Tuesday, December 31, 2019

Poverty Notes - 3311 Words

Poverty: Poverty is the lack of basic human needs, such as clean water, nutrition, health care, education, clothing and shelter, because of the inability to afford them. . Relative poverty is the condition of having fewer resources or less income than others within a society ,or compared to worldwide averages. About 1.7 billion people live in absolute poverty; before the industrial revolution, poverty had mostly been the norm CAUSES OF POVERTY: Education: Lack of education keeps children from obtaining jobs that would lift them and their families out of poverty. Often, children are kept from school because they are needed at home to support their family with additional income. Health: Poor health decreases the amount of†¦show more content†¦For example, from 1990 to 1993, the period encompassing Desert Storm, per capita GDP in Iraq fell from $3500 to $761. The drop in average income, while a striking representation of the drop in the well-being of the average Iraqi citizen in the aftermath of the war, fails to capture the broader affects of damages to the infrastructure and social services, such as health care and access to clean water. Agricultural Cycles: People who rely on fruits and vegetables that they produce for household food consumption (subsistence farmers) often go through cycles of relative abundance and scarcity. For many families that rely on subsistence production for survival, the period immediately prior to harvest is a hungry period. During these periods of scarcity, many families lack sufficient resources to meet their minimal nutritional needs. Being familiar with these cycles has enabled development practitioners to anticipate and prepare for periods of acute need for assistance. Droughts and Flooding: Besides the immediate destruction caused by natural events such as hurricanes, environmental forces often cause acute periods of crisis by destroying crops and animals. Natural Disasters: Natural disasters such as hurricanes and earthquakes have devastated communities throughout the world. Developing countries often suffer much more extensive and acute crises at the hands of naturalShow MoreRelatedA Brief Note On The Poverty Of The United States1482 Words   |  6 PagesPROPOSAL ESSAY 1 Proposal Essay TASK 3 Topic: Causes of the chronic homelessness in the US. Laura Wright Western Governors University WGU Student ID #000478444 PROPOSAL ESSAY 2 The United States has a homeless population of more than a half million people. The homeless assistance programs are overloaded, leaving nearly one third of that half million unsheltered, sleeping outside on the streets, or in makeshift tent citiesRead MoreA Brief Note On Poverty And Its Effects On The United States1015 Words   |  5 Pages2. Poverty In 2013 more than half of the Honduran population lived below the poverty line, with six out of ten rural families living in extreme poverty. Honduras also ranked among the most unequal countries in the region, and its middle class was among the smallest in LAC. Low levels of economic inclusion, limited social mobility, and the extreme vulnerability of lower income households to a wide range of shocks have made poverty in Honduras especially deep and intractable. Over the past 15 yearsRead MoreA Brief Note On Poverty And Mental Health Essay1351 Words   |  6 PagesPoverty and Mental Health Poverty affects us all in society because money can cause all different types of types of stress. Some of the subjects I will be going over are how mental illness can be a contributing factor to poverty, drug addictions and the solutions I think would assist with these illnesses as well as employment opportunities that are diminished because of addictions and mental disorders. Sometimes this stress can lead to a mental disorder or in some cases addictions depending on howRead MoreAnalysis Of Mirror Vs. Suicide Note1222 Words   |  5 Pagesâ€Å"Mirror† vs â€Å"Suicide Note† Poetry is a type of literature that uses rhythmical composition to implement the reader with beautiful, imaginative or elevated thoughts (dictionary.com). Two of the finest poems during their time wereâ€Å"Mirror†, by Sylvia Plath, and â€Å"Suicide Note†, by Janice Mirikitani. Sylvia Plath was a troubled poet; throughout her life she had dealt with major depression. During college she attempted to put an end to her life by taking sleeping pills; she was placed in a mental instituteRead MoreIt is a fact that every day, 22,000 children die that live in poverty. It is a fact that more than800 Words   |  4 PagesIt is a fact that every day, 22,000 children die that live in poverty. It is a fact that more than 3 billion people live on less than $2.50 a day. In Africa, it is a fact that one in four people go hungry. Poverty is a very devastating topic. Poverty is having little to no money for everyday necessities, shelter, food, or a source of income. People who liv e in poverty have a lack of financial resources. People in poverty live without shelter, do not have clean water, don’t have access to doctorsRead MoreHow India s Rich Poor Divide Affects It1302 Words   |  6 PagesIntroduction In my Global Perspectives Project I will be talking about how India’s rich-poor divide affects it. I chose this subject because I truly find it fascinating how India’s poverty and wealth is so fart apart. India’s population escalates from multi million airs to an unbelievable amount of people under the poverty line. I believe that this issue can be solved but over centuries. Of course this isn’t the only problem in India but I find it the most intriguing. Another reason why India is fascinatingRead MoreEconomic Inequality And Its Effects On Economic Growth1709 Words   |  7 Pagesbetween the rich and the poor. The direct relationship between inequality and poverty has shown that while inequality increases, so too does poverty. Increased inequality is harmful for economic growth and its effects also bear social implications. Although there are arguments on the consequences of wealth redistribution and its unintended impact on economic growth, wealth sho uld be redistributed to reduce inequality and poverty, sequentially leading to more economic development and a higher standardRead MoreTrying to Erradicate Poverty and Extreme Poverty1351 Words   |  5 Pages Almost half of the world lives on less than $2.50 a day. The very poor suffer from lack of access to safe food and water, basic education, and medicine. For many of the world’s countries, poverty is prevalent. While almost half of the world lives in poverty, the rich continue to get richer. In 2005, the poorer 10% only accounted for 0.5% of the world’s share of private consumption, while the richest 10% accounted for 59% of consumption (Shah 1-4). There is an increasing inequality gap. The worldRead MorePoverty Case Study1277 Words   |  6 PagesPoverty The concept of poverty, when applied in both developing and developed country contexts, needs to be broadened beyond a uni-dimensional concentration on a person’s lack of financial resources. It is widely agreed that the relationship between poverty and education operates in two directions: poor people are often unable to obtain access to an adequate education, and without an adequate education people are often constrained to a life of poverty. However, before addressing the interrelationshipsRead MoreSocioeconomic Factors Of A Student s Life And Lower Academic Outcomes1711 Words   |  7 Pageshigh-income families and low-income families is widening (Grattan, 2014 June). And, at 12.8% (Ewing, 2013), people below the poverty line are a significant portion of the population. While these figures are already high, they do not represent the full scope of the problem which includes families above the poverty line but below the established middle class. A caveat to note here is tha t advantages and disadvantages exist among all positions in society, however this paper is concerned with academic

Monday, December 23, 2019

SWOT in Personal Life - Handling My Weaknesses and Threats Essay

Essays on SWOT in Personal Life - Handling My Weaknesses and Threats Essay The paper â€Å"SWOT in Personal Life - Handling My Weaknesses and Threats" is a brilliant variant of an essay on management. SWOT analysis is key to strategic planning and it is used to evaluate the strengths, weaknesses, opportunities, and threats involved in a business, a project and even individuals. It is subject to identification of the internal factors and the internal factors that work to favor or against the set objectives. This is a technique that was advanced by Albert Humphrey after a survey of the fortune 500 companies. A SWOT analysis can only be done after defining the end of state our objectives. This has been done to observe the viability of strategic planning models. When it is used in the business field, it can help you design a sustainable environment in the market. However, when applied in a personal context, it can be to mean developing a career in a way that suits your advantage according to your talents. Swot analysis can be used as an ice breaker in strategi c planning. It enables you to identify the internal factors, which are the strength and the weaknesses of the business, and also the external factors which are the threats and opportunities that you are likely to encounter.StrengthsStrengths look at the advantages threat both you and the company would likely be possessing that can be capitalized for the advantage of both you and the business. It also ensures that you easily understand your perfected areas that other people do not understand and how that can be a window of opportunity against the competition. This will not matter whether they are high-cost resources or high-cost resources so long as they all lead to a successful business establishment. It can be better if a personalized survey can be conducted to find out how many people can be able to give you your own strengths. After the research finding has been obtained, one is now justified to explain clearly without bias that he has a listed number of admissible strengths that can work best for him. SWOT has been the key element in the design of the unique selling proposition. This will work well for both an individual business venture and the public policies. All this should be realistic; they can be done and fulfilled.WeaknessesWeaknesses on the other end help to tell what one can be able to improve from the weak point of view to strength. Special precautions should be focussed on what to avoid people actually seeing them as weaknesses to your business. The people will also be able to tell you what exactly makes your business lose sales. When this is approached from an internal and external perspective, it makes the weaknesses be very clear to you especially those that are able to identify by other people. All this need to judge from a clear point of view with honesty and sincerity. It is again that time that one has to face the truth and these calls for being realistic whether for a business proposal or swot for a business venture. This is the other i nternal factor that serves you good.

