Saturday, December 28, 2019

Essay on Writing Self-Evaluation - 947 Words

I believe it is important for any student who wants to do their best in a class to take a moment to evaluate their own work to determine the rate their writing is progressing and how they can continue to advance their writing. When I looked through my own work I asked myself â€Å"what have I learned this semester?† and â€Å"what do I still need to learn in order to improve my writing?†. Answering both these questions will help me with my last step of my self-evaluation, developing a plan to learn new skills. During this semester, I have strengthened my writing by trying new writing techniques, learning about purpose, and finding new ways of combating writers block. My first essay in this class was less focused then the essays I wrote later in†¦show more content†¦I have struggled with writers block with often. In the past, Ive learned to take breaks while writing to help alleviate symptoms of writers block; however, during the semester I have learned to carry a pad of paper with me so that I can write down ideas while they are fresh in my mind. Writing down my thoughts has helped me avoid writers block because I have a list of thoughts about the subject before I have even started writing. When I struggle less to write it improves my essays by decreasing my stress, this can be seen in my writing. I was afflicted with writers block while trying to write both my compare and contrast essay and my description essay, this caused me a lot of stress and caused my essay to suffer. On the other hand, when I wrote my classify and divide essay I did not have to deal with writers block. As a result the stress level was greatly decreased and the improvement is substantial. Although my writing has made some good progress during the course of this semester, I still some things I need to learn in order to keep improving my writing. Grammar, writing in an active voice, and building my rewrite skills are three examples of skills I need to build upon to continue to improve me writing. Even though my grammar has improved during the progression of this class, I still have a lot to learn before my knowledge of grammar can contribute to my writing. I have never had an aptitude forShow MoreRelatedWriting Self-Evaluation Essays562 Words   |  3 Pagesgrammar lessons taught in my English Honors class. I also feel that my vocabulary has developed extensively throughout the course, as well as my structural and organizational skills in my writing pieces. While I have radically improved as a writer throughout the course, there are still particular areas of my writing that I feel still need improvement, such as in-depth sentence level revision and phrasing. I believe that I improved on those aspects throughout the course and that Leslie helped me onRead MoreHow I Grew in My Academic Writing1055 Words   |  5 PagesI did not have a firm writing philosophy before this semester, but I to some degree I understood the importance writing can have on a situation. Now I understand that writing has two outcomes: gaining support or losing support. When writing an essay it is best if the writing is as specific as possible. This way the audience is hopefully not left with a confused opinion about the topic. Since the beginning of the semester I have put a conscious effort to change my writing style. Instead of the boxRead MoreAssessing and Evaluating Our Students1386 Words   |  6 Pages1. Assessment and Evaluation 1.1. Monitoring the learning progress Nunan Lamb (1996) refer to monitoring as an integral part of the learning system which is comprised of assessment of student performance and evaluation of the effectiveness of the course design. According to Dudley-Evans St. John (1998), â€Å"Evaluation is a process which begins with determining what information to gather and which ends with bringing about changes in current activities or future ones. It makes use of quantitativeRead MoreReflection On Simkin Et Al899 Words   |  4 Pagesgraduating university students in America greatly lack the necessary writing skills to flourish in the workplace. In their 2012 paper â€Å"Student perceptions of their writing skills,† Simkin et al. outlined a variety of possible explanations for these troubling findings. They, however, chose to explore two of the many possible reasons for this rising writing problem: university students may be unaware of the importance of writing skills in the workplace or may possess the misconception that they areRead MoreThe New Parent Corporation Is A Multi National Multi Billion Dollar Leader960 Words   |  4 Pagesleagues. The new parent corporation is a multi-national multi-billion dollar leader in our markets. During the transition there were a lot of changes, including a new manager, a broader business focus and the introduction of the â€Å"dreaded† annual self evaluation. I wanted to impress, so using my literacy skills I wrote a meticulous and ingratiating appraisal of myself knowing it was not only important for a good pay increase, but would set the tone for the burgeoning relationship with my new boss asRead MoreThe Importance Of Writing A Business s Health891 Words   |  4 PagesWriting plays a significant role in many disciplines in the workforce. Some believe that in accounting, writing does not take place at all. This is far from the truth. In fact, when it comes to accounting, writing is very important. It is the inspector in a business’s he alth. It is used to tell people the status of a business, address the problems, and provide answers. In this essay, we will try to convey the important role writing takes in accounting. We will show its purpose, its content, and theRead MoreProgram Assignment835 Words   |  4 Pagesactivities to the clients. The program constructs their curriculum based on the MELT curriculum (Mainstream English Language Training). The curriculum is integrated to cover all aspect of reading and writing skills. Including important words used for phrases during emergencies, consumer economics, reading and writing, social languages, identifying basic community services, and personal identification. The assessment showed that program activities are not rigid but flexible. Although the program has a policyRead MoreStudy Guide1489 Words   |  6 Pages.......................................................................4 Course Outline ...........................................................................................................................................................5 Evaluation and Grading .............................................................................................................................................9 Study Guide .............................................................................Read MoreReflective Essay767 Words   |  4 PagesShadi Farid A reflective essay is essentially an essay designed to emulate past experiences or occurrences in writing form. Most reflective essays are to show the reader changes and evolutions of yourself or certain aspects about yourself, so there is a constant change of tenses during the essay between past and present. During this essay I will be describing the most important parts of writing a reflective essay and all the key elements that should be included. Like any essay you would write, reflectiveRead MoreGuidelines For An Effective Teaching And Learning Tool For Instruction And Students1132 Words   |  5 Pagesperformance are the two main elements in a rubric.† Criteria should be about proposed learning outcomes, without using details of the assignment alone. Rubrics can be an effective teaching and learning tool for instruction, students, peer-assessment, and self-assessment if created and utilized efficiently (Brookhart, 2013). Rubrics for Instruction and Students Brookhart (2013) emphasizes that rubrics help teachers teach and students learn. When expectations are clearly laid out by the instructor in

Thursday, December 19, 2019

Essay on Nr 304 Health History and Physical Examination Rua

Health History and Physical Examination RUA Chamberlain College of Nursing November 2014 In this Assessment nursing course, one of the major things that is taught is the most important part of giving proper care to a patient. Correct patient assessment is needed before any nursing care plan or treatment can be implemented. This post-review of a person’s assessment will demonstrate the proper way to go about assessing a person’s health. Health History and Physical Examination Health History Under my care for the assessment was Felix Tshimanga, a 50-year old man who has been working in the hospital environment since his 20s. After living in New York for a little less than 10 years, he’s lived in Georgia for 10 years. The reason for†¦show more content†¦Pulse rate is at 72. The blood pressure was 140 / 95,which is suggestive of high blood pressure and related to his medical history. No heart murmur was noted, and no other abnormalities were noted. His gastrointestinal, musculoskeletal, and integumentary system were unremarkable. Health Education This section includes some recommendations, including but not limited to: * Healthy diet (balanced diet) by avoiding too much salt in food as salt tends to increase blood pressure. Avoid too much carbohydrates and starch to allow the body to breakdown excess fat in the body. Too much of bad cholesterol can be deposited in blood vessels, thus worsening the patient blood pressure (Baric, 1997). * Adopt some healthy habit such as avoid smoking as it has some effect on both cardiovascular and respiratory system. (Luepker, Johnson, Murray, and Pechacek,(1983). * Physical exercise was recommended as well. Previous research has proven that physical exercise and good diet can efficiently control the patient blood pressure. Patient education: The importance of dieting and exercise is crucial, especially in the modern age we are living in. Staying healthy in America is becoming a serious challenge to most people; cutting down on some fat and going for a weekly physical activities to the gym could make a substantial difference in one’s life. Dieting is so important, considering the amount of carbs and calories the average American consumes each day.

Wednesday, December 11, 2019

Problematizing Write Up

Question: Describe about the Problematizing Write Up. Answer: In the current business sector the transparent policies in respect of risk management is the most important concern. The corporate governance practices is highly crucial for the identifying various factors in respect of managing the risks. The most crucial threat in respect of management of the business activities is the people risk. In respect of executing the most effective risk management policies the business continuity management policies has been considered the most appropriate strategies in terms of handling risk and crisis. However, there are several crucial issues which have turned the business continuity management into the current problematised topic. The major issue which has been sighted in this paper was the lack of cooperation from the management transference. Another issue is that the general managers are generally noted to be responsible for the execution of business continuity management project. It has been identified that cross functional steering committee consisted of various stakeholders are most effective for resolving the issues. The literature review has been most useful in order to support my point of view as well. It has identified several strategies which have been pointed as the most important part of resolving the identified issue of the problematised topic. The awareness campaign of business continuity management with the constitution of the key stakeholders is the most crucial way to identify the demand of the customers as well as compliance of the regulation in respect of business activities. In addition to that, the literature review has been able to indicate that aligning the technological facilities will be highly effective for projecting the results in solution gaps issues in respect of false expectations as well as performance. The most potential resolution has been reflected to be the planning along with collaboration of business and IT in the systematic way. The literature review has effectively indicated that the suggested resolution has been evolve at the time of practice in the business approach. There are several challenges which has been surfaced at the time of implementation of the business continuity management. One of the most crucial challenges is lack of consensus in respect of managerial operations. It has been identified in the review that senior management is most effective part of execution of any kind of business approach. It has been also disclosed in the review that the current organizations are highly focused on analyzing the realities at most basic ground. It has been also revealed that the financial implications greatly influence the above mentioned managerial decisions. The management system has been fractioned in two distinct parts at the time of execution. These parts are conduction of the organizations senior management system as well as companys operational management system. The business management system is mostly focused on following the inconsistent branches as well as offices which are located in different countries. In addition to that, the literature review significantly identified that the efficiency of wide range of international BCM standards. In addition to that, the contemporary evolution of the business management has been highly depended on the technical prospects. The major purpose of this modified business continuity management has been ensuring the increase of awareness of the risk identification as well as implementing various measures for mitigating the risks. In order to understand the problem of implementation of business continuity management in respect of risk management I will at first focus on several major principles which will be substantial in case of performing the action learning. These principles are applying scientific methods which will enhance the quality of the outcome. In addition to that, I will depend on the pursuit of the decisions which are rational irrespective of the guess working at the time of executing the action learning. The sound advice along with fair criticism will eventually play a major factor for the proper execution of the current action learning activity. The free and open mentality will be also prime focus of the entire activity which will enhance the chances of adopting new ideas and understanding. In addition to that, the implementation of business continuity management in respect of risk management will need the focus on the challenges as well as theoretical scaffolding in respect of the issues regarding the execution of the business continuity management. It will help me to accumulate the limitation I can take proper steps for conducting the action learning with a proper efficiency. Mostly I will focus on BCM tools which are effective for the resolving the workflows parameters while the documentation is developed in the workplace. This way I can avoid the rework while conducting the implementation of business continuity management. In addition to that, at the time of implementing the business continuity management I will focus on identifying the measures of the disaster in the current location. This way, I can avoid the overstating the importance of the functioning which in turn enhance my efficiency. The business plans has a significant tendency to be focused on the unstated assumptions that disaster will impact only the respective organization. However, in reality there are a numbers of organizations which are located in the same geographical region are impacted by the disaster. In order to properly execute the business management plan in the current corporate world the organizations are in dire need of a business continuity planner in the risk management context. Therefore, it is evident that the identification of the major aspects along with its implementation processes is the most effective for resolving the problems. The various aspects of business continuity management will be more influential for providing the clear understanding in respect of working of the business continuity management as well as its effectiveness in the contemporary market. Therefore, I will now move forward towards finding out the various factors of business continuity management so as I can understan d the major process of resolving the problem by using the respective management style. Henceforth, my final CAL report will contain extensive amount of research as well as assessment report on various different factors of business continuity management in order to find out the effectiveness of these factors in case of resolving various problems. Bibliography: Cheung, C.S. and Yoon, D.K., 2015. Comparative Analysis of Certification in between Performance of Disaster Safety Technology and Business Continuity Management System (BCMS).Journal of Korean Society of Hazard Mitigation,15(5), pp.67-77. Maier, D., Olaru, M., Floricel, T. and Marin, G., 2014, November. Innovative Integrated Management Systems for The Business Continuity Management. InEuropean Conference on Management, Leadership Governance(p. 482). Academic Conferences International Limited. Mansol, N.H., Alwi, M., Hayaati, N. and Ismail, W., 2015, August. Managing organizational culture requirement for Business Continuity Management (BCM) implementation Using Goal-Question-Metric (GQM) approach. InOpen Systems (ICOS), 2015 IEEE Confernece on(pp. 85-90). IEEE. Torabi, S.A., Soufi, H.R. and Sahebjamnia, N., 2014. A new framework for business impact analysis in business continuity management (with a c

