Wednesday, November 27, 2019

The Holocaust A German Historian Examines the Genocide

Table of Contents The author and the purpose of the book Historical context The target audience The significance of the book What readers can learn Recommendations for reading Reference List The author and the purpose of the book The Holocaust: A German Historian Examines the Genocide deals with one of the most debatable issues of the history of the twentieth century, i.e. Holocaust. In this book Benz depicts facts telling the â€Å"story with exactness and absolute candor† (ix). The uniqueness of the book is that it is one of the first books on â€Å"Jewish issue† written by a German scholar. Advertising We will write a custom report sample on The Holocaust: A German Historian Examines the Genocide specifically for you for only $16.05 $11/page Learn More Thus, there is no biased perception of the historical facts, since â€Å"Benz seeks only to provide the basic and incontrovertible facts† (ix). Of course, Benz pertains to the n ation which was involved in this conflict of humaneness and common sense. Nevertheless, being German Benz has an opportunity to make a deeper analysis of those distant events. He does not try to acquit Nazis or hush up some of their horrors. The book provides many facts which took place and had an impact on the history of two nations (Germans and Jewish people) and the whole world. Historical context Benz wrote his book more than 50 years after the events took place. This can be good evidence that the book uses only reliable and unbiased data. The book concisely reveals all the events which led to the â€Å"unique crime in the history of mankind† (p.152). For instance, Benz starts with depicting Wannsee Conference when Nazis revealed the first plans and inclinations concerning the â€Å"Jewish problem†. After this Benz considers the beginning of discrimination of the Jews which grew into anti-Semitism, massacre and genocide. Interestingly, the book tackles various is sues which others did not highlight. For instance, Benz dwells upon emigration of Jews. Admittedly, many people think that the most appropriate solution for Jews living in Germany in 1930-40s was to leave the country. Moreover, many people (especially youth) suppose that there could be no genocide if the Jews simply abandoned their homeland. Nevertheless, Benz gives quite substantial explanation why Jewish people had to stay in Germany and other countries in constant danger and fear. Benz mentions major factors which prevented Jews from emigration, one of which is as follows: â€Å"the confiscation of assets and the crippling fees limited the possibilities for emigration† since no â€Å"country accepting immigrants is interested in impoverished newcomers† (p. 34). Apart from highlighting difficult and controversial issues the book reveals many details which make the picture complete. Thus, Benz points out some facts which are known to Germans and those who live in Ge rmany (or lived there in 1930-40s). Creating such atmosphere Benz manages to make his narrative more illustrative and more persuasive. The reader can not only find out some facts but can understand how this or that could happen.Advertising Looking for report on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More The target audience The book in question is great historical narrative which can be a valuable source of knowledge on the issue. Nevertheless, I would like to point out that although the book contains bibliography where many reliable sources are mentioned, there are not footnotes in the text. Although there are many citations the reader cannot know the source of those quotations. This peculiarity makes the book quite inappropriate for using as a source for some substantial academic writing. However, the book can be used in schools sine it is very informative and illustrative. The book can be a really good source for young people since there are many precise facts and explanations of the most difficult issues. Moreover, the language of the book is not too sophisticated and will be understandable for many students. The significance of the book Of course, there are many different books about Holocaust. However, the exclusive significance of the book in question is that it does not reconsider the issue, but it simply provides comprehensive information about the events of that period. According to Hertzberg (1999) there are many â€Å"revisionist historians† who try to prove that there was no Holocaust and that â€Å"the gas ovens in Auschwitz were disposal units for the bodies of those who died in the cam from disease† (vii-viii). So, books like The Holocaust: A German Historian Examines the Genocide are very important since they reveal the real history without any â€Å"amendments†. The book makes the reader know the past of humanity which an enable people to build up their future withou t making the same mistakes. Apart from this, the book makes people think of many important or even essential issues. Many people can learn not only some historic facts but the basic values of humaneness. What readers can learn Thus, the reader can learn many details which became a basis for the obscure page of the human history. The reader will understand why many solutions which seem obvious now were inappropriate for people living in that period. What is more important, the reader will remember about the horrors which took place some decades ago. They will see that those massacres grew from quite abstract ideas. Initially, those abstract ideas could seem quite positive and patriotic but in some time they transformed into a plan of genocide. After reading the book, people will be able to feel the danger of some â€Å"positive ideas† emerging nowadays. Apart from this the reader will be able to learn that all people are equal and no nation or individual should decide who des erves to live and who does not. Finally, the reader can learn that Germans accept their past with its mistakes but they are ready to move on. They do not want to covert the deeds of their predecessors, but on the contrary, they want to reveal real historic facts which enable all people of the world know exactly what was happening in that difficult period.Advertising We will write a custom report sample on The Holocaust: A German Historian Examines the Genocide specifically for you for only $16.05 $11/page Learn More Recommendations for reading I would like to recommend the book to teachers and students. In the first place, teachers should know that there is such a book concerning Holocaust written by a German scholar. They should know that there is that particular viewpoint on the events of 1930-40s. This will definitely enlarge teachers’ horizons and enable them to provide their students with more comprehensive and at the same time more precise information. On the other hand, students should read the book since they need to know this part of the world history. They should be aware of those terrible things which took place in the world in the twentieth century so that they could never repeat those mistakes. Young people should read the book which will make them remember what can happen to the world if certain ideas win. In conclusion, I would like to stress that unbiased and comprehensive data provided in the book makes it one of the most valuable sources for students to learn about the Holocaust which took place in the twentieth century. Reference List Benz, W.  The Holocaust: A German Historian Examines the Genocide. (Sydenham-Kwiet, J., Trans.). New York, NY: Columbia University Press, 1999. This report on The Holocaust: A German Historian Examines the Genocide was written and submitted by user Davon Church to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Definition and Examples of Corpus Linguistics