Sunday, December 15, 2019

Home Security System Free Essays

string(71) " in a place where the path is likely to be interrupted by an intruder\." ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, house security system becomes the best solution to overcome house intrusion problem when user is not in house. As we know, there are many types of house security system which is too expensive and difficult to use. We will write a custom essay sample on Home Security System or any similar topic only for you Order Now For that reason, an effective house security system at low cost is built where user can also program the security system by their own. This project is focusing on developing a house security system with an active infrared motion detector which is controlled by microcontroller Intel 8051. The overall project is divided into two parts. The first part is concern on the hardware development where all electronics component are connected via the circuit design using wrapping technique. An active infrared, the magnetic sensor, and keypad are the input components while buzzer, indicator, and LCD display are the output components where it’s all controlled by controller circuit. The second part is base on software programming to operate the hardware structure. Program for security system based on microcontroller Intel 8051 assembly language is assemble using ASM51 assembler to get the binary file thus, to load into external memory of the hardware structure via serial communication. The process of downloading and executing the program is done using HyperTerminal’s communication software to the microcontroller serial port. In order to achieve the best house security system, more detectors or sensors can be connected to the microcontroller output port where it can be reprogram by user using their personal computer at home. Read this  Chapter 2 – Why Security is Needed As the result, the infrared motion detector is capable to detect motion while the microcontroller is capable to control the whole operation of the security system. CHAPTER 1 INTRODUCTION 1. 1 Background Motion detection is the action of sensing physical movement in a given area. Motion can be detected by measuring change in speed or vector of an object in the field of view. This can be achieved either by mechanical devices that physically interact with the field or by electronic devices that quantifies and measures changes in the given environment. There are two device of motion detection which is the mechanical device, and the other one is electronic device. In the mechanical device, a tripwire is a simple form of motion detection. If a moving objects steps into the tripwire’s field of view then a simple sound device like bells may alert the user. Mechanical motion detection devices can be simple to implement, but at the same time, it can be defeated easily by interrupting the devices’ mechanics like â€Å"cutting the wire†. While in electronic device, the electronic motion sensing such as motion detectors, can prevent such mechanical intervention. The principal methods by which motion can be electronically identified are optical detection and acoustical detection. Infrared light or laser technology may be used for optical detection. Motion detection devices, such as motion detectors, have sensors that detect movement and send a signal to a sound device that produces an alarm or switch on an image recording device. There are motions detector which employ cameras connected to a computer which stores and manages captured images to be viewed over a computer network. The applications for such detection are detection of unauthorized entry, detection of cessation of occupancy of an area to extinguish lighting, and detection of a moving object which triggers a camera to record subsequent events. The motion detector is thus a basic idea of electronic security systems. 1. 2 Project objective The objective of this project is to build a house security system using microcontroller Intel 8051 based on active infrared motion detection. 1. 3 Project scope This project concentrates on a development of an active infrared motion detector for house security system. To develop the whole project, it consists of three methods which are the concept of security system, the electrical structure, and the software programming. The concept of security system is on the detection of movement using active sensor to trigger alarm controlled by the microcontroller Intel 8051. The electrical structure consist of two systems which are the active infrared circuit that used to detect or sense motion and the microcontroller Intel 8051 circuit, used to control the whole operation of the security system. While the software programming is base on the microcontroller Intel 8051 instruction sets. It contains a program designed for a security system as an interaction to operate the electrical structure. 1. 4 Literature review Motion detectors are mainly used in security systems [4]. It is typically positioned near exterior doorways or windows of a building to monitor the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the average homeowner as well as commercial organizations [4]. An electronic motion detector is a device used to detect any physical movement in a given area and transforms motion into an electric signal. It consist of sensor that electrically connected to other devices such as security system, lighting, audio alarms, and other applications. Motion sensors are used in a wide variety of applications and as a result, many different types of motion sensors are available including the infrared sensor. Infrared sensors are widely known in the arts of intrusion detection and in fire or smoke detection. It is a device that often used in automatic light switches and security systems to turn on a light or to activate some other form of alarm or warning indicator when a person enters a monitored area [4]. The infrared sensors have basically two forms: active and passive. [4] An active infrared detector includes a radiation source and an infrared sensor which is sensitive to interruptions in the radiation sensed from the source. [4] These detectors are used as intrusion detectors by providing a path of radiation from the source to the sensor in a place where the path is likely to be interrupted by an intruder. You read "Home Security System" in category "Papers" The proposed active infrared method of motion detection has the advantage of fast speed response of a relatively large sensor. This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents substantial problems in the passive infrared (PIR) sensors. Low production cost is another advantage of these active infrared detectors. [4] Passive infrared motion detection detects heat energy radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is generally use an optical ollection system and multiple sensing elements of alternating polarity to create a detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for producing a detection signal in response to the heat sensor detecting a change o f temperature caused by the body heat of a person entering the detection pattern. PIR motion detectors are perhaps the most frequently used home security device. 4] Passive IR motion detectors are usually designed to provide an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is responsive to receipt of the breach indication to cause an alarm condition to occur. The other motion detector used in security system is an ultrasonic motion detector. It is commonly used for automatic door openers and security alarms [4]. It is inexpensive and can operate with narrow beam-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector. It can be used to detect motion in an area where there are not supposed to be any moving objects. This type of motion detector is most commonly used in burglar alarm systems since they are very effective in this application [4]. In an ultrasonic motion detector, there are two transducers; one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the receiver in constant phase if none of the objects in the area are moving. If something moves, the received signal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm. Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a plane overhead. Besides, the installation options on this type of motion detector are limited because ultrasonic beams are easily blocked by thin materials, including paper. False triggering is easily caused by reflections from blowing curtains, pets, and flying insects. While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use two infrared sensors, which monitor different zones within a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area. For that reason, the purpose of using the active infrared as a sensor to detect motion for this project is surely on the advantage offers by the sensor. Its capability on detecting motion with a simple design at lowest cost is needed to build an effective house security system based on motion detection. 1. 5 Thesis outline Chapter 1 explains the background of motion detection, the project objective, the project scope, and the literature review of motion detector for security system. The concepts of motion detector are the major element as a guide for the development of the security system. Chapter 2 explains the systems involved for the development of the active infrared motion detector for house security system. The understanding of three systems which are the active infrared, motion detector, and house security system stated in this chapter needed for the development of the whole project. Chapter 3 focuses on the methodologies for the development of the electrical structure and the implementations of microcontroller programming. It gives a brief review on the concept of active infrared motion detector, the electrical structure for hardware development, and the programming for the operation of the security system. Chapter 4 discusses on the results obtained of the whole project. All discussions are concentrating on the result and performance of the security system. The discussion is valuable for future development of the security system. Chapter 5 discusses about the conclusion on development of the active infrared motion detector for house security system. The recommendations and modification required on this project is stated in this chapter for further development. CHAPTER 2 ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM 2. 1 Introduction There are two systems on a development of the active infrared motion detector for house security system. The first system is an active infrared motion detector and the other one is the controller system. The first system concentrates on a development of an active infrared motion detector. It is consists of three element, which are the active infrared, the motion detector, and the house security system. The motion detector circuit will be control by the second system which is the microcontroller Intel 8051 based system. The combination between this two systems will built a project called an active infrared motion detector for house security system. 2. 2 Active infrared (IR) Infrared is an electromagnetic spectrum at a wavelength that is longer than visible light. It cannot be seen but it can be detected. Objects that generate heat also generate infrared radiation and those objects include animals and the human body whose radiation is strongest at a wavelength of 9. 4 µ meter. Infrared in this range will not pass through many types of material that pass visible light such as ordinary window glass and plastic. However it can pass through, with some attenuation, material that is opaque to visible light such as germanium and silicon. The active infrared sensors use invisible light to scan a defined area. In active infrared systems, there are two-piece elements which are consisting of an infrared transmitter and an infrared receiver. There is a 3/8 inch infrared beam between the transmitter which is placed on one side of the trail and the receiver which is placed on the other side of the trail. The transmitter and the receiver can be separated by as much as 150 feet. The transmitter emits a beam of light into the scan zone. The light, which is reflected by the background returns to the receiver, which constantly monitors the scan zone. When a person or object enters the zone the infrared light is interrupted. It then sends a signal to the controller system, which is wired into the door controls. One variation of this operating mode is called ‘background suppression’. This is when the receiver only detects a change in the reflected light when a person or object enters the scan zone thus causing a reflectance variation of the light, sending a signal to the microcontroller thus trigger the alarm of the security system. 2. 3 Motion detector A motion detector is a device that contains a motion sensor and is either integrated with or connected to other devices that alert the user of the pre-sense of motion. An electronic motion detector contains a motion sensor that transforms the detection of motion into an electric signal. The electric signal can be connected to a burglar alarm system which is used to alert the home owner or security service after it detects motion. An example of sensor that used in security system is an active sensor. Active sensors in motion detectors system are commonly used inside homes for a security system. An active motion detector emits optics or sound waves and measures feedback to detect motion. The simplest type of active motion detector is commonly used in commercial doorways to trigger a doorbell. A device is fixed to one side of the doorway, an optical sensor to the other. A beam of light will passes from the device through the sensor. When someone enters the establishment, the beam is broken, triggering the doorbell thus warn user for the intrusion. For that reason, active motion detectors can be purchased for home improvement security system. It is inexpensive devices that can add for more security to a home and provide peace of mind for home owners. 2. 