation in today's life. Body of Speech It's an honor itself to honor this beautiful audience who gather here for the cause of humanity. We wish a very warm welcome to all of you and a heartily congratulations be a part of this social event. I assure you that this event will definitely results in positive directions and will help in saving someone's life in future.This program is being organized to spread the awareness for blood donation & its importance in today's life. As we all know that blood is a base of every human life and there is no life without blood, this makes its value priceless. Blood donation is a great example of altruism in action. The most important thing about donating a blood is that it should be a voluntary donation therefore we have organized this event. Ask few question f rom yourself.. Have you ever visited Hospitals? Have you ever saw any major accident case? Have you ever saw any patient suffering from a major disease in which blood is required to save his/her life. If your answer is YES then think about their lives! Their lives can be saved by just donating our blood. If you look at the statistics of population of a country and the number of road accidents and other major disease in which a patient is urgently required blood, then you will realize how important donating blood is. As the demand and supply is already differs a lot, therefore this gap can be filled by an active participating in Voluntary Blood Donation programs. Can you assume the extent of happiness of victims or patients family after saving his life? It is the real feeling of heart that occurs in their wishes.Many of us have myths about donating blood. Some People says it affect our health and makes us weak. Some people avoid it for their traditional and religious thoughts. And so me people even say that it against their cast and religion. So my dear friends, we would like to clear your doubts regarding all these myths that these myths and thoughts have no meaning. The color of blood is only one that is RED; it has no religion, no cast. The donating of blood is totally safe and has no effect upon the health of one's, though the time gap and other measure of safety and quality must be taken into effect before donating the blood.The organization collecting the blood will ensure all these factors itself before collecting the blood. We usually see many articles on the internet, and books and even there are many awareness campaigns happens in schools and colleges, just like this event we are organizing here. We all must have to give our best to contribute and make other people aware about it. At the end we would like to say that we have a team of doctors to clear all your doubts and queries regarding it. And other useful stuffs to help saving someone's life. Thank s and Regards. Sachin Kumar Do well, Get well, Be well.

Junaid Zia

What did Hannah do to make first cut in the list of potential countries? How did he get from 200 to less than 35 potential new markets? Which variables seemed more important in his decision making? Which variables used might be useful? Hannah Gathered information from several reliable U. S government and related websites and come up with the data to represent the variables related to the particular countries. It includes per capita beef consumption, population, urbanization rate, Affinity to US brands, high Disposable Income, do people go out to eat, per capita GDP etc.Average per capita GDP is not an ideal measure, but rather identifying your customer segment population in a given area. As the extreme wealth and poverty gap can be incredibly wide, creating an unrealistic per capita GDP for any country. Moreover per capita beef consumption is not as such important but rather frequency of people to go outside for having beef feast is vital. However high disposable income of people is good variable and people can create an appropriate pool of potential customers. What would be your choice for top five opportunities?What equation did you use to reach that conclusion and why? It is apparent that Ruth’s Chris has the capability to expand, and we feel that a â€Å"Penetration† strategy would be a possibility, perhaps through increased presence in existing markets or offering a new menu items that would appeal to a wider variety of consumers. However, if they want to move overseas than they can evaluate the cities rather than the country. For example they can target the Paris upon France because it is famous for tourists and Ruth’s Chris can certainly capture appropriate market.Hannah was focused on franchising as his mode of entry. Do the critical variables change if a different mode of entry is employed? Franchising is a good option. But if Ruth’s Chris think about the joint-venture option that it is totally out of context. When your part ner suddenly opens up a budget steakhouse down the street with the same cooking style, flavor and half the price, you’ll find yourself out of the country in no time. Company-owned restaurants also require a great investment along with great knowledge about their culture, the political environment etc.What are some of the internal and external challenges Hannah will face in moving from a list to actually opening restaurants? Hannah selects the beef-eating population. However, no concession made to regional taste for menu items. Even McDonalds changes its menu in other countries, so why is Ruth’s Chris so afraid? More importantly, would the risk of jeopardizing their core competencies through menu alteration outweigh the potential profit, this is the biggest internal challenge for them. Outsourcing USDA prime beef has to be expensive.Shipping it halfway across the world in freezers seems almost extravagant and inefficient. Could Ruth’s Chris evaluate local sourcin g of their produce? It’s very important to think upon. External challenges could include the people’s reluctance towards American brand, high expenses on franchises than decided in agreement, political instability, lack in flexibility according to the situation: like people prefer to take beef-meals at lower prices or ever-changing consumer preferences can be the biggest external challenges.

Monday, July 29, 2019

Homicide Essay Example | Topics and Well Written Essays - 1500 words

Homicide - Essay Example Most of the individuals who commit murder are males. In 2005, the males were ten times more likely to commit murder than females (U.S. Department of Justice 2007). Since 1976, the male individuals have been very dominant in committing murder and in 1980s and 1990s the males were 20 times more likely to commit murder than females. Since the early 1980s, the offending rates of the females declined and became constant after 1999 (U.S. Department of Justice 2007). In 1976, the homicide rate for male offences began at 16.3 per 100,000 (U.S. Department of Justice 2007) of population which remained constant till the next year. The rate increased to 20.6 (U.S. Department of Justice 2007) in the early 1980s and then fell to around 15 percent in 1985. These statistics for males and females offence rates are summarized in Figure 1. The biggest reason for the male dominance in homicide offence is that the males are largely involved in drug abuse and overuse of alcohol. When these individuals are drunk or drugged, their ability to make decisions is diminished and the risk of committing crime increases. Killing done by men, which related to drugs accounted to almost 95% offences while for females, it was only around 5% (U.S. Department of Justice 2007). This shows the correlation between drugged men and homicide is very high. Gang wars and gang related offences are big contributors to homicide. The victims of gang related homicides are 95% males and the offenders are about 98 percent (U.S. Department of Justice 2007), which shows us that most of the individuals who are part of gangs are males. Males are more likely than females to step into arguments with their neighbors, acquaintances and even strangers. Males are also more likely to become revengeful and lose temper than women. This causes them to take revenge from the victims in the form of murder. Therefore we can see a clear and

Sunday, July 28, 2019

Sensitive mothering is essential to the social and emotional Essay

Sensitive mothering is essential to the social and emotional development of the child discuss this statement in the context of relevant developmental theory - Essay Example With respect to this, mothering is referred to as a mother’s style of interaction with her child. A mother should be available to the child and should overcome all the needs of the child. Generally, it is stated that a mother’s love and sensitivity creates a harmony among the two bodies and due to this mother-infant relationship is formed (Barnes, 1995). A mother should not only cater to the child needs but she must be sensitive, i.e. she must have the capabilities to correctly interpret her child’s signals, respond to them promptly and appropriately, and encounter fully to her child’s needs. Moreover, it is the mother’s early interaction with the child that leads to behavioral issues. A sensitive mother will produce socialized and self regulated children. Moreover, mothers who are more sensitive and responsive to a child will form a secure, adaptive attachment with their child. Whereas an insensitive mother who rejects or is under involved with her child development, will form an unsecured bond with her child. According to the research, it has also been seen that sensitive mothers do not only have more close relation with their child, but their infants are more dependant on their mothers as compared to any other. The child is not only less dependant on the teachers but they are also more competent with their pe ers and have a more cooperative attitude with adults as children. Thus a sensitive mother not only grooms its child but also builds self-confidence. Sensitive mothering also plays an important role in the child’s pro social and anti social behavior. Sensitive mothers have a strong association with a child’s obedience, impulse control, and self assertion. On the other hand, an insensitive mother is responsible for a child’s negative actions, because lack of love and care from mothers develop disobedience, rebellious and noncompliance nature within a child. Due to this it can be stated that sensitive mothering is extremely

Saturday, July 27, 2019

Finance final examination questions Essay Example | Topics and Well Written Essays - 1250 words

Finance final examination questions - Essay Example This change causes a shift in a company's cost structure which will result in an increase in Fixed Cost and a reduction in Variable Cost. For example, in period 1 Company A employs unskilled labor which cost $10.00 per hour. However because of a cost cutting exercise by the company, the organisation decides to purchase a new machine in period 2, which will enable Variable Labor cost to be reduced by 75%. The new machine will cost $50,000 and will have a useful life of 10 Years. The following occurred: Period 1 - 1,000 Hrs $ Variable Cost - Labor Cost ($10.00 X 1,000 Hrs) 10,000.00 Fixed Cost 0.00 Total Cost 10,000.00 Period 1 - 1,500 Hrs $ Variable Cost - Labor Cost ($10.00 X 1,500 Hrs) X 25%) 3,750.00 Fixed Cost - Depreciation ($50,000/10 years 5,000.00 Total Cost 8,750.00 Conclusion An increase in a company's Fixed Cost in relation to its Variable cost (as in the above example) will ultimately lead to a fall in Total Cost. This can effectively be determined using CPV

Friday, July 26, 2019

Project Management Applicatio Assignment Example | Topics and Well Written Essays - 500 words

Project Management Applicatio - Assignment Example Patience privacy in health organization is of high concern in today’s era when technology is adversely evolving. The data stored in the health systems database may experience harm that causes physical damage to the hard disks and the systems. Before Health insurance Portability and Accountability Act (HIPAA) was implemented, there were no prior standards of determining whether health cares should securely store patient’s information. After the implementation of the HIPAA act, health cares boosted their databases where confidentiality and portability of patient records were harnessed. If health organizations do not comply with the HIPAA, they can face a penalty of $250,000 and if the violation is repeated the culprit faces fines up to $1.5 million. Organizations first step should be Risk analysis. Organizations should follow the HIPAA risk analysis techniques. The risk analysis should provide medical staff with deep knowledge of understanding the risks involved with inte grity and confidentiality of patient information. The HIPAA act requires that health cares should â€Å"implement policies and procedures to prevent, detect, contain and correct security violations through assessment of potential risks†. I order to mitigate the risks involved physical safeguards such as the building of alarm systems as well as the use of extensive monitoring screen should be widely implemented. Administrative safeguards should also be used in order to secure the authorized exchange of patient information in different hospitals.