Definition and Examples of Corpus Linguistics Corpus linguistics is the study of language based on large collections of real life language use stored in corpora (or corpuses)computerized databases created for linguistic research. Also known as corpus-based studies. Corpus linguistics is viewed by some linguists as a research tool or methodology, and by others as a discipline or theory in its own right.  Kuebler and Zinsmeister conclude that the answer to the question whether corpus linguistics is a theory or a tool is simply that it can be both. It depends on how corpus linguistics is applied (Corpus Linguistics and Linguistically Annotated Corpora, 2015). Although the methods used in corpus linguistics were first adopted in the early 1960s, the term corpus linguistics didnt appear until the 1980s. Examples and Observations [C]orpus linguistics is . . . a methodology,  comprising a large number of related methods which can be used by scholars of many different theoretical leanings. On the other hand, it cannot be denied that corpus linguistics is also frequently associated with a certain outlook on language. At the centre of this outlook is that the rules of language are usage-based and that changes occur when speakers use language to communicate with each other. The argument is that if you are interested in the workings of a particular language, like English, it is a good idea to study language in use. One efficient way of doing this is to use corpus methodology . . .. (Hans Lindquist, Corpus Linguistics and the Description of English. Edinburgh University Press, 2009)Corpus studies boomed from 1980 onwards, as corpora, techniques and new arguments in favour of the use of corpora became more apparent. Currently this boom continuesand both of the schools of corpus linguistics are growing . . .. Corpus linguistics is maturing methodologically and the range of languages addressed by corpus linguists is growing annually. (Tony McEnery and Andrew Wilson, Corpus Linguistics, Edinburgh University Press, 2001) Corpus Linguistics in the Classroom In the context of the classroom the methodology of corpus linguistics is congenial for students of all levels because it is a bottoms-up study of the language requiring very little learned expertise to start with. Even the students that come to linguistic enquiry without a theoretical apparatus learn very quickly to advance their hypotheses on the basis of their observations rather than received knowledge, and test them against the evidence provided by the corpus. (Elena Tognini-Bonelli,  Corpus Linguistics at Work. John Benjamins, 2001)To make good use of corpus resources a teacher needs a modest orientation to the routines involved in retrieving information from the corpus, andmost importantlytraining and experience in how to evaluate that information. (John McHardy Sinclair, How to Use Corpora in Language Teaching, John Benjamins, 2004) Quantitative and Qualitative Analyses Quantitative techniques are essential for corpus-based studies. For example, if you wanted to compare the language use of patterns for the words big and large, you would need to know how many times each word occurs in the corpus, how many different words co-occur with each of these adjectives (the collocations), and how common each of those collocations is. These are all quantitative measurements. . . .A crucial part of the corpus-based approach is going beyond the quantitative patterns to propose functional interpretations explaining why the patterns exist. As a result, a large amount of effort in corpus-based studies is devoted to explaining and exemplifying quantitative patterns. (Douglas Biber, Susan Conrad, and Randi Reppen, Corpus Linguistics: Investigating Language Structure and Use, Cambridge University Press, 2004)[I]n corpus linguistics quantitative and qualitative methods are extensively used in combination. It is also characteristic of corpus linguistics to begin with qua ntitative findings, and work toward qualitative ones. But . . . the procedure may have cyclic elements. Generally it is desirable to subject quantitative results to qualitative scrutinyattempting to explain why a particular frequency pattern occurs, for example. But on the other hand, qualitative analysis (making use of the investigators ability to interpret samples of language in context) may be the means for classifying examples in a particular corpus by their meanings; and this qualitative analysis may then be the input to a further quantitative analysis, one based on meaning . . .. (Geoffrey Leech, Marianne Hundt, Christian Mair, and Nicholas Smith, Change in Contemporary English: A Grammatical Study. Cambridge University Press, 2012)

Thursday, November 21, 2019

Organizational Behavior in Human Relations Essay

Organizational Behavior in Human Relations - Essay Example Leadership is a process where people are motivated; in fact, â€Å"workers look up to their leaders and feel immensely satisfied if leaders take them into confidence and share their wisdom and experience† (â€Å"Organizational Behavior,† n.d., p. 161). However, it is very unfortunate that despite its importance, there is no best way to create leaders in advance, and there is no consensus on what are the attributes that could help in developing leaders. Leaders are playing a great role in the employee engagement and motivation; thus, this problem has been subject to extensive studies for the purpose of coming up a universal and consistent leadership approach that an individual should need to become an effective leader (Packard, 2009). All organizational behavior/human relation subjects need the cooperation of people, and only leader â€Å"knows how to keep people focused† (Maccoby, 2000, p. 58). Culture is learned over many years; thus, transforming people’ s actual behavior and values called for an intensive and tenacious reinforcement that can be performed by strategic leaders (Osborne & Brown, p. 82). Leaders can make employees more committed, but they can also create a climate of fear, distrust, discouragement, and de-motivation if the leadership style is not appropriate with the context. In fact, there are instances that a change initiative failed because leaders did not thoroughly handled the situation by aligning management practices and organizational behavior. Thus, leadership is vital to the organization, and â€Å"without leadership, nothing will be accomplished† and â€Å"The organization will fall apart† (Homan, 2011, p. 211). 2.0 Solution to the Problem from the Organizational Behavior/Human Relations Based on early leadership theories, leaders are characterized by superior qualities or traits that are endowed to them since birth; thus, the experts concluded that â€Å"leaders are born and not made† ( Adair, 2006, p. 9). However, when experts cannot present a detailed description of the trait to become an effective leader, a behavioral theory emerged. This theory stated that leadership can be learned, trained, and developed. Later on, a contingency theory is developed because of insufficient evidences, and it is centered on situational context wherein an effective leader knew how to adapt and match his or her behaviors to a particular applied context. On the other hand, there is no universal way to become a good leader because the environment is rapidly changing, and organizations need to cope up with this change to be successful. Thus, the best solution is to work as a team and apply the contingency approach through the use of different leadership styles in different contingencies because there is no ‘one best way’ to manage all instances (Burnes, 2009). For organizations to have an effective leadership, they need to identify the situation at hand, recognize the ant ecedents and consequences, develop an appropriate leadership style to discourage negative behaviors, and evaluate the appropriate leadership approaches. 3.0 Evaluate Solutions in Terms of Managerial & Employee Perceptions The contingency approach as a solution to the leadership behavior problem is an advantage on the part of the employee because â€Å"factors such as the type of task, the time available, and the skill of the members determine what type of leadership is most appropriate for a

Wednesday, November 20, 2019

Socialnetworkingsecurity Dissertation Example | Topics and Well Written Essays - 8750 words

Socialnetworkingsecurity - Dissertation Example Instead, many organizations either prohibit social media use altogether, or have no policy at all regarding social media use. These two approaches are unsatisfactory. According to the global socioeconomic trend, people and organizations that do not adopt social media are left behind and fail to reap the significant benefits. Therefore, social media could be branded a necessary evil. We allow social media use without any policies or guidelines, therefore exposing ourselves to security threats. This paper basically explores the security risks associated with social networking to individuals and organizations, and the possible technical and administrative safety measures. CHAPTER 1 INTRODUCTION, STATEMENT OF THE PROBLEM, SITUATIONAL ANALYSIS, PREMISE, DEFINITIONS, LIMITATIONS AND DELIMITATIONS Introduction Social networking sites popularity has greatly increased. No one can argue the usefulness of sites such as Facebook, Twitter and LinkedIn. They are used for professional networking an d job searches, as a means of increasing sales revenue, as an information tool regarding safety and other issues or as a way to reconnect with friends. Evidently, emails have lost their position as the main internet-based communication tools due to the explosion of other social networking options, interaction and collaboration (Freeman, 2004). According to a report by The Wall Street Journal in 2009, there are more social networking accounts than Webmail account. Nowadays, users rely more on blogs, tweets and social networking posts to supplement their exchange of personal and professional information. We live in a period where our identity online seem to overshadow our actual identity, as well as key personal and financial systems, thus posing major security risks that are associated with them. Over the years, security risks on process, people and application have been identified by researchers and hackers (Abraham, 2012). This study’s main purpose is to provide an overview of the main security issues or risks pertaining to social networking. Statement of the Problem Why should access to personal data be limited, and what are the security risks arising from social networking? Situational Analysis In an effort to employ a more strict process for carrying out a situational analysis on social media, the study will employ SWOT model. To commence, we begin by listening, which serves as the market research, content, location and tone of the discussions found in social media. From the listening activities, one will gain insight as follows: Talent: On the basis of listening activities, what skills are necessary in order to take part in social media? Technological talent is required thus as a result of luck of this, participation is highly restricted in the realm of social media (Abraham, 2012). Time: Knowledge regarding the time required will be necessary to dedicate to our social media endeavors is critical. The main aim being the influence to other aspects o f the business as time shifts to activities in social media. Through listening, one is able to acquire some degree for the timeframe faced in terms of being involved (Abraham, 2012). Capital: Through listening, one is able to determine the span covered by online discussion, thus giving a suggestion to what is necessary to become engaged. Obviously, there is a cost involved when it comes to training employees on participating in social media, which has to be considered - this is regarded as the