4 House security system House security system is one of security that truly related to burglar or safety alarm system. Burglar and safety alarms are found in electronic form nowadays. Sensors are connected to a control unit via either a low-voltage hardwire which in turn connects to a means for announcing the alarm to elicit response. In a new construction systems are predominately hardwired for economy while in retrofits wireless systems may be more economical and certainly quicker to install. Some systems are dedicated to one mission; handle fire, intrusion, and safety alarms simultaneously. In common security system, the lights are triggered by motion gives the impression to user that someone is at home and able to see the burglar. Infrared motion detectors placed in house security system in crucial areas of the house can detect any burglars and alert the home owner or police. The first security system invented, house alarms were triggered by the release of a pressure button fitted into a door or window frame. This basic alarm was fundamentally flawed as the entire intruder needed to do to silence the alarm was to close the door or window. While various systems on the market ranging from inexpensive house security alarms to highly sophisticated systems requiring professional installation. All modern alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or closed depending on the security system designed. The alarm is triggered when the circuit is altered and will not be silenced until a code is punched into the control panel. The most expensive and complicated alarm systems might also involve a combination of motion sensors and pressure pads to ensure even the most cunning intruder doesn’t get his hands on treasures. 2. 5 Microcontroller Intel 8051 The microcontroller 8051 is an 8-bit machine. Its memory is organized in bytes and practically all its instruction deal with byte quantities. It uses an Accumulator as the primary register for instruction results. Other operands can be accessed using one of the four different addressing modes available: register implicit, direct, indirect or immediate. Operands reside in one of the five memory spaces of the 8051. The five memory spaces of the 8051 are the Program Memory, External Data Memory, Internal Data Memory, Special Function Registers and Bit Memory. The Program Memory space contains all the instructions, immediate data and constant tables and strings. It is principally addressed by the 16-bit Program Counter (PC), but it can also be accessed by a few instructions using the 16-bit Data Pointer (DPTR). The maximum size of the Program Memory space is 64K bytes. The External Data Memory space contains all the variables, buffers and data structures that can not fit on-chip. It is principally addressed by the 16-bit Data Pointer (DPTR), although the first two general purposes register R0 and R1 of the currently selected register bank can access a 256-byte bank of External Data Memory. The maximum size of the External Data Memory space is 64K bytes. The external data memory can only be accessed using the indirect addressing mode with the DPTR, R0 or R1. The Internal Data Memory space is functionally the most important data memory space. In it resides up to four banks of general purpose registers, the program stack, 128 bits of the 256-bit memory, and all the variables and data structures that are operated on directly by the program. The maximum size of the Internal Data Memory space is 256-bytes. The register, indirect and direct addressing modes can be used in different parts of the Internal Data Memory space. The Special Function Register space contains all the on-chip peripheral input and output registers as well as particular registers that need program access. The maximum number of Special Function Registers (SFRs) is 128, though the actual number on an 8051 family member depends on the number and type of peripheral functions integrated on. The SFRs can only be accessed using the direct addressing mode while the upper 128 bytes of the Internal Data Memory can only be accessed using the Indirect addressing mode. The Bit Memory space is used for storing bit variables and flags. There are specific instructions in the 8051 that operate only in the Bit Memory space. The maximum size of the Bit Memory space is 256-bits. Bits can only be accessed using the bit instructions and the direct addressing mode. 2. 6 Summary The understanding on the elements of the systems involved for this project which are the active infrared, the motion detector, and the house security system is needed before proceed for the design and development process. This is important to ensure the project done according to the main idea of each part discuss in this chapter. CHAPTER 3 METHODOLOGY 3. 1 Introduction There are several steps to be applied in designing an active infrared motion detector for house security system. The relevant information is gathered through literature review from previous chapter. Data on motion detection and security system projects has been collected where the theoretical design is studied based on the motion detector for security concept. The understanding on the electrical structure for the hardware development is needed for the design circuit process of the motion detector and the basic security circuit. The next is the hardware development according to the circuit designed. This process is just only being proceed if each part of the circuit being improved is valid, else, it will be repeated until it is valid as the theoretical. Once the hardware development circuits have the output as the expected, then, the comparison for both hardware and theoretical analysis will be done. Next is the step where software structure is developed for the security system to be interface with the hardware development. While the final step of this research is on applying the whole project to the real house entrance like doors and windows. 3. 2 The concept of motion detector for security system Figure 3. 1 Active infrared motion detectors Figure 3. 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consists of two housings. The first housing contains an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector. The other housing contains an infrared reflector to reflect the infrared signal. When positioned in front of an entrance to a protected area, the two housings establish an invisible beam. Figure 3. 2 The concept of infrared motion detector for security system A person who enters the area will interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the active infrared motion detector. An interruption in the signal modulated pulsating beam transmit by an infrared diode while receive by an infrared detector will set ‘on’ or ‘off’ the alarm of the security system. 3. 3 Hardware development Figure 3. 3 Block diagram for the house security system The hardware development is divided into three stages as shown in block diagram above. The inputs stage of the security system is the motion detector circuit, keypad, and magnetic sensor. The second stage is the controller unit which is the microcontroller Intel 8051. The purpose of using microcontroller is to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzers. 3. 3. 1 Motion detector circuit In designing the infrared motion detector circuit, it is based on two basic principle of active infrared motion detector which is the infrared transmitter and infrared receiver as shown in Figure 3. 4. Figure 3. 4 Basic principle of infrared operation 3. 3. 2 Infrared transmitter For the infrared transmitter which is also known as emitter circuit, it is on a basic design of timer 555 astable operation. The output of timer is connected to the infrared transmitter is used to produce pulse using an astable timer circuit. In astable circuit operation, pulse will continually generated until the power supplied through the circuit is removed. The astable circuit produces a continuous train of pulses at any frequency required. This means that the 555 timer can operate repeatedly; it will switch ‘on’ and ‘off’ continually to generate data for the infrared transmission. . 3. 3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high ‘1’ or low ‘0’ from the output termi nal thus activate or deactivate the controller system operation. The range of infrared detector components according to datasheet stated that the infrared detector can fully operates on detecting the infrared signal of 38 to 45 kHz. . 3. 4 4 ? 4 hexadecimal keypad The purpose of using 4 ? 4 hexadecimal keypad in the project is as an input where secure code entries to activate of deactivate the security system operation. The keypad provides eight interface pins, where one pin for each row and column of the keypad matrix. This 4 ? 4 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the keypad bouncing in the hardware development. 3. 3. 5 Keypad encoder (MM74C922) The MM74C922 key encoders provide all the necessary logic to fully encode an array of 4 ? hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller syst em. Figure 3. 5 Interaction between keypad, keypad encoder, and octal buffer The figure 3. 5 above shows the block diagram on the interaction between the 4 ? 4 hexadecimal keypad, keypad encoder (MM74C922), and the octal buffer (74LS244). The keypad is used as a switch to give logic configuration to the keypad encoder. While the encoder will encode the data configuration from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 3. 3. 6 Octal buffer (74LS244) A buffer is simply a unity-gain amplifier, usually with very high input impedance and very low output impedance. It allows a connection of heavily loaded to another load which requires a lot of current like capacitive load. The octal buffer is used to isolate one device from another by eliminating loading effects. It provides a ‘buffer’ between the two devices. The 74LS244 are octal buffers and line drivers designed to be employed as the memory address drivers, clock drivers, and bus-oriented transmitters/ receivers which provide improvement on the controller board density. 3. 3. 7 Microcontroller circuit (Intel 8051 – expended mode) The controller systems that use to control the motion detector system and other electronic devices are the microcontroller Intel 8051 – expended mode. In expended mode configuration, external ROM and RAM are used to add the data memory to be more than internal memory provided by the Intel manufacturer. The purpose of using an expended mode for the project is to expend more data available on developing and designing an excellent operation of the security system. Figure 3. 6 Intel 8051 block diagram The microcontroller Intel 8051 is a widely used on controlling devices and instruments due to its flexibility, existence of multiple producers. It consists of a simple architecture introduced by Intel in the year of 80’s. It produced with 128 bytes of RAM, 4K bytes of on-chip ROM, 2 timers, one serial port, and 8-bits wide of ports. This type of microcontroller become very popular after Intel allowed another manufacturer to make and market any flavor of the 8051, and still remains compatible with 8051. There are various versions of 8051 with different speeds and amount of the on-chip ROM which is valuable on controlling a system designed. 3. 4 Software development The software structure is using the assembly language where a set of program based on security system is assembled using ASM51 assembler. The 8051 Cross Assembler (ASM51) takes an assembly language source file created with a text editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the Cross Assembler builds a symbol table and labels that used in the source file. While the second pass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose. A security program as shown in flow chart below were written in notepad based on 8051 instruction set before assembling process to get the binary code. This binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 3. 7 is a basic designed for the security system operation. In this security system, the security code is set as ‘1985’ to activate or deactivate security system. When user closed the door, the system will activate where the magnetic switch and infrared is in active condition. To deactivate the system where opening door without alarm, user must enter the deactivation code. The chance to deactivate the system is once before keypad locked, where user can not enter the code anymore. If deactivation code was correct, green LED will ‘on’ while alarm will ‘off’ condition. System at this time is successfully deactivated and user can open the door without alarm. Figure 3. 7 Flow chart of software design for the security system If deactivation code enters was incorrect, system is still activate and for that, red LED and alarm will ‘on’ where the system is in a warning mode. The system will keep in this mode until the correct deactivation code entered. When the correct deactivation codes enter, the reconfirm code is needed where user need to reenter the correct deactivation code before the system successfully deactivate; the green LED will ‘on’ and the alarm will ‘off’ condition. The reconfirm code is designed in the system to make more security for the system developed. If intruder open the magnetic switch without entered the correct security code, thus the alarm will ‘on’. User must enter the correct deactivation code to turn ‘off’ the alarm system. The activation and deactivate code for this system are ‘1985’ and the ‘enter’ button codes are ‘A’ for every codes entered. 3. 5 Summary There are three elements discussed in this chapter which are the concept of motion detector for security system, the hardware development, and the software designed for the security system. Each part of these elements is related to each other. The understanding of the concepts and methods on developing the project is very important to achieve the main objective for the whole project. CHAPTER 4 RESULTS AND DISCUSSIONS 4. 1 Introduction This chapter will briefly discuss on the results and discussions of the hardware development. There are three major modules in developing the hardware structure which are the active infrared motion detector circuit, keypad module circuit, and the most important; the controller circuit 4. 2 Motion detector circuit The hardware development of the active infrared motion detector system is divided into two parts, which are the infrared emitter circuit and the infrared detector component. 4. 2. 1 The emitter The emitter which also known as infrared transmitter circuit was build as shown in Figure 4. . A probe or the oscilloscope is attached to the infrared LED while the adjustable resistor is varied to calibrate the emitter to transmit 38 kHz square wave. The Figure 4. 1 shows the final configuration of the emitter circuit: Figure 4. 1 The emitter circuit Figure 4. 2 shows the result obtained from the oscilloscope where the frequency generated by the emitter circuit is 38. 67 kHz square w ave. At this generated frequency, the voltage maximum produced is 1. 60V and the peak to peak voltage is 1. 16V. Figure 4. 2 The 38 kHz frequency generated by the emitter circuit How to cite Home Security System, Papers