Thursday, July 25, 2019

Paper 3 (The Final) Essay Example | Topics and Well Written Essays - 1500 words

Paper 3 (The Final) - Essay Example Lady Gaga has been a trendsetter in fashion and beauty for several years to date. Her photo to be featured in this paper and the way it was presented is similar to how she portrayed herself in public – deviant and trendsetter. Beyonce, on the other hand, has been a role model of popular culture for more than a decade now. She depicts talent and beauty that most young people look up to and desired to be. These two personalities in their own ways set the standards for beauty and define what popular culture is. By this, my paper will try to evaluate the effect of popular culture in people’s perception of beauty. I will explore two photos to prove that there is a connection between the photos, the popular culture and its role in influencing people’s lives and perspectives in terms of their social roles and in the aspect of beauty in particular. In the study conducted by Barbara Read entitled â€Å"Britney, Beyonce and me – Primary school girls’ role mo dels and constructions of the ‘popular girl’† it was discussed how gender and culture shape the values of young girls today into aligning with the experiences observed from their role models are, like for example Lady Gaga and Beyonce. According to Read (2), children’s peer culture play an important role in shaping the way they value things and construct meanings such that the more their friends want to become like their role models, they wanted the same things to happen to them too. According to the results of the study (Read 5), school girls look up to their female teachers primarily as their role models but this can be argued to be normal as teachers are the next best thing they normally look up to. The next school girls’ role models include female singers and performers such as Britney and Beyonce (Read 5). Source: American music photo set. The photo above is showing Beyonce as she performed Oxygen Festival in Ireland. The photo is an example of a framing vector in which the artist used edges of the image as well as other vectors within the image to direct viewer’s attention; this type was specifically used to include certain elements while excluding others (â€Å"Tools† 6). By using this type of vector, the artist or photographer was able to portray Beyonce as an object in which viewers can direct their attention (â€Å"Tools† 7). The objectified pop star can now be subjected to scrutiny and in turn may influence the perception of people especially pre-teen girls and women. They were able to see Beyonce in this photo as a role model in the way she look and dress and how beautiful and talented she is. The perspective of the photo was oblique in which there is a slightly more detached sense of involvement (â€Å"Tools† 14) and the long shot social distance that pertains to distance between people who are to remain strangers (â€Å"Tools† 17). In support to this claim, Read suggested in her work that pre-teen girls look up to people that are popular and are stranger to them (6). Read’s extensive works on the subject lead her to conclude that pop music had been important for pre teen girls in construction of their identity indicated by their interest in unknown or rare songs or bands/singers before looking up to anyone else (6).The photographer clearly conveyed the extent in which popular culture influenced a large number of people through capturing within the frame of this photo the millions of people looking up to Beyonce and by representing her as

Wednesday, July 24, 2019

Face of Racial Profiling Research Paper Example | Topics and Well Written Essays - 1250 words

Face of Racial Profiling - Research Paper Example The horrific terrorist attacks of September 11, 2001 left an ineradicable mental image in the minds of people worldwide and changed many aspects of life in America not the least of which is the moral, ethical and legal debate regarding the concept of profiling based on a person’s race or country of origin.   The government and various agencies such as the transportation industry, as a response to possible future terrorist attacks, has led an anti-terrorism campaign focused on identifying people of Arab descent extending even to people of the Muslin faith and those who appear to be of   Middle Eastern origin.   Undoubtedly, if profiling in the name of terrorism has not been proved effective, the profiling of black citizens in the name of ‘getting tough on crime’ is not effective as well and causes more harm, ultimately, than whatever good may come of it.   â€Å"Racial profiling in any manifestation is a flawed law enforcement tactic that is in direct conf lict with constitutional values† (MacDonald, 2001).   There is no conclusive evidence that proves either way if the profiling of suspected terrorists which includes the factor of ethnicity or race is effective in safeguarding U.S. citizens.   What is known is that the majority of U.S. residents, legal or not, of every racial group are not involved in terrorist activities and were alarmed by the September 11 attacks.   Consequently, harassing, detaining or intruding on the liberty and privacy of individuals haven’t caused any reason to justify such an intrusion.... Undoubtedly, if profiling in the name of terrorism has not been proved effective, the profiling of black citizens in the name of ‘getting tough on crime’ is not effective as well and causes more harm, ultimately, than whatever good may come of it. â€Å"Racial profiling in any manifestation is a flawed law enforcement tactic that is in direct conflict with constitutional values† (MacDonald, 2001). There is no conclusive evidence that proves either way if the profiling of suspected terrorists which includes the factor of ethnicity or race is effective in safeguarding U.S. citizens. What is known is that the majority of U.S. residents, legal or not, of every racial group are not involved in terrorist activities and were alarmed by the September 11 attacks. Consequently, harassing, detaining or intruding on the liberty and privacy of individuals who are of a certain ethnic group will undoubtedly cause a certain amount of personal detriment to countless numbers of peo ple who haven’t caused any reason to justify such an intrusion. The reality of the situation will not totally convince those persons who argue that profiling is effective and helps keep the public safe. Unlike illegal drug trafficking which involves large numbers of U.S. citizens of all ethnicities, there is every reason to assume that very few people in the U.S. are not engaged in terrorist activities or are planning attacks. Hence, â€Å"any criteria police use to identify or ‘profile’ terrorists, whether or not those criteria rely on suspect classifications such as race, ethnicity, or national origin, will yield many more false positives than they will disclose

Communication Plan Case Study Example | Topics and Well Written Essays - 2750 words

Communication Plan - Case Study Example Reports have suggested that in the US, obesity rates have doubled since the last few decades. Approximately 65% of the overall adult population of the country falls into the category of overweight population. However, the situation is worsening day by day and has now reached an alarming stage. Several techniques have been tried and tested and hardly any of them has impacted or provided the desired results (Haberer 14). Considering this situation, marketers have also tried to utilize the opportunities of the US market. A number of companies involved in manufacturing and marketing of anti obesity drugs have emerged in the market and hence, the industry is becoming quite competitive (McDaniel 14). This report seeks to investigate the external business environment of the US and frame in marketing and communication strategies for the company, Cambridge Sciences Pharmaceuticals (CSP). The company has recently launched weight reducing drug names as Metabical. According to the pilot study ca rried out by the company, the drug is providing effective results. However, industry experts and eminent scholars around the world believes that a good product does not serve the purpose or fulfills the objectives of a firm, rather to get success a good product needs to have the support of good marketing and promotional campaign. The research paper will begin with a context analysis and the frameworks to be put into practice are PESTEL analysis and SWOT analysis. Context Analysis The context in which a business operates is crucial for a number of factors. The context not only influences the business decision of a company, but also plays a vital role in the operations of a firm. Hence, before devising the marketing plan, the study will carry out an in-depth analysis of the context in which the company operates. Apart from that the study will also enumerate SWOT analysis of the company. PESTEL Analysis Pestle is a strategic management tool by which a company analyses the external busi ness environment (Mills 14 -16). It stands for political, legal, environmental, economical, social and technological factors. The analysis is carried out below: - Factor Analysis Verdict Political The political factors of a country include the stability of the government, regulations of the environment, taxation policies, and Competition regulation and consumer protectionism among others. Almost each of these factors impacts the pharmaceutical industry. In the context of US, the government is stable enough and has always supportive to a new business and investments. However, the country is strict when it comes to the compliance of environmental condition. The recent health reforms have however led to an increased pressure on the prices of the products. It is obvious that compliance with the rules and regulation of a country is mandatory for a business, but along the same time it is also necessary that the company encompasses a strong internal policy to guide the operations of the fi rm. It has been found that most of the factors pertaining to the political situation of the country are favorable for doing pharmaceutical business in the country. The only cause of cause of concern is the strict regulation of government towards the maintaining the standard of the drugs and to ensure there are no side effects for consuming it. Therefore considering theses facts it is strongly recommended to the firm that they should ensure that the product maintains the standards and the promotional

Tuesday, July 23, 2019

Project risk management of south africa's 2010 world cup challenge Essay

Project risk management of south africa's 2010 world cup challenge - Essay Example These negativities pose a great risk in hosting such a mega event. This country has never got such a chance to propagate its plus points at any previous time in history so it should focus on appropriate planning of strategies and successful management of risks. The political risks are high, as the opposition would always scrutinize each and every effort and actions of the ruling party. Organizing such a big event without any political upheaval is nearly impossible. Reports have already started coming which state that opposition feels that spending so much of money in a gala event is not required when South Africa has other burning issues like poverty, unemployment and underdevelopment to deal with. Each and every issue related to world cup is taking a political angle. There are a section of people who believe that showing so much of interest in this event should not be the priority of the government, instead the focus should be in the overall development of the country. This viewpoint has the risk of further aggravating the political tensions as the opposition may try to project this viewpoint of a small section of society into the opinion of the masses. This entire hullabaloo will negatively impact the feelings of those who are pro FIFA w orld cup in South Africa and give a chance to the opposition in creating a situation that might pose a threat to the hosting and staging of the sports event. All other controversial issues of the South African politics will also come in the fore thus distracting the ruling party’s enthusiasm and focus towards the event. Hence political unrest in the backdrop of this gala event is a major threat to this project. Other major controversies like power shortage in the country and underdeveloped broadcast infrastructure would be greatly emphasized by the opposition which would pose a threat to the South Africa’s image to the entire world. There is a risk from a section of