Wednesday, December 4, 2019

Analysis of The Lottery Research Paper Example

Analysis of The Lottery Paper When someone gets in trouble unfairly, people could protest against unfairness or could obey the unfairness. The Lottery, is a short story written by Shirley Jackson in 1948, shows dark sides hidden in peoples minds. This story was influenced after the World War II, so peoples brutality from the war is reflected to this story. In this story, there is an annual lottery that the result of winning is stoned. Jackson uses symbolism to imply that blind obedience to radiation can be dangerous and peoples inconsolableness. At first, names of each character have specific meanings. Jackson uses symbolic names to connote a forthcoming event after the lottery. For examples, the name, Mr.. Summers (1238), is associated with warmth, blooming, blossoming, youth and sunlight, so the author uses this name ironically. Also, it implies the lottery is held in summer season. The next symbol is Mr.. Graves (1238) who is an assistant of Mr.. Summers. A grave means a place of burial for a dead body. Therefore, readers can infer that a tragedy will come at the end. Also, by showing two opposite names, oppositeness and negatives always exist together. Secondly, a black box which keeps slips of papers exists. The black box is a symbol of tradition of the town. The box is described as The original paraphernalia for the lottery had been lost long ago (1238). It shows even though the original box had been lost, the old tradition has never changed and questioned. Also, she states, Mr.. We will write a custom essay sample on Analysis of The Lottery specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Analysis of The Lottery specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Analysis of The Lottery specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Summers spoke frequently to the villagers about making a new box, but no one liked to upset even as much tradition as was represented by the black box (1238). Based on this ascription, she shows people in the town do not want to change their old tradition and want to settle for the present without any wiliness even though they have a chance to be changed. Actually, the slips of papers substituted for the chips of wood that had been used for generations. It seems that people tried to change their old customs; however, it is for their convenience, not for revolution. In addition to, the black color symbolize death or evil, so Jackson implies that a result from the black box is punishment. Also, she uses black color to show peoples fear to the lottery impliedly. The next symbol is the stones that kill Mrs.. Hutchinson. At first, Jackson describes the situation of the day: Bobby Martin had already stuffed his pockets full of stones, and the other boys soon followed his example (1238). Jackson uses innocent children as people who accumulate stones. In this scene, she describes the deadly lottery game as a simple play by using pure objects. Also, she depicts the stone with innocuous words: the smoothest and roundest stones (1238) which is contrary to the tragedy end. By doing so, people feel they get rid of their guilty because, at least, they use items cooking not bad on the exterior. However, at the last scene, the stones are used as punishment tools by people who do not pick up a winning slip. It shows peoples selfishness because the citizens throw the stones only for their future which means harvest. The last and the central symbol is the lottery itself. Actually, winning in a lottery game is related to being lucky. However, In The Lottery, it means death and sacrifice. Jackson implies peoples madness from the lottery. For example, she states Lottery in June, corn be heavy soon. (1241 ). They believe hat killing a person by stones bring them a rich year. Therefore, they attempt to rationalize their barbaric and heartless tradition. Also, this story shows peoples obedience to power and conventionality when Mr.. Hutchinson picked up the winning slip. Mr.. Hutchinson says Shut up Testis (1241) to his wife who is Mrs.. Hutchinson and at the last scene, when his wife was decided to get stoned, Jackson depicts his attitude to his wife: Bill Hutchinson went over to his wife and forced to the slip of paper out Of her hand (1243) . Even though Testis Hutchinson is his wife, Bill treats Testis cruelly. It also shows peoples selfishness. After starting throwing stones, Testis tries to run away, but she is caught by people soon. The tradition will be lasting after this year lottery. At the last scene Testis shouts out: It isnt fair, it isnt right (1243), and it implies the tradition is unfair and it should be changed, yet people do not think of changing their old customs. In conclusion, the use of symbolism in The Lottery is very clearly. The author implicates symbols in the story in a society at that time. In my opinion, Shirley Jackson wants to indicate our society in her story. This story strongly shows collectivity, selfishness and madness of people. The tradition represented as the lottery is shown not to be changed and unquestioned by peoples obedience. Additionally, this story shows that dill makes a joke to his wife and then kills her in a short time it shows how cruel people are. Overall, the author uses symbols indirectly, but also very obvious to imply peoples madness and selfishness.

Wednesday, November 27, 2019

The Holocaust A German Historian Examines the Genocide

Table of Contents The author and the purpose of the book Historical context The target audience The significance of the book What readers can learn Recommendations for reading Reference List The author and the purpose of the book The Holocaust: A German Historian Examines the Genocide deals with one of the most debatable issues of the history of the twentieth century, i.e. Holocaust. In this book Benz depicts facts telling the â€Å"story with exactness and absolute candor† (ix). The uniqueness of the book is that it is one of the first books on â€Å"Jewish issue† written by a German scholar. Advertising We will write a custom report sample on The Holocaust: A German Historian Examines the Genocide specifically for you for only $16.05 $11/page Learn More Thus, there is no biased perception of the historical facts, since â€Å"Benz seeks only to provide the basic and incontrovertible facts† (ix). Of course, Benz pertains to the n ation which was involved in this conflict of humaneness and common sense. Nevertheless, being German Benz has an opportunity to make a deeper analysis of those distant events. He does not try to acquit Nazis or hush up some of their horrors. The book provides many facts which took place and had an impact on the history of two nations (Germans and Jewish people) and the whole world. Historical context Benz wrote his book more than 50 years after the events took place. This can be good evidence that the book uses only reliable and unbiased data. The book concisely reveals all the events which led to the â€Å"unique crime in the history of mankind† (p.152). For instance, Benz starts with depicting Wannsee Conference when Nazis revealed the first plans and inclinations concerning the â€Å"Jewish problem†. After this Benz considers the beginning of discrimination of the Jews which grew into anti-Semitism, massacre and genocide. Interestingly, the book tackles various is sues which others did not highlight. For instance, Benz dwells upon emigration of Jews. Admittedly, many people think that the most appropriate solution for Jews living in Germany in 1930-40s was to leave the country. Moreover, many people (especially youth) suppose that there could be no genocide if the Jews simply abandoned their homeland. Nevertheless, Benz gives quite substantial explanation why Jewish people had to stay in Germany and other countries in constant danger and fear. Benz mentions major factors which prevented Jews from emigration, one of which is as follows: â€Å"the confiscation of assets and the crippling fees limited the possibilities for emigration† since no â€Å"country accepting immigrants is interested in impoverished newcomers† (p. 34). Apart from highlighting difficult and controversial issues the book reveals many details which make the picture complete. Thus, Benz points out some facts which are known to Germans and those who live in Ge rmany (or lived there in 1930-40s). Creating such atmosphere Benz manages to make his narrative more illustrative and more persuasive. The reader can not only find out some facts but can understand how this or that could happen.Advertising Looking for report on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More The target audience The book in question is great historical narrative which can be a valuable source of knowledge on the issue. Nevertheless, I would like to point out that although the book contains bibliography where many reliable sources are mentioned, there are not footnotes in the text. Although there are many citations the reader cannot know the source of those quotations. This peculiarity makes the book quite inappropriate for using as a source for some substantial academic writing. However, the book can be used in schools sine it is very informative and illustrative. The book can be a really good source for young people since there are many precise facts and explanations of the most difficult issues. Moreover, the language of the book is not too sophisticated and will be understandable for many students. The significance of the book Of course, there are many different books about Holocaust. However, the exclusive significance of the book in question is that it does not reconsider the issue, but it simply provides comprehensive information about the events of that period. According to Hertzberg (1999) there are many â€Å"revisionist historians† who try to prove that there was no Holocaust and that â€Å"the gas ovens in Auschwitz were disposal units for the bodies of those who died in the cam from disease† (vii-viii). So, books like The Holocaust: A German Historian Examines the Genocide are very important since they reveal the real history without any â€Å"amendments†. The book makes the reader know the past of humanity which an enable people to build up their future withou t making the same mistakes. Apart from this, the book makes people think of many important or even essential issues. Many people can learn not only some historic facts but the basic values of humaneness. What readers can learn Thus, the reader can learn many details which became a basis for the obscure page of the human history. The reader will understand why many solutions which seem obvious now were inappropriate for people living in that period. What is more important, the reader will remember about the horrors which took place some decades ago. They will see that those massacres grew from quite abstract ideas. Initially, those abstract ideas could seem quite positive and patriotic but in some time they transformed into a plan of genocide. After reading the book, people will be able to feel the danger of some â€Å"positive ideas† emerging nowadays. Apart from this the reader will be able to learn that all people are equal and no nation or individual should decide who des erves to live and who does not. Finally, the reader can learn that Germans accept their past with its mistakes but they are ready to move on. They do not want to covert the deeds of their predecessors, but on the contrary, they want to reveal real historic facts which enable all people of the world know exactly what was happening in that difficult period.Advertising We will write a custom report sample on The Holocaust: A German Historian Examines the Genocide specifically for you for only $16.05 $11/page Learn More Recommendations for reading I would like to recommend the book to teachers and students. In the first place, teachers should know that there is such a book concerning Holocaust written by a German scholar. They should know that there is that particular viewpoint on the events of 1930-40s. This will definitely enlarge teachers’ horizons and enable them to provide their students with more comprehensive and at the same time more precise information. On the other hand, students should read the book since they need to know this part of the world history. They should be aware of those terrible things which took place in the world in the twentieth century so that they could never repeat those mistakes. Young people should read the book which will make them remember what can happen to the world if certain ideas win. In conclusion, I would like to stress that unbiased and comprehensive data provided in the book makes it one of the most valuable sources for students to learn about the Holocaust which took place in the twentieth century. Reference List Benz, W.  The Holocaust: A German Historian Examines the Genocide. (Sydenham-Kwiet, J., Trans.). New York, NY: Columbia University Press, 1999. This report on The Holocaust: A German Historian Examines the Genocide was written and submitted by user Davon Church to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Definition and Examples of Corpus Linguistics

