Friday, November 29, 2019

Live in the Present with Memories of the Past free essay sample

Human Society is a long period of building and developing. From the time man lived in dank caves to nowadays when he lives in such a modern life with a lot of excellent facilities. The modern life, the excellent facilities was not a present from god. It was made by people of all generations who always learned from the past and developed everything they had learned from it. Thus, I totally disagree with the statement above that learning about the past has no value. The first reason for this is that learning about the past brings us all the knowledge and information in the past. Without yesterday, there is no today. A society can develop only when its people inherit and understand the achievements of the precursors because the precursors achievements were the foundation for everything to develop.. For example, before 1964 there was only black-and-white television but until now there are kinds of colour televisions that are slim and innovative such as LCD TV The black-and-white television made the basis and gave inventors idea to develop the modern TV nowadays. We will write a custom essay sample on Live in the Present with Memories of the Past or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Consequently our knowledge, success today is the result of constant work of our ancestors before. Secondly, learning about the past is very essential because it makes us doubt and take consideration into earlier assumptions. For that reason, people will find out mistakes that were made in the past. This will show us which roads not to ever go down again and put human in a right way to develop. Learning about the past is not only learning about the history but also is learning from our and the others mistakes. By this way of learning, people will become more and more experienced and never make the same mistakes again. Additionally, if learning about the past has no value, people in the world could speak, could write by themselves without learning from anyone. This is impossible so the value of the past, in this case are the parents, are undeniable. In a nutshell, the past is always a good teacher and we are still bad students who crave for knowledge. Denying the past also means that we are destroying the present and our future because no one can jump without ground to stand on.

Monday, November 25, 2019

Antonin Scalia essays

Antonin Scalia essays Supreme Court Justice Antonin Scalia was born on March 11, 1936 in Trenton, New Jersey to a Sicilian immigrant father and an Italian-American mother and was raised in Queens. He attended Catholic schools in New York City as a child and teen. Scalia then attended Georgetown University, spending his junior year at the University of Fribourg in Switzerland, and graduated at the top of his class with an A.B. (Sorry, I dont know what that means) in 1957. He also attended Harvard, serving as the editor for Law Review. Scalia graduated from Harvard in 1960. On September 10, 1960, Scalia married Maureen McCarthy, and the two went to go live in Cleveland, Ohio. While in Cleveland, Scalia was admitted to the Ohio Bar and worked for the law firm of Jones, Day, Cockley, and Reavis until 1967. The Scalias then moved to Virginia, and he was admitted to the Virginia Bar in 1970. While In Virginia, Scalia taught law at the Virginia Law School until 1974. In 1971, Scalia became General Counsel of the Office of Telecommunications Policy for the White House, and from 1972 to 1974, he was the chairman of the Administrative Conference of the US. Scalia was then appointed the assistant attorney general of the Office of Legal Counsel for the Department of Justice. In 1977, Scalia returned to teaching after 6 months serving as the resident scholar at the American Enterprise Institute in DC. Him and his family picked up and moved again to Chicago, Illinois. While In Chicago, Scalia taught at the University of Chicagos law school (he was also a visiting professor of law at his alma mater, Georgetown University, and also at Stanford University during that time) until President Ronald Reagan appointed him to the US Court of Appeals for the DC Circuit in 1982. Scalia took his oath of office on August 17 of that year. Four years after Scalia began working at the Court of Appeals, President Reagan then chose him to be an a ...

Thursday, November 21, 2019

Demography and Health Scholarship Essay Example | Topics and Well Written Essays - 750 words

Demography and Health - Scholarship Essay Example Only a few differences exist where white non Hispanic groups has suicide as one of the top ten causes of death, and another difference is that Homicide and legal intervention is not a top ten cause of death among the white non Hispanic. .. erences exist where white non Hispanic groups has suicide as one of the top ten causes of death, and another difference is that Homicide and legal intervention is not a top ten cause of death among the white non Hispanic. Question 5: In which Hispanic subgroup is the neonatal mortality risk the highest Hispanic subgroups include Mexicans, Puerto Ricans and Cubans, the subgroup with the highest neonatal mortality risk is the Puerto Ricans group with a total high of 7.9. Answer: Puerto Ricans Question 6: In which group is the post-neonatal mortality risk the highest: The group with the highest post neonatal mortality risk is the blacks, the blacks have a total high of 6.3, while the Cubans have the lowest post neonatal mortality risk which is 2.0. Answer: blacks Reference: US Department of Health and Human Services Public Health Service Monthly Vital Statistics Report. Vol 43, No.

Wednesday, November 20, 2019

The physics of Sonography Essay Example | Topics and Well Written Essays - 750 words

The physics of Sonography - Essay Example In the study of waves, under physics, discoveries were made of some waves that were invisible to the human eye, but that would be extremely useful in imagery. Sonography depends on ultrasound waves, which are used to generate images coming from an object from which reflection occurred (Abu-Zidan, Ashraf and Peter 501). The physics, which is involved in the studies, address the properties of the waves as well as how the waves relate with other environmental elements. The physicians have to analyze the effect and results obtained by propelling the ultrasound waves onto the human body. In addition, doing this establish whether the technology is safe as well as useful to the field. By conducting experiments on the ultrasound wave properties, the physicians can identify the elements, which pose a challenge to the technology, and possibly device ways in which they can be eliminated. In sonography, elements such as shadows (Abu-Zidan, Ashraf and Peter 502) may cause wrongful data collection thereby drawing the need to have a means by which the shadow effect is reduced. Physics in this case focuses on perfecting the sonography operation by ensuring that the data obtained by use of the ultrasounds is accurate and free of errors. Data interpretation is another element of physics that is of great use in sonography. By using sonographic technology, the aim of the experience is to obtain data from the body without having to put the patient through vigorous methods. Different conditions, persona and deformations in the human body are bound to produce different result results under sonographic study (Abu-Zidan, Ashraf and Peter 508). It is important to engage physics in the studies since by the use of physics the densities, volume, texture, color and activity of the specimen under investigation can be determined. It is essential in the case of sonography since the medical practice cannot allow trial and error techniques that

Monday, November 18, 2019

Art History paper Essay Example | Topics and Well Written Essays - 500 words

Art History paper - Essay Example 45). Hans Holbein is among the most accomplished and also innovative painters in the history. His portraits are recognized instantly due to his creativity. Hans Holbein had a renaissance mind and vision. The portraits he painted got made with much skills and imagination. Due to his modest attitude, the painter made pictures that were of high value. The paintings he made spoke for themselves. Hans Holbein made three paintings of a scholar Erasmus of Rotterdam, whose advice was sought by many. The painting of Erasmus of Rotterdam got done in profile. It was contrary to his usual work of having the paintings in full face (Wolf et al. 46). The main idea of presenting the painting in profile was to show the intellectual independence that he possessed. A person who gets painted in full reveals him or herself and must pose in a way that reveals a favorable light. However, a person who gets painted in profile allows the model to assume the artist. In the portrait of Erasmus, the turning away is revealed by the intense intellectual concentration of the scholar. It is explained by the facial expression and also the writing hand. The sharp features shown indicate a critical mind, the sensitivity in his hands and also indecision (Wolf et al. 49). The characteristics in the portrait are made to describe the scholar carefully. The attire he was in was of simple style and also costly. It demonstrated the beauty for simplicity and good taste the scholar possessed. The three rings the scholar had in his fingers indicated that he was not vanity free. Holbein got informed on the perspective of a single point in art. The applied the antique motifs as well as the architectural forms. The painting made by Holbein on the dynastic Tudor at the white wall showed that he had prepared towards a large mural. The painting included 25 pieces; each piece was cut and painted on the background (Wolf et al. 50). A painting should get