Monday, July 22, 2019

Writ of Habeas Corpus Essay Example for Free

Writ of Habeas Corpus Essay Habeas Corpus demands a court to a jailer to produce the prisoner and announce the charges (Levin-Waldman, 2012). Habeas Corpus is an ancient common law that applies to all Americans and anybody in the United States at the time of their arrest. It is a legal procedure that requires a person to be brought in front after the have been arrested/ taken into custody. This is done so that the government to show cause to why the liberty of that person is being taken away and to let the person know what they are being charged with. Habeas Corpus is fundamental to American and all other English common law derivative systems of jurisprudence. It is the ultimate lawful and peaceable remedy for adjudicating the providence of liberty’s restraint (http://www.slate.com). History of Habeas Corpus The history of Habeas Corpus is an ancient law that has been used since the middle ages. It appears to be predominately of Anglo-Saxon common law origin but the exact origins are not really known. Even though the origin of Habeas Corpus is unknown it has been used in Europe for centuries. Its principle that has been used since the middle ages by various writs (http://www.slate.com). Habeas Corpus has evolved and changed a bit over the years, but it has basically remained the same. Habeas Corpus states that a person who has been arrested or in custody be brought before a court. Habeas Corpus has been used in the United States since the beginning of the American Revolutionary War. The Writ of Habeas Corpus was established by the British and was generally regarded as part of the fundamental protections guaranteed by law to each citizen (http://www.slate.com). Article I, Section 9 of the US Constitution guarantees the availability of the writ of habeas corpus (http://search.proquest.com). Habeas corpus serves as a tool or legal defense by people that are detained by the government. Habeas Corpus has also been used by detained suspected terrorist/ enemy combatants to challenge the government as to the legality of their detention. Since the beginning of the War on Terror hundreds of suspected terrorist/ enemy combatants have been held at the Guantanamo Bay, Cuba detention facility. Some of the detainees that are held there today have been in detention since January 2002. This has created many debates because many people feel that they are being held illegally in direct violation of the US Constitution and International Law. Suspension of Habeas Corpus Article I, Section 9 of the US Constitution, states that, â€Å"the privilege of the writ of habeas corpus shall not be suspended, unless when in cases of rebellion or invasion the public safety may require it (http://www.slate.com). This means that every American is entitled to Habeas Corpus and that the only way that the government can suspend Habeas Corpus is during a rebellion or a direct threat to public safety. This is one of the ways that the Bush Administration justified detaining hundreds of suspected terrorist for years in detention facilities like Guantanamo Bay, Cuba. Their justification was that the suspected terrorist posed a threat to the safety and security of the American people and the United States Government. They also used President Abraham Lincoln’s decision to suspend Habeas Corpus in April 27, 1861 as an example of how and way it was important to detain suspected terrorist. On April 27, 1861, President Lincoln suspended the habeas corpus privilege on points along the Philadelphia-Washington route (http://www.slate.com). This was done after 20,000 Confederate sympathizers in Baltimore tried to stop Union troops from traveling from one train station to another en route to Washington, causing a riot (http://www.slate.com). President Lincoln viewed the Confederate sympathizers as a threat to public safety, and their actions could also be considered a rebellion against the United States Government. After President Lincoln ordered the suspended the habeas corpus, his Generals detained anybody whom they believed posed a threat to Union troops or public safety. Habeas Corpus and the War on Terror After the September 11, 2001 attacks in the United States and the beginning of the War on terror the Bush Administration enacted one of the most controversial policies of their administration. This new policy enacted created many heated debates within the United States three branches of the U.S. Government, because it authorized the US Military to detain suspected terrorist/ enemy combatants for an undetermined amount of time. After the beginning of the War on Terror the Bush Administration order to use military commissions to try enemy combatants, which includes a provision denying habeas corpus rights to those subject to the order in federal court (http://search.proquest.com). These new polices also suspend the use of habeas corpus and it was justified by stating that these suspected terrorist were detained outside of the United States and they were being held at a location outside of the jurisdiction of the US Government. In later provision of these polices stated that the foreign nationals who have been held at Guantanamo Bay for six years without meaningful due process protections cannot be deprived of habeas corpus rights by either the president or Congress (http://search.proquest.com). Boumediene v. Bush Several law suits have been filed against the United States by detainees or families of the detainees in regards to the illegal detention of foreign nationals that are suspected to be terrorist or enemy combatants. In the case of Boumediene v. Bush the Supreme Court of the United States ruled on behalf of Lakhdar Boumediene, a naturalized citizen of Bosnia and Herzegovina. Boumediene was a detainee that was being held at military detention in Guantanamo Bay, Cuba by the United States. In this case the United States argued that Guantanamo Bay was not part of the United States, and under the 1903 lease between the United States and Cuba. Cuba had ultimate sovereignty over the territory even though it was being lease to the United States. But under the same lease agreement the United States had complete jurisdiction and control over the Naval Base (http://search.proquest.com). The Boumediene v. Bush case was head alone the case of Al Odah v. United States. Both of these cases challenged the legality of detainee detention at the military base in Guantanamo Bay, Cuba and it also challenged the constitutionality of the Military Commissions Act (MCA) of 2006. The United States Military Commissions Act of 2006 was drafted after the Supreme Courts decision on Hamdan v. Rumsfeld. Military Commissions Act authorizes trial by military commission for violations of the law of war. The MCA was signed by President George W. Bush on October 17, 2006 (http://search.proquest.com). On June 12, 2008, Supreme Court Justice Kennedy delivered stated that court ruled on 5-4 majority, stating that the prisoners being held at the Guantanamo Bay detention camps had a right to the habeas corpus under the United States Constitution. They also stated that the Military Commissions Act of 2006 was an unconstitutional suspension of that right (http://search.proquest.com). This decision was based on the fact that the United States had complete jurisdiction and control, over the territory (Guantanamo Bay Naval Base). Even though Cuba retained ultimate sovereignty over the territory, the United States still had control and jurisdiction over the Naval Base. This means that the people detained as enemy combatants at the Guantanamo Bay Naval Base were entitled to the writ of habeas corpus protected in Article I, Section 9 of the U.S. Constitution (http://search.proquest.com). Many people believe that enemy combatant should not have the same rights as an American Citizen. This can especially be said about suspected terrorist and anybody that threatens that safety and security of the United States. The Bush Administration justified the detention of hundreds of detainees at the Guantanamo Bay Naval Base, by stating that they were arrested outside of the United States and that is being held outside of United States territory. President Bush as the as commander-in-chief did use the US Constitution to justify his actions, Article I, Section 9 of the US Constitution, states that, â€Å"the privilege of the writ of habeas corpus shall not be suspended, unless when in cases of rebellion or invasion the public safety may require it (http://www.slate.com). This means that the commander-in-chief can suspend the writ of habeas corpus in the interest of public safety. I believe that this is a very valid justification as long as a reasonable person believes that there is still a threat to the public safety. Article 1, Section 9, Clause 2 of the US Constitution, gives Congress power to suspend the writ of habeas corpus. Article 1, Section 9, Clause 2 further states that only the Federal Government and not the States, has the authority to suspend the writ of habeas corpus. It does not specifically state who has the authority to suspend the writ. The role of the Supreme Court in protecting civil liberties, including the judicial philosophy is very important. The Supreme Court ensures that our constitutional rights are not violated and it also serves as part of the checks and balances that our government has. The Supreme Court has played a very important role in the war on terror and the court decisions have changed the way enemy combatants are detained and prosecuted in US Courts. The Supreme Court ruled that even if an enemy combatant is detained overseas and held outside of the United States, the detainee still have constitutional rights and the writ of habeas corpus does apply to them. After reading and analyzing the writ of habeas corpus, the Bush Administration’s detention justification and the US Supreme Court rulings, I feel that the President and the United States Government should be given a little more flexibility in regards to the writ of habeas corpus. I can understand why the Bush Administration detained these suspected terrorist/ enemy combatants and how they can justify that these people are dangerous and that they do pose a threat to the American people. But I also feel that keeping them detained indefinitely without due process is wrong. I do think that the military should handle suspected terrorist/ enemy combatants that are arrested/ detained outside of the United States. References Staab, J. B. (2008). The war on terrors impact on habeas corpus: The constitutionality of the military commissions act of 2006. Journal of the Institute of Justice and International Studies. Retrieved September 23, 2012, from http://search.proquest.com/docview/213962970?accountid=32521 Redish, M. H., McNamara, C. (2010). Habeas corpus, due process and the suspension clause: A study in the foundations of american constitutionalism. Virginia Law Review. Retrieved September 22, 2012, from http://search.proquest.com/docview/759595988?accountid=32521 Levin-Waldman, O. M. (2012). American government. San Diego, CA: Bridgepoint Education, Inc. Greenberg, D. (2001). Lincolns Crackdown Suspects jailed. No charges filed. Sound familiar? Slate. Retrieved September 22, 2012, from http://www.slate.com/articles/news_and_politics/history_lesson/2001/11/lincolns_crackdown.html Azmy, B. (2009). Boumediene v. bush and the new common law of habeas. Rochester, Rochester: Retrieved September 22, 2012, from http://search.proquest.com/docview/189874026?accountid=32521