Sunday, November 17, 2019

McDonalds customer service and training model Essay

McDonalds customer service and training model - Essay Example McDonalds have become the byword of fast food industry in the world today. "The company began in 1940 with a restaurant opened by siblings Dick and Mac McDonald, but it was their introduction of the "Speedee Service System" in 1948 that established the principles of the fast-food restaurant." http://en.wikipedia.org/wiki/McDonald%27s_Corporation Unlike usual restaurants, fast food joints have their own pertinent and unbreakable rules. These rules and policies are usually made by the top management and are interpreted and enforced by the Store Manager. Like any other chain businesses, McDonalds too are centrally managed. All the policies and rules are made centrally and the branches and franchises are simply expected to follow them. The least requirement of fast food business is that it has to maintain very high level of service and efficiency throughout to every customer and it should be of unquestionable quality. In addition, cleanliness and safety standards are exceptionally important. Fast food joints manage this through proactive floor control. Rest of all decisions are made by the centre of the organisation, and most of the decisions are foreseen, expected and already clarified. There are a certain differences between the regular res... More stringent and immediate financial control is maintained over the fast foods as money moves fast in these joints owing to brisk business. It is also true that careful and meticulous control at the spot is impossible in places like McDonalds and as such, accounting should be frequent. They cannot afford to wait for the monthly balance sheet. Profit and loss are controlled by accurate inventory aided by the frequent statistical reports and many other systems like ordering of replenishments on time and much in advance, manpower scheduling for the entire month and sticking to it, and urgent building maintenance, maintenance of supporting machinery, including that could be necessary at a later date. The entire concept of fast foods is that of a 'man in a hurry' as they are catering to men in proverbial hurry. So, equal forethought and time slots are allotted to administrative work, documentation, recruitee training, wage reviews, performance reviews and disciplinary actions and awards , pecuniary or otherwise. Efficiency is linked with the increase in the pace of life, according to Ritzer. It is beneficial for consumers and workers both, as more customers get served and profits are increased. "But as is the case with rationalization in general, and each of its dimensions, irrationalities such as surprising inefficiencies and the dehumanisation of workers and customers, emerge from the drive for increased efficiency," (Ritzer, 2000, p.40). According to him, fast food restaurant 'has helped turn efficiency into an increasingly universal reality'. Ritzer argues that because of the fastness of the food, 'the emphasis on quantity tends to affect adversely the quality of both the process and the result'. For customers eating on the run