Saturday, November 16, 2019

Spectrum Sensing and Spectrum Sensing Techniques

Spectrum Sensing and Spectrum Sensing Techniques Chapter 1.Introduction In recent years there has been an enormous growth in wireless communication devices and wireless users. The ever increasing demand for higher speed and reliability made researchers think about intelligent radios like Cognitive Radios (CR). But major amount of spectrum is available for licensed users. There are various communication bodies like the International Telecommunication Union (ITU), European Conference of Postal and Telecommunications Administrations (CEPT) also European Telecommunications Standards Institute (ETSI) who works on standards of communication that defines the use of spectrum for licensed and unlicensed users. 1.1 Background Spectrum is a valuable resource in communication. Over the past few years as the use of various wireless technology is increasing rapidly so we either need more spectrum or make efficient use of current spectrum to satisfy their needs. One way of making efficient use of spectrum is employing spectrum sharing technique. There are many spectrum sharing techniques available like energy detection, cyclostationary feature detector, and matched filter. Of the above technique matched filter and cyclostationary gives more accurate result but they are bit complex and computationally harder as compared to energy detection technique. Energy detection is the simplest of above three and computationally less complex. 1.2 Motivation Survey has shown that at any given time only portion of spectrum is utilized. According to a report published by FCC (Federal Communications Commission America) in 2003 has set a set of rule for efficient use of spectrum for licensed and unlicensed users. Also OFCOM (Office of Communications United Kingdom) has noticed the underutilization of spectrum. At any given time only portion of spectrum is utilized. Even if the system says there are no frequencies available, there is still some frequency available. These available frequencies are known as spectrum holes or white spaces. Some of the bands are completely occupied by users while some bands go unutilized. And that is inefficient use of spectrum. We must have noticed that in cases of emergencies like the train bomb blast in July 2006 in Mumbai, India cellular network actually failed to support huge amount of customer at the same time, this was also the case during 9/11 in USA. If we were having cognitive radios at that time peop les would have been able to talk to their families and inform about their safety. As we are moving from 3G (Third generation) to 4G (Fourth Generation) we need to make certain changes in our wireless technologies. Below shown is the measurement of 0 GHz to 6 GHz at Berkley Wireless Research Center (BWRC). 1.3 Aim and Objective This thesis emphasises on understanding Cognitive radios, the importance of spectrum sensing for todays world, the issues regarding the same. A simplified Matlab code is used to support our thesis. As the thesis follows you will find more about cognitive radios and spectrum sensing with a technique to generate white space at a specific frequency. The main objective of the thesis is to do survey on spectrum sensing and spectrum sensing techniques. Then do plan a model for the same. A model can be supported by a Matlab code. And after all this we need to analyse the model we suggested and further improvements that can be done in that. 1.4 Thesis Organisation Our thesis is organised as follows: Chapter.2 Literature Review This chapter begins with a brief history about cognitive radios .Which is followed by a detail explanation of Cognitive radios and spectrum sensing and some of the spectrum sensing techniques used. At the end of this chapter a business model for spectrum sensing and multi resolution of CR is given. Chapter.3 System Description This chapter basically deals with sampling and its importance to us. Also you will find technique to get your spectrum at specific center frequency under â€Å"generation of White Spaces†. Chapter.4 Simulation/Design Analysis As the name suggests, this chapter deals with simulation model and detail explanation of the code used for spectrum sensing using energy detection. In this chapter we have shown the output of the simulation used. Chapter.6 Future Work This chapter suggests some of the future work to be done with this thesis which could be useful for further research in this field. Chapter.7 Conclusion This gives the concluding part of the thesis. Chapter 2 Literature Review In this chapter we are going to discuss about the cognitive radios, like what are they and why are they so important to us. The chapter begins with a short history of cognitive radios, which is followed by a general discussion on OFDM, some of the challenges faced by cognitive radios in real environment, and also some of the applications of cognitive radios. We have tried to explain spectrum sensing in brief and the techniques used for spectrum sensing in todays world. Finally a business model for spectrum sensing is showed which is preceded by multi-resolution of Cognitive radios. 2.1 History of cognitive radios Dr. Joseph Mitola III was the first to introduce or propose the theory of Cognitive radios in 1999. According to Dr. Joseph Mitola Cognitive radios will be the radios that are smart and intelligent enough to find the available bandwidth in a spectrum. It will also have knowledge of right information that has to be passed to the user. And user does not have to take some extra effort for that. It is supposed to do this automatically. He has also mentioned in his PhD dissertation that CR is natural extensions of software defined radios. In 2002 the FCC published a report prepared by Spectrum Policy Task Force [SPTF] which says that majority of spectrum is underutilized. And there is actually is not shortage of spectrum but rather we need to make efficient use of the current spectrum. Also in same year 2002 Professor Cave from UK presented a report which speaks of the possibility of selling bandwidth to the user depending on their requirement. But it would not be fair to give unlicensed user allow to use licensed spectrum. So in December 2002 FCC issued a Notice of Enquiry (NOI) to see TV channel bands can be made available to unlicensed users. Then in 2003 FCC forms a set of rules and proposed interference temperature model for keep track of interference. Later in the same year Notice of Proposed Rulemaking (NPRM) tried to see into issues related to cognitive radio technology where it also pointed out Cognitive radios is a advanced technology which could help efficient use of spectrum by licensed users in own network and by sharing spectrum and with unlicensed users by negotiating when required. This encouraged many researchers in the field of cognitive radios. Major progress in cognitive radios took place in the year 2004, where FCC published NRPM which showed possibility of allowing secondary users to use licensed spectrum. FCC opened three bands for unlicensed users which are 6525 to 6700 MHz, 12.75 to 13.15 GHz and 13.2125-13.25 GHz. This allowed cognitive dev ices to transmit six times more. Also IEEE standards are working parallel to the FCCs. Spectrum pooling system by Professor Timo A Weiss from Karlsruhe University Germany), OFDM based Cognitive radios by professor Ian F Akyildiz et al from GIT (USA) are some of the promising works in Cognitive radios. there are many researches are done, many still going on in Europe, Asia, and America, exploring various aspects of cognitive radios. In Jan 2010 first call over a CR network was made in university of Oulu using CRAMNET (Cognitive Radio Assisted Mobile Ad Hoc Network). 2.2 Cognitive radio With the development of wireless communication devices and technologies in WLAN and WAN spectrum is becoming scarcer. Low frequency bands which are near few GHz are very scarce and highly congested. In current wireless system we are using fixed spectrum allocation scheme. In fixed spectrum allocation scheme a part of spectrum is owned by an operator. Unlicensed users are not allowed to use that spectrum. This leads to the problem of spectrum scarcity. Survey has shown that more than 50% of the spectrum is underutilized. This is where Cognitive Radio (CR) is comes into picture. CR is introduced to solve the problem of spectrum sharing. Cognitive Radios actually scans the spectrum and during scanning it looks for spectrum holes. The main objective of the cognitive radios is to look for opportunities or white spaces in spectrum band as quickly and as much as possible. And when we say opportunity, opportunity could be in time or frequency domain. Also when we locate this spectrum holes opportunistically we also need to vacant the occupied spectrum as soon as primary user comes back. Here primary user means the users whose spectrum we are using (licensed user) and secondary means the unlicensed users. Cognitive radio is a pattern for wireless communication technology in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. These altered parameters are associated with the active monitoring of several factors in the external and internal radio environment e.g. radio frequency spectrum, user behaviour. Cognitive radio can be said as next generation of software defined radio (SDR). They are flexible in terms of their transmission characteristics in terms of frequency, bandwidth, ISP which makes smart decisions to configure the SDR at any point in time to achieve a particular goal. By combining these two technologies makes a radio intelligent and flexible and which helps to adapt it to the variations in the environment, user requirements as per the other radio users. Adaptation to changes and requirements should lead to highly reliable communication whenever and wherever required, while making efficient use of spectrum. Good cognitive radio uses analysis done for long period to know about the environment and also his own behaviour. There are various parameters taken into account to decide transmission and reception changes, we can distinguish certain types of cognitive radio. The main two are as follow: Full Cognitive Radio : It is also known as Mitola radio in which every possible parameter which can be observed by a wireless node is taken into consideration to take decision Spectrum Sensing Cognitive