Sunday, July 21, 2019

Analysis of the telecommunications industry in China

Analysis of the telecommunications industry in China Vodafone is a London-based major telecommunication firm employing over 84,000 employees worldwide as of 2010. They are in more than 20 countries and have partnership in another 40 more for total revenue in 2010 of  £44 billion.  [1]  There focus is on RD and license management which make Vodafone a leader in new technology and product development. With this reputation, a lot of local companies can be interested in partnership with Vodafone in order to gain a technological boost which can help them overtake on the local competition. In 2000, Vodafone added CMHK (China Mobile Hong Kong) to his partner list by buying 2.19% of the company shares at a price of $2.5 billion. Two years later a second purchase of $750 million increased their share to 3.2%. By creating this partnership, Vodafone gained access to over 477 million subscribers in Hong Kong and China. From CMHK side, the alliance with the British firm set the table for a technological innovation campaign. The first remarkable output of this collaboration was JIL (Joint Innovation Lab), with the goal of accelerating the innovation process.  [2]   China and the WTO -How has Chinas entry into the WTO affected Vodafones development in China and Hong Kong? -How has it affected foreign telecommunications in general? C:UsersMYDocuments2011-1à ­Ã¢â‚¬ ¢Ã¢â€ž ¢Ãƒ ªÃ‚ ¸Ã‚ °Ãƒ ªÃ‚ µÃ‚ ­Ãƒ ¬Ã‚  Ã…“à ªÃ‚ ²Ã‚ ½Ãƒ ¬Ã‹Å" Ãƒ «Ã‚ ¡Ã‚  china telecom statistics.jpg After almost 15 years of negotiation, China joined WTO as of 11 December 2001. Before the adhesion, Chinas policy protected the national emerging telecom industries  [3]  while allowing only foreign equipment vendors to invest in Chinas economy.  [4]  The new contract gave entry to foreign investment for up to 49% of one of the local companys share in the 17 largest cities in China.  [5]   As well as other markets, Chinas telecommunication market is expected to grow very rapidly especially if open to foreign service suppliers. The whole market generated over $130 billion in 2010 and is expected to grow by an average rate of 8.8% in for the next five years. Thus overtaking Japan and becoming the leader in the Asian market.  [6]  For foreign investors, those odds were quite attracting. The Reality -Why has Vodafone still held a minority stake in CMHK? -What factors do you think have inhibited Vodafones investment in the Chinese telecommunications market? Still, even after the entry in the WTO, Chinas telecommunication market stayed under the large influence of the Ministry of Information Industry (MII). The maximum level of stake ownership was set up to 49% under WTO agreement but no foreign telecommunication companies got close to that number. Vodafone, for example, was planning to increase its share up to 20% by 2005; in 2009 the 3.2% was still the reality. The main problem in the Chinese market is a multitude of complex and multi-layered political, economic and cultural factors.  [7]  China is still operated with ancient art of Guanxi (network of contacts)  [8]  and MII is considered to be both regulator and party in Chinese telecommunication market. So even if the contract allows some expansion for foreign companies, the huge bureaucracy makes investing in China a long and laborious process. China Unicom and SK Telecom -What has China Unicom done in its attempt to remain competitive? What are the advantages and challenges of such a strategy, and how effective do you think it will be? In 2006, a few years after the entry of Vodafone in the Chinese market, SK Telecom of South Korea invested $1 billion in China Unicom. In total the South Korean firm received about 7% of the company shares in return of this investment. The great advantage for the Chinese giant was a possibility for a technological advancement. The two firms would now work together on handset development and IP sharing. China Unicom could then have a glance at foreign technology, just like their main competitor did 6 years ago with Vodafone. For SK Telecom, the transaction was also a great advancement. It allowed them to gain entry in the protected Chinese market and escape the South Korean saturated market. On the other hand, as part of the contract, China Telecom had to accept SK Telecom as the sole partner until the end of 2007.  [9]  In technology business, one year and a half tied to only one partner could hold you backward. Another foreign company could release a great new technological advancement and it would be impossible for China Unicom to get their hands on it. The Third Giant: China Telecom -What actions do you think China Telecom should take, given the competitive position of the CMHK-Vodafone and China Unicom-SK Telecom partnership? The telecommunication market in China has been quite homogeneous so far. Looking for foreign partnership could be a way to get a hand on advanced technology or management system that would give the firm a competitive advantage over their competitors, especially since the two other leading companies already stepped forward by accepting foreign investment. With that in mind, China Telecom should get into a serious search for a foreign partner in order to keep up with the competition. But what if those foreign partnerships were not as successful as planned? In fact, in September 2010, Vodafone sold their 3.2% stakes in China Mobile, pocketing $6.5 billion which is nearly twice the original investment4. After the sale, CMHK and Vodafone will continue to cooperate in areas such as roaming, network roadmap development, multinational customers, and green technology and so on  [10]  . Vodafone left with a profit and the alliance stayed but most of the cooperation died in the separation process. What about China Unicom and SK Telecom? Well in November 2009, the Korean firm sold the whole 3.8% stake of China Unicom to unknown buyer(s). SKT also earned more than 50% of their initial investment but abandoned their business plans in China. China Unicom dropped CDMA business, which was SKTs main strength, and absorbed China Netcoms GSM part and decided to focus on GSM. However, SKT is continuing cooperation in technology and conversion service area.  [11]   Accepting foreign investment is not a definite key to success. As said before, China used to be a quite closed and homogeneous market, so as the customers. Outsiders may have a hard time to understand how to conduct business in China and how to understand the needs of its people. In brief, the most important is for the host company to analyze how foreign firm could help them in their actual market and if the fusion can be done efficiently. Surely in a few years there will be a lot of success story in the telecommunication firm in China, but for now China Telecom is better not to jump on the first offering.