Definition and Examples of Corpus Linguistics Corpus linguistics is the study of language based on large collections of real life language use stored in corpora (or corpuses)computerized databases created for linguistic research. Also known as corpus-based studies. Corpus linguistics is viewed by some linguists as a research tool or methodology, and by others as a discipline or theory in its own right.  Kuebler and Zinsmeister conclude that the answer to the question whether corpus linguistics is a theory or a tool is simply that it can be both. It depends on how corpus linguistics is applied (Corpus Linguistics and Linguistically Annotated Corpora, 2015). Although the methods used in corpus linguistics were first adopted in the early 1960s, the term corpus linguistics didnt appear until the 1980s. Examples and Observations [C]orpus linguistics is . . . a methodology,  comprising a large number of related methods which can be used by scholars of many different theoretical leanings. On the other hand, it cannot be denied that corpus linguistics is also frequently associated with a certain outlook on language. At the centre of this outlook is that the rules of language are usage-based and that changes occur when speakers use language to communicate with each other. The argument is that if you are interested in the workings of a particular language, like English, it is a good idea to study language in use. One efficient way of doing this is to use corpus methodology . . .. (Hans Lindquist, Corpus Linguistics and the Description of English. Edinburgh University Press, 2009)Corpus studies boomed from 1980 onwards, as corpora, techniques and new arguments in favour of the use of corpora became more apparent. Currently this boom continuesand both of the schools of corpus linguistics are growing . . .. Corpus linguistics is maturing methodologically and the range of languages addressed by corpus linguists is growing annually. (Tony McEnery and Andrew Wilson, Corpus Linguistics, Edinburgh University Press, 2001) Corpus Linguistics in the Classroom In the context of the classroom the methodology of corpus linguistics is congenial for students of all levels because it is a bottoms-up study of the language requiring very little learned expertise to start with. Even the students that come to linguistic enquiry without a theoretical apparatus learn very quickly to advance their hypotheses on the basis of their observations rather than received knowledge, and test them against the evidence provided by the corpus. (Elena Tognini-Bonelli,  Corpus Linguistics at Work. John Benjamins, 2001)To make good use of corpus resources a teacher needs a modest orientation to the routines involved in retrieving information from the corpus, andmost importantlytraining and experience in how to evaluate that information. (John McHardy Sinclair, How to Use Corpora in Language Teaching, John Benjamins, 2004) Quantitative and Qualitative Analyses Quantitative techniques are essential for corpus-based studies. For example, if you wanted to compare the language use of patterns for the words big and large, you would need to know how many times each word occurs in the corpus, how many different words co-occur with each of these adjectives (the collocations), and how common each of those collocations is. These are all quantitative measurements. . . .A crucial part of the corpus-based approach is going beyond the quantitative patterns to propose functional interpretations explaining why the patterns exist. As a result, a large amount of effort in corpus-based studies is devoted to explaining and exemplifying quantitative patterns. (Douglas Biber, Susan Conrad, and Randi Reppen, Corpus Linguistics: Investigating Language Structure and Use, Cambridge University Press, 2004)[I]n corpus linguistics quantitative and qualitative methods are extensively used in combination. It is also characteristic of corpus linguistics to begin with qua ntitative findings, and work toward qualitative ones. But . . . the procedure may have cyclic elements. Generally it is desirable to subject quantitative results to qualitative scrutinyattempting to explain why a particular frequency pattern occurs, for example. But on the other hand, qualitative analysis (making use of the investigators ability to interpret samples of language in context) may be the means for classifying examples in a particular corpus by their meanings; and this qualitative analysis may then be the input to a further quantitative analysis, one based on meaning . . .. (Geoffrey Leech, Marianne Hundt, Christian Mair, and Nicholas Smith, Change in Contemporary English: A Grammatical Study. Cambridge University Press, 2012)

Thursday, November 21, 2019

Organizational Behavior in Human Relations Essay

Organizational Behavior in Human Relations - Essay Example Leadership is a process where people are motivated; in fact, â€Å"workers look up to their leaders and feel immensely satisfied if leaders take them into confidence and share their wisdom and experience† (â€Å"Organizational Behavior,† n.d., p. 161). However, it is very unfortunate that despite its importance, there is no best way to create leaders in advance, and there is no consensus on what are the attributes that could help in developing leaders. Leaders are playing a great role in the employee engagement and motivation; thus, this problem has been subject to extensive studies for the purpose of coming up a universal and consistent leadership approach that an individual should need to become an effective leader (Packard, 2009). All organizational behavior/human relation subjects need the cooperation of people, and only leader â€Å"knows how to keep people focused† (Maccoby, 2000, p. 58). Culture is learned over many years; thus, transforming people’ s actual behavior and values called for an intensive and tenacious reinforcement that can be performed by strategic leaders (Osborne & Brown, p. 82). Leaders can make employees more committed, but they can also create a climate of fear, distrust, discouragement, and de-motivation if the leadership style is not appropriate with the context. In fact, there are instances that a change initiative failed because leaders did not thoroughly handled the situation by aligning management practices and organizational behavior. Thus, leadership is vital to the organization, and â€Å"without leadership, nothing will be accomplished† and â€Å"The organization will fall apart† (Homan, 2011, p. 211). 2.0 Solution to the Problem from the Organizational Behavior/Human Relations Based on early leadership theories, leaders are characterized by superior qualities or traits that are endowed to them since birth; thus, the experts concluded that â€Å"leaders are born and not made† ( Adair, 2006, p. 9). However, when experts cannot present a detailed description of the trait to become an effective leader, a behavioral theory emerged. This theory stated that leadership can be learned, trained, and developed. Later on, a contingency theory is developed because of insufficient evidences, and it is centered on situational context wherein an effective leader knew how to adapt and match his or her behaviors to a particular applied context. On the other hand, there is no universal way to become a good leader because the environment is rapidly changing, and organizations need to cope up with this change to be successful. Thus, the best solution is to work as a team and apply the contingency approach through the use of different leadership styles in different contingencies because there is no ‘one best way’ to manage all instances (Burnes, 2009). For organizations to have an effective leadership, they need to identify the situation at hand, recognize the ant ecedents and consequences, develop an appropriate leadership style to discourage negative behaviors, and evaluate the appropriate leadership approaches. 3.0 Evaluate Solutions in Terms of Managerial & Employee Perceptions The contingency approach as a solution to the leadership behavior problem is an advantage on the part of the employee because â€Å"factors such as the type of task, the time available, and the skill of the members determine what type of leadership is most appropriate for a

Wednesday, November 20, 2019

Socialnetworkingsecurity Dissertation Example | Topics and Well Written Essays - 8750 words

Socialnetworkingsecurity - Dissertation Example Instead, many organizations either prohibit social media use altogether, or have no policy at all regarding social media use. These two approaches are unsatisfactory. According to the global socioeconomic trend, people and organizations that do not adopt social media are left behind and fail to reap the significant benefits. Therefore, social media could be branded a necessary evil. We allow social media use without any policies or guidelines, therefore exposing ourselves to security threats. This paper basically explores the security risks associated with social networking to individuals and organizations, and the possible technical and administrative safety measures. CHAPTER 1 INTRODUCTION, STATEMENT OF THE PROBLEM, SITUATIONAL ANALYSIS, PREMISE, DEFINITIONS, LIMITATIONS AND DELIMITATIONS Introduction Social networking sites popularity has greatly increased. No one can argue the usefulness of sites such as Facebook, Twitter and LinkedIn. They are used for professional networking an d job searches, as a means of increasing sales revenue, as an information tool regarding safety and other issues or as a way to reconnect with friends. Evidently, emails have lost their position as the main internet-based communication tools due to the explosion of other social networking options, interaction and collaboration (Freeman, 2004). According to a report by The Wall Street Journal in 2009, there are more social networking accounts than Webmail account. Nowadays, users rely more on blogs, tweets and social networking posts to supplement their exchange of personal and professional information. We live in a period where our identity online seem to overshadow our actual identity, as well as key personal and financial systems, thus posing major security risks that are associated with them. Over the years, security risks on process, people and application have been identified by researchers and hackers (Abraham, 2012). This study’s main purpose is to provide an overview of the main security issues or risks pertaining to social networking. Statement of the Problem Why should access to personal data be limited, and what are the security risks arising from social networking? Situational Analysis In an effort to employ a more strict process for carrying out a situational analysis on social media, the study will employ SWOT model. To commence, we begin by listening, which serves as the market research, content, location and tone of the discussions found in social media. From the listening activities, one will gain insight as follows: Talent: On the basis of listening activities, what skills are necessary in order to take part in social media? Technological talent is required thus as a result of luck of this, participation is highly restricted in the realm of social media (Abraham, 2012). Time: Knowledge regarding the time required will be necessary to dedicate to our social media endeavors is critical. The main aim being the influence to other aspects o f the business as time shifts to activities in social media. Through listening, one is able to acquire some degree for the timeframe faced in terms of being involved (Abraham, 2012). Capital: Through listening, one is able to determine the span covered by online discussion, thus giving a suggestion to what is necessary to become engaged. Obviously, there is a cost involved when it comes to training employees on participating in social media, which has to be considered - this is regarded as the