Radio: It is the type in which only the radio frequency spectrum is considered. And Depending on the parts of the spectrum available for cognitive radio, we can distinguish as: Licensed Band Cognitive Radio: It is the type in which cognitive radio is capable of using bands assigned to licensed users, apart from unlicensed bands, such as U-NII band or ISM band. Unlicensed Band Cognitive Radio: This can only utilize unlicensed parts of radio frequency spectrum only or the bands which are free to use. 2.3 About OFDM OFDM stands for Orthogonal Frequency Division Multiplexing. It is generally a type of Frequency Division Multiplexing (FDM) rather a special case in FDM. What makes it special is its orthogonal behaviour. Now the word orthogonal basically means mutually independence. When we say A is orthogonal to B, we mean that A has no vector in direction of B and vice versa or in other words A and B is mutually independent. Or the integral of two signals over one period is 0. In OFDM a single signal is first multiplexed and modulated independently to create orthogonal signals. This means the signal is first divided into number of smaller streams and then modulated further before transmission. For example imagine a slicing of cheese and grilling or cheese. Slicing is like FDM where whole data is sent in a bunch and grilling is like OFDM where the data to be sent is first divided into smaller data and then processed to transmit further like OFDM. Figure shown below is one more way to understand the concept of OFDM. On the left hand side is a big container which carry whole bunch of data at one time and take it to the destination. And on right hand side is four smaller containers where each carry smaller portion of data and take it to the destination. These smaller containers can be assumed as sub-carriers. And in case of OFDM they are orthogonal sub-carriers. The main advantage over here is that even if some of the cheese is lost during grilling, still we have not lost all the cheese. In OFDM input data with high data rate is first passed thorough serial to parallel converter. This parallel divided data is then modulated on individually. And parallel to serial conversion is done before transmission. This parallel divided data is our sub-carriers. These sub-carriers must be orthogonal. 2.4 Cognition cycle Above figure shows the rough model of Cognition Cycle. It reads the surrounding environment and makes decision accordingly. When we say decision we mean cognitive radio sense the requirement or urgency that may be in terms of changing a channel or churning from one technology to another depending upon the scenario. There are different stages where it observes the environment, learns it and then plans its action make required decision and then execute its plans. It is much like a radio with a power of thinking which was not been able before. The figure below shows the cognitive radio architecture suggested by Dr. Mitola. 2.4.1 Some important terms 2.4.1.1Wireless Environment/Outside world- It refers to a communication environment that includes any communication devices and the frequency bands they are working in. 2.4.1.2 Spectrum sensing- It is the technique used by cognitive radios to sense the spectrum. This action involves finding availability of white spaces or spectrum holes in the spectrum. 2.4.1.3 Spectrum Management- It involves catching the best spectrum available so as to satisfy user communication requirements. Cognitive radios should decide on the best spectrum band so that it can meet the Quality of service required for all available frequency bands, therefore these functions are necessary for Cognitive radios. These management functions can be classified as: Spectrum analysis Spectrum decision Spectrum Mobility: It is defined as the process when a cognitive radio device exchanges its frequency of operation. Cognitive radio networks target to use the spectrum in a dynamic manner by allowing the radio terminals to operate in the best available frequency band, maintaining seamless communication requirements during the transition to better spectrum. Spectrum Sharing: providing the fair spectrum scheduling method. One of the major challenges in open spectrum usage is the spectrum sharing. It can be regarded to be similar to generic media access control MAC problems in existing systems 2.5Cognitive Radio Challenges Three main problems experienced by CR are as follows: Interference (Mainly because of Hidden Nodes). Security. Control. They are described as follows: 2.5.1 Interference and the Hidden Node Problem Ideally while designing a CR we should consider that it does not have any impact on existing radio users, but in practically some impact is expected. If a particular user have non-cognitive radios, it is essential to study and make a note that how they would be affected by the interference of CR, mainly with respect to sharing resources such as spectrum, time, space etc. CR adaptive nature could be difficult to predict and thus making it hard to control the behaviour of a CR which will concern for user who faces CR interference issue. In communication industry the main concern about CR is the hidden node problem. This scenario arises when a CR is not capable to detect an interference with any of non-cognitive radios within its range, not only because of CRs own spectrum sensing is ineffective but also due to some non-cognitive radios are hidden. For example, if a transmitting contemporary user is not in the range from the CR, its transmission power may not be strong enough at the CRs location, it may be reduce than the noise floor which makes it more difficult to get detected. As the CR might not be able to detect a transmission by a contemporary user and similarly unaware of availability of the receiving by a contemporary user. Consequently, if it is confirmed as safe to use the contemporary users frequency and CR starts transmitting, at the contemporary receiving end it will create interference. The CR may have a limited view of spectrum provided from wide spectrum measurements which may cause interference with the receiving user. The localised spectrum view denotes that a CR should be potential to find transmitting user those are communicating below the noise level, since the strength of the received signal is very weak at the CRs location. Similarly a situation can occur where the signal attenuate by distance, thus user transmission is blocked by obstacles such as buildings, towers, hills or mountains. For example consider a CR in a valley would have a limi ted picture of the surrounding radio environment, as compared to that if it were located on top of a hill. 2.5.2 Security Concerns CR may be vulnerable to malicious effect, resulting into unexpected or problematic behaviour of individual CRs or complete networks. This problem springs up from the potential to re-program CRs in an unauthorized way. Hacking or placing a vulnerable code, virus on a network might enable criminals to steal valuable information from a CR through electronically, fool a network operator into charging others for services or achieve potentially widespread denial-of-service. A considerable amount of regulatory work will require to be done to clarify who would be responsible for the various security areas of CR, software developers, manufacturers, network operators and CR users themselves may all have a role to play. The CR security issue is closely related to that of SDR, which already discussed and hence not repeated here. Instead, a brief summary of the issues is given. Downloading software updates over an air interface poses some specific problems for security. Several digital signatures will be required for each piece of downloaded software in order to meet likely regulatory requirements. Exactly who is necessary to authorize software downloads must be standardized before any large scale deployment of over-the-air updates can be realized. 2.5.3 Burden of Control and Regulatory challenges A CR in reality will have some effect on different spectrum users the compliance of these new radios is likely to focus on a Policy module defined within a CR, which will determine the boundaries of CR behaviour. It is important while studying CR; to consider how users would not be affected by interference from CR devices and the exact operation and nature of a proposed CR policy system must be understood carefully. It is likely to include a detail case study of the specifications and characteristics of all the contemporary users for a specific CR or complete network of CRs may share the resources. The effort in controlling CR devices, it is necessary to ensure their behaviour is properly or not, even in the case of faulty or tampered devices, that measures are quickly implemented to intense problems. This will involve policies and standards which are created in a universal digitally interpretable policy, so that all CRs can understand the same. Monitoring techniques and powerful alg orithms are required to enable detection and identification of bad CRs and in this way it provides traceability to find or determine who is responsible for the issue. In addition to these challenges, spectrum regulators and spectrum managers will require providing access to licensed spectrum in such a way that is traceable, transparent and highly dynamic. If CRs are allowed to cover international territory additional effort will be required, due to the necessity to provide and collaborate cooperation with other countries. Assuming that acceptable control of CR policy behaviour is technically possible and feasible, it may turn out to be such a great burden that it will be simply not economically viable and the benefits of CR are outweighed by this burden. 2.6 Important Applications for Cognitive Radio are Downloading of audio and video files on mobile handsets. This application requires moderate data rates and near-ubiquitous coverage. Emergency services communications: It requires interoperability and a moderate data rate with local coverage. Broadband wireless networking: Very high data rate required but CR users have option to accept limited coverage, e.g. hot spots. Multimedia wireless and sensor networking: Broad range of data rates may be required. 