ZigBee Physical IEEE

ZigBee Physical IEEE This report work started with extensive literature study in several area of ZigBee, particular in the physical aspect. This knowledge was then implemented in simulating the physical aspect of the Zigbee working in the range of 2.4 GHz. Various parameter of the physical layer are alter to demonstrate the its effect by using MATLAB(syntax code in M-file and Simulink). Results are analyzed and compared to demonstrate how the actual standard and specification are derived. 2.0 Literature Review Zigbee is known as IEEE 802.15.4 Low-Rate Wireless Personal Area Network (WPAN) standard is part of the IEEE 802 family of digital communication standards. It is designed for low-cost, low-power applications that require relatively low data throughput which is down to an average of less than 1 bps. It is also differentiated from IEEE 802.15.1TM (Bluetooth TM) in several respects; it does not support isochronous voice, as Bluetooth does. Figure 2.0(a) shows the comparison with standard and technologies. 2.1 Applications ZigBee technology is well suited to a wide range of energy management and efficiency, building automation, industrial, medical, home automation applications. Essentially, applications that require interoperability and/or the RF performance characteristics of the IEEE 802.15.4 standard would benefit from a ZigBee solution. Examples include: Demand Response Advanced Metering Infrastructure Automatic Meter Reading Lighting controls HVAC control Heating control Environmental controls Wireless smoke and CO detectors Home security Blind, drapery and shade controls Medical sensing and monitoring Universal Remote Control to a Set-Top Box which includes Home Control Industrial and building automation 2.2 Advantages The most appealing advantages Zigbee has is low power consumption due low duty cycle of end device that only turns on when required, uses only small capacity of battery but long operating time. It is also relatively low cost compare to other wireless network. It offered low message throughput with the size of code ranges from 32kB to 70kB and is only approximately 10% of code size used in Bluetooth technology. Other advantages are listed below: -Large network order. -Few QoS guarantee -Selectable levels of security based on the Advanced Encryption Standard with 128-bit keys (AES-128) s. 2.3 Physical layer IEEE 802.15.4/ZigBee has two available physical layers. In the 2.4-GHz band, it supports a data rate of 250 kbps; there are 16 available channels, centred at 2405 + 5k MHz, where 0 ≠¤ k ≠¤ 15. The other physical layer is a regional one, covering the 868.0 to 868.6 MHz band available in Europe and the 902 to 928 MHz band available in much of the Americas. There is a single channel in the 868 MHz band, centred at 868.3 MHz, with a BPSK data rate of 20 kbps; the standard supports a BPSK data rate of 40 kbps in the 902 to 928 MHz band, with channels centred at 906 + 2k MHz, where 0 ≠¤ k ≠¤ 9.[1] 2.4 Network topologies To meet its wide range of potential applications, IEEE 802.15.4/ZigBee supports star, mesh, and tree networks, the latter two being multihop networks. Multihop Network: A multi-hop communications allows data from one device to be relayed to another device via intermediary devices. By relying on these intermediary devices, the range of a given network can be significantly increased while at the same time limiting the power consumption of each device. [2] Star Network: Star network topologies are commonly referred to as point-to-point and point-to-multipoint networks. This topology can be supported by either ZigBee or 802.15.4. In this network, all devices are limited to â€Å"single-hop† communications. Typical applications for star networks include garage door openers and remote controls. [2] 2.5 DSSS (Direct Sequence Spread Spectrum) IEEE 802.15.4 uses direct sequence spread spectrum (DSSS) for robust data communications. A DSSS spectrum system is spreading baseband by directly multiplying the baseband data with the PN code sequence. At the receiver side code, synchronization is received and the signal is passed through a filter. At the next step, it is multiplied by a local version of the same PN sequence. The received data are then dispread. The signal bandwidth is reduced. An interference signal will be spread when multiplying with the dispread sequence and the power of the interference is reduced when the bandwidth are increased. The part of the interference signal that does not have the same bandwidth as the desired signal is then filter out. In this way the most of the interference power is eliminated. 2.6 Channel Access There are two types of channel access in the IEEE 802.15.4 defined communication system. They are based on whether the devices want to retain their own exclusive time slot for communication or they have to compete with other devices for accessing the channel. The contention based allows the devices to access the channel in distributed way using CSMA CA algorithm. With this method each devices has to scan the air medium for free channel or to compete with other devices for the channel access. With contention free method, the network coordinator decides about the channel access by using Guaranteed Time Slot (GTS) of the channel space. This method is suitable for latency sensitive devices that require short delay time and no competition for channel access. To meet its low average power consumption goals, IEEE 802.15.4/ZigBee is capable of extremely low duty cycles — below 10 ppm [3]. The standard also supports beaconless operation — an asynchronous, asymmetrical mode supporting unslotted CSMA-CA channel access for star networks — that enables devices other than the receiving central node to remain asleep for indefinite periods, thus reducing their average power consumption still further. 2.7 Data processing IEEE 802.15.4 2.4-GHz physical layer uses a 16-ary quasi-orthogonal signalling technique — trading signal bandwidth to recover sensitivity with coding gain. A particular 32-chip, pseudo-random (PN) sequence is used to represent four bits [3].A chip is a symbol from p-n code sequence. There are 16 chips sequence and one is defined in table below: Information is placed on the signal by cyclically rotating or conjugating (inverting chips with odd indices) the PN sequence 8. The PN sequence is rotated in increments of four chips: symbols 0 through 7 represent rotation without conjugation; and symbols 8 through 15 represent the same rotations, but with conjugation. In this way, four bits are placed on each transmitted symbol and, because transmitted symbols are related by simple rotations and conjugations, receiver implementations can be simplified over other orthogonal signalling techniques that employ unrelated PN sequences. Half-sine shaped Offset-Quadrature Phase Shift Keying (O-QPSK) is employed, in which the chips of even index are placed on the I-channel and the chips of odd index are delayed one-half chip period and then placed on the Q-channel. The chip rate on either the I or the Q channel is 1 Mchip/s, so the overall chip rate is 2 Mchip/s. The symbol rate is 62.5 k symbols/s, leading to a data rate of 250 kbps. [4] 3.0 Description of the Simulator In this report, Simulink and syntax code (M-file) in MATLAB are used to generate the scatter plot. For the implementation of overall block system in Simulink model, the equivalent block diagram is as shown above. The Simulink model block consists of random integer generator, modulator and demodulator, noise channel and also error rate calculator. Simulink model effectively represent the complicated syntax code into system model block. The signal is generated by using a Random integer, the Random Integer Generator block generates uniformly distributed random integers in the range [0, M-1]. Then, the signal are modulated by OQPSK, the Offset Quadrature Phase Shift Keying (OQPSK) modulation scheme is used in this assignment. As stated in literature review, Offset Quadrature Phase Shift Keying (OQPSK) is a variant of phase-shift keying modulation using 4 different values of the phase to transmit. Addictive White Gaussian Noise is then added to the signal to simulate a practical channel w hich consists noise. After that, the signal is demodulated by using the same scheme-OQPSK. Result are compared with the initial signal (output from the Random Integer) to calculate the BER and SER performance of the scheme. The Discrete-Time Scatter Plot Scope block displays scatter plots of a modulated signal, which are located after AWGN block to reveal the modulation characteristics, such as channel distortions of the signal. For M-file code, the sequence is similar as the above block diagram, the following command are to used to generated the random signal : out = randint(m,n,rg) The code represented above generates an m by n integer matrix of random number. Variable â€Å"rg† represent the range of random number to be generated. The modulating part and demodulating are done by using the below code: y = oqpskmod(x) y = oqpskdemod(x) To add noise to the signal: y = awgn(x,snr,measured) Where x is the input signal and â€Å"snr† is the signal to noise ratio. The scatter plot are plotted by using: scatterplot(y) Besides plotting the scatter plot, the BER versus SNR curve are plotted as it is important to compare different modulating scheme in term of the BER performance. This is done by using syntax code in M-file. The complete code is attached in the appendix. The following is the flow chart to describe the sequence of the code. At the end, three graphs are generated ideal BER characteristic, practical BER characteristic and SER characteristic. 4.0 Result and Discussion . Dots are located at the centre of the boundary lines which is within the box or boundary line. This indicated that proper digital signal is being received. The closer the detected level/phase dots are plotted to the middle of the boundaries, the lesser noise and interference to the digital signal. However this diagram will never be obtain in practical cases. Therefore to simulate a practical real cases, Addictive White Gaussian noise must be considered, Additive Gaussian noise disturb the digitally modulated signal during analog transmission, for instance in the analog channel. Additive superimposed noise normally has a constant power density and a Gaussian amplitude distribution throughout the bandwidth of a channel. If no other error is present at the same time, the points representing the ideal signal status are expanded to form circular â€Å"clouds† as shown below. As figure above shown, scattering of the dots indicates some marginal signal performance degradation but not enough to cause significant digital bit errors because dots are still located inside the boundary. Only dots to the edges of the quadrant or beyond represent significant degradation that results in bit errors during decoding which are shown in figure below generated by using Simulink . In conventional QPSK, change in the input bit from 00 to 11 or 01 to 10 causes a corresponding 180 ° shift in the output phase therefore an advantage of OQPSK is the limited phase shift that must be imparted during modulation. The sudden phase-shifts occur about twice as often as for QPSK (since the signals no longer change together), but they are less severe. In other words, OQPSK has smaller jumps when compared to QPSK. This lowers the dynamical range of fluctuations in the signal which is desirable in engineering communications signals. As mentioned earlier, the simulation is performed to study the performance of the design model. The study is done by observing the bit error rate (BER) with respect to the signal to noise ratio (SNR) The simulation (Figure 4.0(f)) compares the BER versus SNR curve for different modulation scheme used. Four different modulation schemes is taken into comparison, which is the Quadrature Amplitude Modulation (QAM), Quadrature Phase Shift Keying (QPSK), Differential Phase Shift Keying (DPSK) and finally Offset Quadrature Phase Shift Keying (OQPSK) employed by Zigbee operating at 2.4GHz radio band. By comparing different modulation scheme give better insight on which modulation is better and suitable. All modulation schemes are simulated with the value M = 4, where it is effectively represented by n = 2 bits which can be calculated from the following formula below: n = log2 (M) The first graph below shows the theoretical bit error rate versus signal to noise ratio curve. For practical system, white Gaussian noise is added. If comparison is made between theoretical graph and practical graph, it shows that there is not much of the different in term of the shape of the graph. ,it shows that for all the modulating scheme, the higher the SNR the lower the BER (bit error rate).The same principal are apply to the symbol error rate(SER) vs SNR(figure 4.0(g)). For BER vs SNR, comparing the four different modulation schemes from the practical graph plotted, DPSK modulation scheme shows to have the worst bit error rate at any level of SNR, followed by QPSK and QAM having approximately similar bit error rate at any SNR level. The OQPSK tends to have the lowest bit error rate at any SNR level if compared to other modulation scheme, which is desired. The comparison is done by taking one fixed SNR level, for example, considering the SNR level of -2. The bit error rate of OQPSK falls approximately to 10-2, which is the smallest. The QAM and QPSK have bit error rate falls within the range of 110-1 to 510-1, slightly much higher than OQPSK. The DPSK has the highest bit error rate, which is above the range 110-1. 2dB Graph 4.0(h) illustrate symbol error rate (SER) versus signal to noise ratio (SNR) under the same condition for the four modulation scheme. The SER versus SNR curve has similar characteristic over the BER versus SNR curve, with OQPSK being in the best performance, followed by QPSK and QAM and DPSK having the worst performances. Low average power is achieved with a low overall system duty cycle. However, low duty cycle must be achieved with low peak power consumption during active periods because most of the target power sources have limited current sourcing capabilities and low terminal voltage, and it is not desired to implement with complex power conditioning systems for cost and efficiency reasons. At the physical layer, the need for low duty cycle yet low active power consumption implies the need for a high data rate (to finish active periods quickly and return to sleep), but a low symbol rate (because signal processing peak power consumption is more closely tied to the symbol rate than the data rate). Therefore, this implies the need for multilevel signalling (or m-ary signalling, with m > 2), in which multiple information bits are sent per transmitted symbol. However, simple multilevel signalling, such as 4-FSK, results in a loss of sensitivity. As can be seen from figure 4.0(h), OQPSK provides a 2-dB increasein sensitivity over nearest scheme (QAM). For modulating scheme with low sensitivity, there is a need to recover the needed link margin (i.e. range) without resorting to directive antennas, the transmitted power must be increased or the receiver noise figure must be reduced, both of which can increase power consumption significantly. 5.0 Conclusion In conclusion, IEEE 802.15.4 is still a new standard which has the potential to unify methods of data communication for sensors, actuators, appliances, asset tracking devices and so on. It offers the means to build a reliable and affordable network backbone that takes advantage of battery-powered devices communicating at low data rates. In addition the complexity and cost of the IEEE 802.15.4/Zigbee-compliant devices are intended to be low. It can potentially create a whole new ecosystem of interconnected home appliances, light and climate control systems, and security and sensor sub-networks. In this respect, the implementation of the physical layer of the IEEE 802.15.4 standard must be optimized to meet the challenging low-cost and low-power targets. From the context above, various test and evaluation on the BER versus SNR curve and scatter plot for various scheme are done on physical layer of the ZigBee, the result shows that OQPSK is the most suitable modulating scheme which fit the ZigBee (2.4 GHz band) characteristic (low power consumption, high sensitivity, high reliability and low cost ). Thus it coincides with the actual standard for Zigbee. 6.0 References 1. Sensor Technology Handbook, Page 593 Section:  22. Wireless Sensor Networks: Principles and Applications Wilson, Jon S ISBN: 0750677295, Newnes, 2004 ZigBee Specification, ZigBee Alliance, Zigbee Document 053474r05 Version1.0, 2005-06-20 2.ZigBee and 802.15.4 Solutions -http://www.silabs.com/public/documents/marcom_doc/pbrief/Microcontrollers/en/ZigBee_Brief_Web.pdf 3.RF Circuit Design Theory and Applications, Reinhold Ludwig and Pavel Bretchko Pretince Hall, ISBN 0-13-095323-7 4. Zigbee Ready RF Design -http://rfdesign.com 5. Zigbee http://en.wikipedia.org/wiki/ZigBee 6.Edgar H. Callaway, Jr., Wireless Sensor Networks. Boca Raton, FL: Auerbach Publications, 2003, Chap. 7. 7. chipcon,http://www.chipcon.com,2006-01 8. IEEE802.15.4 and ZigBee Compliant Radio Transceiver Design