Friday, November 15, 2019

DSP-OFDM Modulator Project

DSP-OFDM Modulator Project Chapter One Introduction to the DSP-OFDM Modulator Project 1.1 Introduction The Orthogonal Frequency Division Multiplexing (OFDM) digital communication technique has been attracting a great concern of researchers all over the world, due to its unique characteristics. The designers and engineers of mobile wireless communication systems and wireless multimedia broadband are looking forward to exploit the OFDM to be the air interface of these devices and systems. This exploitation has already been done with several systems and standards such as Wireless Local Area Networks 802.11a and Digital Video Broadcast-Terrestrial (DVB-T). The DSP-OFDM Modulator project studies the essential parts of the OFDM modulator and demodulator and implements the OFDM modulator and demodulator on two separate DSP boards. For the OFDM modulator, the project studies the hardware DSP implementation of the OFDM modulators different parts such as the QAM mapper and the IFFT. This applies on the OFDM demodulator too. Additionally, for the OFDM demodulator, the project studies the carrier recovery issue to recover the OFDM information signal from the carrier signal and the OFDM symbol timing recovery issue to correctly pinpoint each OFDM symbols boundaries. The Projects involves several aspects of the digital communications and the theoretical and practical DSP and uses the MATLAB and the Code Composer Studio (CCS) to analyze and simulate the designs to be practically implemented. 1.2 The Aim and the Objectives The aim of the DSP OFDM Modulator project is to implement OFDM modulator and demodulator on two separate DSP boards. The implementation is not tied to any existing OFDM standard such that used in the DVB-T or other standards. The DSP hardware implantation comprises many DSP and digital communication operations to be implemented through writing the C codes that perform these operations i.e. the QAM mapping and de-mapping, the IFFT and FFT, the digital IIR filters and the synchronization. Therefore, the implementation will be first simulated by MATLAB and the Code Composer Studio (CCS) part by part before and with the hardware implementation on the DSP boards. The CCS will be used to simulate not only the modulator and demodulator but also the subparts of the hardware implementation such as the FFT and IFFT C codes. For example, the C code that will be used to perform N-Point IFFT to a complex array containing N complex elements to produce N outputs. These N outputs or discrete values will be compared with those N outputs or discrete values obtained from performing N-Point IFFT to the same N element-complex array in MATLAB in order to check that this C code will work properly in the DSP real time implementation of the OFDM modulator. 1.3 The Research Background and Motivations The good presentation of the theoretical and practical DSP during the taught part of the course encouraged me to tackle this project, as I had not done any practical DSP before I enrolled in the MSc Wireless Communication Systems course. The good understanding of the discrete Fourier transform (DFT) allows presenting the Conjugate Symmetric approach. The use of the Conjugate Symmetric distribution of the subcarrier vectors on the IFFT input points makes the IFFT produce a multicarrier signal with a real part (In-phase) (I) only in the time domain, as the imaginary part (Quadrature) (Q) is always set to zero. It is easier to modulate and demodulate the OFDM information signal with a real part only, as the quadrature modulation is no longer required. The Conjugate Symmetric proposal allows applying the FM modulation to transmit and receive the multicarrier OFDM information signal. 1.4 The Thesiss Organization The thesis consists of five chapters. Chapter two is considered as a literature survey. Chapter two explains the OFDM spectrum and the principles of the OFDM modulator and demodulator. It illustrates how the OFDM information signal carries or represents the digital data bits and how the IFFT N outputs (discrete values) are actually the samples of the OFDM multicarrier information signal for the current OFDM symbol being generated. It will be shown how the OFDM symbol has longer duration than those of other digital communication modulation techniques without affecting the data rate to be more resilient with dispersive channels and many other aspects of the OFDM modulation technique. This project is not tied to any existing OFDM standard. However, it resembles these standards in terms of the general block diagrams of the OFDM systems and the use of the pilot carriers, hence the employment of the OFDM in the DVB-T and the WLAN 802.11a are described briefly in chapter two. Chapter three shows and simulates by using MATLAB the approaches and ideas that will be used for the hardware DSP implementation. It discusses the (Conjugate Symmetric) proposal that has come out of this project to facilitate the modulation and demodulation of the OFDM information signal and the use of the squared cosine method to recover the OFDM information signal from the modulated carrier signal. The use of the cyclic prefix (CP) to recover the OFDM symbol timing is also discussed in chapter three. Chapter four presents the hardware implementation of the DSP OFDM modulator and demodulator on two separate DSP boards and shows the different results of the hardware implantation on the oscilloscopes screen as well as it shows the results of the CCS simulation of the OFDM modulator and demodulator and compares the OFDM spectrum of the generated OFDM information signal generated by the Conjugate Symmetric approach with that generated from the traditional method. Chapter five is for the conclusion points that have come out of this project and the further work to be implemented in the future. The attached CD contains the real time DSP implantation CCS projects of the OFDM modulator (OFDM-TX project) and OFDM demodulator (OFDM-RX project) and the CCS simulation of the OFDM modulator and demodulator (Simulation project) as well as the MATLAB codes and an electronic copy of the thesis. Chapter Two OFDM Basics 2.1 Introduction In the digital communications, the transmitted signal over a wireless channel is more preferred, when the symbol duration is significantly greater than the delay spread (s) of this channel to avoid the intersymbol interference (ISI) due to the time dispersion of transmitted symbols. But unfortunately, the symbol duration is reversely proportional to the bit rate which means a great constraint when high data rate transmission is required over a wireless channel with a relatively high delay spread due to the multipath environment of that channel [1]. The OFDM technique produces the solution to this problem, as it divides the high rate bit stream into (N) very low rate bit streams that are transmitted simultaneously using (N) orthogonal subcarriers for every OFDM symbol. Each of these low rate bit streams modulates an individual subcarrier. Therefore, the symbol duration is increased as many as (N) times without reducing the actual bit rate. 2.2 The Spectrum of the OFDM Subcarriers Figure (2-1) y(t) (the dotted curve) is the algebraic summation of the 5 sinusoidal waves Figure (2-2) the spectrum of y(t) in the frequency domain (five stems or tones) Figure (2-3) the rectangular function with (?t) duration in the time domain Figure (2-4) the spectrom of the rectangular function in the frequency domain Figure (2-5) the spectrum of the OFDM symbol with five subcarriers Suppose y(t) is a signal consisting of the algebraic summation of five sinusoidal waves (subcarriers) in the time domain with five different frequencies (f1, f2, f3, f4 and f5) respectively figure (2-1). Suppose these subcarriers have the same frequency spacing (?f) between each adjacent subcarriers in the frequency domain. The spectrum of y (t) in the frequency domain in terms of the magnitude has five stems at f1 to f5 respectively. Each stem (single tone) represents one of these five sinusoidal waves or subcarriers figure (2-2). Now, suppose an OFDM symbol (with symbol duration = (?t)) consists of the same five sinusoidal subcarriers mentioned earlier. The spectrum of this OFDM symbol in the frequency domain does not now consist of five stems; instead the spectrum is like that one in figure (2-5). The spectrum in figure (2-5) consists of five overlapped sinc functions each of which represents an individual subcarrier. Actually, our OFDM symbol is not identical to y(t). More precisely, it is a (truncated y(t)) with truncation duration equal to the OFDM symbol duration (?t). When a signal is truncated in the time domain with equal gain over all the truncated points within the period (?t), that means mathematically multiplying this signal with a rectangular function in the time domain with a time duration equal to (?t) figure (2-3). The shape of the spectrum of rectangular function in terms of the magnitude is single sinc wave in the frequency domain cutting the horizontal axis at points equal to the integer multiples of the reciprocal of the time duration (1/?t) figure (2-4). Basically, when any two signals are multiplied in the time domain, the resultant signal of this multiplication has a spectrum in the frequency domain equal to the convolution of the spectrums of the two original signals. Therefore the spectrum in figure (2-5) represents the resultant of the convolution operation between the fiv e stems of y(t) figure (2-2) and the sinc of the rectangular function figure (2-4) in the frequency domain. Looking at figure (2-5) again, it is easy to notice that the peak of each subcarrier sinc occurs at a point where all other four sincs have magnitudes equal to zero at which. This situation is the condition of the orthogonality between the subcarriers as it ensures the least interference between the subcarriers in the frequency domain. The orthogonality between subcarriers is not achieved, unless the frequency spacing between the subcarriers (?f) is equal to the reciprocal of the OFDM symbol duration (1/(?t)) [2]. 