2.7 Spectrum Sensing Spectrum sensing is the process performing measurements on the part of spectrum and on the basis of measured data making a decision related spectrum usage. As the requirement and quantity of users is getting increased day by day, it is necessary for ISPs to have large amount of spectrum in order to achieve the QOS (Quality of Service). This leads the interest in unlicensed spectrum access and spectrum sensing is vital concept of this. In a situation where there are licensed user and any unlicensed exists, licensed user (primary user) is to be protected and no unlicensed user can interfere any licensed users operation and such cases Spectrum sensing is also useful to detect the existence or non existence of a primary user. Spectrum sensing is an important concept for exploring spectrum opportunities for the secondary spectrum usage in real-time. It detects the unused spectrum and shares it without any noticeable interference with other users. It is an important requirement of the Cogn itive Radio in order to sense spectrum holes. Detecting primary users is the most efficient way to detect spectrum holes. 2.8 Spectrum Sensing Techniques Available Spectrum sensing plays a vital role in cognitive radios. And the type of spectrum sensing techniques to choose more or less depends upon the spectrum sensing technique. A method such as energy detection proves to be one of the simplest of all, but it doesnt works well at low SNR, varying noise levels, fading. On the other hand technique such as Matched filters shows better performance, but they comes complex receiver design. We are going to discuss some of these techniques as we proceed further. 2.8.1 Matched Filter Technique This is the technique which takes minimum amount of sensing time. In this method of spectrum detection, receiver receives a pilot signal along with the data that is sent by the transmitter. A pilot signal is a single frequency that is used for synchronisation. All the secondarys those are struggling for spectrum should have knowledge of this pilot signal. There should` be tight timing synchronisation between primary and secondary. They are also required to know about the kind of modulation being used, pulse shaping. Also secondarys must have another receiver for every primary. This kind of techniques also fails when there is frequency offset. Examples of this technique are TV signals, CDMA with pilot, also used in OFDM. 2.8.2 Energy Detection technique This is the most simples of all techniques. In this the receiver has no knowledge of the transmitted signal. The receivers need not to have knowledge about the modulation type or any kind of pilot signal. Earlier energy detection was done with the help of a LPF (Low Pass Filter), Digital to Analog converter (D/A), and square law device that used to calculate the energy of the signal. Later it is done by making use of fast Fourier transform (FFT). This is known as periodogram method in energy detection. 2.8.2 Cyclostationary Feature Detection Signals are modulated with sine waves or cyclic prefix as in OFDM. And they are periodic. This periodic property of a signal helps it to be cyclostationary. This technique basically uses this principle of spectral correlation to detect the spectrum. Even if signals have similar PSD (Power Spectral Density) but they have do not have similar spectral correlation. 2.9 Multi-resolution for Cognitive Radio Sensing The concept of multi-resolution for Cognitive Radio can be applied with different methods but, the basic idea is the same. The whole spectrum is first sensed by using a coarse resolution. After this first step fine resolution sensing is done on a part of interested bands. In this way CR avoids itself from sensing the spectrum at one time and thus saving time and power. In this way, the sensing time is reduced and the power also been saved from unrequited computations. Also the multiple antenna architecture helps parallel processing and enables to reduce the sensing time. But, it increases the chip area and consumption of power which is not desirable. Also for coarse resolution sensing the mixer has to produce many frequencies and Also it should switch to one frequency for beginning the fine resolution sensing. If the signal is low pass signal then we can use fine resolution to scan the whole spectrum. Because low pass signal has low center frequencies and its sampling is doable. But for pass band signals it is not feasible to scan the whole spectrum. Because, for example say if we have some signal with center frequency of 850 MHz, it is not practically possible to do sample that signal. As according to Nyquist theorem sampling rate should be at least twice that of center frequency. Therefore it is practically not possible to sample a signal at 1600 Mega Hertz. 2.10 Business Model for Spectrum Sensing So far we have discussed about Cognitive radios and spectrum sensing in details. Since this is telecom, and telecom involves huge capital investment. One of the most costly things in telecom is getting the license itself and then comes the infrastructure and installations etc. Currently most of countries work on static spectrum allocation basis. For spectrum sensing to work we need some kind of regulation or set of rules that all will be ready to work with. A team from Brussels University has suggested a model for the same. The same model is discussed in brief below. This model is divided into four main categories. i. Ownership- Ownership simply means the ownership of license. One who has license is authorized to use particular band of spectrum. And if another licensee wants to share a spectrum then it will depends on parameters discussed below. If the operator is unlicensed then there is now issue of ownership. ii. Exclusivity- Exclusivity means whether or not a particular operator is exclusively assigned a band of spectrum. That will be issue of regulator to decide to exclusively assign a spectrum to a specific user. If it is assigned exclusively then nobody can access that band of frequency, and if not then those bands of frequencies will be available for sharing. iii. Tradability- Tradability means whether or not a terminal is allowed to switch between frequencies from different operators. If tradability is permitted frequency band or bands can be auctioned for sale or given on lease. iv. Neutrality- It is possible that some of frequency bands can be accessed by number of RATs (radio Access Technology) or may be limited to a particular RAT. If frequency bands are not available to number of RATs then that band need to address more issues, such as setting technical conditions to access the band and coordinating the cooperation between multiple technologies. Unlicensed: Unlicensed deals with the band of frequencies which are free to use, like ISM band. Common example for this is Wi-Fi which operates in 2.4GHz. This band of frequency is available to all and there is special condition to access this band. Single RAT Pool: This pool is related to a group of licensees which are not exclusively assigned any band of frequency and using same RAT. Multi RAT Pool: It is similar to Single RAT Pool except that it has multiple RATs. Single RAT Market: In this each operator is assigned with a separate frequency, but that can be accessed by the conditionally secondarys. Multi RAT Market: In this the operator is a licensee and is exclusively assigned with a band of frequency, and also with tradability. Flexible Operator and Static Spectrum: If a particular band of spectrum is exclusively assigned to an operator and without tradability. And if there is only one RAT, then it is known as Static Spectrum else Flexible Operator. 2.11 Survey outcome As per the literature review we concludes to use Energy detection technique for spectrum sensing as it is the fastest spectrum detection technique available and also it is simpler as compared to other techniques. There are many researches done in this field and many are still doing. Because of the survey we get knowledge about various techniques available in market. This led us to do a simulation model with one of the spectrum sensing technique. Now as far as selection of spectrum sensing technique is concerned, we selected Energy detection technique. The same could be seen in next part of the thesis which includes its design and implementation in simulation model. Chapter 3 Simulation Design 3.1 Sampling and Its Importance Sampling is a process of converting the continuous analog signal to a discreet analog signal and the samples signal is the discreet time representation of the original signal. If the message is coming from a digital source, then it is in the form to be processed by digital communication systems. But in real life not every signal is digital, message signal can be analog. In situation like these, we have to first convert the analog signal into discreet time signal, this is sampling. For this process to work well, sampling rate should be selected carefully or in other words it should satisfy Nyquist criterion. And Nyquist Criterion says that the sampling frequency should be at least twice the maximum frequency in signal. Fs ≠¥ 2fmax or T=1/ fmax Where â€Å"Fs† is sampling frequency, fmax is maximum frequency in the signal. T=Sampling period. Sampling is like reading a signal in analog form and taking its value at that instant of time. So more the samples we take better the resolution of the signal and, signal can be recovered more accurately. But if we take less number of samples, then resolution of the signal decreases. If we go on reducing the sampling rate, then times comes when it is difficult to recover the original signal from the sampled signal or in other words original information in the signal is lost. This is also known as aliasing. Aliasing is the effect which takes place if the signal is sampled less than twice the maximum frequency. 3.2 Types of Signal 3.2.1 Time limited signal- It is a signal which exists for only certain duration of time. Out of this duration, signal does not exist. A rectangular pulse of duration â€Å"T† seconds can be considered as time limited signal. x(t)=A †¦ for 0 3.2.2 Band Limited signals- It is a signal which has a frequency spectrum which exists only over a certain range of frequency. The value of signal outside this range of frequency is zero. Mod(X(f))=A †¦.-B 3.3 Sampling Of Low pass and Band Pass signal Low pass sampling theorem states that- a) A band limited signal of finite energy, which has no frequency components higher than W Hertz, is c