Saturday, July 20, 2019

Macbeth, King Lear and Much Ado About Nothing :: English Literature Essays

Macbeth, King Lear and Much Ado About No Shakespeare writes his plays to teach a moral story, of behavior and love. The three plays, King Lear, Much Ado About nothing, and Macbeth, the parents are very stubborn and their views are very narrow toward their children. The children know that they are treated poorly but love their parents although they have many faults in trust and love. Each play ends with a loving relationship because thoughts about one another is cleared up and they live happily ever after. King Lear, has many valuable points. Shakespeare emphasizes the importance of love between family members by showing how much harm disloyal or unloving family members can cause. King Lear cruelly abuses his most loving daughter, Cordelia, simply because she admits that her love for her father is limited: "Unhappy that I am, I cannot heave my heart into my mouth. I love your Majesty/ According to my bond, no more nor less." This truthful declaration by Cordelia leads to her disinheritance. However, despite this rejection, Cordelia continues to stand by her father's side and defend him in his time of need against Regan and Goneril. Now that they have their land and power, these disloyal sisters won't care for or even support their father. In fact, the two are now so greedy and disloyal that they wish to have Lear murdered. In effect, Lear, Goneril and Regan are very much alike: their failure to love family members causes great pain, first for themselves and then for others. Lear treats Cordelia poorly because he does not realize that he has mistrusted his only true daughter. This mistrust comes from the fact that Lear believed Regan and Goneril when both professed their love for him. However, neither is honest. Toward the end of the play, Lear realizes that he has been very unfair to Cordelia, and that the other two sisters have misled him. Cordelia, however, remains true to Lear, as she respects the relationship between them although he does not. Shakespeare expects family members to be true to one another and have a solid trust in each other. Lear doesn't do what Shakespeare expects: he no longer loves Cordelia after she confesses she loves him only to the extent a daughter should. All of his love is for Regan and Goneril because both of them tell their father what he wants to hear: that they love him more than anyone in the world. Macbeth, King Lear and Much Ado About Nothing :: English Literature Essays Macbeth, King Lear and Much Ado About No Shakespeare writes his plays to teach a moral story, of behavior and love. The three plays, King Lear, Much Ado About nothing, and Macbeth, the parents are very stubborn and their views are very narrow toward their children. The children know that they are treated poorly but love their parents although they have many faults in trust and love. Each play ends with a loving relationship because thoughts about one another is cleared up and they live happily ever after. King Lear, has many valuable points. Shakespeare emphasizes the importance of love between family members by showing how much harm disloyal or unloving family members can cause. King Lear cruelly abuses his most loving daughter, Cordelia, simply because she admits that her love for her father is limited: "Unhappy that I am, I cannot heave my heart into my mouth. I love your Majesty/ According to my bond, no more nor less." This truthful declaration by Cordelia leads to her disinheritance. However, despite this rejection, Cordelia continues to stand by her father's side and defend him in his time of need against Regan and Goneril. Now that they have their land and power, these disloyal sisters won't care for or even support their father. In fact, the two are now so greedy and disloyal that they wish to have Lear murdered. In effect, Lear, Goneril and Regan are very much alike: their failure to love family members causes great pain, first for themselves and then for others. Lear treats Cordelia poorly because he does not realize that he has mistrusted his only true daughter. This mistrust comes from the fact that Lear believed Regan and Goneril when both professed their love for him. However, neither is honest. Toward the end of the play, Lear realizes that he has been very unfair to Cordelia, and that the other two sisters have misled him. Cordelia, however, remains true to Lear, as she respects the relationship between them although he does not. Shakespeare expects family members to be true to one another and have a solid trust in each other. Lear doesn't do what Shakespeare expects: he no longer loves Cordelia after she confesses she loves him only to the extent a daughter should. All of his love is for Regan and Goneril because both of them tell their father what he wants to hear: that they love him more than anyone in the world.

Friday, July 19, 2019

Gender Roles Essay -- Female Male Compare Socialization Essays

Gender Roles   Ã‚  Ã‚  Ã‚  Ã‚  While I was growing up, gender roles were highly defined by my parents and teachers as well as all other societal influences. Boys were taught to do 'boy' things and girls were taught to do 'girly' things. The toys that children play with and the activities that are encouraged by adults demonstrate the influence of gender roles on today's youth.   Ã‚     Ã‚  Ã‚  In my formative years, the masculine traits that I learned came out because of the activities that my parents had me engage in and the things that they expected from me. The expectations that my parents held for my sister, on the other hand, varied from those that they had for me, and this was made apparent through the different activities that occupied her time. My parents treated us in completely different regard. We had different toys, different friends, and we were supposed to like different things. When I got hurt my parents would say things like 'shake it off,' or 'that didn't hurt that much,' but when my sister would cry, they would give her attention and pull her aside to take care of her. I got into a lot more trouble throughout my life than my sister and this was, in part, overlooked as the boy's mischievous nature. I played with GI Joes and He-Man action figures, while my sister played with Barbie Dolls. I remember when she and I would play together and the GI Joes would be married to the Barbie Dolls. When I made the action figures fight over the Barbie Dolls, my sister would always get ...