2.3 The OFDM Modulator The OFDM Modulator uses the Quadrature Amplitude Modulation (QAM) Mapper and the Inverse Fast Fourier Transformer (IFFT) to simultaneously generate and modulate the subcarriers of each OFDM symbol. Figure (2-6) shows a general block diagram of the OFDM modulator. The OFDM modulator builds and transmits each OFDM symbol consisting of a number of subcarriers equal to N as follows. The QAM mapper maps the data bits to (N) QAM vectors. Each of these vectors has real and imaginary components and represents a single subcarrier. The number of data bits that are mapped to each QAM vector (subcarrier) depends on the QAM order (M) as shown in table (2-1). Using QAM mapper with higher order produces higher data rate. However, this will be at the cost of the reception quality as the constellation of higher order QAM allows higher Bit Error Rate (BER) for a given The QAM Mapper stage maps data bits to QAM vectors in accordance with the QAM constellation. The Serial to Parallel (S/P) buffers the QAM vectors of each OFDM symbol to prepare them for the IFFT operation. The IFFT stage converts the buffered QAM vectors (the subcarriers) from the frequency domain to produce an OFDM symbol sequence equivalent to the algebraic summation of these sinusoidal subcarriers in the time domain to be buffered in the next stage. Guard Interval Insertion and Parallel to Serial stages add the guard interval to each buffered OFDM symbol sequence and produces it serially to the next stage. The DSP Low Pass Filter (LPF) and The Digital to Analogue Convertor (DAC) stages are to smooth the signal and convert the digital sequence into analogue signal. The Up Conversion and The Power Amplification stages. Figure (2-6) general block diagram of the OFDM modulator. The 4-QAM constellation, which is identical to Quadrature Phase Shift Keying (QPSK) constellation, gives the receiver more tolerance to the changes of the amplitude and phase of any received QAM vector and allows the receiver to de-map it to the correct 2-bit-combination, as long as it still lies in the same quadrant from which it was originated at the transmitter, whereas 16 and 64 QAM constellations give less tolerance to the change in the phase and amplitude of the received QAM vector due to the noise and interference. Not all subcarriers of an OFDM symbol are used to carry the data bits, some of which are used as pilot carriers for the synchronization and channel estimation purposes and for providing the receiver with specific information such as the order of QAM being used by the transmitter. The Serial to Parallel (S/P) stage buffers the N vectors from the QAM stage for each OFDM symbol to produce them in parallel way to IFFT stage. The number of IFFT points is always greater than the number of the subcarriers (N), so the (S/P) pads the remaining IFFT points, which have not been assigned QAM vectors, with zeroes. The IFFT stage is the heart of the OFDM modulator. It gives the QAM vectors the mathematical ability to be considered as the OFDM subcarriers in the frequency domain and converts them to the time domain to form the multi-subcarrier information signal. In other words, as all the (N) QAM vectors of each OFDM symbol are the parallel inputs of the IFFT operation, the IFFT stage considers these QAM vectors as tones or stems in the frequency domain and converts them into correspondent subcarriers in the time domain for the given OFDM symbol duration. Each QAM vector has a specific phase and amplitude which corresponds to the bit combination this vector represents in accordance with the QAM constellation. The IFFT coverts each QAM vector into a correspondent sinusoidal subcarrier in the time domain with amplitude and phase directly related to those of that vector and a frequency that is directly proportional with the sequence of IFFT point, to which the vector has been assigned. That means if a QAM vector with sequence (n) (assigned to an IFFT point with sequence n) generates a subcarrier with frequency equal to (f), the vector with sequence (n-1) generates a subcarrier with a frequency equal to (f ?f) and the vector with sequence (n+1) generates a subcarrier with a frequency equal to (f + ?f). The IFFT stage can simultaneously produce all the N-subcarriers for each OFDM symbol as it performs the conversion from the frequency domain to the time domain for N (QAM vectors) in one parallel operation for each OFDM symbol. The OFDM symbol signal in the time domain represents the algebraic summation of all subcarriers of that symbol. Now, it is obvious how the OFDM modulator divides the high rate bit stream into (N) lower rate bit streams which are simultaneously transmitted over (N times higher OFDM symbol duration) without reducing the actual bit rate. The Guard Interval Insertion stage appends a guard period at the beginning of each OFDM. The Guard Interval (GI) (also called the Cyclic Prefix (CP)) makes a separation between the consecutive OFDM symbols to contribute in the ISI reduction and to eliminate the Intercarrier Interference (ICI) between the subcarriers. The guard interval must be greater than the highest path difference duration. As a result, multipath signals with delay smaller than the GI cannot cause ICI [3]. The guard interval is generally equal to or less than the quarter symbol duration [4]. Practically, the guard interval is generated by taking an exact copy of the end part of the OFDM symbol and adding it to the beginning of the symbol. The guard interval (GI) can be used by the receiver to determine the beginning and end of each received OFDM symbol through the cross correlation operation. Now, the sequence of the OFDM symbol is converted into serial sequence. The Guard Interval Insertion and the Parallel to Serial (P/S) stages are shown as one stage in figure (2-6). The DSP LPF smoothes the information signal. The Digital to Analogue Convertor (DAC) converts the incoming digital sequence into analogue signal. Finally, the Up Conversion and Power Amplification stage mixes the information signal with a locally generated carrier and boosts the resulted signal to be transmitted. The input data bits to the OFDM modulator in figure (2-6) may be first scrambled for the security purposes, encoded for the Forward Error Correction (FEC) purposes and interleaved (to randomize the bursts of error [5]). Therefore, scrambler, encoder and interleaver blocks may precede the other stages to provide the OFDM modulator with scrambled, encoded and interleaved coded bits [6]. It is also possible to up convert the signal whilst it is still in the digital signal processing domain before converting it to the analogue form. The Carrier Recovery and the Down Converting stage recovers the information signal from the carrier signal. The Sample and Hold circuit and the Analogue to Digital Convertor (ADC) stage converts the information signal from the analogue form to produce the digital sequence for the DSP processing. The Guard Interval Removal and the Serial to Parallel (S/P) stage removes the cyclic prefix (CP) and produces all the useful samples of the current OFDM symbol being processed to the FFT stage simultaneously. The FFT stage converts the subcarriers of the OFDM symbol from the time domain to the frequency domain and produces them to the QAM De-mapper as vectors through the (P/S) buffer. One tap Equalizer can be used to equalize the vector constellation after the FFT stage. The Parallel to Serial (P/S) stage buffers the vectors of each OFDM symbol to produce them serially to the QAM De-mapper. The QAM De-mapper assigns each vector to the correspondent bit combination to produce the data bits. Figure (2-7) general block diagram of the OFDM demodulator. 2.4 The OFDM Demodulator The OFDM modulation operation is completely reversed in the demodulator. At first, the information signal must be recovered from the carrier. This is done by the carrier recovery and down converting stage. Figure (2-7) shows a general block diagram of the OFDM demodulator. The analogue to digital convertor (ADC) converts the information signal into a digital sequence. The guard interval removal stage removes the inserted guard interval or cyclic prefix from the beginning of each OFDM symbol. The OFDM demodulator could use the cyclic prefix at the beginning of each OFDM symbol to pinpoint the beginning and end of each symbol, as the cyclic prefix at the beginning of each OFDM symbol is identical to the end part of that symbol within a duration equal to the cyclic prefix duration. Now, the digital sequence of each OFDM symbol, which represents the algebraic summation of the subcarriers signals in the time domain, is simultaneously presented to the FFT stage to convert these subcarriers into their correspondent vectors in the frequency domain. The parallel presentation of the symbols digital sequence to the FFT stage involves the idea of serial to parallel conversion of this sequence. The subcarriers may also be equalized before being presented to the QAM de-mapper using a one tap equalizer. The QAM de-mapper assigns each vector in the frequency domain to the correspondent binary bit combination in accordance with the QAM constellation being used in the transmitter and receiver. The serial sequence of the received coded bits must be de-interleaved and then decoded and descrambled, if the scrambling, encoding and the interleaving are applied in the transmission side. The number of data bits per each OFDM symbol can be easily calculated by multiplying the number of subcarriers that are used to carry the data bits (Payload subcarriers) by the number of bits represented by the QAM vector in accordance with the QAM constellation table (2-1). The carrier recovery operation can also be done after the sample and hold stage within the digital signal processing unit. 2.5 Digital Video Broadcasting-Terrestrial (DVB-T) The DVB-T employs the OFDM due to its excellent performance in the multipath environments which are common in the terrestrial broadcasting, as the OFDM distributes a high bit stream over a high number of orthogonal subcarriers, each of which carries a low bit rate stream simultaneously, which makes the symbol duration much higher than the delay of the indirect paths [7]. The DVB-T has two modes 2K and 8K. As 2K and 8K modes have the same data rata, selecting which mode should be used depends on the requirements. The 2K mode has about 250 Â µ S symbol duration and 4 KHz spacing between its subcarriers, whereas the 8K mode has about 1 m S symbol duration and 1 KHz spacing between its subcarriers. These characteristics make the 8K mode with its higher symbol duration more resilient with multipath situations and channels with a high delay spread but the 2K mode resists better the shift in the frequency caused by Doppler effects due to the relative mobility between the transmitter and receiver, as it has higher frequency spacing between its subcarriers. The DVB-T has (FEC) similar to that of the DVB-S (Satellite) [8]. It has the following code rates (1/2, 2/3, 3/4, 5/6 and 7/8). Not all subcarriers are used as payload carriers to carry the coded bits (data bits + redundant bits); some subcarriers are used for channel estimation and correction. These subc arriers are the pilot carriers which have vectors lying on the I (In-phase) axis of the QAM constellation with angles equal to either 0 degrees or 180 degrees, hence they have only real components unlike the payload vectors which have real and imaginary components in order to recognize between them. The mapping of the pilot carriers to be delivered as vectors to the IFFT stage in the OFDM modulator is achieved through the BPSK modulation which uses the I (in-phase) axis of the constellation. Figure (2-8) shows the locations of DVB-T subcarriers on the 4-QAM constellation. The locations of the payload carriers The locations of the continual and scatter pilot carriers The locations of the TPS pilot carriers Figure (2-7) general block diagram of the OFDM demodulator. The DVB-T uses 4, 16 or 64 QAM to modulate the coded bits to be represented as payload subcarrier vectors, therefore each payload subcarrier can carry 2, 4 or 6 coded bits every OFDM symbol respectively. The DVB-T uses a guard interval length equal to (1/4, 1/8, 1/16 or 1/32) of the OFDM symbol duration [8]. 