Wednesday, November 13, 2019

Essay examples --

INTRODUCTION: In general, Password-based authentication protocols are enormously used for logging to servers located remote or local. They also provide authentication between the client and the server to assure both parties‟ legality†. However an attacker may find the passwords. Therefore a designer usually uses a scheme with password changing function. However other than schemes which are anonymous, all the others in the literature cannot satisfy the three important properties: (1) two passes to reduce the network traffic and increase system performance , (2) the anonymity, and (3) the ten security features proposed by Liao et al.. In the scheme, we let the secret keys of both the user and the server be x and y, respectively which are embedded in three properties. The biometric authentication system offers several advantages over other security methods. Password might be forgotten and thus smart card might be shared,lost,or stolen.In contrast ,personal biometric such as fingerprints has no such drawbacks.Remote authentication is form of e_authentcation in which user as proof of adenitis as admitted over a network connection. There are two problems in applying personal bio-metrics. (1) obtaining easily some bio-metric characteristics, so that the results can never changed, (2)the difficulty of checking whether the device is capable of verifying that a person is alive. Due to such problems the best way is to integrate bio-metrics with password and smart card to construct a three secure factor authentication scheme. Client server system scenario usually a password based authentication scheme is widely used in order to identify the remote user. But the simple passwords are always easy to break using simple di... ...nge Phase When U wants to change his password from following steps. Step 1: U inserts his smart card, and inputs his IDu, PWu, the new password PWu’, and pc. Step 2: The smart card computes u=h(IDu||PWu||x),h(IDu||IDs||y)=Râ™ pcâ™ u, and checks to see whether O=h(h(pc||u)||h(h(IDu||IDs||y)||u)) holds. If it holds, the smart card computes u’=h(IDu||PWu’||x),R’=pcâ™ h(IDu||IDs||y)â™ u’, O’=h(h(pc||u’)||h(h(IDu||IDs||y)||u’)),A’=Aâ™ h(IDu||PWu||x)â™ h(IDu||PWu’||x), and then updates R, O, A with R’, O’, A’, respectively. Conclusions We have proposed secure and efficient biometrics-based remote user authentication. The proposed scheme can effectively withstand the replay attack,the imper- sonating attack, and the man-in-the-middle attacks.The proposed scheme enhance the security, but furthermore, this result reduces the communication and computation costs. Essay examples -- INTRODUCTION: In general, Password-based authentication protocols are enormously used for logging to servers located remote or local. They also provide authentication between the client and the server to assure both parties‟ legality†. However an attacker may find the passwords. Therefore a designer usually uses a scheme with password changing function. However other than schemes which are anonymous, all the others in the literature cannot satisfy the three important properties: (1) two passes to reduce the network traffic and increase system performance , (2) the anonymity, and (3) the ten security features proposed by Liao et al.. In the scheme, we let the secret keys of both the user and the server be x and y, respectively which are embedded in three properties. The biometric authentication system offers several advantages over other security methods. Password might be forgotten and thus smart card might be shared,lost,or stolen.In contrast ,personal biometric such as fingerprints has no such drawbacks.Remote authentication is form of e_authentcation in which user as proof of adenitis as admitted over a network connection. There are two problems in applying personal bio-metrics. (1) obtaining easily some bio-metric characteristics, so that the results can never changed, (2)the difficulty of checking whether the device is capable of verifying that a person is alive. Due to such problems the best way is to integrate bio-metrics with password and smart card to construct a three secure factor authentication scheme. Client server system scenario usually a password based authentication scheme is widely used in order to identify the remote user. But the simple passwords are always easy to break using simple di... ...nge Phase When U wants to change his password from following steps. Step 1: U inserts his smart card, and inputs his IDu, PWu, the new password PWu’, and pc. Step 2: The smart card computes u=h(IDu||PWu||x),h(IDu||IDs||y)=Râ™ pcâ™ u, and checks to see whether O=h(h(pc||u)||h(h(IDu||IDs||y)||u)) holds. If it holds, the smart card computes u’=h(IDu||PWu’||x),R’=pcâ™ h(IDu||IDs||y)â™ u’, O’=h(h(pc||u’)||h(h(IDu||IDs||y)||u’)),A’=Aâ™ h(IDu||PWu||x)â™ h(IDu||PWu’||x), and then updates R, O, A with R’, O’, A’, respectively. Conclusions We have proposed secure and efficient biometrics-based remote user authentication. The proposed scheme can effectively withstand the replay attack,the imper- sonating attack, and the man-in-the-middle attacks.The proposed scheme enhance the security, but furthermore, this result reduces the communication and computation costs.

Monday, November 11, 2019

The Hmong New Year

`The Hmong New Year is a cultural celebration that occurs annually, in the months of November and December, in areas where large Hmong population exists. In this speech, I am going to share the three main components that make up the celebration of Hmong New Year, such as the culture of the food, tradition clothes, and the activities that are involved. I. There are several activities that are involved at Hmong New Years. A. The game of love â€Å"Pov pob,† or ball toss, involves lines or groups of men and women tossing a ball. 1. The ball is thrown so that the other player can catch it with one hand.If the throw is good and the other player drops or misses the ball, an ornament or a piece of silver or a belt from his or her costume is given to the opposite player in the pair. Ornaments are recovered by singing traditional courting songs to the opposite player. 2. Girls can toss the ball with other girls or boys, but boys cannot toss the ball with boys. It is also taboo to toss the ball to someone of the same clan. Through playing this game, the youngsters get to know each other, forming relationships that may eventually lead to marriage. a. According to Liz Price who wrote the article call The Hmong Game of Love on the webpage thestar. om, she stated, â€Å"Throw the ball and catch a husband. If you see a boy you like, toss the ball to him and hope he returns it. But if you don’t like your potential partner, then drop the ball he throws you. † The next activity is†¦ B. The beauty contest is held every at Hmong New Year. This contest offers young ladies a chance to show off their talent and skills to the whole community. 1. The rules for the contest are that you cannot be married and if you win first place you will be â€Å"Miss Hmong† for one whole year until the next â€Å"Miss Hmong† is chosen. The contest usually runs for three days and is held during the New Year celebration.C. There are also sports tournaments involvi ng soccer, volleyball and kato for men and women. 1. Kato is played by using your feet, body, and head. One of the rules is you were not allowed to use your hands. The winning team gets first prized with a $500 reward. 2. Soccer is a big tournament that takes place during Hmong New Year. Soccer is given the top highest prize money for the winning team. First place gets five thousand dollars. 3. Unlike Soccer and Kato, both male and females play volleyball. Prices are given as well. The winning teams both males and females get five hundred dollars as their winning prize. D.There is the talent show. 1. The talent show consist of multiple groups and sometimes individual performing some kind of traditional performance. a. One of the performances consists a group of girls performing a tradition dance. c. The Hmong flute is called Sao ‘Raj'; it is another intricate part of the talent show. The Sao is a vertical flute pierced with finger holes. The Hmong Sao is a single flute with ha rd and colorful timber; the sound it produces is harsh and sweet. When the Sao flute is being played on stage, the music captures the hearts of the audience and the hearts of young girls. Moving on to the second component†¦..II. The tradition Hmong clothes. A. Hmong New years is presented with many traditional Hmong clothes that consists of bright colors and Hmong jewelries. The dabtshos (pronounced da chaw) is a decorative panel worn in the back of a Hmong woman's traditional blouse. It is a required part of the woman's traditional clothing. If a woman does not wear her dabtshos at New Years, other people would think it’s very strange. The needlework on the dabtshos is used as a way for a young woman to attract a husband. If she is wearing a beautifully decorated panel that shows off her mother's sewing skills, many boys will want to be her artner in the ball toss. B. There is also coins involving in the costume. From my understanding, the coins show that you are rich o r not. The more coins you have on your clothes, the more you are successful. C. A tradition hat is also worn. All the tradition clothes are all hand-made and stitched in multiple patterns. The last component is†¦ III. The food that is offered at Hmong New Years. A. After a long day of enjoying the sports and activities, people go to the booth where they sell different varieties of food, such as bbq pork and chicken. These foods are served with a plate of rice and peppers.Hmong sausage is one of the popular plates within the variety of food. It has a distinct taste of ginger and pepper made with pork. B. Another popular plate is papaya salad. It’s basically made with papaya fruit, tomatoes, lime juice, pepper, and tamarind juice. C. Lastly, there are also multiple fruit drinks and snacks. a. According to Jeff Lindsay on his website webpages. csus. edu, he said that he had talked to many people of different races about this event and many loves it. They agree that it's a o ne of a kind celebration because it brings the community together in various ways and really show what the Hmong culture is about.Conclusion: When people go to any HNY event held around the world they can expect to see a variety of colorful Hmong tradition dresses, expect to enjoy different Hmong traditional foods, and expect to be entertain with traditional Hmong dances, music, pageant, and more. Also, there are activities and games that anyone can participate in, such as the traditional ball toss game. The Hmong people originated in central Asia, and now live spread throughout China, Tibet, Laos and Vietnam. Many Laotian Hmong fought for the United States during the Vietnam war, after which they took refuge in California, Wisconsin and Minnesota.Traditionally, Hmong communities celebrate the new year at the end of the harvest, staggering these dates from August to December to allow communities to enjoy each other's festivities. New year activities vary from community to community and reflect regional influences The only major holiday celebrated by the Hmong each year is the New Year's celebration timed to fall during the full moon at the end of the twelfth lunar calendar month usually around November. In Laos it falls after the rice harvest and also marks the beginning of the r New Yea