Sunday, November 17, 2019

McDonalds customer service and training model Essay

McDonalds customer service and training model - Essay Example McDonalds have become the byword of fast food industry in the world today. "The company began in 1940 with a restaurant opened by siblings Dick and Mac McDonald, but it was their introduction of the "Speedee Service System" in 1948 that established the principles of the fast-food restaurant." http://en.wikipedia.org/wiki/McDonald%27s_Corporation Unlike usual restaurants, fast food joints have their own pertinent and unbreakable rules. These rules and policies are usually made by the top management and are interpreted and enforced by the Store Manager. Like any other chain businesses, McDonalds too are centrally managed. All the policies and rules are made centrally and the branches and franchises are simply expected to follow them. The least requirement of fast food business is that it has to maintain very high level of service and efficiency throughout to every customer and it should be of unquestionable quality. In addition, cleanliness and safety standards are exceptionally important. Fast food joints manage this through proactive floor control. Rest of all decisions are made by the centre of the organisation, and most of the decisions are foreseen, expected and already clarified. There are a certain differences between the regular res... More stringent and immediate financial control is maintained over the fast foods as money moves fast in these joints owing to brisk business. It is also true that careful and meticulous control at the spot is impossible in places like McDonalds and as such, accounting should be frequent. They cannot afford to wait for the monthly balance sheet. Profit and loss are controlled by accurate inventory aided by the frequent statistical reports and many other systems like ordering of replenishments on time and much in advance, manpower scheduling for the entire month and sticking to it, and urgent building maintenance, maintenance of supporting machinery, including that could be necessary at a later date. The entire concept of fast foods is that of a 'man in a hurry' as they are catering to men in proverbial hurry. So, equal forethought and time slots are allotted to administrative work, documentation, recruitee training, wage reviews, performance reviews and disciplinary actions and awards , pecuniary or otherwise. Efficiency is linked with the increase in the pace of life, according to Ritzer. It is beneficial for consumers and workers both, as more customers get served and profits are increased. "But as is the case with rationalization in general, and each of its dimensions, irrationalities such as surprising inefficiencies and the dehumanisation of workers and customers, emerge from the drive for increased efficiency," (Ritzer, 2000, p.40). According to him, fast food restaurant 'has helped turn efficiency into an increasingly universal reality'. Ritzer argues that because of the fastness of the food, 'the emphasis on quantity tends to affect adversely the quality of both the process and the result'. For customers eating on the run