2.5.1 The DVB-T OFDM Subcarriers The DVB-T 2K mode has 2048 subcarriers, but it only uses 1705 subcarriers and sets the rest to zero. The 1705 carriers are numbered from 0 to 1704. It uses 1512 subcarriers as payload carriers and the remaining 193 subcarriers as pilot carriers. There are three types of the pilot carriers the continual pilots, scatter pilots and the (Transmission Parameter Signaling) (TPS) pilots. The continual pilots have fixed positions in the OFDM symbol spectrum. For example the sequences 0, 48, 969, 1683 and 1704 in the range (0 1704) are reserved as positions for the continual pilots. The continual pilots are used by the receiver to estimate the amount of phase rotation of the received QAM vectors. Every group of 12 subcarrier vectors has only one scatter pilot. The scatter pilots do not have fixed positions. Among each 12 carriers positions there is one variable position for one scatter pilot. The position of each scatter pilot regularly varies from symbol to symbol by jumping 3 positions for ward with respect to its position in the previous symbol. The scatter pilots are used to estimate the channel too. The TPS pilot carriers have fixed positions and are used by the transmitter to inform the receiver about the transmission parameters such as. The DVB-T mode (2K or 8K) Modulation type of the payload subcarrier vectors (4, 16, or 64) QAM FEC code rate (1/2, 2/3, 3/4, 5/6 or 7/8) Length of the guard interval (1/4, 1/8, 1/16 or 1/32) Like the continual and scatter pilots, the TPS pilot carriers lie on the I (in-phase) axis. Each OFDM symbol in the 2K mode has 17 TPS pilot carriers with fixed positions. Within the same symbol all the 17 TPS pilots are either at 0 degrees or 180 degrees. The receiver determines the state of TPS pilots whether the TPS pilots of the received symbol are at 0 degrees or 180 degree based on the majority voting rule. Through the TPS pilots, the transmitter sends the receiver 67 information bits every OFDM frame. The OFDM frame consists of 68 OFDM symbols. The TPS pilots are Differential Bi-Phase Shift Keying (DBPSK) modulated. That means the receiver considers receiving an information bit = (0), if the state of the TPS pilots change from the previous symbol to the current symbol and considers receiving an information bit = (1), if the phase or state of the TPS pilots does not change from the previous symbol to the current symbol. 68 OFDM symbols are required to transmit the 67 informatio n bits, as the first symbol is used to determine the initializing state of the TPS pilots. The 67 bits inform the receiver about the transmission parameters, for example: Bits 26 and 27 represent the QAM order (00=4, 01=16, 10=64) Bits 31, 32 and 33 represent the code rate (000=1/2, 001=2/3, 010=3/4, 011=5/6, 100=7/8) The DVB-T 8K mode has 6817 subcarrier per each OFDM symbol. The subcarriers of the 8K have the same principles and use of those of 2K with difference in their numbers only. Table (2 2) shows the different subcarriers of both 2K and 8K modes. The scatter pilot carriers have two different numbers of the subcarriers, as the scatter pilot carriers coincide with fixed locations of the continual pilot carriers due to their jumping [8]. 2.6 WLAN 802.11a Wireless Local Area Networks (WLANs) 802.11a employ OFDM as a digital communication technique for reliable and high data rate transmission. Each OFDM symbol is expressed by 64 subcarriers, but the actual used subcarriers are (52) (64 52 =12 subcarriers are set to zero). There are 48 payload carriers to carry the coded bits (data and redundancy bits) and 4 pilot carriers. The frequency spacing between the subcarriers is (?f = 312.5 KHz). The required channel bandwidth can be calculated by multiplying the total number of subcarriers by the frequency spacing = 312.5 K * 64 = 20 MHz. To achieve the orthogonality between the subcarriers the OFDM symbol duration (?t) must be equal to the reciprocal of (?f) (?t = 1/ ?f), hence ?t = 1/312.5 KHz = 3.2 Â µs. 802.11a appends a guard interval (GI) equal of (1/4) the OFDM symbol duration at the beginning of each OFDM symbol (GI = 0.25 * 3.2 Â µs = 0.8 Â µs), therefore each OFDM symbol occupies (3.2 Â µs + 0.8 Â µs = 4 Â µs) time interval. That means a wireless device transmits 250,000 OFDM symbol per second. 802.11a allows wireless devices to have (8) transmission data rates or modes (6, 9, 12, 18, 24, 36, 48 and 54) M bits/sec. 802.11a uses (BPSK, QPSK, 16-QAM or 64-QAM) to modulate the payload carriers and uses (1/2, 2/3 or 3/4) code rate for the FEC in accordance with transmission data rate being used. The different (8) modes use different modulation types and different code rates as shown in table (2-3) [6]. 802.11a uses BPSK modulation to modulate the payload carries in modes 1 and 2 unlike the DVB-T which only uses QAM modulation to modulate the payload carriers. For each mode, the OFDM symbol has the same total duration (4 Â µs) (250,000 OFDM symbol/Sec) and the same channel bandwidth (20 MHz), as it has the same number of subcarriers (48 payload carriers and 4 pilot carriers). Looking back at table (2-3) (Mode (8) 54 Mbps), as the 64-QAM modulation is used to modulate the payload carriers, each payload carrier in the OFDM symbol carries (log2 (64) = 6 coded bits). Each OFDM symbol carries (48 payload carriers/OFDM symbol * 6 coded bits/payload carrier = 288 coded bits / OFDM symbol). The number of data bits per each OFDM symbol = 288 * (code rate = 3/4) = 216 data bits / OFDM symbol. There are 250,000 OFDM symbols / Sec, hence the data bit rate = 216 * 250,000 = 54 Mbps. Chapter Three The MATLAB Analyses for the Hardware Implementation Approaches 3.1 Introduction Throughout this chapter the ideas and approaches that will be used for the DSP hardware implementation of the OFDM modulator and demodulator on two separate DSP boards will be discussed and simulated by using the MATLAB. There are mainly three approaches. The use of the (Conjugate Symmetric) with the carrier vectors which are the inputs of the IFFT stage in the OFDM modulator to produce an OFDM information signal in the time domain with a real part only for easier modulation and demodulation, which is the proposal that has come out from this project. The use of the squared cosine to recover the OFDM information signal from the carrier signal in the receiver (the synchronization of the carrier frequency signal). The make use of the guard interval (GI) or the cyclic prefix (CP) for the synchronization of the OFDM symbol (i.e. The Symbol Clock Recovery) to allow the receiver to know the correct boundaries of each received OFDM symbol to set the FFT window at the correct positions of the received OFDM signal. 3.2 The Mathematical Analysis of a Multicarrier Signal To understand the idea of the (Conjugate Symmetric) and the role of the IFFT and FFT in the OFDM system, lets consider y(t) as a continuous multicarrier signal with a real part only in the time domain consisting of the algebraic summation of five sinusoidal waves or subcarriers which have the following frequencies (1, 2, 3, 4 and 5) KHz and phase shifts (p4,,3p4, 5p4, 7p2, 9p4) respectively with equal amplitude = (28) for each. For our y(t), each two adjacent subcarriers (in the frequency domain) have 90 degrees phase shift. y(t) can be expressed in the time domain as in Eq. (3-1) It is not necessary for the five subcarriers forming y(t) to have the same magnitude. It is just to simplify this discussion. Now, if y(t) is sampled with sampling frequency (Fs). Fs must be greater than (2 * 5 KHz = 10 KHz), where 5 KHz is the highest frequency of y(t) according to the Nyquist-Shannon theorem. Nyquist-Shannon theorem stipulates that the sampling rate or frequency must be at least two times greater than the highest frequency of the sampled signal to avoid the aliasing which prevents providing the DSP system with a right copy of the sampled signal [9]. When a continuous signal in the time domain is sampled, a sample is taken at every (t = n * Ts). Ts is the sampling interval (Ts = 1 / Fs) and n is zero or positive integer number representing the sequence of the sample. y(t) is no longer continuous. Now, y(t) represents a sequence of discrete values. In Eq. (3-1), y(t) is replaced by y(n) in the left hand side and (t) is replaced by (n * Ts) or (n / Fs) in the right hand side as in Eq. (3-2). If Fs is set to 16 KHz (16 KHz > 10 KHz) and 16-point FFT operation is performed to y(n) to produce y(n)s spectrum in the frequency domain in order to study it. The 16 point FFT operation needs 16 discrete values or samples of y(n) for n = 0, 1, 2,13, 14, 15. The results of 16 point FFT operation are 16 complex vectors in the frequency domain. The 16 discrete values (samples) of y(n) are the inputs of the FFT in the time domain and the outputs are 16 complex vectors of Y(m) which represents y(n)s spectrum in the frequency domain. Table (3-1) lists the 16 discrete values of y(n) in the time domain and table (3-2) lists the 16 vectors