Friday, November 8, 2019

DL Limited Company Business Plan

DL Limited Company Business Plan Executive Summary Education model in the contemporary world has taken a new face where by the conventional education has been complemented by e learning. According to national center for education statistics 20.4 percent of college student across the world subscribe to distance learning program. DL limited is a new UK company that is a part of Sterling consulting group.Advertising We will write a custom report sample on DL Limited Company Business Plan specifically for you for only $16.05 $11/page Learn More The firm offers long distance business management courses in conjunction with university that have subscribed to this package. The company the set-up cost of DL limited involves course development; web portals costs and general operating overheads are  £300000.The company has a strategy to expand to other lucrative market to form a network contacts with many universities and governments around the world. Analysis of the company market environment is th erefore crucial to determine the opportunities and strength of the firm in its expansion to other markets (Foster, 1992). The company intends to extend its educational services to markets beyond Turkey, which has been its major clientele. The business plan will seek to outline strategic and product decision in the bid to expand to other markets around the world. Company Description DL limited is a higher education consulting firm that provides undergraduate university courses in business management through long distance open learning model. DL limited is part of sterling consulting group with mandate to offer distance-learning package to undergraduate business degree programmes in Europe and other parts of the world. The firm utilizes the world web technology and other support systems to offer the education package (MacDonald, et al. 2005). The firm is budgeting for an enrollment of 500 students annually from different universities around the world. DL limited company is supported b y client universities by their subscription to the e-learning educational model. This model focuses on both full time and part time students. The model offers the courses to students of the subscribed universities through a web portal that will provide an interactive learning through an instructor (Naidu, 2005, p. 658). Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Proposed model for web-based e-learning system Source: semantic web technology Vision To be the world recognized center for academic excellence through e-learning model of education. Mission DL limited is dedicated in overcoming barriers that restrict access to university education and provide quality education and research through e-learning model in conjunction with other universities across the world. Mandate DL limited company will provide distance learning in undergraduate business courses and other business re lated transfer course. The firm is mandated to offer the below courses in business degree level in its distance learning model. Bachelor degree in economics Bachelor degree in finance Bachelor degree business administration Bachelor degree in business studies Bachelor degree in managerial information system Bachelor degree in commerce Bachelor degree in marketing management Bachelor degree in human resource management Bachelor degree in accounting Environmental Scan Environmental analysis seeks to assess internal and external factors that affect the company distance-learning program. In analyzing macro and microenvironment, the S.W.O.T (strength, weakness, opportunity, and threats) analysis will be used. Strength and weakness will analyze the internal environment whereas weakness and threats will assess the external environment under which the firm operates (Barrows, 1994). Strengths Well-established partner: DL limited is offshoot of Sterling consultant group, which offers cons ultation services in UK. Sterling consultant group has three years working experience with senior officials in UK universities and 14 Turkish universities to develop double degree program in business, IT, and Engineering courses. The sterling group has currently 1000 student from Turkey representing a fee income of more than  £ 7.7 million to UK universities. Infrastructure:-The web technology to be utilized is superior in reaching more students in different universities across the world. The infrastructure is also cost effective method of learning since no physical amenities will be required to disseminate knowledge. This model of learning enables a student to be exposed to different materials in the web that cannot be offered by one single lecturer or instructor. Financial and resource backing:-DL limited is a new firm from Sterling group. The firm will be launched within three months after its completion and will be requiring  £300,000 as its operating costs. DL limited is a subsidiary of Sterling group and therefore the firm will have the advantage of having its initial capital cost transferred to its mother company. Experience support stuff:-The human resource that will be employed in support of the distance-learning model will be required to be well experienced with information technology systems and with skill to handle any query from the customers. The working group will vary in their specialization ranging from information technology technicians to qualified lecturer who will provide a support service to the clients. Availability of variety of business courses:-DL limited has a mandate to provide business courses. Variety of these courses can increase the number of enrolment to the program due to its diversification. These courses may range from accounting to finance and other relevant business courses Weakness Inadequate business experienced-DL limited is new upcoming company in the distance-learning model of education. The firm has no experien ce in management know how and will depend on the mother company for a while before it can operate independently. Resources: DL limited is a new company that has yet no resources and will depend entirely on the sterling group. These resources will include financial and human capital and infrastructures. Weak public perception:-Intensive marketing for the new firm is important if the firm is to gain international recognition. The known firm to the public is Sterling Company and therefore DL limited will have to strategic market itself to be recognized as the provider of distant learning services to client universities. Scope:-DL limited has a narrow scope in its mandate to provide leaning courses. The firm has a mandate to provide only business management courses. This reduces the opportunity to admit other student from other discipline that may want to use the services. Mode of learning:-Distance learning depends entirely on information technology, which is vulnerable to cyber crime s. The business is risky in that these cyber crimes can bring sudden inconsistency in the mode of learning if these crimes. System viruses and interference of information in the database are some of the threats that face distance-learning mode of education. Opportunity Ready market:-Distance learning model of education is gaining popularity across the world. Currently Sterling group which is the mother company to DL limited has exceed two million distance learning student from Turkey universities. This model is being replicated in Eastern Europe countries such as Georgia and Albania. DL limited will be enrolling a minimum of five hundred student annually.Market for distance learning program is large and therefore DL limited need to expand its infrastructure to accommodate the large number of student who need to enroll in the program. DL limited looks forward in exploring the African and Asian markets to extend its services. This will be made possible by enrolling potential univers ity institutions in these areas to the distance-learning model. These markets are not as saturated as those in America and Europe and therefore will provide a good starting ground for the firm. Government support:-Sterling group has been working with governments in UK and other countries who are in support for the model of education. Government support provides a conducive environment for the company operations and this is an advantage to the firm. Location:-DL limited is situated in UK, which is strategically situated in terms of access to the technologies and support needed. The company is also well located near competent world-renowned universities that will offer support services to new to the firm. Technology:-E-learning technology model is an information technology new approach to learning. Network transfer of skills and knowledge supports this model. It include web-based learning, computer based learning and virtual classroom platform. Distant learning is however taking a ne w paradigm shift because of emerging new technologies. Traditional learning methods are becoming more overtaken by new trend in learning methodology. In today’s learning world, learning systems make use of internets, e-mails, video transmission, and even social site such as face book to communicate with students.Advertising We will write a custom report sample on DL Limited Company Business Plan specifically for you for only $16.05 $11/page Learn More Modules on different subjects can now be taught via teleconferencing and shared through social networks. This advance in technology have made learning more cost effective in that many students all over the world can now access education more easily (Owston Wideman, 1997, p. 66-73). Threats Competition:-Distance learning is an emerging model for modern education and is therefore subject to competition for several institutions in UK. Firms such as Stone bridge associated collages have well established n ames as distance learning providers. These institutions offer much flexible and competitive business degree programs and have years of experience in distance learning model. Aggressive marketing:-Aggressive marketing by the competitor is a threat to the firm’s market share. DL limited is a new company that is barely known in the market. The firm needs to develop good marketing strategies in order to compete effectively with other firm in the market. Fluctuation in demand: From the current economic conditions, it will be difficult to forecast the demand. The number of student forecasted to enroll in the program may be less than planned. One can never be certain on the forecasted demand as a number of factors beyond the organizations control impacts on the demand. Cost of technology:-The intended educational model relays heavily on information technology. However, technology is very dynamic and change over time. Technology that is superior today will be obsolete tomorrow. In c orporate world, technology aspect of the organization should be reviewed every eighteen month and changed if necessary. The cost of a new technology is very expensive in terms of maintenance and initial installation. Over reliance to mother company: DL limited is a new company that is a split from Sterling group. The company will rely on almost every aspect of its operation from the mother company. The mother firm will provide most of the finances for its establishment and even technical assistant. Business Objectives DL limited is a new firm that traces it origin to Sterling group. In order for the firm to grow and attain the competitive advantage, the management will have to focus on the objectives and implement strategies to achieve them. These objectives are as follows Exploring new markets:-DL limited is interested in expanding in African and Asia markets. These markets are new to the program model and this will provide a good starting point for the firm. Survey from 134 cou ntries in Africa showed that distance learning is a new concept in the continent. Among African universities e-learning trend was as follows Kenya S.africa Nigeria Ethiopia Uganda Senegal Ghana Tanza Drc 18% 14% 12% 6% 5% 4% 4% 3% 3% The biggest challenge to distance learning in Africa is the internet bandwidth and unstable electricity supply. There has been however efforts to provide undersea cable to the coast of Kenya as per July 2009. The Asia market is however for more receptive to distance learning model. The strategic approach in markets in Asia in to attract the population to enroll to the program. The target being India and china, which has vast population of universities that may find it convenience to subscribe to this model of learning. Ensure quality learning: Quality in an essential aspect in distance learning. Quality leaning brings about competitive edge over the competitors offering the same product to the market. In providing quality to the customer, the management will have to review the curriculum of the courses to offer. The delivery methods employed to provide these courses must be efficient and reliable. The human capital employed must be conversant with the system administration. Capacity building through training is also crucial as far as quality is concerned. Capacity building should be spread not only to the technocrats but also at the management level of the organization (Dewey, 1958, p. 149). Attain competitive edge: Competitive edge over competitors will give the firm monopoly of offering business courses to the market. Competitive advantage can be attained through technology and other innovative means to achieve organizational market targets. The firm will have to conduct survey in order to benchmark its services with other firms providing the same services. Extensive marketing is also a significant aspect. The firm may utilize information technology modes such as internet to market its courses to institutions around the world. Staffing-DL limited is an upcoming company dealing in distance learning program. The company is to be launched within three months of its initiation. It will require human capital to operate. Specialist in different areas of operation within the firm will need to be recruited through a very competitive method. The main objective is to ensure quality service to the customer (Namuth, et al. 2005). New products:-DL limited is mandated to provide undergraduate degree courses in business courses. The firm will also provide a course curriculum accepted by the by the client universities. The firm also will have to provide and information technology course as a common unit to compliment these courses such that one will have a degree in relevant business course and a diploma in information technology. Full time undergraduate course in business will take three years plus one year in information technology diploma. This will be made possible in collaboration with four renowned UK Un iversity namely University of Leeds, University of Nottingham, University of Warwick, and University of Greenwich (Clark, 1994, p. 454). Pricing for the courses: The business courses will be offered in international pricing standards. Each course will be charged differently as follows. Courses Fee per year Duration Bachelor degree in economics  £ 5000 3 yrs Bachelor degree in marketing management  £ 6700 3 yrs Bachelors degree in human resource management  £5000 3yrs Bachelor degree in accounting  £6200 3yrs Bachelor degree in finance  £6800 3yrs Bachelor degree in business studies  £5000 3yrs Bachelor degree in management information system  £5200 3yrs Bachelor degree in commerce  £6500 3yrs Bachelor degree in business administration  £6000 3yrs An additional tuition fee of  £1000 will charged for an extra diploma course in information technology, which will take a period of one year. Business Strategies DL limited will consider the fol lowing strategies for achievement of its goals and objectives.  