Saturday, December 7, 2019

Globalization of Rydges Hotel Group Sydney

Question: Discuss about the Globalization of Rydges Hotel Group Sydney. Answer: Introduction Global hospitality and tourism industry is growing at a rapid rate allowing more opportunities(Peters, 2009). Rydges Hotel is an Australian based chain of hotels that is focused in Sydney and other locations in Australia. The Company also offers alliance programs with Global Hotel Chains offering stays for its customers in over 500 global locations. The current aim of the business is to opt for international expansion by itself such that it can accommodate tourists outside Australia. The Company is extremely profitable and wants to expand its current expertise to outside of the country. The scope of the current study focuses on the international expansion modes that the Company will adopt for its internationalization strategy. Background of the Problem Rygdes Hotel in Australia is facing immense problem from stagnation in profits and market expansion opportunities(/www.rydges.com, Retrieved on 4th April 2017). Though it has a spread of a number of hotels across Australia, New Zealand and UK it is experiencing stagnation in growth rates compared to its previous years. In the scope of the recent business expansion, it is considering expanding into developing countries as India, Brazil, Mexico or Indonesia. These countries are currently expanding and offering a host of opportunities for hospitality industry to set up and conduct their businesses(Hjalager, 2010). The Company will thus, analyse situation prevailing in each of these countries and then adopt a suitable business model for expansion into these markets. Research aims and Objectives In order to attain goals of the study the following research aims and objectives have been designed(Mok, 2013). Research Objective 1: To understand the scope of international hospitality business Research Objective 2: To analyse the ideal market for expansion for the current hospitality chain Research Objective 3: To analyse the international expansion strategy that will be adopted by the brand Research Objective 4: To understand the barriers and opportunities of entry Methodology A research methodology is the most critical part of any project that allows the scholar to develop course of action(Cline, 2011). For the current research qualitative and quantitative data will be collected and analyzed. The data will be both of primary and secondary nature. Primary data, which is first hand data, will be collected by means of interviews, surveys, questionnaires and other methods. Secondary data will be collected by means of newspapers, internet sources, journals, books, company magazines and so on. As secondary data reliability cannot be assessed easily each of such data will be verified(Time, 2012). In order to attain research objectives relevant data from each of the country will be collected and analyzed. These collected data will provide insights regarding the prevalent macro-economic forces and industry conditions. Once data regarding each country has been collated then a suitable international entry strategy into these countries will be ascertained which will provide maximum amounts of revenue to the parent Company(Silverman, 2016). Conclusion The research aim and methodology allows ascertaining proper direction to the scope of the research work. From the methodology proper findings and analysis can be ascertained which will enable the Company to decide on the suitable country of expansion as well as the entry mode for expansion. While these developing countries provide immense opportunities there remains pertinent threats from the same regarding their political, economic and social scenario, also industry conditions prevalent in each country is separate. the scope of this study will allow to ascertain scope for global expansion for the Company. References /www.rydges.com. (Retrieved on 4th April 2017). Company Profile . https://www.rydges.com/. Cline, R. (2011). Data collection methods. . Introduction to the Pharmacy Business Administration Series. Hjalager, A. M. (2010). A review of innovation research in tourism. Tourism management, 1-12. Mok, C. S. (2013). Service quality management in hospitality, tourism, and leisure. . Routledge. Peters, M. F. (2009). The importance of lifestyle entrepreneurship: A conceptual study of the tourism industry. 393-405: Pasos. Silverman, D. e. (2016). Qualitative research. Sage. Time, C. (2012). Data Collection Methods. . Review of Sociology, 225-249.

Friday, November 29, 2019

QUINTO INFORME SOBRE LA SITUACIN DE LOS DERECHOS Essays

QUINTO INFORME SOBRE LA SITUACIN DE LOS DERECHOS HUMANOS EN GUATEMALA CAPTULO X LOS DERECHOS DE LOS PUEBLOS INDGENAS Introduccin 1. Los derechos humanos de los individuos y pupueblos indgenas de Guatemala, aproximadamente la mitad de la poblacin total, han sido objeto de constante atencin de la Comisin[1]. El pueblo maya, el mayor en nmero de integrantes, comprende las comunidades lingsticas Achi', Akateco, Awakateco, Ch'orti', Chuj, Itza, Ixil, Popti', Q'anjob'al, Kaqchikel, K'iche', Mam, Mopan, Poqomam, Pocomchi', Q'eqchi', Sakapulteko, Sipakapense, Tektiteko, Tz'utujil y Uspanteco.[2] La poblacin indgena esta tambin integrada por los pocos sobrevivientes del antiguo pueblo xinca, y por el pueblo garfuna, este ltimo de races indgenas y africanas ubicado en areas cercanas a la costa atlntica de Guatemala. 2. Por su conformacin poblacional Guatemala es un Estado multitnico, multilinge y pluricultural. 3. La poblacin de Guatemala es en su mayora rural. El 65%[3] de los habitantes residen en zonas rurales, y de ellos 52%[4] son indgenas, mayora que es ms pronunciada en los departamentos alejados de la capital. Los indgenas constituyen algo menos de la mitad de la poblacin urbana[5]. 4. Los indgenas en Guatemala histricamente han sido discriminados tnicamente, constituyen gran parte de la poblacin pobre o en extrema pobreza y son mayora en los departamentos con los ms altos ndices de exclusin social. Lo mismo ocurre en asentamientos urbanos marginales. Sin embargo, rurales o urbanos, mantienen en todas las regiones, una actividad y organizacin social intensa y una cultura rica y en continua adaptacin a las exigencias de los cambios histricos, defendiendo y desarrollando su identidad cultural. A. Marco jurdico 5. La legislacin en Guatemala contiene una serie de normas especficas y dispersas, de rango constitucional y legal, sobre los pueblos indgenas. La tendencia legislativa de la ltima dcada en esta materia se ha caracterizado por incorporar en el ordenamiento legal normas de reconocimiento y proteccin en favor de los indgenas, en relacin por ejemplo con la proteccin del nio o la nia indgena, la promocin de la educacin bilinge intercultural, la creacin de instituciones de proteccin y defensa de la mujer indgena, entre otras. 6. La Constitucin Poltica de la Repblica reconoce que el Estado est formado por diversos grupos tnicos y asegura reconocer, respetar y promover sus formas de vida, costumbres y tradiciones. Proteccin a grupos tnicos. Guatemala est formada por diversos grupos tnicos entre los que figuran los grupos indgenas de ascendencia maya. El Estado reconoce, respeta y promueve sus formas de vida, costumbres, tradiciones, formas de organizacin social, el uso del traje indgena en hombre y mujeres, idiomas y dialectos. [6] 7. En 1997 entr en vigencia en Guatemala el Convenio 169, sobre pueblos indgenas y tribales en pases independientes, de la Organizacin Internacional del Trabajo (O.I.T.) que es el instrumento internacional de derechos humanos especfico ms relevante para los derechos de los indgenas, que establece que : Los pueblos indgenas y tribales debern gozar plenamente de los derechos humanos y libertades fundamentales, sin obstculos ni discriminacin. Las disposiciones de este Convenio se aplicarn sin discriminacin a los hombres y mujeres de esos pueblos.[7] B. LOS INDGENAS GUATEMALTECOS Y EL CONFLICTO ARMADO (1962-1996) 8. La cifra total de vctimas de la violencia politica en este perodo ha sido estimada por investigaciones y estudios en ms de doscientas mil, sea personas muertas o desaparecidas forzosamente, consecuencia del conflicto armado en Guatemala ocurrido entre los aos 1962 y 1996.[8] La gran mayora de las vctimas fueron guatemalteco-mayas. 9. Los guatemalteco-mayas representaron el 83% de las vctimas plenamente identificadas por la Comisin para el Esclarecimiento Histrico[9], (CEH) en su trabajo de documentacin de las violaciones de los derechos humanos y hechos de violencia vinculados al enfrentamiento armado. En su labor de documentacin la CEH identific 42.275[10] vctimas hombres, mujeres y nios de las que 23.671 fueron vctimas de ejecuciones arbitrarias y 6.159 vctimas de desaparicin forzada. 10. La poltica contrainsurgente en Guatemala se caracteriz en varios perodos por acciones militares destinadas a la destruccin de grupos y comunidades como tales, as como al desplazamiento geogrfico de comunidades indgenas cuando se las consideraba posibles auxiliares de la guerrilla. En el perodo ms violento del conflicto armado (1978-1983), bajo las presidencias de los generales Romeo Lucas Garca (1978-1982) y Efran Ros Montt (1982-1983) los operativos militares se concentraron en Quich, Huehuetenango, Chimaltenango, Alta y Baja Verapaz, costa sur y ciudad de Guatemala. 11. Las masacres en las aldeas Plan Snchez y Dos Erres ocurridas en 1982 son ejemplos dolorosos de la poltica de exterminio en contra de las comunidades indgenas. El exterminio