Friday, November 15, 2019

DSP-OFDM Modulator Project

DSP-OFDM Modulator Project Chapter One Introduction to the DSP-OFDM Modulator Project 1.1 Introduction The Orthogonal Frequency Division Multiplexing (OFDM) digital communication technique has been attracting a great concern of researchers all over the world, due to its unique characteristics. The designers and engineers of mobile wireless communication systems and wireless multimedia broadband are looking forward to exploit the OFDM to be the air interface of these devices and systems. This exploitation has already been done with several systems and standards such as Wireless Local Area Networks 802.11a and Digital Video Broadcast-Terrestrial (DVB-T). The DSP-OFDM Modulator project studies the essential parts of the OFDM modulator and demodulator and implements the OFDM modulator and demodulator on two separate DSP boards. For the OFDM modulator, the project studies the hardware DSP implementation of the OFDM modulators different parts such as the QAM mapper and the IFFT. This applies on the OFDM demodulator too. Additionally, for the OFDM demodulator, the project studies the carrier recovery issue to recover the OFDM information signal from the carrier signal and the OFDM symbol timing recovery issue to correctly pinpoint each OFDM symbols boundaries. The Projects involves several aspects of the digital communications and the theoretical and practical DSP and uses the MATLAB and the Code Composer Studio (CCS) to analyze and simulate the designs to be practically implemented. 1.2 The Aim and the Objectives The aim of the DSP OFDM Modulator project is to implement OFDM modulator and demodulator on two separate DSP boards. The implementation is not tied to any existing OFDM standard such that used in the DVB-T or other standards. The DSP hardware implantation comprises many DSP and digital communication operations to be implemented through writing the C codes that perform these operations i.e. the QAM mapping and de-mapping, the IFFT and FFT, the digital IIR filters and the synchronization. Therefore, the implementation will be first simulated by MATLAB and the Code Composer Studio (CCS) part by part before and with the hardware implementation on the DSP boards. The CCS will be used to simulate not only the modulator and demodulator but also the subparts of the hardware implementation such as the FFT and IFFT C codes. For example, the C code that will be used to perform N-Point IFFT to a complex array containing N complex elements to produce N outputs. These N outputs or discrete values will be compared with those N outputs or discrete values obtained from performing N-Point IFFT to the same N element-complex array in MATLAB in order to check that this C code will work properly in the DSP real time implementation of the OFDM modulator. 1.3 The Research Background and Motivations The good presentation of the theoretical and practical DSP during the taught part of the course encouraged me to tackle this project, as I had not done any practical DSP before I enrolled in the MSc Wireless Communication Systems course. The good understanding of the discrete Fourier transform (DFT) allows presenting the Conjugate Symmetric approach. The use of the Conjugate Symmetric distribution of the subcarrier vectors on the IFFT input points makes the IFFT produce a multicarrier signal with a real part (In-phase) (I) only in the time domain, as the imaginary part (Quadrature) (Q) is always set to zero. It is easier to modulate and demodulate the OFDM information signal with a real part only, as the quadrature modulation is no longer required. The Conjugate Symmetric proposal allows applying the FM modulation to transmit and receive the multicarrier OFDM information signal. 1.4 The Thesiss Organization The thesis consists of five chapters. Chapter two is considered as a literature survey. Chapter two explains the OFDM spectrum and the principles of the OFDM modulator and demodulator. It illustrates how the OFDM information signal carries or represents the digital data bits and how the IFFT N outputs (discrete values) are actually the samples of the OFDM multicarrier information signal for the current OFDM symbol being generated. It will be shown how the OFDM symbol has longer duration than those of other digital communication modulation techniques without affecting the data rate to be more resilient with dispersive channels and many other aspects of the OFDM modulation technique. This project is not tied to any existing OFDM standard. However, it resembles these standards in terms of the general block diagrams of the OFDM systems and the use of the pilot carriers, hence the employment of the OFDM in the DVB-T and the WLAN 802.11a are described briefly in chapter two. Chapter three shows and simulates by using MATLAB the approaches and ideas that will be used for the hardware DSP implementation. It discusses the (Conjugate Symmetric) proposal that has come out of this project to facilitate the modulation and demodulation of the OFDM information signal and the use of the squared cosine method to recover the OFDM information signal from the modulated carrier signal. The use of the cyclic prefix (CP) to recover the OFDM symbol timing is also discussed in chapter three. Chapter four presents the hardware implementation of the DSP OFDM modulator and demodulator on two separate DSP boards and shows the different results of the hardware implantation on the oscilloscopes screen as well as it shows the results of the CCS simulation of the OFDM modulator and demodulator and compares the OFDM spectrum of the generated OFDM information signal generated by the Conjugate Symmetric approach with that generated from the traditional method. Chapter five is for the conclusion points that have come out of this project and the further work to be implemented in the future. The attached CD contains the real time DSP implantation CCS projects of the OFDM modulator (OFDM-TX project) and OFDM demodulator (OFDM-RX project) and the CCS simulation of the OFDM modulator and demodulator (Simulation project) as well as the MATLAB codes and an electronic copy of the thesis. Chapter Two OFDM Basics 2.1 Introduction In the digital communications, the transmitted signal over a wireless channel is more preferred, when the symbol duration is significantly greater than the delay spread (s) of this channel to avoid the intersymbol interference (ISI) due to the time dispersion of transmitted symbols. But unfortunately, the symbol duration is reversely proportional to the bit rate which means a great constraint when high data rate transmission is required over a wireless channel with a relatively high delay spread due to the multipath environment of that channel [1]. The OFDM technique produces the solution to this problem, as it divides the high rate bit stream into (N) very low rate bit streams that are transmitted simultaneously using (N) orthogonal subcarriers for every OFDM symbol. Each of these low rate bit streams modulates an individual subcarrier. Therefore, the symbol duration is increased as many as (N) times without reducing the actual bit rate. 2.2 The Spectrum of the OFDM Subcarriers Figure (2-1) y(t) (the dotted curve) is the algebraic summation of the 5 sinusoidal waves Figure (2-2) the spectrum of y(t) in the frequency domain (five stems or tones) Figure (2-3) the rectangular function with (?t) duration in the time domain Figure (2-4) the spectrom of the rectangular function in the frequency domain Figure (2-5) the spectrum of the OFDM symbol with five subcarriers Suppose y(t) is a signal consisting of the algebraic summation of five sinusoidal waves (subcarriers) in the time domain with five different frequencies (f1, f2, f3, f4 and f5) respectively figure (2-1). Suppose these subcarriers have the same frequency spacing (?f) between each adjacent subcarriers in the frequency domain. The spectrum of y (t) in the frequency domain in terms of the magnitude has five stems at f1 to f5 respectively. Each stem (single tone) represents one of these five sinusoidal waves or subcarriers figure (2-2). Now, suppose an OFDM symbol (with symbol duration = (?t)) consists of the same five sinusoidal subcarriers mentioned earlier. The spectrum of this OFDM symbol in the frequency domain does not now consist of five stems; instead the spectrum is like that one in figure (2-5). The spectrum in figure (2-5) consists of five overlapped sinc functions each of which represents an individual subcarrier. Actually, our OFDM symbol is not identical to y(t). More precisely, it is a (truncated y(t)) with truncation duration equal to the OFDM symbol duration (?t). When a signal is truncated in the time domain with equal gain over all the truncated points within the period (?t), that means mathematically multiplying this signal with a rectangular function in the time domain with a time duration equal to (?t) figure (2-3). The shape of the spectrum of rectangular function in terms of the magnitude is single sinc wave in the frequency domain cutting the horizontal axis at points equal to the integer multiples of the reciprocal of the time duration (1/?t) figure (2-4). Basically, when any two signals are multiplied in the time domain, the resultant signal of this multiplication has a spectrum in the frequency domain equal to the convolution of the spectrums of the two original signals. Therefore the spectrum in figure (2-5) represents the resultant of the convolution operation between the fiv e stems of y(t) figure (2-2) and the sinc of the rectangular function figure (2-4) in the frequency domain. Looking at figure (2-5) again, it is easy to notice that the peak of each subcarrier sinc occurs at a point where all other four sincs have magnitudes equal to zero at which. This situation is the condition of the orthogonality between the subcarriers as it ensures the least interference between the subcarriers in the frequency domain. The orthogonality between subcarriers is not achieved, unless the frequency spacing between the subcarriers (?f) is equal to the reciprocal of the OFDM symbol duration (1/(?t)) [2]. 2.3 The OFDM Modulator The OFDM Modulator uses the Quadrature Amplitude Modulation (QAM) Mapper and the Inverse Fast Fourier Transformer (IFFT) to simultaneously generate and modulate the subcarriers of each OFDM symbol. Figure (2-6) shows a general block diagram of the OFDM modulator. The OFDM modulator builds and transmits each OFDM symbol consisting of a number of subcarriers equal to N as follows. The QAM mapper maps the data bits to (N) QAM vectors. Each of these vectors has real and imaginary components and represents a single subcarrier. The number of data bits that are mapped to each QAM vector (subcarrier) depends on the QAM order (M) as shown in table (2-1). Using QAM mapper with higher order produces higher data rate. However, this will be at the cost of the reception quality as the constellation of higher order QAM allows higher Bit Error Rate (BER) for a given The QAM Mapper stage maps data bits to QAM vectors in accordance with the QAM constellation. The Serial to Parallel (S/P) buffers the QAM vectors of each OFDM symbol to prepare them for the IFFT operation. The IFFT stage converts the buffered QAM vectors (the subcarriers) from the frequency domain to produce an OFDM symbol sequence equivalent to the algebraic summation of these sinusoidal subcarriers in the time domain to be buffered in the next stage. Guard Interval Insertion and Parallel to Serial stages add the guard interval to each buffered OFDM symbol sequence and produces it serially to the next stage. The DSP Low Pass Filter (LPF) and The Digital to Analogue Convertor (DAC) stages are to smooth the signal and convert the digital sequence into analogue signal. The Up Conversion and The Power Amplification stages. Figure (2-6) general block diagram of the OFDM modulator. The 4-QAM constellation, which is identical to Quadrature Phase Shift Keying (QPSK) constellation, gives the receiver more tolerance to the changes of the amplitude and phase of any received QAM vector and allows the receiver to de-map it to the correct 2-bit-combination, as long as it still lies in the same quadrant from which it was originated at the transmitter, whereas 16 and 64 QAM constellations give less tolerance to the change in the phase and amplitude of the received QAM vector due to the noise and interference. Not all subcarriers of an OFDM symbol are used to carry the data bits, some of which are used as pilot carriers for the synchronization and channel estimation purposes and for providing the receiver with specific information such as the order of QAM being used by the transmitter. The Serial to Parallel (S/P) stage buffers the N vectors from the QAM stage for each OFDM symbol to produce them in parallel way to IFFT stage. The number of IFFT points is always greater than the number of the subcarriers (N), so the (S/P) pads the remaining IFFT points, which have not been assigned QAM vectors, with zeroes. The IFFT stage is the heart of the OFDM modulator. It gives the QAM vectors the mathematical ability to be considered as the OFDM subcarriers in the frequency domain and converts them to the time domain to form the multi-subcarrier information signal. In other words, as all the (N) QAM vectors of each OFDM symbol are the parallel inputs of the IFFT operation, the IFFT stage considers these QAM vectors as tones or stems in the frequency domain and converts them into correspondent subcarriers in the time domain for the given OFDM symbol duration. Each QAM vector has a specific phase and amplitude which corresponds to the bit combination this vector represents in accordance with the QAM constellation. The IFFT coverts each QAM vector into a correspondent sinusoidal subcarrier in the time domain with amplitude and phase directly related to those of that vector and a frequency that is directly proportional with the sequence of IFFT point, to which the vector has been assigned. That means if a QAM vector with sequence (n) (assigned to an IFFT point with sequence n) generates a subcarrier with frequency equal to (f), the vector with sequence (n-1) generates a subcarrier with a frequency equal to (f ?f) and the vector with sequence (n+1) generates a subcarrier with a frequency equal to (f + ?f). The IFFT stage can simultaneously produce all the N-subcarriers for each OFDM symbol as it performs the conversion from the frequency domain to the time domain for N (QAM vectors) in one parallel operation for each OFDM symbol. The OFDM symbol signal in the time domain represents the algebraic summation of all subcarriers of that symbol. Now, it is obvious how the OFDM modulator divides the high rate bit stream into (N) lower rate bit streams which are simultaneously transmitted over (N times higher OFDM symbol duration) without reducing the actual bit rate. The Guard Interval Insertion stage appends a guard period at the beginning of each OFDM. The Guard Interval (GI) (also called the Cyclic Prefix (CP)) makes a separation between the consecutive OFDM symbols to contribute in the ISI reduction and to eliminate the Intercarrier Interference (ICI) between the subcarriers. The guard interval must be greater than the highest path difference duration. As a result, multipath signals with delay smaller than the GI cannot cause ICI [3]. The guard interval is generally equal to or less than the quarter symbol duration [4]. Practically, the guard interval is generated by taking an exact copy of the end part of the OFDM symbol and adding it to the beginning of the symbol. The guard interval (GI) can be used by the receiver to determine the beginning and end of each received OFDM symbol through the cross correlation operation. Now, the sequence of the OFDM symbol is converted into serial sequence. The Guard Interval Insertion and the Parallel to Serial (P/S) stages are shown as one stage in figure (2-6). The DSP LPF smoothes the information signal. The Digital to Analogue Convertor (DAC) converts the incoming digital sequence into analogue signal. Finally, the Up Conversion and Power Amplification stage mixes the information signal with a locally generated carrier and boosts the resulted signal to be transmitted. The input data bits to the OFDM modulator in figure (2-6) may be first scrambled for the security purposes, encoded for the Forward Error Correction (FEC) purposes and interleaved (to randomize the bursts of error [5]). Therefore, scrambler, encoder and interleaver blocks may precede the other stages to provide the OFDM modulator with scrambled, encoded and interleaved coded bits [6]. It is also possible to up convert the signal whilst it is still in the digital signal processing domain before converting it to the analogue form. The Carrier Recovery and the Down Converting stage recovers the information signal from the carrier signal. The Sample and Hold circuit and the Analogue to Digital Convertor (ADC) stage converts the information signal from the analogue form to produce the digital sequence for the DSP processing. The Guard Interval Removal and the Serial to Parallel (S/P) stage removes the cyclic prefix (CP) and produces all the useful samples of the current OFDM symbol being processed to the FFT stage simultaneously. The FFT stage converts the subcarriers of the OFDM symbol from the time domain to the frequency domain and produces them to the QAM De-mapper as vectors through the (P/S) buffer. One tap Equalizer can be used to equalize the vector constellation after the FFT stage. The Parallel to Serial (P/S) stage buffers the vectors of each OFDM symbol to produce them serially to the QAM De-mapper. The QAM De-mapper assigns each vector to the correspondent bit combination to produce the data bits. Figure (2-7) general block diagram of the OFDM demodulator. 2.4 The OFDM Demodulator The OFDM modulation operation is completely reversed in the demodulator. At first, the information signal must be recovered from the carrier. This is done by the carrier recovery and down converting stage. Figure (2-7) shows a general block diagram of the OFDM demodulator. The analogue to digital convertor (ADC) converts the information signal into a digital sequence. The guard interval removal stage removes the inserted guard interval or cyclic prefix from the beginning of each OFDM symbol. The OFDM demodulator could use the cyclic prefix at the beginning of each OFDM symbol to pinpoint the beginning and end of each symbol, as the cyclic prefix at the beginning of each OFDM symbol is identical to the end part of that symbol within a duration equal to the cyclic prefix duration. Now, the digital sequence of each OFDM symbol, which represents the algebraic summation of the subcarriers signals in the time domain, is simultaneously presented to the FFT stage to convert these subcarriers into their correspondent vectors in the frequency domain. The parallel presentation of the symbols digital sequence to the FFT stage involves the idea of serial to parallel conversion of this sequence. The subcarriers may also be equalized before being presented to the QAM de-mapper using a one tap equalizer. The QAM de-mapper assigns each vector in the frequency domain to the correspondent binary bit combination in accordance with the QAM constellation being used in the transmitter and receiver. The serial sequence of the received coded bits must be de-interleaved and then decoded and descrambled, if the scrambling, encoding and the interleaving are applied in the transmission side. The number of data bits per each OFDM symbol can be easily calculated by multiplying the number of subcarriers that are used to carry the data bits (Payload subcarriers) by the number of bits represented by the QAM vector in accordance with the QAM constellation table (2-1). The carrier recovery operation can also be done after the sample and hold stage within the digital signal processing unit. 2.5 Digital Video Broadcasting-Terrestrial (DVB-T) The DVB-T employs the OFDM due to its excellent performance in the multipath environments which are common in the terrestrial broadcasting, as the OFDM distributes a high bit stream over a high number of orthogonal subcarriers, each of which carries a low bit rate stream simultaneously, which makes the symbol duration much higher than the delay of the indirect paths [7]. The DVB-T has two modes 2K and 8K. As 2K and 8K modes have the same data rata, selecting which mode should be used depends on the requirements. The 2K mode has about 250 Â µ S symbol duration and 4 KHz spacing between its subcarriers, whereas the 8K mode has about 1 m S symbol duration and 1 KHz spacing between its subcarriers. These characteristics make the 8K mode with its higher symbol duration more resilient with multipath situations and channels with a high delay spread but the 2K mode resists better the shift in the frequency caused by Doppler effects due to the relative mobility between the transmitter and receiver, as it has higher frequency spacing between its subcarriers. The DVB-T has (FEC) similar to that of the DVB-S (Satellite) [8]. It has the following code rates (1/2, 2/3, 3/4, 5/6 and 7/8). Not all subcarriers are used as payload carriers to carry the coded bits (data bits + redundant bits); some subcarriers are used for channel estimation and correction. These subc arriers are the pilot carriers which have vectors lying on the I (In-phase) axis of the QAM constellation with angles equal to either 0 degrees or 180 degrees, hence they have only real components unlike the payload vectors which have real and imaginary components in order to recognize between them. The mapping of the pilot carriers to be delivered as vectors to the IFFT stage in the OFDM modulator is achieved through the BPSK modulation which uses the I (in-phase) axis of the constellation. Figure (2-8) shows the locations of DVB-T subcarriers on the 4-QAM constellation. The locations of the payload carriers The locations of the continual and scatter pilot carriers The locations of the TPS pilot carriers Figure (2-7) general block diagram of the OFDM demodulator. The DVB-T uses 4, 16 or 64 QAM to modulate the coded bits to be represented as payload subcarrier vectors, therefore each payload subcarrier can carry 2, 4 or 6 coded bits every OFDM symbol respectively. The DVB-T uses a guard interval length equal to (1/4, 1/8, 1/16 or 1/32) of the OFDM symbol duration [8]. 2.5.1 The DVB-T OFDM Subcarriers The DVB-T 2K mode has 2048 subcarriers, but it only uses 1705 subcarriers and sets the rest to zero. The 1705 carriers are numbered from 0 to 1704. It uses 1512 subcarriers as payload carriers and the remaining 193 subcarriers as pilot carriers. There are three types of the pilot carriers the continual pilots, scatter pilots and the (Transmission Parameter Signaling) (TPS) pilots. The continual pilots have fixed positions in the OFDM symbol spectrum. For example the sequences 0, 48, 969, 1683 and 1704 in the range (0 1704) are reserved as positions for the continual pilots. The continual pilots are used by the receiver to estimate the amount of phase rotation of the received QAM vectors. Every group of 12 subcarrier vectors has only one scatter pilot. The scatter pilots do not have fixed positions. Among each 12 carriers positions there is one variable position for one scatter pilot. The position of each scatter pilot regularly varies from symbol to symbol by jumping 3 positions for ward with respect to its position in the previous symbol. The scatter pilots are used to estimate the channel too. The TPS pilot carriers have fixed positions and are used by the transmitter to inform the receiver about the transmission parameters such as. The DVB-T mode (2K or 8K) Modulation type of the payload subcarrier vectors (4, 16, or 64) QAM FEC code rate (1/2, 2/3, 3/4, 5/6 or 7/8) Length of the guard interval (1/4, 1/8, 1/16 or 1/32) Like the continual and scatter pilots, the TPS pilot carriers lie on the I (in-phase) axis. Each OFDM symbol in the 2K mode has 17 TPS pilot carriers with fixed positions. Within the same symbol all the 17 TPS pilots are either at 0 degrees or 180 degrees. The receiver determines the state of TPS pilots whether the TPS pilots of the received symbol are at 0 degrees or 180 degree based on the majority voting rule. Through the TPS pilots, the transmitter sends the receiver 67 information bits every OFDM frame. The OFDM frame consists of 68 OFDM symbols. The TPS pilots are Differential Bi-Phase Shift Keying (DBPSK) modulated. That means the receiver considers receiving an information bit = (0), if the state of the TPS pilots change from the previous symbol to the current symbol and considers receiving an information bit = (1), if the phase or state of the TPS pilots does not change from the previous symbol to the current symbol. 68 OFDM symbols are required to transmit the 67 informatio n bits, as the first symbol is used to determine the initializing state of the TPS pilots. The 67 bits inform the receiver about the transmission parameters, for example: Bits 26 and 27 represent the QAM order (00=4, 01=16, 10=64) Bits 31, 32 and 33 represent the code rate (000=1/2, 001=2/3, 010=3/4, 011=5/6, 100=7/8) The DVB-T 8K mode has 6817 subcarrier per each OFDM symbol. The subcarriers of the 8K have the same principles and use of those of 2K with difference in their numbers only. Table (2 2) shows the different subcarriers of both 2K and 8K modes. The scatter pilot carriers have two different numbers of the subcarriers, as the scatter pilot carriers coincide with fixed locations of the continual pilot carriers due to their jumping [8]. 2.6 WLAN 802.11a Wireless Local Area Networks (WLANs) 802.11a employ OFDM as a digital communication technique for reliable and high data rate transmission. Each OFDM symbol is expressed by 64 subcarriers, but the actual used subcarriers are (52) (64 52 =12 subcarriers are set to zero). There are 48 payload carriers to carry the coded bits (data and redundancy bits) and 4 pilot carriers. The frequency spacing between the subcarriers is (?f = 312.5 KHz). The required channel bandwidth can be calculated by multiplying the total number of subcarriers by the frequency spacing = 312.5 K * 64 = 20 MHz. To achieve the orthogonality between the subcarriers the OFDM symbol duration (?t) must be equal to the reciprocal of (?f) (?t = 1/ ?f), hence ?t = 1/312.5 KHz = 3.2 Â µs. 802.11a appends a guard interval (GI) equal of (1/4) the OFDM symbol duration at the beginning of each OFDM symbol (GI = 0.25 * 3.2 Â µs = 0.8 Â µs), therefore each OFDM symbol occupies (3.2 Â µs + 0.8 Â µs = 4 Â µs) time interval. That means a wireless device transmits 250,000 OFDM symbol per second. 802.11a allows wireless devices to have (8) transmission data rates or modes (6, 9, 12, 18, 24, 36, 48 and 54) M bits/sec. 802.11a uses (BPSK, QPSK, 16-QAM or 64-QAM) to modulate the payload carriers and uses (1/2, 2/3 or 3/4) code rate for the FEC in accordance with transmission data rate being used. The different (8) modes use different modulation types and different code rates as shown in table (2-3) [6]. 802.11a uses BPSK modulation to modulate the payload carries in modes 1 and 2 unlike the DVB-T which only uses QAM modulation to modulate the payload carriers. For each mode, the OFDM symbol has the same total duration (4 Â µs) (250,000 OFDM symbol/Sec) and the same channel bandwidth (20 MHz), as it has the same number of subcarriers (48 payload carriers and 4 pilot carriers). Looking back at table (2-3) (Mode (8) 54 Mbps), as the 64-QAM modulation is used to modulate the payload carriers, each payload carrier in the OFDM symbol carries (log2 (64) = 6 coded bits). Each OFDM symbol carries (48 payload carriers/OFDM symbol * 6 coded bits/payload carrier = 288 coded bits / OFDM symbol). The number of data bits per each OFDM symbol = 288 * (code rate = 3/4) = 216 data bits / OFDM symbol. There are 250,000 OFDM symbols / Sec, hence the data bit rate = 216 * 250,000 = 54 Mbps. Chapter Three The MATLAB Analyses for the Hardware Implementation Approaches 3.1 Introduction Throughout this chapter the ideas and approaches that will be used for the DSP hardware implementation of the OFDM modulator and demodulator on two separate DSP boards will be discussed and simulated by using the MATLAB. There are mainly three approaches. The use of the (Conjugate Symmetric) with the carrier vectors which are the inputs of the IFFT stage in the OFDM modulator to produce an OFDM information signal in the time domain with a real part only for easier modulation and demodulation, which is the proposal that has come out from this project. The use of the squared cosine to recover the OFDM information signal from the carrier signal in the receiver (the synchronization of the carrier frequency signal). The make use of the guard interval (GI) or the cyclic prefix (CP) for the synchronization of the OFDM symbol (i.e. The Symbol Clock Recovery) to allow the receiver to know the correct boundaries of each received OFDM symbol to set the FFT window at the correct positions of the received OFDM signal. 3.2 The Mathematical Analysis of a Multicarrier Signal To understand the idea of the (Conjugate Symmetric) and the role of the IFFT and FFT in the OFDM system, lets consider y(t) as a continuous multicarrier signal with a real part only in the time domain consisting of the algebraic summation of five sinusoidal waves or subcarriers which have the following frequencies (1, 2, 3, 4 and 5) KHz and phase shifts (p4,,3p4, 5p4, 7p2, 9p4) respectively with equal amplitude = (28) for each. For our y(t), each two adjacent subcarriers (in the frequency domain) have 90 degrees phase shift. y(t) can be expressed in the time domain as in Eq. (3-1) It is not necessary for the five subcarriers forming y(t) to have the same magnitude. It is just to simplify this discussion. Now, if y(t) is sampled with sampling frequency (Fs). Fs must be greater than (2 * 5 KHz = 10 KHz), where 5 KHz is the highest frequency of y(t) according to the Nyquist-Shannon theorem. Nyquist-Shannon theorem stipulates that the sampling rate or frequency must be at least two times greater than the highest frequency of the sampled signal to avoid the aliasing which prevents providing the DSP system with a right copy of the sampled signal [9]. When a continuous signal in the time domain is sampled, a sample is taken at every (t = n * Ts). Ts is the sampling interval (Ts = 1 / Fs) and n is zero or positive integer number representing the sequence of the sample. y(t) is no longer continuous. Now, y(t) represents a sequence of discrete values. In Eq. (3-1), y(t) is replaced by y(n) in the left hand side and (t) is replaced by (n * Ts) or (n / Fs) in the right hand side as in Eq. (3-2). If Fs is set to 16 KHz (16 KHz > 10 KHz) and 16-point FFT operation is performed to y(n) to produce y(n)s spectrum in the frequency domain in order to study it. The 16 point FFT operation needs 16 discrete values or samples of y(n) for n = 0, 1, 2,13, 14, 15. The results of 16 point FFT operation are 16 complex vectors in the frequency domain. The 16 discrete values (samples) of y(n) are the inputs of the FFT in the time domain and the outputs are 16 complex vectors of Y(m) which represents y(n)s spectrum in the frequency domain. Table (3-1) lists the 16 discrete values of y(n) in the time domain and table (3-2) lists the 16 vectors