Administration will involve putting up technical team and management group to provide an operational mechanism to the new organization. The top organizational structure follows the below model (Dede, 1996). Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The top management will provide leadership for the whole organization. The technical department will have to develop information communication systems that will enable distance learning possible (Bransford, 1998). The operations department will be responsible for the academic part of the system include course monitoring and evaluation of the model. At operational level, there will be unit instructors and lecturers. The mode of learning will involve web approach, video conferencing, and e-mailing. A website for the firm will be developed to include all courses and an online subscription. Payment of tuition fee and online learning will be made possible by this website. The technical team will also be responsible for system maintenance and support (Dede, 2000, p. 58). Pricing of the courses was reached after survey of tuition costs charged by competing firm and projected operational costs in initiating the firm. The tuition fee will be determined by variety of factors such as cost of investment, competitors pricing and global market pricing. The price reached for offered business meets the international standards and affordable (Nash, 2005). In ensuring quality learning, the company will provide the latest technologies in its model. Use of communication tools such as e-mail and the firm’s website to share and discuss educational topics and materials will be a step towards offering superior platform of learning (Brown, Collins Duguid, 1989). The learning services in the web will provide registration of the preferred online course and interactive tutorials by the instructor. The systems also enable the students to create at while they will be authenticated by using a password. This will enable the student to check the learning topics and assignment. The system also provides online library for references and research (Edelson Gordin, 1999, p. 399). In exploring new market, DL limited will have to develop a marketing plan. This market plan will explore the use of internet facility to advertise distance-learning courses. The firm will use social sites such as twitter and face book to bring awareness to the institutions courses (Otterbourg, 1998). A market department under head of operations will be formed and its representative will have an office in Kenya to represent the Africa market and another office in India to represent the Asian market. These two outlets will be responsible for marketing the firm and offering any support services to institution that enroll to the program. These marketing units will link up with universities and sell the firms products to these institutions (Dewey, p. 1958).  Outsourced private firm will be responsible for selection and recruitment of the support staff for the firm. The contracted firm will advertise for both managerial and operational positions posts and later carry out interviews for these positions. Key competencies that will be looked for during the interviews are experience and skill in t he operation of distance learning (Knowles, 1984). For managerial position, management skills and experience will be the competences required. The resources will determine the number of staff and the number subscribed student on the model. The lecturer and instructor will be academician will years of experience in the relevant business course (Carrol Rosson, 2005, p. 8).  DL limited also intends gain competitive edge by using the latest technologies in the communication sector. Use of social sites to market and as a means of communication to students is one of the strategies the firm is willing to explore. By concentrating in business courses, the firm is segmenting the market based on subject of offer and this will enable the firm concentrate more on its core business (Bangert-Drowns, et al. 1991). Competitive edge will also be acquired the nature of the service provider and it is for this reason that the firm will be hiring the most qualified and experienced working personnel ( Clark, 1983, p. 452). Contribution of DL (using ICTs) substantive divisions application Development of materials Using instructional design methods to make sure that information is structured and presented using multimedia Sharing work-in progress, such as PowerPoint presentations, lecture notes with DL team so as to tailor them to distance learning Pedagogical expertise, application of training methodology Course delivery Structured online and interactive training materials, use of chat and electronic communication Availability to take part in chat sessions, Answer e-mails. Use of DL materials in face to face sessions Building distance learning elements into face-to-face training seminars and events Use of practical expertise and methodology in face to face sessions Student Support Forum, scheduled chat sessions Availability to answer email enquiries and participate in chat sessions about substantive matters Assessment Carefully structured online tests providing feedba ck to students Sharing learning objectives and assessment criteria with practical so as to design effective assessment Tools. Being available to mark tests and give feedback to students Evaluation Use of database to track student progress Online questionnaires into the effectiveness of training Undertake questionnaire and other evaluations into the effectiveness of the training and sharing outcomes Use of practical expertise and methodology to evaluate training Strategy for implementing a Distance learning process source: UNCTAD report January 2004 Advantages of Distance Leaning Over Conventional Model The student does not require hall of residence or a traditional classroom to pursue education while the service provider cuts cost on elaborate organizational structure with employee to pay. Distance learning is accessible to everyone connected to the internet as the service can be accessed from any part of the globe with no time barrier (Gackowski, 2003). Distance learning has more content in scope that traditional learning model does not have. Through e-learning, one can excess more and latest materials in the internet from any part of the world at any given time, the system is also efficient as it avoids the lock scheduling of classroom learning (Bielaczyc Collins, 1999, p. 193). Market Projection The firm is on the growth stage of product life cycle and projects to be enroll about 500 students annually. This will require extensive marketing campaign in the regional of interest i.e. African and Asia.In projecting future demand the firm need to assess the competition, customer, and product (Clark Solomon, 1986). Competition will affect the market share of the company and therefore it is important for DL limited to explore other innovative means in administering this model of learning in order to stay ahead of the competition. Product development is another method of obtaining a competitive edge. The enroll program will commence on January 2012.The proj ections for the next 5 years (Linn, Bell His, 1998). 2012 2013 2014 2015 2016 total Number of students enrolled 500 700 1000 2500 4000 8700 The estimates show that by the firm will be having at least 8700 students with the first lot having successfully completed the course. Financial Budget and Projection This section will provide an estimate initial budget of developing distance-learning centre. The set-up costs of DL limited will involve course development, web portals, and general operating overheads at a cost of  £300,000.This amount is projected to initiate the cost of establishing DL limited (Malaxa Douglas, 2005). Risk Management Risk management involves identifying and assessing the risk factors with intention to minimize their impact in the organization. Risks lurk in every aspect of the business. They vary from competitor innovations to new technology in the market. These dynamics in the market bring about disruption to the operational consistency in the organ ization (Kaplan-Leiserson, 1999).There are risks that can be controlled and those that cannot. The role of top management of DL limited will be to develop a strategic plan for the risks both internal and external risks. Risk factor may range from competition and Technological changes in the business environment. In the mode, learning which is via the web, viruses and hacking may be major causes of concern. There is also a risk potential of service quality during the delivery stage (Koohang Harman, 2005). Market risk is the potential of viable market not materializing as projected i.e. in Asia and Africa Economic risk such as recession is factors that have to be considered when projecting the future demand. The company has to prepare to counter these uncertainties and mitigate the environmental risk factors. Risk management is the process of identifying, assessing, and prioritizing risks factors in order to minimize and control its impact in an organization. The first step in risk m anagement is to identify the kind of potential risk a business is to identify the risk factors the firm exposed to. This is done by examining the external and internal environment for drivers of the risks (Hayhoe, 1998, p. 76).  Risk management involves Identify business process and function in an organization than are vulnerable to the risk factors by Rank these functions and processes in order of their vulnerability to risk factors Identify threats of risk to these business functions and processes Determine the specific risk to each process and function. Put up appropriate resources and plans s in place to deal with the risk factors. References Bangert-Drowns, R. et al. (1991) The instructional effects of feedback in test-like events, Review of Educational Research, 61, 213-238. Bransford, J. (1998) Doing with understanding: Lessons from research on problem and project-based learning. Journal of the Learning Sciences, 3/4, 271-312. Barrows, H. S. (1994) Problem-Based Learning Applied to Medical Education. School of Medicine. Springfield, IL: Southern Illinois University. Bielaczyc, K., Collins, A. (1999). Learning communities in classrooms: A reconceptualization of educational practice. In C. M. Reigeluth (Ed.), Instructional design theories and models: A new paradigm of instructional theory, Vol. 2, pp. 188-228. Brown, J. S., Collins, A., Duguid, P. (1989) Situated cognition and the culture of learning. Educational Researcher, January-February, 32-42. Campbell, R. J. (2000, September-October). Descending into the maelstrom of the 21st century with Marshall McLuhan, Educational Technology, 40(5), 18-27. Carrol, J. M., Rosson, M. B. (2005). Toward even more authentic case based learning. Educational Technology, 45(6), 5-11. Clark, R. E. (1983). Reconsidering research on learning from media. Review of Educational Research, 53(4), 445-460. Clark, R. E. (1994). Media will never influence learning. Educational Technology Research and Development, 53(2), 21 -30. Clark, R. Solomon, G. (1986) Media in teaching. In M. Wittrock (Ed.), Handbook of Research on Teaching, 3 Ed, New York: Macmillan. Dede, C. (1996) Emerging technologies and distributed learning. American Journal of Distance Education, 10(2), 4-36. Dede, C. (2000). Emerging technologies and distributed learning in higher education. In D. Hanna (Ed.), Higher education in an era of digital competition: Choices and challenges. New York: Atwood. pp. 55-64 Dewey, J. (1958) Experience and education. New York: Macmillan. Edelson, D.C., Gordin, D. Pea, R. (1999) Addressing the challenges of inquiry-based learning through technology and curriculum design. The Journal of the Learning Sciences, 8(34), 391-450. Foster, G. (1992). Lessons from teamwork: Towards a systemic scheme for Press. course development. Higher Education, 24, 193-211. Gackowski, Z. (2003) Case/real-life problem-based learning with information system projects. Journal of Information Technology Education, 2, 357-365. Ha yhoe, G.F. (1998). Evaluating distance learning in graduate programs: Ensuring rigorous, rewarding professional education. Paper presented at the International Professional Communication Conference 98 on 23 September 1998 in Quà ©bec City, PQ, Canada. Web. Kaplan-Leiserson, E. (1999) Learning circuits glossary. American Society for Training Development. Web. Knowles, M. (1984) Andragogy in action. San Francisco: Jossey-Bass. Koohang, A. Harman, K. (2005) Open source: A metaphor for e-learning. Informing Science: The InternationalJournal of an Emerging Transdiscipline, 8, 75-86. Web. Linn, M., Bell, P., and His, S. (1998) Using the Internet to Enhance Student Understanding of Science: The Knowledge Integration Environment. Interactive Learning Environments, 1(6), 4-38. MacDonald, C. et al. (2005) Addressing the e-learning contradiction: A collaborative approach for developing a conceptual framework learning object. Interdisciplinary Journal of Knowledge and Learning Objects, 1, 79 -98. Web. Malaxa, V. Douglas, I. (2005) A framework for metadata creation tools. Interdisciplinary Journal of Knowledge and Learning Objects, 1, 151-162. Web. Naidu, S. (2002) Designing and evaluating instruction for e-learning. In P. L. Rodgers (Ed.), Designing Instruction for Technology-Enhanced Learning , Hershey, PA: Idea Group Publishing, pp. 134-159. Naidu, S. (2003). E-Learning: A Guidebook of Principles, Procedures and Practices. New Delhi, India: Commonwealth Educational Media Center for Asia (CEMCA), and the Commonwealth of Learning. pp. 645-664. Naidu, S. (2005). Evaluating Distance Education and E-learning. In C. Howard, J. V. Boettcher, L. Justice, K. Schenk, P. Rogers, G. A. Berg (Eds.), Encyclopedia of Distance Learning, Idea Group, Inc.: Hershey PA. Vol. 1-IV, pp. 857-864. Namuth, D. et al. (2005) Principles of sustainable learning object libraries. Interdisciplinary Journal of Knowledge and Learning Objects, 1, 181-196. Web. Nash, S. (2005) Learning objects, learn ing object repositories, and learning theory: Preliminary best practices for online courses. Interdisciplinary Journal of Knowledge and Learning Objects, 1, 217-228. Web. Otterbourg, S. (1998) Using Technology to Strengthen Employee and Family Involvement in Education. Research Report 1223-98-RR. New York: The Conference Board. Owston, R. and Wideman, H. (1997) Word processors and children’s writing in a high-computer-access setting. Journal of Research on Computing in Education, 30(2), 202 – 220.