Monday, November 25, 2019

Taxpayer Cost for Political Conventions

Taxpayer Cost for Political Conventions American taxpayers help pay for the political conventions held every four years by both the Republican and Democratic national committees. The conventions cost tens of millions of dollars and are put on even though there have been no brokered conventions and every presidential nominee in modern history has been chosen well beforehand. Taxpayers directly contributed $18,248,300 million to the Republican and Democratic national committees, or a total of $36.5 million, to hold their presidential nominating conventions for the 2012 election. They gave similar amounts to the parties in 2008. In addition, Congress set aside $50 million for security at each of the party conventions in 2012, for a total of $100 million. The total cost to taxpayers of the two national party conventions in 2012 exceeded $136 million. Corporations and unions also help cover the cost of the conventions. The cost of holding the political conventions, though, has come under intense scrutiny because of the nations growing national debt and annual deficits. Republican U.S. Sen. Tom Coburn of Oklahoma has referred to the political conventions as mere summertime parties and called on Congress to end taxpayer subsidies for them. The $15.6 trillion debt cannot be eliminated overnight, Coburn said in June 2012. But eliminating taxpayer subsidies for political conventions will show strong leadership to getting our budget crisis in control. Where the Money Comes From The taxpayer subsidies for political conventions come through the Presidential Election Campaign Fund. The account is funded by taxpayers who choose to contribute $3 to it by checking a box on the federal income tax returns. About 33 million taxpayers contribute to the fund every year, according to the Federal Election Commission. The amount each party receives from the Presidential Election Campaign Fund to cover convention costs is a fixed amount index to inflation, according to the FEC. The federal subsidies cover a smaller portion of the political convention costs. In 1980, the public subsidies paid for nearly 95 percent of the convention costs, according to the Congressional Sunset Caucus, whose goal is to uncover and eliminate government waste. By 2008, however, the Presidential Election Campaign Fund covered only 23 percent of the political convention costs. Taxpayer Contributions to Political Conventions Here is a list of how much each major party was given in taxpayer subsidies to hold their political conventions since 1976, according to FEC records: 2012 – $18,248,3002008 – $16,820,7602004 – $14,924,0002000 – $13,512,0001996 – $12,364,0001992 – $11,048,0001988 – $9,220,0001984 – $8,080,0001980 – $4,416,0001976 – $2,182,000 How the Money is Spent The money is used to pay for entertainment, catering, transportation, hotel costs, â€Å"production of candidate biographical films,† and a variety of other expenses. There are few rules on how money from the Presidential Election Campaign Fund is spent. Federal law places relatively few restrictions on how PECF convention funds are spent, as long as purchases are lawful and are used to defray expenses incurred with respect to a presidential nominating convention, the Congressional Research Service wrote in 2011. By accepting the money the parties do agree, however, to spending limits and the filing of public disclosure reports to the FEC. Spending Examples Here is some example of how money is spent by the Republican and Democratic parties on political conventions in 2008, according to Coburns office: Republican National Convention Committee: $2,313,750 – Payroll$885,279 – Lodging$679,110 – Catering$437,485 – Airfare$53,805 – Film production$13,864 – Banners$6,209 – Promotional items - gift bags$4,951 – Photography services$3,953 – Floral arrangement for convention$3,369 – Communications consultant Democratic National Convention Committee: $3,732,494 – Salaries$955,951 – Travel$942,629 – Catering$374,598 – Political consulting fees$288,561 – Production music$140,560 – Production: Podium$49,122 – Photography$14,494 – Gifts/trinkets$3,320 – Makeup artist consultant$2,500 – Entertainment Criticism of Political Convention Costs Several members of Congress including Coburn and U.S. Rep. Tom Cole, a Republican from Oklahoma, have introduced bills that would end taxpayer subsidies of political conventions. The major parties are more than capable of funding their own national conventions through private contributions, which already generate over three times the amount the federal grants provide for this purpose alone, the Sunset Caucus wrote in 2012. Others have pointed out what they call the hypocrisy in congressional criticism of the General Services Administration for spending $822,751 on a team building meeting in Las Vegas in 2012 and lack of scrutiny over political convention spending. In addition, many critics of taxpayer subsidies for political conventions say the events are unnecessary. Both parties chose their nominees in the primaries and caucuses- even the Republicans, whose party implemented a little-noticed change in the primary system that lengthened the amount of time it took the eventual nominee to secure the 1,144 delegates necessary for the nomination in 2012.

Friday, November 22, 2019

Jet Aircrafts and Aerospace Defence Equipments Essay

Jet Aircrafts and Aerospace Defence Equipments - Essay Example The market for aerospace and defense is highly influenced by other factors such as product development, product differentiation, technological innovations as well as the overall competitive environment. The market for commercial airlines and defense equipment is highly dominated by three major players – Boeing, EADS and Dassault Aviation. The Boeing Company, founded by William E Boeing in 1916, is a pioneer in the field of aerospace and defense materials. It is the world’s largest global manufacturer and supplier of commercial jetliners and military aircraft, catering to a wide range of markets including the supply of its defense products to the U.S and other allied armed forces across the world and is the second largest1 aerospace and defense contractor in the world. This is the largest business unit of Boeing so far and is mainly engaged in the process of unit designing and development and manufacturing of commercial jetliners. It boasts of a robust portfolio comprising of a range of products such as the 737 series, which has a seating capacity of up to 150 passengers, 747 series, which accommodates up to 566 passengers, 767 series with a capacity of 325 passengers, and 757 series up to 230 passengers. The company frequently introduces latest models in this segment and is currently working on the Dreamliner, which boasts of an impressive state of the art technology with an aim to provide ultimate ease in traveling to its customers. Boeing’s commercial aircraft sales play a major role in enhancing its brand value and popularity ultimately translating into increased profitability. The sale of defense products is highly dependent on external factors such as government support – in the form of subsidies, military budgets as well as the political environment. Boeing saw a substantial rise in the demands for its defense and space-related services in the wake of the Iraq war.  