Thursday, July 18, 2019

The Host Chapter 5: Uncomforted

Hello there, Wanderer! Won't you take a seat and make yourself at home?† I hesitated on the threshold of the Comforter's office, one foot in and one foot out. She smiled, just a tiny movement at the corners of her mouth. It was much easier to read facial expressions now; the little muscle twitches and shifts had become familiar through months of exposure. I could see that the Comforter found my reluctance a bit amusing. At the same time, I could sense her frustration that I was still uneasy coming to her. With a quiet sigh of resignation, I walked into the small brightly colored room and took my usual seat-the puffy red one, the one farthest from where she sat. Her lips pursed. To avoid her gaze, I stared through the open windows at the clouds scuttling past the sun. The faint tang of ocean brine blew softly through the room. â€Å"So, Wanderer. It's been a while since you've come to see me.† I met her eyes guiltily. â€Å"I did leave a message about that last appointment. I had a student who requested some of my time†¦Ã¢â‚¬  â€Å"Yes, I know.† She smiled the tiny smile again. â€Å"I got your message.† She was attractive for an older woman, as humans went. She'd let her hair stay a natural gray-it was soft, tending toward white rather than silver, and she wore it long, pulled back in a loose ponytail. Her eyes were an interesting green color I'd never seen on anyone else. â€Å"I'm sorry,† I said, since she seemed to be waiting for a response. â€Å"That's all right. I understand. It's difficult for you to come here. You wish so much that it wasn't necessary. It's never been necessary for you before. This frightens you.† I stared down at the wooden floor. â€Å"Yes, Comforter.† â€Å"I know I've asked you to call me Kathy.† â€Å"Yes†¦ Kathy.† She laughed lightly. â€Å"You are not at ease with human names yet, are you, Wanderer?† â€Å"No. To be honest, it seems†¦ like a surrender.† I looked up to see her nod slowly. â€Å"Well, I can understand why you, especially, would feel that way.† I swallowed loudly when she said that, and stared again at the floor. â€Å"Let's talk about something easier for a moment,† Kathy suggested. â€Å"Do you continue to enjoy your Calling?† â€Å"I do.† This was easier. â€Å"I've begun a new semester. I wondered if it would get tiresome, repeating the same material, but so far it doesn't. Having new ears makes the stories new again.† â€Å"I hear good things about you from Curt. He says your class is among the most requested at the university.† My cheeks warmed a bit at this praise. â€Å"That's nice to hear. How is your partner?† â€Å"Curt is wonderful, thank you. Our hosts are in excellent shape for their ages. We have many years ahead of us, I think.† I was curious if she would stay on this world, if she would move to another human host when the time came, or if she would leave. But I didn't want to ask any questions that might move us into the more difficult areas of discussion. â€Å"I enjoy teaching,† I said instead. â€Å"It's somewhat related to my Calling with the See Weeds, so that makes it easier than something unfamiliar. I'm indebted to Curt for requesting me.† â€Å"They're lucky to have you.† Kathy smiled warmly. â€Å"Do you know how rare it is for a Professor of History to have experienced even two planets in the curriculum? Yet you've lived a term on almost all of them. And the Origin, to boot! There isn't a school on this planet that wouldn't love to steal you away from us. Curt plots ways to keep you busy so you have no time to consider moving.† â€Å"Honorary Professor,† I corrected her. Kathy smiled and then took a deep breath, her smile fading. â€Å"You haven't been to see me in so long, I was wondering if your problems were resolving themselves. But then it occurred to me that perhaps the reason for your absence was that they were getting worse.† I stared down at my hands and said nothing. My hands were light brown-a tan that never faded whether I spent time in the sun or not. One dark freckle marked the skin just above my left wrist. My nails were cut short. I disliked the feeling of long nails. They were unpleasant when they brushed the skin wrong. And my fingers were so long and thin-the added length of fingernails made them look strange. Even for a human. She cleared her throat after a minute. â€Å"I'm guessing my intuition was right.† â€Å"Kathy.† I said her name slowly. Stalling. â€Å"Why did you keep your human name? Did it make you feel†¦ more at one? With your host, I mean?† I would have liked to know about Curt's choice as well, but it was such a personal question. It would have been wrong to ask anyone besides Curt for the answer, even his partner. I worried that I'd already been too impolite, but she laughed. â€Å"Heavens, no, Wanderer. Haven't I told you this? Hmm. Maybe not, since it's not my job to talk, but to listen. Most of the souls I speak with don't need as much encouragement as you do. Did you know I came to Earth in one of the very first placements, before the humans had any idea we were here? I had human neighbors on both sides. Curt and I had to pretend to be our hosts for several years. Even after we'd settled the immediate area, you never knew when a human might be near. So Kathy just became who I was. Besides, the translation of my former name was fourteen words long and did not shorten prettily.† She grinned. The sunlight slanting through the window caught her eyes and sent their silver green reflection dancing on the wall. For a moment, the emerald irises glowed iridescent. I'd had no idea that this soft, cozy woman had been a part of the front line. It took me a minute to process that. I stared at her, surprised and suddenly more respectful. I'd never taken Comforters very seriously-never had a need before now. They were for those who struggled, for the weak, and it shamed me to be here. Knowing Kathy's history made me feel slightly less awkward with her. She understood strength. â€Å"Did it bother you?† I asked. â€Å"Pretending to be one of them?† â€Å"No, not really. You see, this host was a lot to get used to-there was so much that was new. Sensory overload. Following the set pattern was quite as much as I could handle at first.† â€Å"And Curt†¦ You chose to stay with your host's spouse? After it was over?† This question was more pointed, and Kathy grasped that at once. She shifted in her seat, pulling her legs up and folding them under her. She gazed thoughtfully at a spot just over my head as she answered. â€Å"Yes, I chose Curt-and he chose me. At first, of course, it was random chance, an assignment. We bonded, naturally, from spending so much time together, sharing the danger of our mission. As the university's president, Curt had many contacts, you see. Our house was an insertion facility. We would entertain often. Humans would come through our door and our kind would leave. It all had to be very quick and quiet-you know the violence these hosts are prone to. We lived every day with the knowledge that we could meet a final end at any moment. There was constant excitement and frequent fear. â€Å"All very good reasons why Curt and I might have formed an attachment and decided to stay together when secrecy was no longer necessary. And I could lie to you, assuage your fears, by telling you that these were the reasons. But†¦Ã¢â‚¬  She shook her head and then seemed to settle deeper into her chair, her eyes boring into me. â€Å"In so many millennia, the humans never did figure love out. How much is physical, how much in the mind? How much accident and how much fate? Why did perfect matches crumble and impossible couples thrive? I don't know the answers any better than they did. Love simply is where it is. My host loved Curt's host, and that love did not die when the ownership of the minds changed.† She watched me carefully, reacting with a slight frown when I slumped in my seat. â€Å"Melanie still grieves for Jared,† she stated. I felt my head nod without willing the action. â€Å"You grieve for him.† I closed my eyes. â€Å"The dreams continue?† â€Å"Every night,† I mumbled. â€Å"Tell me about them.† Her voice was soft, persuasive. â€Å"I don't like to think about them.† â€Å"I know. Try. It might help.† â€Å"How? How will it help to tell you that I see his face every time I close my eyes? That I wake up and cry when he's not there? That the memories are so strong I can't separate hers from mine anymore?† I stopped abruptly, clenching my teeth. Kathy pulled a white handkerchief from her pocket and offered it to me. When I didn't move, she got up, walked over to me, and dropped it in my lap. She sat on the arm of my chair and waited. I held on stubbornly for half a minute. Then I snatched the little square of fabric angrily and wiped my eyes. â€Å"I hate this.† â€Å"Everybody cries their first year. These emotions are so impossible. We're all children for a bit, whether we intended that or not. I used to tear up every time I saw a pretty sunset. The taste of peanut butter would sometimes do that, too.† She patted the top of my head, then trailed her fingers gently through the lock of hair I always kept tucked behind my ear. â€Å"Such pretty, shiny hair,† she noted. â€Å"Every time I see you it's shorter. Why do you keep it that way?† Already in tears, I didn't feel like I had much dignity to defend. Why claim that it was easier to care for, as I usually did? After all, I'd come here to confess and get help-I might as well get on with it. â€Å"It bothers her. She likes it long.† She didn't gasp, as I half expected she would. Kathy was good at her job. Her response was only a second late and only slightly incoherent. â€Å"You†¦ She†¦ she's still that†¦ present?† The appalling truth tumbled from my lips. â€Å"When she wants to be. Our history bores her. She's more dormant while I'm working. But she's there, all right. Sometimes I feel like she's as present as I am.† My voice was only a whisper by the time I was done. â€Å"Wanderer!† Kathy exclaimed, horrified. â€Å"Why didn't you tell me it was that bad? How long has it been this way?† â€Å"It's getting worse. Instead of fading, she seems to be growing stronger. It's not as bad as the Healer's case yet-we spoke of Kevin, do you remember? She hasn't taken control. She won't. I won't let that happen!† The pitch of my voice climbed. â€Å"Of course it won't happen,† she assured me. â€Å"Of course not. But if you're this†¦ unhappy, you should have told me earlier. We need to get you to a Healer.† It took me a moment, emotionally distracted as I was, to understand. â€Å"A Healer? You want me to skip?† â€Å"No one would think badly of that choice, Wanderer. It's understood, if a host is defective -â€Å" â€Å"Defective? She's not defective. I am. I'm too weak for this world!† My head fell into my hands as the humiliation washed through me. Fresh tears welled in my eyes. Kathy's arm settled around my shoulders. I was struggling so hard to control my wild emotions that I didn't pull away, though it felt too intimate. It bothered Melanie, too. She didn't like being hugged by an alien. Of course Melanie was very much present in this moment, and unbearably smug as I finally admitted to her power. She was gleeful. It was always harder to control her when I was distracted by emotion like this. I tried to calm myself so that I would be able to put her in her place. You are in my place. Her thought was faint but intelligible. How much worse it was getting; she was strong enough to speak to me now whenever she wished. It was as bad as that first minute of consciousness. Go away. It's my place now. Never. â€Å"Wanderer, dear, no. You are not weak, and we both know that.† â€Å"Hmph.† â€Å"Listen to me. You are strong. Surprisingly strong. Our kind are always so much the same, but you exceed the norm. You're so brave it astonishes me. Your past lives are a testament to that.† My past lives maybe, but this life? Where was my strength now? â€Å"But humans are more individualized than we are,† Kathy went on. â€Å"There's quite a range, and some of them are much stronger than others. I truly believe that if anyone else had been put into this host, Melanie would have crushed them in days. Maybe it's an accident, maybe it's fate, but it appears to me that the strongest of our kind is being hosted by the strongest of theirs.† â€Å"Doesn't say much for our kind, does it?† She heard the implication behind my words. â€Å"She's not winning, Wanderer. You are this lovely person beside me. She's just a shadow in the corner of your mind.† â€Å"She speaks to me, Kathy. She still thinks her own thoughts. She still keeps her secrets.† â€Å"But she doesn't speak for you, does she? I doubt I would be able to say as much in your place.† I didn't respond. I was feeling too miserable. â€Å"I think you should consider reimplantation.† â€Å"Kathy, you just said that she would crush a different soul. I don't know if I believe that-you're probably just trying to do your job and comfort me. But if she is so strong, it wouldn't be fair to hand her off to someone else because I can't subdue her. Who would you choose to take her on?† â€Å"I didn't say that to comfort you, dear.† â€Å"Then what -â€Å" â€Å"I don't think this host would be considered for reuse.† â€Å"Oh!† A shiver of horror jolted down my spine. And I wasn't the only one who was staggered by the idea. I was immediately repulsed. I was no quitter. Through the long revolutions around the suns of my last planet-the world of the See Weeds, as they were known here-I had waited. Though the permanence of being rooted began to wear long before I'd thought it would, though the lives of the See Weeds would measure in centuries on this planet, I had not skipped out on the life term of my host. To do so was wasteful, wrong, ungrateful. It mocked the very essence of who we were as souls. We made our worlds better places; that was absolutely essential or we did not deserve them. But we were not wasteful. We did make whatever we took better, more peaceful and beautiful. And the humans were brutish and ungovernable. They had killed one another so frequently that murder had been an accepted part of life. The various tortures they'd devised over the few millennia they'd lasted had been too much for me; I hadn't been able to bear even the dry official overviews. Wars had raged over the face of nearly every continent. Sanctioned murder, ordered and viciously effective. Those who lived in peaceful nations had looked the other way as members of their own species starved on their doorstep. There was no equality to the distribution of the planet's bounteous resources. Most vile yet, their offspring-the next generation, which my kind nearly worshipped for their promise-had all too often been victims of heinous crimes. And not just at the hands of strangers, but at the hands of the caretakers they were entrusted to. Even the huge sphere of the planet had been put into j eopardy through their careless and greedy mistakes. No one could compare what had been and what was now and not admit that Earth was a better place thanks to us. You murder an entire species and then pat yourselves on the back. My hands balled up into fists. I could have you disposed of, I reminded her. Go ahead. Make my murder official. I was bluffing, but so was Melanie. Oh, she thought she wanted to die. She'd thrown herself into the elevator shaft, after all. But that was in a moment of panic and defeat. To consider it calmly from a comfortable chair was something else altogether. I could feel the adrenaline-adrenaline called into being by her fear-shoot through my limbs as I contemplated switching to a more pliant body. It would be nice to be alone again. To have my mind to myself. This world was very pleasant in so many novel ways, and it would be wonderful to be able to appreciate it without the distractions of an angry, displaced nonentity who should have had better sense than to linger unwanted this way. Melanie squirmed, figuratively, in the recesses of my head as I tried to consider it rationally. Maybe I should give up†¦ The words themselves made me flinch. I, Wanderer, give up? Quit? Admit failure and try again with a weak, spineless host who wouldn't give me any trouble? I shook my head. I could barely stand to think of it. And†¦ this was my body. I was used to the feel of it. I liked the way the muscles moved over the bones, the bend of the joints and the pull of the tendons. I knew the reflection in the mirror. The sun-browned skin, the high, sharp bones of my face, the short silk cap of mahogany hair, the muddy green brown hazel of my eyes-this was me. I wanted myself. I wouldn't let what was mine be destroyed.