Tuesday, November 12, 2019

Essay --

The question â€Å"Is this product genetically modified?† has gained increasing popularity among the health concerned and those who worry about where their food comes from over the past couple of years. A decade or two ago, this question had no meaning and has no significance in society. However, thanks to the development of technology and a larger understanding of the underlying properties of foods, down to the molecular scale, humans have created a new field of engineering to combat worries that have plagued the food industry to centuries upon centuries. And as always, the advent of a new a product or procedure that changes the way we think and create will always usher along with it self opinions from every strata of society. The genetic modification of food in the United States of America has become a pertinent topic of debate, just recently gaining its popularity in the past couple of years. To modify or not to modify? There are both pros and cons to whether or not c hange the DNA sequences of foods in order to better them in some way or another. However, like every other major, groundbreaking change in this country comes regulation in hopes to appease everyone in the country and give each participant a fair chance in the race, in particular, the race for the production and distribution of foods. Such regulation in the United States has been done in order to protect and support people that have not devoted their time and money to the biological nuance and also to give every consumer in the country products that are labeled, identifying what they are putting into their systems on a daily basis. As time and society progress, how we view tasks that have been usually kept hidden and now placed onto a pedestal for everyone to se... ...lation. The policy has three priorities at its forefront: (1) U.S. policy would focus on the product of genetic modification (GM) techniques, not the process itself, (2) Only regulation grounded in verifiable scientific risks would be tolerated, and (3) GM products are on a continuum with existing products and, therefore, existing statutes are sufficient to review the products. The framework is also responsible for the governing of specific agencies and their policies, as mentioned briefly before, and also which agency has responsibility for a particular experiment. The delegation of responsibility is laid out in great detail in large tables, showing specifically which agency is to assume responsibility. If two or more agencies have potential jurisdiction, then one agency is considered the lead agency, as the other ones are then subordinate, as mentioned earlier.

Sunday, November 10, 2019

Political Economy Essay

Approaches to study of Politics Falls under Political Science We’re made to do the impossible Summary 1 paragraph will do. Provide the insight -Data -Theory used -approach used – use other references to prove your point 3 x 5 Surname all caps first name email address mobile number On approach deals with different meaning of politics Political Science What is Politics & its scope ? Banned words Politics is dirt Politics is nothing more than a means of rising in the world Samuel Johnson Systematic organization of hatred Henry Adams Art of governing mankind by deceiving them. BASIS of POLITICS Intellect and Will Man Capable of Thinking Politics as a rational activity Man has the capacity to think and realize his wants, needs and interest which are potentially in conflict with others’ wants, needs, and interests. Man cannot survive on its own. He needs someone else Politics as a social activity 2 or more persons Politics as a social activity 2 or more persons Associate with society Politics is concerned with social dynamics. POLITICS AS THE ART OF GOVt What concerns the state Study of government and exercise of authority Authoritative allocation of social values Framework Definition does not provide David Easton Authoritative binding to all Allocation done by the government Social Values anything held important by society budget allocation, privatization, elections Henry Mayo 3 characteristics that separate the political from non-poitical Politics is focused on the governing function through which are: Limitation on Easton on Mayo’s concept of Politics POLITICS DOES NOT ONLY HAPPEN IN THE GOVERNMENT POLTICS AS PUBLIC AFFAIRS State DIFFERENCE OF GOVERNMENT AND PUBLIC AFFAIRS PUBLIC PRIVATE State Civil Society Institutions of the State ( apparatus of government, infrastructure, economy, taxes Autonomous bodies (family, kinship groups, private businesses, trade unions Funded at the public’s Expense Set up and funded by individual citizens Responsible for the collective organization of community life Responsible for the satisfaction of own interests rather than the interest of the larger society. Private with this definition EX: RH Bill It should not be affair of the government. Public Sphere vs Private Sphere Restricted to the acitivites of the state itself and the responsibilities that are properly exercised by public bodies Politics should not meddle on personal affairs and institutions POLITICS AS COMPROMISE & CONSESUS A daily activity in which differing interests within a given unity of rule are conciliated by giving them a share in power in proportion to their role in the welfare and the survival of the community Bernard Crick Everything will just be fine – for no matter big or small the dispute is, at the end of the day we will just arrive in a compromise. Assumption: Conflict is inevitable Resolving conflict through compromise conciliation and negotiation, rather than violence and coercion. Not limited to government POLITICS IS INEVITABLE LINKED TO THE PHENOMENA OF CONFLICT & COOPERATION Politics as master science Why Make use other things to make things in order. Existence of rival opinions- conflict People recognize that they have to work with others cooperation Hannah Arendt- Acting in Concert Otto Von Bismarck- Politics is the art of the possible. POWER AS POWER & DISTRIBUTION OF RESOURCES What is power? X has power over Y insofar as Robert Dahl X is able, in one way or another, to get Y to do something That is more to X’s liking And which Y would not otherwise have done. Faces of Power As decision-making – you shape there decisions As agenda setting – You are preventing the person to make a decision As thought control- You are imposing your preference in an indirect or subtle way. Definition of Politics through POWER and allocation of resources FIND THE FOLLOWING QUOTES OF FAMOUS SCIENTISTS Adrian Leftwich- Politics is at the heart of all collective social activity, formal and informal, public and private, in all human groups, institutions and societies. Harold Lasswell Politics is, in essence power: the ability to achieve a desired outcome, through whatever means. Kate Millett â€Å"Politics is a power-structured relationships, arrangements whereby one group of persons is controlled by another. â€Å"POLITICS†- as the constrained use of social power. Robert Goodin & Hans- Dieter Klingemann Constrained because there are already laws establish. Politics takes place in all social activities; politics happen at every level of social interaction Politics concern production, distribution and use of resources in the course of social existence. -Ability to achieve a desired outcome, through whatever means . Approaches to the study of Politics Ontology- the nature of being Epistemology -How do you know what we know? Theoretical – concept & idea Empirical- Evidence, observation History- both theory and experience Methodology – How do we exactly know what we know