Wednesday, November 20, 2019

International Trade Ph.D. Essay Example | Topics and Well Written Essays - 1250 words

International Trade Ph.D. - Essay Example Along with specificity, the transaction is time ordered. Each actor involved in the transaction must handle all matters within the time period stipulated within the content of the term or type of payment. In this particular instance, the negotiating process has commenced and the quantity and cost of the items have been identified, therefore the process of tinder of an offer has previously taken place. The process now proceeds to a formal finalization of quantity, type, cost, terms, marks, type of shipment; i.e., free on board, full container load, and whether the buyer will engage an agent; freight forwarder, etc. International transactions contain many pitfalls—make a mistake with customs clearance and the transaction can be subject to delays in payment or wastage of human or financial resources. Sustained international trading success calls for investment in the skills and expertise necessary to master international trade procedures and to get the documents right. (Sitpro).. . Thus, the volume of product marketed is not as important as the consistent product supply. Do not take your foreign responsibilities for granted; lack of service and attention to foreign accounts can cripple your efforts to export. (Exporting) Again, in-house matters must be clear and specific to achieve long-term success. Therefore, ample considerations must be focused on the following items: (1) Management and Personnel---who will be responsible for the exports department'sorganization and staff ---What are management's expectations for the effort ---whatorganizational structure is required to ensure export sales are adequately servicedWho will follow through (2) Production Capacity---how is the present capacity being used ---will filling exportorders hurt domestic sales ---what is the cost of additional production ---are therefluctuations in the annual workload When Where Why ---what minimum orderquantity is required ---what is required to design and package orders for export 3 (2) Financial Capacity---how much capital can be tied up in exports ---what exportoperating cost can be supported ---how will initial expenses of the export effort beallocated ---what other new development plans are in the works that may competewith export plans ---by what date must an effort pay for itself ---is outside capitalnecessary (Susta) Once there is a representative and positive response to the items mentioned above, you are then prepared to approach the specifics of exporting electronic widgets to the targeted company

Monday, November 18, 2019

The Lady or The Tiger Essay Example | Topics and Well Written Essays - 1000 words

The Lady or The Tiger - Essay Example During the trial, the lover looked closely for any signs from the Princess, who was seated at the King’s right hand. This essay therefore explores the possible course of action of the Princess’ lover selecting one door over the other. One’s personal contention is that the lover would be led to the door where the tiger would emerge. At one side of the coin, the princess could lead her lover to the door to the lady. There is the possibility that the Princess could love him so much and would not even dare seeing the consequence that he would be devoured by the ferocious tiger. As Stockton initially emphasized, â€Å"she was the apple of his eye, and was loved by him above all humanity† (3). The love that was supposedly shared happily between them for several months was enough to ensure that the Princess would like him to live and spare his life from being killed by the tiger. Likewise, the princess’ skills, power, and notoriety exemplify possessing sim ilar traits as that of his father, the king. Therefore, by leading her lover to the door to the lady, she could think of ways and means to send that lady to the same fate that her lover encountered. As she used her skills and power to determine which particular door contains the lady and which one contains the tiger, she could likewise use this power to manipulate the fate and destiny of the lady who would supposedly marry her lover. By saving him from being eaten, she still has the chance to look forward to a life with him somehow in the near future. On the other hand, the princess could also lead her lover to the door which contains the tiger. It was explicitly stated that the princess hated the lady since â€Å"often had she seen, or imagined that she had seen, this fair creature throwing glances of admiration upon the person of her lover, and sometimes she thought these glances were perceived, and even returned† (Stockton 4). The jealousy and alleged burned agony that the princess felt as she imagines her lover being married to the lady was just unbearable. As such, there is greater possibility that the princess would rather see her lover die by being devoured by the tiger, rather than see him wed to another woman. The reflective question noted could also possess validity: â€Å"Would it not be better for him to die at once, and go to wait for her in the blessed regions of semi-barbaric futurity?† (Stockton 6). The princess could decide that it would be better for her lover to have met his death in this world and that their love story to be continued in the afterlife. Even if she could save her lover from the pangs of the tiger by leading him to the lady, there were no laws in their kingdom that would allow them to continue and consummate their love for each other. Thus, if she could not have him for herself; then, by all possibilities and given her devious and scheming demeanor, she would most probably lead her lover to the door containing t he tiger. The personality and character of the princess parallels the personality of the king. In this regard, one doubts that the princess would allow her lover to be married to another lady, of whom she detests. She would rather see him killed than know that he lives and be married to someone else. The agony and jealousy that she would have to contend for the rest of her life would be too much to