Tuesday, November 12, 2019

Essay --

The question â€Å"Is this product genetically modified?† has gained increasing popularity among the health concerned and those who worry about where their food comes from over the past couple of years. A decade or two ago, this question had no meaning and has no significance in society. However, thanks to the development of technology and a larger understanding of the underlying properties of foods, down to the molecular scale, humans have created a new field of engineering to combat worries that have plagued the food industry to centuries upon centuries. And as always, the advent of a new a product or procedure that changes the way we think and create will always usher along with it self opinions from every strata of society. The genetic modification of food in the United States of America has become a pertinent topic of debate, just recently gaining its popularity in the past couple of years. To modify or not to modify? There are both pros and cons to whether or not c hange the DNA sequences of foods in order to better them in some way or another. However, like every other major, groundbreaking change in this country comes regulation in hopes to appease everyone in the country and give each participant a fair chance in the race, in particular, the race for the production and distribution of foods. Such regulation in the United States has been done in order to protect and support people that have not devoted their time and money to the biological nuance and also to give every consumer in the country products that are labeled, identifying what they are putting into their systems on a daily basis. As time and society progress, how we view tasks that have been usually kept hidden and now placed onto a pedestal for everyone to se... ...lation. The policy has three priorities at its forefront: (1) U.S. policy would focus on the product of genetic modification (GM) techniques, not the process itself, (2) Only regulation grounded in verifiable scientific risks would be tolerated, and (3) GM products are on a continuum with existing products and, therefore, existing statutes are sufficient to review the products. The framework is also responsible for the governing of specific agencies and their policies, as mentioned briefly before, and also which agency has responsibility for a particular experiment. The delegation of responsibility is laid out in great detail in large tables, showing specifically which agency is to assume responsibility. If two or more agencies have potential jurisdiction, then one agency is considered the lead agency, as the other ones are then subordinate, as mentioned earlier.