Friday, November 8, 2019

Money Laundering Extract from UNODC Essays

Money Laundering Extract from UNODC Essays Money Laundering Extract from UNODC Essay Money Laundering Extract from UNODC Essay Money Laundering Extract from UNODC BY 24 Money is the prime reason for engaging in almost any type of criminal activity. Money-laundering is the method by which criminals disguise the illegal origins of their wealth and protect their asset bases, so as to avoid the suspicion of law enforcement agencies and prevent leaving a trail of incriminating evidence. Terrorists and terrorist organizations also rely on money to sustain themselves and to carry out terrorist acts. Money for terrorists is derived from a wide variety of sources. While terrorists are not greatly concerned with disguising the origin of money, they are concerned with concealing its destination and the purpose for which it has been collected. Terrorists and terrorist organizations therefore employ techniques similar to those used by money launderers to hide their money. The ability to prevent and detect money-laundering is a highly effective means of identifying criminals and terrorists and the underlying activity from which money is derived. The application of ntelligence and investigative techniques can be one way of detecting and disrupting the activities of terrorists and terrorist organizations. Because they deal with other peoples money, financial institutions rely on a reputation for probity and integrity. A financial institution found to have assisted in laundering money will be shunned by legitimate enterprises. An international financial centre that is used for money- laundering can become an ideal financial haven. Developing countries that attract dirty money as a short-term engine of growth can find it difficult, as a consequence, to attract the kind of solid long-term foreign direct investment that is based on stable conditions and good governance, and that can help them sustain development and promote long-term growth. Money-laundering can erode a nations economy by changing the demand for cash, making interest and exchange rates more volatile, and by causing high inflation in countries where criminals are doing business. Most disturbing of all, money-laundering fuels corruption and organized crime. Corrupt public officials need to be able to launder bribes, kick-backs, public funds and, on occasion, even development loans from international financial institutions. Organized criminal groups need to be able to launder the proceeds of drug trafficking and commodity smuggling. Terrorist groups use money-laundering channels to get cash to buy arms. The social consequences of allowing these groups to launder money can be disastrous. Taking the proceeds of crimes from corrupt public officials, traffickers nd organized crime groups is one of the best ways to stop criminals in their tracks. In recent years, the international community has become more aware of the dangers that money-laundering poses in all these areas and many Governments and jurisdictions have committed themselves to taking action. The United Nations and other international organizations are committed to helping them in any way they can. Criminals are now taking advantage of the globalization of the world economy by transferring funds quickly across international borders.

Wednesday, November 6, 2019

Anne Frank as my hero essays

Anne Frank as my hero essays The one historical figure that has had a dramatic impact on my life, and more than likely numerous others, is Anne Frank. I feel the courage and emotions that she was able to exhibit and display to herself as well as many others in dire times, is something to be admired by all. In 1942, when the Nazis began to invade her country, the Frank family was forced into hiding. Due to the horrible persecution of Jews, Anne Frank and her family were forced to hide in an attic of a warehouse. The Franks daughter, Anne, kept a thourough diary of that horrific experience. Just minutes before the Franks were discovered and captured in the attic they had been stowed in for two years, young Anne made an entry to her diary. Her words stated, In spite of everything, I still believe that people are really good at heart. This expression of pure love for all mankind, can only be spoken by Anne. If we could all aspire to have this type of outlook on life we would all be much better off. Even though Anne unfortunately had to endure and suffer so much, her courage and character only grew stronger. Before Anne Frank went into hiding, she led a blissful and joyous life. She was always surrounded by her family, friends, and those who loved her. She was torn away from this ideal and peaceful life and placed into the harsh and cruel reality of war and the Nazi agenda. Anne was only thirteen years old when she had to witness all these acts of hatred and violence. As I mentioned before the Frank family was persecuted because of their religious beliefs. Although they were facing threats of death, the family never abandoned their faith and belief. They always remained true to themselves and their faith, no matter the consecunces. I can not even begin to imagine what it must have been like for young Anne. Even though Im Hispanic and a Catholic I most likely will never get to the point of suffering that she endured, ...

Sunday, November 3, 2019

Exchange rate regime in Kazakhstan Essay Example | Topics and Well Written Essays - 2000 words

Exchange rate regime in Kazakhstan - Essay Example Kazakhstan has achieved highest economic growth rate amongst its sister countries during 2001-2008.It reached annual GDP of as high as 9.8 percent in 2000 and over 8.5 percent in 2007.Primary resources of higher revenues include: natural gas, oil, zinc, and copper (USAID, 2008, p.3).This paper explores Kazakhstans exchange rate regime over a period of time. Pegging Tenge against US dollar, Kazakhstan opted for an unsanctioned policy of a â€Å"soft† fixed rate regime in 1993.Soft exchange rate regime as compared to stringent regime refer to a regime that repositions the value of its domestic currency more frequently. Tenge’s initial value was fixed at the rate of T5 for every US dollar. Par value indicates the rate on which the domestic government agrees to defend its own currency in order to keep the fixed ratio between domestic and foreign currency (Burke, 2009).According to Begg, Fischer, and Dornbusch, the commitment to fixed exchange rate may built private sector’s trust on government when it comes to creating inflation, as it only makes the country uncompetitive (2003, p.484). In fixed regime, the government agrees to maintain its domestic currency’s value at a fixed rate. The Tenge is convertible, Central Bank of Kazakhstan is able to sell and buy in order to maintain the exchange rate equilibrium (Burke, 2009).Burke (2009) further explains that the Tenge is overvalued as compared to the US dollar. Under fixed exchange rate regime, devaluation means decline in the nominal exchange rate between Tenge and US dollar. However, Blanchard (2006, pp.380-383) warns that devaluation of the nominal exchange rate directs to real depreciation. Instant impact of currency devaluation appears in declining real exchange rate and enhancing the country’s competitiveness. It allows reallocating the resources in order to support domestic industries

Friday, November 1, 2019

Report - sustainability - compare the footprint of different countries Coursework

Report - sustainability - compare the footprint of different countries - Coursework Example In this report, the researcher will analyze what are the main factors that increase the water foot prints and how the water footprints can be lowered. Like other resources that help life on the earth to sustain, water is also an important component that helps the life to sustain on earth. Most of living organisms have more amount of water in their bodies besides other components. A normal human body has about 60percent of water and the rest 40% is other essential components. Seas and oceans cover almost 70% of the earth but the seawater is undrinkable as the water is saline and can damage the vital organs like kidneys, etc. The process of desalination water is quite expensive and requires a large amount of energy. Out of total water resources including saline seawater, 2.5 percent of the water can be drinkable but a major amount of drinkable water is found in the form of glaciers and only 1 percent of the water is for the human utilization (Johnson 2012). Some countries have more wat er resources as compared to the others. As the number of lakes and rivers present in the country is responsible for making the country full of drinkable water resources. In the similar way, a country with less rivers and lakes makes the country having less water resources. Having less water resources directly influences the human life as less water resources would influence the corps; farms, etc thus influence the food production. To minimize the water losses and water footprints we should cut down the excessive use of water. Like little alteration in the way we utilize the water can make big difference like how we utilize water during bath, during washing clothes, etc. The main concern is how the water is utilized in different countries. What are the water footprints in different countries and how the water footprints influence the water in some other regions? In this report, I will analyze what are the main factors that increase the water foot prints and how the water footprints c an be lowered. Methodology In this report, I will utilize the qualitative method as well as qualitative method for research. In qualitative research method, the secondary data collection method is utilized. In the secondary data collection, the data is collected from the previous research work associating with the topic of the research. The collected data is then analyzed and reviewed to extract the useful data from the raw data. In secondary data collection method, the previous work of other researchers and authors on the relevant topics is collected through various sources. The main source is the internet articles, journals and research works. Books on the other are