Anime Business Plan

Exam 2 1. How a clearly defined mint helps a assembly line A. Vision produces direction companies who maculation out the vision for their family coun exchangeing every cardinals attention on the in store(p carmineicate) and detail the path a line line will take B. Vision determines ratiocination C. Vision motivates people- a clear vision excites and ignites people to action D. Vision allows for tenaciousness in the face of adversity. 2. Define strength, weakness, opportunity, and threats a.Strength- ar positive internal factors that inhabit a companys readiness to accomplish its missions goals and objects b. Weakness- ar negative internal factors that curb a companys ability to accomplish its missions goals and objectives c. Opportunitys- positive foreign forces that a firm can exercise to accomplish its missions goals and objectives. d. Threats- atomic number 18 negative outside factors that inhibit a companys ability to achieve its goals and objectives. 3. trip le types of contender Direct, prodigious competitors, and indirect competitors.Direct Competitors offer the corresponding products and work Customers often compare prices Deals among these competitors when they shop. Significant Competitors offer some of the aforementi unrivaledd(prenominal) operate or similar products or renovations Product or service lines crossing but non executely. Indirect offers same or similar products only in as bitty keep down of areas. 4. third types of strategies- a. Cost leadership- Strives to be the low be provider relative to its competition in the industry b.Differentiation- A Company seeks to get client loyalty by aligning its goods or services in a unique or different way. c. counselling (niche) a strategy in which a company selects one or more than market segments, identitys customer special needs wants & interests & offers them with excellent service designed to meet their needs. 5. Define complete advantage- the aggregation of factors that sets a small origin apart from its comptetiors and gives it a unique prospect in the market segments to its competition. 6. Purpose of easibility analysis- a process to determine whether or not an belief can be alter into a valid disdain. 7. Elements in 5 forces model- * Rivalry among competitors in the market(strongest force) Barraging power of suppliers to the industry, negotiate power of buyers, threat of advanced entrants to the industry, threats of replenishment products or services. 8. Definition of concern prototyping- a process in which enterprisers test their pedigree models on a small eggshell before committing serious resources to launch a business that might not work. . Three aspects considered in fiscal feasibility analysis- * primordial research- in normalation that the entrepreneur collects first cash in ones chips and analyses * Secondary research- information that has already been compiled and is analyze for wasting disease often at a very reasonable cost or sometimes even free. * Focus groups- a market research technique that involves sign up a small number of effectiveness customers (usually 8-120) to give an entrepurerure fed back on proper(postnominal) issues about a likely product or service.Or special idea its self. 10. Two functions of a business plan- * Guides an entrepreneur by charting the companys future course of action and invent a strategy for success. * Provides a onslaught of tools Mission asseveratements, goals, objectives, market analyses, budgets, financial forecasts, gull markets, strategys to help entrepreneur lead the company. 11. Most common form of business ownership- Sole proprietorship. 12. Advantages/Disadvantages of sole proprietorship Advantages Simple to create, least costly to being, government issue incentive, total decision making authority, No special legal restrictions, easy to expose Disadvantages * Un trammel personal responsibility, especial(a) skills & capabili ties, feelings of isolation, limited access to capital, lack of continuity in business. 13. Types of Corporations * Domestic- a throne that does business in the state it was founded in. * Foreign a company doing business in a state other that where it was founded. Alien a corporation found in another sylvan but doing business in the U. S * dummy uply held a corporation whose shares are controlled by a relatively small number of people Family elatives friends Employees. * Publicly Held A corporation who has a large number of linage holders usually traded on the stock exchange. 14. Advantagesdisadvantages of corporations- Advantages Limited liability of stock holders, ablitlty to commit capital , ability to continue indefinitely, movable ownership.Disadvantages Cost and time involved in the incorporation process, double tax, and dominance for bony four-in-handial incentive, legal requirements and regulatory red tape, potential loss of control by fo to a lower business offices. 15. Types of partnerships General alliance Partners who share in owning a business and who have unlimited personal liability for partners dept. Limited Partnership Partners, who make financial investments and partnership, do not take on an active social occasion in managing a business, and whose liability is limited to amount invested. 16.Define Franchising A system of diffusion in which semi-independent business owners pay fees and royalties to a parent company in return for the right to become identified with its trademark, to sell its products or services and often to use its business format and system. 17. Benefits of Franchise A business system that is proven , manager training and support, shop name appeal, exchangeable quality of gods and services, national advertising program, financial assistance, proven produces and business formats, combined purchasing power site selection and grease protecting, greater chance of success. 8. Three types of immunity * Trade name involves a brand name without distributing particular products exclusively to a lower place the franchiser name * Product Distribution Involves a franchises licensing a franchisee to sell specific products under the franchisors brand name and trademark though a selective limited dispersal network. * Pure involves providing the franchisee with a complete business format. 19.Definition of piggy back franchise- a system of franchising in which two or more franchises team up to sell eulogistic products or services under one roof. 20. Multiple unit Franchising a method in which a franchiser opens more than one unit in a bighearted territory with in a specific time period. 21. Franchise Disclosure inventory (FDD) a document that every franchisor is require by law to give potential franchisees before any offer or sale of a franchise outlines 23 important pieces of information. 2. Advantages /Disadvantages of buying an existing business * Advantages a successful business whitethorn continue to be successful a successful business may already have the outdo location employees and suppliers are already established, equipment is already installed and productive expertness is known inventory is in place and tide credit is established new business owners hit the ground running. Disadvantages Its a looser the previous owner may have created ill will Employees communicable with the business may not be sustainable the locating is unstable equipment and forwardnesss may be out of date change and innovation may be hard to implement inventory may be out of date or obsolete account receivables may be less that face value business may be overpriced. 23. Steps to getting a business the right way. a. psychoanalyst your skills and abilitys b. Prepare a list of potential medical prognosiss c. Investigate and respect candidate business to find the best one d. Explore financing options . fit smooth transition by discourse with employs. 24. Acquir ing procedures * Identify and approach candidate * Sign the nondisclosure statement * Sign letter of intent * Buyers due diligence investigation * Draft the purchase agreement * Close the final deal * Begin the transition 25. 5 Ps of negotiation * education examine the needs of both parties * balance Remain calm during the negotiation. * Patience dupet be in much(prenominal) a hurry * Persuasiveness- know what around important positions are articulate them. * labor dont give in a first sign of vindication to your position.

Wednesday, July 17, 2019

A Lesson before Dying: What Makes an Educated Man? Essay

A Lesson before Dying is a unfor observetable novel, set in Bayone, Louisiana in the 1940s, about an uneducated, illiterate b lose hu earthity, Jefferson, who is wrongly accused of murder and sentenced to death. dapple on trial, his defense attorney likened him to a hog, duty him nonhing more than a disperse and a cornered animal. Jeffersons godm early(a) wants him to fail a man before he founders. She persuades two men, portion out Wiggins and rarefied Ambrose, to see with Jefferson and teach him what it nub to be a man.While both men intrust the same outcome, they disagree about what it means to be an educated man. subsidisation be delusionves that his college horizontal surface gives him all the deallight-emitting diodege he needs. However, empyrean Ambrose believes that being educated goes deeper that reading, writing, and arithmetic. Grant Wiggins, the son of plantation workers, degenerates to his hometown after attending college with an stance that his prep aration somehow sets him apart the other black men living in his community of interests. He becomes a plantation teacher, complementary the cycle of returning to his roots.While he is outraged with how other blacks are treated, he does not use his training to servicing the cause. Instead, he becomes angry and bitter. He does not believe he can support Jefferson and he does not want to get involved What do I set up to him? Do I know what a man is? Do I know how a man is supposed to die? Im still act to find out how a man should live. Am I supposed to prescribe someone how to die who has never lived? (Gaines 31) sacred Ambrose is a black advocateer, determined to preach the gospel and lead bulk to redemption and an afterlife with Christ. elevated Ambrose wants the blacks in his community to live peacefully with the whites and to rise up from the ashes of sla rattling. He is kind and compassionate and lives a humble life. While he is not educated like Grant, he is very wise to the realities of life. He believes that his knowledge of people makes him more educated than Grant. rarefied Ambrose believes that Grant looks down on him, because he is uneducated. He is determined to put Grant in his place by gestateing him son and telling him what he thinks of him, When you act educated, Ill call you Grant.Ill even call you Mr. Grant, when you act like a man. (Gaines 216) reverend Ambrose is angry that Grant does not truly see what Tante Lou has done for him. He is queer that with all of Grants education he still does not interpret his people Cause reading, writing, and rithmetic is not enough. You think thats all they sent you to discipline for? They sent you to school to ameliorate pang, to relieve hurtand if you have to lie to do it, then you lie. You lie and you lie and you lieYou tell them that cause they have pain too, and you dont want to increase yoursand you lie. (Gaines 218) empyrean Ambrose understands why Tante Lou made sacrifices to get away Grant to college. She wanted Grant to return home and make a dissimilitude for his people. It makes Reverend Ambrose angry that someone as educated as Grant cannot really see how people really feel. Reverend Ambrose believes that it is better to lie in straddle to prevent others from hurting. He wants Grant to see to it Jefferson of the existence of Heaven.He wanted Grant to lie and say he believed in God and Heaven I wint let you sent that boys soul to hell. He did not want Grant to acknowledge to Jefferson his lack of faith in God. He wants a dying man to have the forecast of an afterlife that was better than his life here. Reverend Ambrose could not understand how an educated man would take away the hope of a man that set to be executed. While it would be easy to argue that Reverend Ambrose not as educated as Grant, one cannot overlook the fact that his laic knowledge goes far deeper than Grants.He understands the depths of peoples souls, and knows how to comfort and led them to knowledge and truth. Grant, on the other hand, is primitive about others feelings. His education lacks real life knowledge, as salubrious as the ability to interact with people. Reverend Ambrose sees where Grant is lacking and believes that until he opens his look and heart to those around him, he pass on never truly be educated. whole caboodle Cited Gaines, Ernest J. A Lesson before Dying. New York jump Vintage Contemporaries, 1994. Print.