Saturday, November 16, 2019

Evidence Based Healthcare Research Social Work Essay

Evidence Based Healthcare Research Social Work Essay Evidenced Based Healthcare and Research: Appraisal. In the United Kingdom the concept of Independent Living and Self-directed Support has become an established approach for the delivery of health and social care services, that it is currently the preferred residential alternative for people with learning disabilities (Binnie Titchen 1999). Independent living can be defined as enabling independence by receiving the right support how and when it is required (Morris 2004). It has now become a key principle in various government policy documents such as the Valuing People Now Strategy (UK Department of Health, 2009) and the Personalisation through Person-Centred Planning initiative (UK Department of Health, 2010). This assignment aims to present a detailed critique of a qualitative study entitled How adults with learning disabilities view independent living (Bond Hurst 2010). A critique can defined as a balanced evaluation of the strengths and limitations of a research article, in order to determine its credibility and/or applicability to practice (Gamgee 2006). This study is a welcome contribution to the current health and social care research domain because whilst independent living is the preferred residential option, it is not at all clear whether it is suitable for all people with learning disabilities, moreover if there is in fact sufficient empirical evidence to support this notion. It is therefore imperative to establish a sound evidence base that draws upon the lived personal experiences of those with learning disabilities. Using an acknowledged framework A Step by Step guide to critiquing a quantitative study (Coughan et al., 2007) the relative worth of the evidence in support of i ndependent living will be judged systematically. As well as exploring the significance of independent living as an essential nursing intervention and its application to modern clinical practice. Ryan-Wenger (2003) suggests that in analysing published articles it is important to ascertain two fundamental aspects of a critique which can be subdivided into elements that influence the robustness of the research methodology also known as integrity variables and elements which influence the believability of the research such as writing style, author(s), report title and abstract otherwise known as credibility variables. The latter seems to be the most logical place to commence. Evaluation of the Journal Article Polit and Beck (2006) state that writing style should be such that it attracts the reader to read on; this paper is well written, comprehensive and concise. The structure and layout of the paper is well organised with a logical consistency and free from jargon in comparison to some papers where the author(s) can be opaque in their approach. However slight reservation is reserved concerning the level of proof reading as there seems to be some grammatical and typographical errors which can be found on pages 288 and 289. Both authors appear to have a sound background in learning disability from both a social context and educational settings. As indicated in the acknowledgements the authors qualifications indicate that they have a degree of knowledge in this field and this piece of research seems to be a part of a taught component of their masters programme. The report tile seems to be descriptive and succinct, although it lacks specificity of the research methodology used in the study. This can be very useful for others who are searching for this type of paper. Although the term qualitative research is mentioned under keywords the title itself could be more specific. As a result the report title is ambiguous and merely eight words in length. Meehan (1999) states that a title should be between ten to fifteen words long in order to clearly identify the purpose of the study for the reader. This paper presents both an accessible and detailed version of the abstract, but are both helpful? The accessible form includes information on the subject and the number of participants, whereas the detailed form provides an outline of the methodology used, ethical framework, findings and recommendations. On balance the summaries present a clear overview of the study, however it does beg the question in what sense is the accessible form accessible? and to whom? It seems that the authors are trying to be politically correct rather than logical because how many service users actually read the British Journal of Learning Disabilities?. It seems that this is a knee jerk reaction which has been applied incorrectly; it would be more suitable if the document was aimed at informing an audience with learning disabilities such as Valuing People (UK Department of Health, 2001) which caters to a wide range of readers. The easy -read version is aimed at service users whilst the denser version is aimed at professionals and service providers. Having identified and analysed variables that affect the credibility of the research presented, how believable the work appears, the authors qualifications and their ability to undertake and accurately present the study. The robustness of the research methodology and the integrity of the findings will be appraised in order to determine the trustworthiness of the study and its applicability to nursing practice. The authors state the aim of the study is to explore the views of nine people with learning disabilities who have already achieved independence and wish to contribute to the debate of independent living. The authors suggest that this style of living is now viewed as desirable, but what is the reality for people who live with learning disabilities? This concept of desirability is held as problematic by the authors who choose to study and present the reality of living independently as opposed to the notion of general and conventional wisdom. A study conducted by Barlow Kirby (1991) concluded that people in receipt of self-directed support had more life satisfaction than those in residential care. This finding is further supported by the publication of Independent Living (HM Office for Disability Issues, 2007). The decision to suspend judgement about independent living is justifiable and is supported by other researchers in the field of learning disabilities; as there are several impli cations for service users, professionals and service providers. This is for a number of reasons for instance promoting choice and control (OBrien, 2002), health issues (Priest Gibbs, 2004), vulnerability (Cooper, 2002) and the ability for those with learning disabilities to access services (Jansen et al., 2006). The literature review conducted by the authors demonstrates an appropriate depth and breadth of reading around independent living. The majority of studies included are of recent origin being less than five years old; the few historical studies included put the concept of living independently into context. The authors successfully identified conflicts between the literature by comparing and contrasting findings (Burns and Grove., 1997), because although evidence exists to show people who have moved from larger institutions prefer smaller group homes (Forrester-Jones et al., 2002) there is still no accurate data detailing the number of people with learning disabilities living independently (Beadle Brown et al., 2004). However the authors failed to mention how they conducted their search and information on the databases used to gather papers in their review. The authors did however, use primary sources of information as opposed to secondary sources and anecdotal information, which attes ts to the integrity and value of the study presented. Bond Hurst (2010) ascertained the narratives of nine people with learning disabilities via the use of semi-constructed interviews within their methodology. The authors are to be commended for their attention to detail in terms of their ability to design and structure interviews so as to accommodate the needs of the participants. As well as conducting interviews at times and venues convenient to them. The interview structure included open-ended questions to assist understanding as communication emerged to be a key barrier for some people with learning disabilities. The authors report on a number of theoretical issues that have been adapted for the participants in order that they might fully participate in the research process. The structure of the interviews was devised using the Canadian Model of Occupational Performance (Canadian Association of Occupational Therapists, 1997), but is this model applicable to the United Kingdom population and to which care setting? Bond Hurst (2010) adopted thematic analysis within their methodology in assessing the narratives. The data collected was audio taped and later transcribed into coded themes, which is acknowledged in general research literature to be good practice. On balance, the authors adhered to the steps in the research process and it is conveyed between the fluidity of phases. The critique subsequently moves onto considering the ethical framework. This research paper was supported by the local ethics committee and all participants in the study gave informed consent. Although it is not clear whether or not it was an National Health Service (NHS) ethics committee. However, the authors sought to ensure their working methods complied with the Data Protection Act (1998) but not with all government legislation applicable to the study such as the Mental Health Act (1983). Although there is mention about accessibility, the authors failed to ensure the participants had the capacity to make informed decisions as defined in the Mental Health Act (1983). In relation to the number of participants, the sample size is small and therefore may not be reflective or wholly representative for all people with learning difficulties. Small samples are more likely to be at risk of being overly representative of small subgroups within a target population (Coughan et al., 2007). Th erefore slight reservation is held as the authors did not mention whether they sought to remove overall bias by generating a sample that is likely to be representative and generalisable to the target population. Parahoo (2006) states that for a sample to truly reflect of the population it represents the authors must generate a probability sample. The participants in this study were recruited via convenience sampling using a third party (Melton 1998); however several variables could have an affect on the sample which can lead to it being distorted such as the vast age range. The authors are to be commended however, in their efforts to maintain the confidentiality of their participants by offering them the choice to provide their own pseudonyms. In the discussion the authors identified seven themes from their data analysis which reflected the views of all the participants and in turn addressed the aims of the study. Their findings supported the four key principles as stated in the Valuing People policy document, and ways in which people can be supported to achieve this includes increasing social inclusion, increasing autonomy and choice for people and raising awareness of the vulnerability of those with learning disabilities. However the study also highlighted that the majority of participants struggled with the more complex aspect of living independently, such as money management and budgeting. The government has recently introduced Direct Payments as part of a nationwide transformation in social care services, which involves paying money directly to an individual in need to take control of their own support and care services. This initiative will aid finance management as it enables service users to have control over the c are they receive and how they receive it. The majority of participants maintained that when comparing their current lifestyle of independent living to that of their previous lifestyle it was clear that they wanted to remain living independently. Application to Clinical Practice This section will explore the significance of independent living as an essential nursing intervention and its application to modern clinical practice. Gates Atherton (2001) state that there is a need for evidence of effectiveness in health and social care. The most important aspect of being a practitioner regardless of ones vocation, is that collectively we as professionals seek the best evidence available on which to base our practice (Coughan et al., 2007). The evidence in support of independent living is limited and not entirely accurate, therefore when evidence is presented it should not be taken on face value. As Cullum Droogan (1999) put it not all research is of the same quality or high standard therefore as a learning disability nurse and social worker it is important being a care provider that although a paper has been published it can be critically appraised. This paper is of central relevance to our practice in ensuring that the lifestyles of people with learning disabil ities are informed by valid and reliable evidence. This research paper adds value to the current literature available in support of independent living however caution must be expressed as it is not solely about living independently. The concept of independently living cannot be advocated for everyone; each person is different and therefore require different levels of support which will meet their needs. The publication of Valuing People (UK Department of Health, 2001) the key document that prompted a change in the way health and social care services operate. The paper made Person-Centred Planning a central component of service reform, and outlined four key principles namely: Human Rights, Independence, Choice and Social Inclusion (Mansell and Beadle-Brown, 2004). This means that people with learning disabilities should be valued members of society, treated with dignity and respect whilst having the same rights and choices as everybody else (OBrien, 2002). Furthermore, people with le arning disabilities should feel empowered to take control over the care that they receive in order to plan and live their lives independently. Previously, people with learning disabilities were shunned away from the community and susceptible to abuse. The Community Care Act (1990) was introduced as a result of both political and social changes in attitudes towards the treatment of people with mental illnesses. In line with Mental Health Act (1983) the aim was to remove the stigma associated with mentally ill people away from isolation towards social inclusion (Social Role Valorisation, Wolfensberger, 1983). But does independently living mean that you get social inclusion? Currently we are seeing a culture of people who require support being effectively excluded from society, waiting for the next support worker to cook their meals, help with personal hygiene and general cleaning. This is a downward spiral in our society which is putting a demand on our system. As a care provider in line with the General Social Care Council and the Nursing and Midwifery Codes of Conduct (2008), it is our duty to advocate in the best interest of the client at all times but who is actually making the decisions? Bond Hurst (2010) highlighted how closely health was linked to independent living and that many of the participants suffered from chronic conditions such as asthma, diabetes and arthritis. Is it a case of compromising funding for services at the expense of overlooking health issues? It seems that the authors make a plausible case that people with learning disabilities are being seen as not a priority as they carry a disproportionate burden of health inequalities among our population. The reality for people with learning disabilities is far from the projected lifestyle of independence (Emerson UK Literature). It is a challenge to support people with learning disabilities, several factors need to be considered to prevent potential disregard. Jansen et al., (2006) points out the need to adopt integrated care approaches in treating those with learning disabilities. This will involve working with different agencies (interagency team working) and different types of professionals (multidis ciplinary team working) in order to provide an holistic service to meet their needs. Current research shows that a disabled person is likely to be in contact with at least ten different care professionals in their lifetime (UK Department of Education, 2003). Issues can arise through out this time which may lead to lack of continuity and communication. Therefore, a sufficient amount of training and awareness is needed to ensure that all staff are qualified and skilled to ensure equity of service provision. When caring for patients it is essential as a practitioner to adopt the current best practice. To determine what this is one must be able to critically appraise evidence that is presented to them (Basset and Basset., 2003). This paper focused on the lived experiences of nine people with learning disabilities about the reality of living independently. In critiquing this paper, the authors successfully highlighted the importance of independent living as an essential nursing intervention however there were also some limitations, the most important being limited verification of the data. Furthermore the narratives of the participants were highly subjective and findings non-generalisable, thus the notion of independent living is not to be applied to all that have a learning disability, or vulnerable adults with complex needs. As recommended by the authors, further accurate, reliable and valid research is needed that will add value to the evidence-base domain. Total Word Count: 2,452 Excluding Headings and References

Wednesday, November 13, 2019

Human Nature and society presented through Huckleberry Finn Essay

Human Nature and Society presented through Huckleberry Finn Mark Twain opposed many of the ideologies of his time. Through his novel Huckleberry Finn, he explored human nature and the society. He made apparent his dislike for them. The book focus’s on the general treatment of black people during this time. Specifically, the author criticizes morality, slavery and racism. The characters encountered in Huckleberry Finn do not have very high moral standards. Many of them think and act very irrationally. In Chapter six, the newly appointed judge in town denied the widow and Judge Thatcher custody of Huck, despite Pap’s abusive, alcohol dependant history. Here the author criticized the knowledge and decisions of society’s authority figures. Throughout the book Twain attempts to portray the inhumane society he observed. People were treated very differently according to wealth, race or social stature. In Chapter eleven, Ms. Loftus sympathizes with Huck, a runaway and aids him in his travels, providing food and comfort. Ironically when the runaway was a black slave, her only concern was turning him in for a reward. As Huck travels further with Jim, their bond grows stronger. He realizes how Jim and others are being mistreated and taken advantage of. Despite this, Huck was still bombarded with the idealisms proposing slavery. When faced with the options of turning Jim in or not, it was a difficult choice for him to make. With his decision to assist Jim in his escape, he was...