Sunday, November 10, 2019

Political Economy Essay

Approaches to study of Politics Falls under Political Science We’re made to do the impossible Summary 1 paragraph will do. Provide the insight -Data -Theory used -approach used – use other references to prove your point 3 x 5 Surname all caps first name email address mobile number On approach deals with different meaning of politics Political Science What is Politics & its scope ? Banned words Politics is dirt Politics is nothing more than a means of rising in the world Samuel Johnson Systematic organization of hatred Henry Adams Art of governing mankind by deceiving them. BASIS of POLITICS Intellect and Will Man Capable of Thinking Politics as a rational activity Man has the capacity to think and realize his wants, needs and interest which are potentially in conflict with others’ wants, needs, and interests. Man cannot survive on its own. He needs someone else Politics as a social activity 2 or more persons Politics as a social activity 2 or more persons Associate with society Politics is concerned with social dynamics. POLITICS AS THE ART OF GOVt What concerns the state Study of government and exercise of authority Authoritative allocation of social values Framework Definition does not provide David Easton Authoritative binding to all Allocation done by the government Social Values anything held important by society budget allocation, privatization, elections Henry Mayo 3 characteristics that separate the political from non-poitical Politics is focused on the governing function through which are: Limitation on Easton on Mayo’s concept of Politics POLITICS DOES NOT ONLY HAPPEN IN THE GOVERNMENT POLTICS AS PUBLIC AFFAIRS State DIFFERENCE OF GOVERNMENT AND PUBLIC AFFAIRS PUBLIC PRIVATE State Civil Society Institutions of the State ( apparatus of government, infrastructure, economy, taxes Autonomous bodies (family, kinship groups, private businesses, trade unions Funded at the public’s Expense Set up and funded by individual citizens Responsible for the collective organization of community life Responsible for the satisfaction of own interests rather than the interest of the larger society. Private with this definition EX: RH Bill It should not be affair of the government. Public Sphere vs Private Sphere Restricted to the acitivites of the state itself and the responsibilities that are properly exercised by public bodies Politics should not meddle on personal affairs and institutions POLITICS AS COMPROMISE & CONSESUS A daily activity in which differing interests within a given unity of rule are conciliated by giving them a share in power in proportion to their role in the welfare and the survival of the community Bernard Crick Everything will just be fine – for no matter big or small the dispute is, at the end of the day we will just arrive in a compromise. Assumption: Conflict is inevitable Resolving conflict through compromise conciliation and negotiation, rather than violence and coercion. Not limited to government POLITICS IS INEVITABLE LINKED TO THE PHENOMENA OF CONFLICT & COOPERATION Politics as master science Why Make use other things to make things in order. Existence of rival opinions- conflict People recognize that they have to work with others cooperation Hannah Arendt- Acting in Concert Otto Von Bismarck- Politics is the art of the possible. POWER AS POWER & DISTRIBUTION OF RESOURCES What is power? X has power over Y insofar as Robert Dahl X is able, in one way or another, to get Y to do something That is more to X’s liking And which Y would not otherwise have done. Faces of Power As decision-making – you shape there decisions As agenda setting – You are preventing the person to make a decision As thought control- You are imposing your preference in an indirect or subtle way. Definition of Politics through POWER and allocation of resources FIND THE FOLLOWING QUOTES OF FAMOUS SCIENTISTS Adrian Leftwich- Politics is at the heart of all collective social activity, formal and informal, public and private, in all human groups, institutions and societies. Harold Lasswell Politics is, in essence power: the ability to achieve a desired outcome, through whatever means. Kate Millett â€Å"Politics is a power-structured relationships, arrangements whereby one group of persons is controlled by another. â€Å"POLITICS†- as the constrained use of social power. Robert Goodin & Hans- Dieter Klingemann Constrained because there are already laws establish. Politics takes place in all social activities; politics happen at every level of social interaction Politics concern production, distribution and use of resources in the course of social existence. -Ability to achieve a desired outcome, through whatever means . Approaches to the study of Politics Ontology- the nature of being Epistemology -How do you know what we know? Theoretical – concept & idea Empirical- Evidence, observation History- both theory and experience Methodology – How do we exactly know what we know

Friday, November 8, 2019

Money Laundering Extract from UNODC Essays

Money Laundering Extract from UNODC Essays Money Laundering Extract from UNODC Essay Money Laundering Extract from UNODC Essay Money Laundering Extract from UNODC BY 24 Money is the prime reason for engaging in almost any type of criminal activity. Money-laundering is the method by which criminals disguise the illegal origins of their wealth and protect their asset bases, so as to avoid the suspicion of law enforcement agencies and prevent leaving a trail of incriminating evidence. Terrorists and terrorist organizations also rely on money to sustain themselves and to carry out terrorist acts. Money for terrorists is derived from a wide variety of sources. While terrorists are not greatly concerned with disguising the origin of money, they are concerned with concealing its destination and the purpose for which it has been collected. Terrorists and terrorist organizations therefore employ techniques similar to those used by money launderers to hide their money. The ability to prevent and detect money-laundering is a highly effective means of identifying criminals and terrorists and the underlying activity from which money is derived. The application of ntelligence and investigative techniques can be one way of detecting and disrupting the activities of terrorists and terrorist organizations. Because they deal with other peoples money, financial institutions rely on a reputation for probity and integrity. A financial institution found to have assisted in laundering money will be shunned by legitimate enterprises. An international financial centre that is used for money- laundering can become an ideal financial haven. Developing countries that attract dirty money as a short-term engine of growth can find it difficult, as a consequence, to attract the kind of solid long-term foreign direct investment that is based on stable conditions and good governance, and that can help them sustain development and promote long-term growth. Money-laundering can erode a nations economy by changing the demand for cash, making interest and exchange rates more volatile, and by causing high inflation in countries where criminals are doing business. Most disturbing of all, money-laundering fuels corruption and organized crime. Corrupt public officials need to be able to launder bribes, kick-backs, public funds and, on occasion, even development loans from international financial institutions. Organized criminal groups need to be able to launder the proceeds of drug trafficking and commodity smuggling. Terrorist groups use money-laundering channels to get cash to buy arms. The social consequences of allowing these groups to launder money can be disastrous. Taking the proceeds of crimes from corrupt public officials, traffickers nd organized crime groups is one of the best ways to stop criminals in their tracks. In recent years, the international community has become more aware of the dangers that money-laundering poses in all these areas and many Governments and jurisdictions have committed themselves to taking action. The United Nations and other international organizations are committed to helping them in any way they can. Criminals are now taking advantage of the globalization of the world economy by transferring funds quickly across international borders.

Wednesday, November 6, 2019

Anne Frank as my hero essays

Anne Frank as my hero essays The one historical figure that has had a dramatic impact on my life, and more than likely numerous others, is Anne Frank. I feel the courage and emotions that she was able to exhibit and display to herself as well as many others in dire times, is something to be admired by all. In 1942, when the Nazis began to invade her country, the Frank family was forced into hiding. Due to the horrible persecution of Jews, Anne Frank and her family were forced to hide in an attic of a warehouse. The Franks daughter, Anne, kept a thourough diary of that horrific experience. Just minutes before the Franks were discovered and captured in the attic they had been stowed in for two years, young Anne made an entry to her diary. Her words stated, In spite of everything, I still believe that people are really good at heart. This expression of pure love for all mankind, can only be spoken by Anne. If we could all aspire to have this type of outlook on life we would all be much better off. Even though Anne unfortunately had to endure and suffer so much, her courage and character only grew stronger. Before Anne Frank went into hiding, she led a blissful and joyous life. She was always surrounded by her family, friends, and those who loved her. She was torn away from this ideal and peaceful life and placed into the harsh and cruel reality of war and the Nazi agenda. Anne was only thirteen years old when she had to witness all these acts of hatred and violence. As I mentioned before the Frank family was persecuted because of their religious beliefs. Although they were facing threats of death, the family never abandoned their faith and belief. They always remained true to themselves and their faith, no matter the consecunces. I can not even begin to imagine what it must have been like for young Anne. Even though Im Hispanic and a Catholic I most likely will never get to the point of suffering that she endured, ...

Sunday, November 3, 2019

Exchange rate regime in Kazakhstan Essay Example | Topics and Well Written Essays - 2000 words

Exchange rate regime in Kazakhstan - Essay Example Kazakhstan has achieved highest economic growth rate amongst its sister countries during 2001-2008.It reached annual GDP of as high as 9.8 percent in 2000 and over 8.5 percent in 2007.Primary resources of higher revenues include: natural gas, oil, zinc, and copper (USAID, 2008, p.3).This paper explores Kazakhstans exchange rate regime over a period of time. Pegging Tenge against US dollar, Kazakhstan opted for an unsanctioned policy of a â€Å"soft† fixed rate regime in 1993.Soft exchange rate regime as compared to stringent regime refer to a regime that repositions the value of its domestic currency more frequently. Tenge’s initial value was fixed at the rate of T5 for every US dollar. Par value indicates the rate on which the domestic government agrees to defend its own currency in order to keep the fixed ratio between domestic and foreign currency (Burke, 2009).According to Begg, Fischer, and Dornbusch, the commitment to fixed exchange rate may built private sector’s trust on government when it comes to creating inflation, as it only makes the country uncompetitive (2003, p.484). In fixed regime, the government agrees to maintain its domestic currency’s value at a fixed rate. The Tenge is convertible, Central Bank of Kazakhstan is able to sell and buy in order to maintain the exchange rate equilibrium (Burke, 2009).Burke (2009) further explains that the Tenge is overvalued as compared to the US dollar. Under fixed exchange rate regime, devaluation means decline in the nominal exchange rate between Tenge and US dollar. However, Blanchard (2006, pp.380-383) warns that devaluation of the nominal exchange rate directs to real depreciation. Instant impact of currency devaluation appears in declining real exchange rate and enhancing the country’s competitiveness. It allows reallocating the resources in order to support domestic industries

Friday, November 1, 2019

Report - sustainability - compare the footprint of different countries Coursework

Report - sustainability - compare the footprint of different countries - Coursework Example In this report, the researcher will analyze what are the main factors that increase the water foot prints and how the water footprints can be lowered. Like other resources that help life on the earth to sustain, water is also an important component that helps the life to sustain on earth. Most of living organisms have more amount of water in their bodies besides other components. A normal human body has about 60percent of water and the rest 40% is other essential components. Seas and oceans cover almost 70% of the earth but the seawater is undrinkable as the water is saline and can damage the vital organs like kidneys, etc. The process of desalination water is quite expensive and requires a large amount of energy. Out of total water resources including saline seawater, 2.5 percent of the water can be drinkable but a major amount of drinkable water is found in the form of glaciers and only 1 percent of the water is for the human utilization (Johnson 2012). Some countries have more wat er resources as compared to the others. As the number of lakes and rivers present in the country is responsible for making the country full of drinkable water resources. In the similar way, a country with less rivers and lakes makes the country having less water resources. Having less water resources directly influences the human life as less water resources would influence the corps; farms, etc thus influence the food production. To minimize the water losses and water footprints we should cut down the excessive use of water. Like little alteration in the way we utilize the water can make big difference like how we utilize water during bath, during washing clothes, etc. The main concern is how the water is utilized in different countries. What are the water footprints in different countries and how the water footprints influence the water in some other regions? In this report, I will analyze what are the main factors that increase the water foot prints and how the water footprints c an be lowered. Methodology In this report, I will utilize the qualitative method as well as qualitative method for research. In qualitative research method, the secondary data collection method is utilized. In the secondary data collection, the data is collected from the previous research work associating with the topic of the research. The collected data is then analyzed and reviewed to extract the useful data from the raw data. In secondary data collection method, the previous work of other researchers and authors on the relevant topics is collected through various sources. The main source is the internet articles, journals and research works. Books on the other are

Wednesday, October 30, 2019

Russia 1917-1941. Rise of Nazism in Germany, World War II Essay

Russia 1917-1941. Rise of Nazism in Germany, World War II - Essay Example When the autocratic rule of Russia crumbled in the revolution of 1917, it was due to a variety of underlying and systemic causes that were rooted deep in the empire's history. These economic, social and political problems were reinforced and exacerbated mainly by the First World War (1914-1918), but also by the Russo-Japanese war of 1904-05, that created and resulted in the same kinds of problems and revolts experienced in 1905. The policies imposed by Nicholas II, his predecessors and his ministers mostly served to aggravate rather than to alleviate the discontent of the Russian people. These policies and resulted in the riots and strikes that led to revolution in 1917. The situation in Russia around the turn of the century was complicated and the nation was difficult to rule. There existed a huge diversity of ideologies and identities within the Empire, making it hard for the Tsar to keep his authority and control. The influence that his two most recent predecessors had on the empire was contradictory; Alexander II was known as "the Tsar Liberator", and he introduced many reforms, such as the Emancipation Edict; and, Nicholas I, known as the "Reactionary Tsar", with his counter-reforms. Tsar Alexander III, who was crowned Tsar in 1894, wanted to "uphold the principles of autocracy" like his father, meaning the three reactionary principles: autocracy, orthodoxy and nationalism. Tsar Nicholas II was a weak and indecisive leader, unable to delegate his tasks and he generally cared too little for his people. One might argue that the only loyalty the Tsar had was to God, due to the orthodox belief that he was chosen and guided by God himself. Article On e of the Fundamental Laws of the Empire stated that: "God himself commands that this supreme authority be obeyed". The causes of the 1917 revolution included Russia's social, economic and political problems. Socially, Tsarist Russia stood well behind the rest of Europe in its industry and farming, resulting in few opportunities for advancement on the part of peasants and industrial workers. The discontent came from centuries of oppression of the lower classes by the Tsarist regime, and their considerable lack of rights. The rapid industrialisation of Russia also resulted in urban overcrowding and poor conditions for urban industrial workers. Economically, widespread inflation and famine in Russia contributed to the revolution. These economic stimuli originated in Russia's outdated economy and the Tsar's failure to modernize it. The rural agrarian economy struggled to produce enough food to feed the cities each year, and despite the vast expansions under Sergei Witte of the railway systems, they also lacked the ability to effectively transport the food into the cities. Factory workers also suffere d as Russia's young and undeveloped industrial base sought to catch up with the rest of Europe. They had to endure terrible working conditions and low wages. The sporadic riots did not create a calm context in which to develop an industrial foundation peacefully or methodically. Politically, the people of Russia resented the autocracy of Tsar Nicholas II. Most segments of Russian society had reason to be dissatisfied. They had no representation in government, and the Tsar remained out of touch with the people. This was seen on the "Bloody Sunday" of 1905 where his people came in peaceful demonstrations to his palace, which he had left, and were shot at by his army. Ultimately, a combination of these three factors, coupled with the development of revolutionary ideas and movements, laid the foundations for the Russian Revolution. This discontent of Russia's people

Monday, October 28, 2019

American History Essay Example for Free

American History Essay The civil war, according to President Abraham Lincoln, was not really fought to end the prolonged existence of slavery in the United States. The American Civil War was fought to preserve the Union and safeguard the interest of the American people but not of the slaves. Lincoln, who was not an absolute abolitionist himself, believe that the slaves should be free gradually and not on a one time big time basis. But as the civil war became lengthy, Lincoln and his administration has made colossal changes to the original plan and had to issue an Emancipation Proclamation freeing the slaves in the Confederacy. This action was well thought of Lincoln. When the congress has passed the Second Confiscation Act on July 17, 1862, Lincoln was prompted to respond. The Second Confiscation Act entailed that all slaves of everyone in rebellion to the United States were declared free. The act from the congress was not only what impelled Lincoln to act but also the peoples’ growing aversion of slavery. Lincoln has read his drafted â€Å"Preliminary Proclamation† to Secretary of State William H. Seward and Secretary of Navy Gideon Welles. Both were overwhelmed and were unable to respond quickly. On July 22, Lincoln discussed the matter to his cabinet and has received a lot of mix reactions but majority of the cabinet approved of the proclamation. Yet, it was only a consultation. The cabinet reviewed the contexts on September 22 and Lincoln has composed the final Emancipation Proclamation on New Year’s Day of 1863. The Emancipation Proclamation pronounced that â€Å"all slaves within any states or on a designated part of a State whereof shall then be in rebellion against the United States shall be then, henceforward, and forever free†¦Ã¢â‚¬  The Emancipation Proclamation guaranteed freedom only of those slaves in the states not in the jurisdiction of the Union. Lincoln’s Secretary of State William H. Seward has criticized the irony of the emancipation. Seward pointed out that the Union might have been sympathetic to slavery by freeing the slaves on the states uncontrolled by the Union but holding them in servitude in places possible to be freed by the government. Lincoln has known this but he did not want to irritate the slaveholders in the Union. Moreover, the Emancipation Proclamation would have not been easily released if it were not a war necessity. The Union saw its last resort on freeing the slave to increase its army and to antagonize the farms and the industries in the South. The proclamation was not sympathy to the slaves but a remedy to the unending war. Yet, the Emancipation Proclamation was one of the greatest victories of the Lincoln administration and of American democracy. It has also stressed that the war is not all about preserving the Union but also on the pressing need to abolish slavery. It was also the foundation of the 13th Amendment to the Constitution, which forever end slavery in the United States. On the other hand, after the Emancipation Proclamation the war did not ended soon. Many critics of the Lincoln administration supposed that the proclamation has only worsened the situation. The Union was still deficient of soldiers. Lincoln was prompted to create solutions by issuing the Enrollment Act of Conscription on March 3, 1863, which agitated many Northerners. The Union at the early stage of the war has relied on volunteerism but fewer men wanted to enlist. The Conscription Act imposed military duty to every capable man of 20 to 45 years old. Yet those who can find a substitute or pay $300 could be exempted from the draft. This exemption has angered the poor. Leslie M. Harris (2003) reported that antiwar newspaper in New York began criticizing the draft law citing the government’s interference on local affairs on behalf of the â€Å"nigger war. †The most unruly response to the act happened in New York City when unruly mobs appeared on July 11, 1963 when the draft took effect. Even though New York politicians have been very supportive of the Emancipation Proclamation, New Yorkers were divided on their stance towards the proclamation. Likewise, the mob consisted mostly of the poor Irish and German immigrants who lived on New York’s slum area. Irish and German immigrants in New York were told to prepare for the emancipated slaves who will flee to the North and would seek job. The immigrants did not think it was necessary for them to fight and they also have bigotry towards the African-American because they were usually their competitors to lowest-paying jobs. Yet, the main problem arose when the mob started to create commotions on the city. The first targets of the mob include military and government building, which instituted the inequitable draft. But after a while, the mob targeted the black people. First, they assaulted a black vendor and a nine year-old boy before burning to ashes the Colored Orphan Asylum on Fifth Avenue between Forty-Third and Forty-Fourth Streets. Luckily, no child was hurt in the attack. However, the mob has continued to attack Black people and sometimes killing them. Harris (2003) further reported that the mob singled out men for special violence. William Jones, a black man was hanged and his body burned afterward. Some group white men were even cheering when they kill William Williams, a black sailor, shouting: vengeance on every nigger in New York. The mayhem which lasted five days forced hundreds of Blacks to leave the city. Yet, not every Irish were sympathetic to the mob. There were reported cases were Irishmen helped black men. Irish neighbors of Philip White, a black drugstore owner at the corner of Gold and Frankfurt Street, help drove the mob away because White has been a good neighbor and creditor. However, this interracial cooperation was very least as compared to the havoc against the black people. However, the Union Army stationed at the Potomac were able to pacify the rioters and restore order in the city however they remained encamped around the city for several weeks. The Emancipation Proclamation and the Draft Riots embodied the bearing of the people during the Civil War. Though, only was a war measure, the Emancipation Proclamation was a great demonstration of democracy. The Draft Riots proved that not every person has the heart to fight for the Union and not everyone was in favor of the Emancipation. However, though Washington Times wrote, â€Å"The nation is at this time in a state of Revolution, North, South, East, and West, those who believed in the restoration of the Union and the rule of law never gave up hope but fought for what they believe was right. The New York Draft Riots, the Civil War and all its casualties were the price paid by the United States in order to protect and defend the Constitution, its people and those unalienable rights that were bestowed to each citizen which are â€Å"Life, Liberty and the Pursuit of Happiness. † References Harris, L. M. (2003). In the Shadow of Slavery: African Americans in New York City, 1626-1863. Chicago: University of Chicago. Smith, A. I. , (2007). The American civil war. Macmillan: New York.