Monday, November 11, 2019

With Reference to Alternative Research, Critically Assess Bennett-Levy and Marteau’s Research

There is much research to support the idea of preparedness in the acquisition of phobias, just like Bennett-levy and Marteau have done, however many studies use non-human animals, and use experimental research methods. Cook & Mineka (1989) found that rhesus monkeys could acquire fear through social learning to fear relevant stimuli (toy snakes and crocodiles) but not of fear-irrelevant stimuli (flowers and a toy rabbit). Subsequently, Cook & Mineka (1990), again using rhesus monkeys, showed them edited videotapes of models reacting fearfully to toy snakes and non-fearfully to artificial flowers or vice versa.The observers only acquired a fear in the former condition, i. e. when they watched a monkey responding with fear to a snake. However, there is experimental research that shows that humans can show preparedness. Ohman and Soares (1998) showed that participants could be conditioned more quickly when associated with fear-relevant material, e. g. pictures of snakes or spiders, than when paired with fear-irrelevant material, e. g. picture of flowers or mushrooms. Again showing that fear is more readily associated with some things but not others.Bennett-Levy and Marteau deliberately removed the idea that the animals were harmful; however is this not a reason to fear an animal? One biological imperative for fear is risk of disease. Matchett & Davey (1991) and Ware et al (1994) looked at the relationship between animal fears relating to contamination and to likelihood of attack. They investigated fear of predatory animals and other fear-relevant animals. Both groups of animals elicited fear but only the animals carrying a risk of disease also elicited disgust.Those participants with the greatest fear of the ‘disgusting’ animals also scored highly on scales such as fear of illness and obsessive washing. Further support for this idea comes from Davey et al (1998) who conducted a cross-cultural study into animal fears. They found that, although cultures share fear for animals which are fierce, the greatest similarity was in those eliciting disgust; again indicating a link between phobias and animal-borne disease. The distinction between fear of fierce and infection-risk animals is demonstrated by experimental evidence from Davey et al (2003).They found that people will tend to become classically conditioned to pain responses associated with predatory animals (i. e. fierce ones). Disgustrelated unconditioned stimuli, however, were more readily associated with lowpredation animals (i. e. ones with a disease risk) than with safe ones. There does seem to be reasons for fearing animals, but in the modern comfortable existence that many enjoy, there are few natural things that will damage us and we have little reason to fear, but phobias are one of the commonest disorders in our society.

Saturday, November 9, 2019

Elements Of Leadership Styles II Example

Elements Of Leadership Styles II Example Elements Of Leadership Styles II – Coursework Example ELEMENTS OF LEADERSHIP STYLES II Two major leadership styles have become areas of focus for the past weeks and these are servant leadership and situational leadership. The study has somewhat had servant leadership as the experimental leadership style with which the situation leadership style was compared to. Under the servant leadership style, it was realized that servant leaders would generally have well structured prices, values and beliefs with which they offer service to their subordinates (Hussey and Hussey, 2007). Invariably, servant leaders see themselves as chief servants and as part of the work force (Gray-Toft and Anderson, 2008). To this end, they seek the interest of the larger group and incorporate themselves into the task of achieving the goals of the group. On the other hand, situation leaders encompass themselves with four (4) major routes to achieving organizational or group goals. These routes are telling, selling, participating and delegating (Saunders et al, 2003) . To this end, it can be seen that whereas servant leaders always stick to a particular principle and value, situational leaders change with changing times (Johnson, 2012). With the selected organization as a case study; and with comparison with the two styles of leadership, it would be said that the best leadership style that would fit the immediate needs of the organization is the servant leadership style. The reason behind this choice is that the organization seems to be experiencing some organizational challenges that has emanated from how leadership has been conducted over the years. Over the years, there are some employees who feel that leaders have been over authoritative and have been selective with the choices. When servant leadership is thus employed, employees are going to see their leaders as part of them and they are going to have a better appreciation of their leaders and the way and manner in which they carry their leadership (Johnson, 2012). REFERENCE LISTGray-Toft, P. and Anderson, J.G. (2008). Stress among hospital nursing staff: its causes and effects. Social Science & Medicine 14: 639-647.Hussey, J. and Hussey, R. (2007). Business Research: A Practical Guide for Undergraduate and Postgraduate Students. Basingstoke: Macmillan Business.Johnson R, (2012). 5 Different Styles of Leadership Styles. Accessed September 20, 2012 from http://smallbusiness.chron.com/5-different-types-leadership-styles-17584.htmlSaunders, M., Lewis, P. and Thornhill, A. (2003).Research Methods for Business Students. Harlow: Pearson Education Limited.

Wednesday, November 6, 2019

Americas Growing Pains1 essays

Americas Growing Pains1 essays Americas first two presidents, George Washington and John Adams, both resolutely adhered to the idea that America should endeavor to stay out of war at all times, and did everything in their power to evade declaring and entering into war. Throughout their reigns, war was ubiquitous in Europe, and many countries (especially Britain and France) made numerous attempts to obtain and secure Americas support. Washington and Adams both believed that America should not side with any foreign country during times of war making the fundamental purport of Americas first foreign policy the elusion of war at all costs. This policy was manifested throughout Washington and Adams involvement in, and reactions to the following affairs: the Citizen Genet controversy, the One of Washingtons initial attempts to pursue this policy was his counteraction to the Genet Affair. In 1793, George Washington proclaimed neutrality, thus declaring America an uninvolved, nonpartisan country in times of war. Simultaneously, Edmond Charles Genet was sent to the United States as a special representative from France to implore support in the French Revolution. Genet had previously resolved that the proclamation of neutrality was a harmless little pleasantry designed to throw dust in the eyes of the British. Commencing in Charleston, South Carolina, Genet traveled throughout the United States presenting his credentials. In addition to his quest for support, he began to license American vessels to operate as privateers against British shipping and to grant French military commissions to a number of Americans in order to prepare expeditions against Spanish and British territorial claims in North America. These two actions were in direct defilement of American law. Washington demanded that he cease his unlawful actions, but Genet continued to commission privateers because he enti...

Monday, November 4, 2019

The Relationship between Entrepreneuship, Innocation and Economic Essay

The Relationship between Entrepreneuship, Innocation and Economic Development - Essay Example A variety of theories and policy approaches have been advanced with Keynesian influenced stimulus packages being infused into Western economies with varying degrees of success. Still, a growing body of support has turned to the potentials of economic development occurring through entrepreneurship and innovation. Theorists such as Joseph Schumpeter argue that entrepreneurship and innovation are core elements for economic development, and subsequent city and state governments have oftentimes-established incubators and given increased funding to ensure that innovation is supported. This essay examines the relationship between entrepreneurship, innovation and economic development. The essay also considers the role creativity and problem solving play in this relationship, with reference to both theory and examples from the business world. Analysis When examining the relationship between entrepreneurship, innovation, and economic development perhaps the most groundbreaking theorist has bee n Joseph Schumpeter. While Schumpeter’s insights into economic development span a wide array of understandings, there are a number of specific considerations that are relevant for this specific mode of investigation. One of Schumpeter’s most important notions is that of ‘creative destruction’. ... Individuals such as Alan Greenspan have noted that this process underlines economic development. He notes, â€Å""Capitalism expands wealth primarily through creative destruction—the process by which the cash flow from obsolescent, low-return capital is invested in high-return, cutting-edge technologies" (Greenspan 2002). There are a number of specific means by which entrepreneurship and innovation carries out such creative destruction. In his text ‘Theory of Economic Development’ Schumpeter argued that entrepreneurship didn’t simply create new industries, but also resulted in the combination of past industries (Schumpeter 1982). One example of this is that the development of the steam engine combined with carriage development techniques to form the automobile. The development of the automobile then drastically shifts previously held economic and social structural elements, reenergizing the economy and contributing to economic development. While Schumpeter ’s theories have received a degree of criticism that remain prominent and highly relevant in the contemporary world environment. In large part, Schumpeter’s understanding of entrepreneurship and innovation as contributing to economic development has been echoed through endogenous growth theory. This perspective contends that a nation’s economic growth occurs through internal rather than external factors. In this context of understanding it’s clear how Schumpeter’s theory on entrepreneurship is squarely rooted within the endogenous means of growth. While entrepreneurship is popularly viewed in terms of inventions and small business owners, in further examining its impact on economic development one must consider the more abstract notion of innovation

Saturday, November 2, 2019

E-commerce Essay Example | Topics and Well Written Essays - 2500 words - 1

E-commerce - Essay Example e mysterious flu virus that originated in Southeast Asia, soon spread throughout the world and many countries so affected had been crossed out as travel destinations. As for the surging oil prices, all kinds of transportation systems were logically the first and worst sufferers. The airline industry received the hardest blows. In effect, the airline industry was among the sectors of the world economy lying prostrate as the old millennium changed to the new. Many flag carriers, notably Swissair of Switzerland and Sabena of Belgium, could not hang on and wrote finis to their operations. In the US, a number of domestic airliners filed for bankruptcy proceedings as an option for folding up completely. Going into 2005, the airline industry as a whole was estimated to have suffered losses to the tune of $43 billion (Watson, J., 2006). This was equivalent to the combined capitalization of 13 American airlines in today’s terms. The British Airways (BA), which for many years held the distinction of being the world’s most profitable airline, found itself hemorrhaging by 2 million pound-sterling per day in operating costs during those troubled years, following the 9/11 tragedy and the added one-two punch of SARS and the almost doubling cost of fuel. From 2001 onwards, BA went through an almost uninterrupted four-year decline. As the world’s largest international airline, BA is regarded as the industry leader, its profit ledger the bellwether of the market. Had it collapsed in the aftermath of 9/11, there would have been serious repercussions for both the aviation industry worldwide and global business as a whole. Airlines have precisely taken to forming an alliance among themselves to consolidate their resources so they can joined hands in warding off industry-wide problems like rising fuel costs, overcapacity and under-capacity. Such an industry grouping is the American Alliance which consists of Cathay Pacific, Qantas and other airlines. BA, an