Wednesday, November 6, 2019

United States Declaration of Independence and Allowance Medical Allowance Essays

United States Declaration of Independence and Allowance Medical Allowance Essays United States Declaration of Independence and Allowance Medical Allowance Essay United States Declaration of Independence and Allowance Medical Allowance Essay E-67, 4th Crescent, Sainikpuri Secunderabad-500 094 Printed on : 10/03/2010 PAYSLIP DETAILS FOR THE MONTH OF : SEPTEMBER,2010 sudhansu sekhar mishra Employee ID SBU Designation Location Bank Current Leave Status CLs : 4. 00 BLs : 0. 00 Earnings Basic HRA Conveyance Education Allowance Special Allowance Medical Allowance Other Allowance Medical Reimbursement Meal Card Amount Gross Project DA Total Gross 3,500 1,400 800 0 1,300 0 0 0 0 7,000 0 7,000 Total Deduction Net Amount Arrear Gross Amount Total Amount Allowance Narration Deduction Narration Loan Narration Cumulative TDS Medical amount Rs. . 00/- is included in gross as allowance. , 0 623 6,378 0 6,378 PF ESI Professional Tax Loan Amount TDS Other Deductions Meal Card Amount Project DA SLs : 4. 00 Els : 7. 00 LOP Days : 0 MLs : 0. 00 Worked Days : 30 Deductions 420 123 80 0 0 0 0 0 112154 Radio Frequency Engineering S Level4 Hyderabad Axis Bank Ltd Date Of Join Account Number PF Number ESI Number Meal Card Account No: Project Nam e 14 Apr,2010 -NAAP/HY/35820/10250 N. A. Note: For more details please login to your account at specified URL http:// hrms. atspl. com Requesting to submit your tax declarations by login to ERP applicaiton, failing to submit the declaration will deduct TDS from salary accordiing to the tax rules In case of change of address/telephone number you may access your personal login and effect the change Aster Private Limited Page 1 of 1

Monday, November 4, 2019

Accounting Essay Example | Topics and Well Written Essays - 750 words - 4

Accounting - Essay Example that would be distributed to holders of each share of common stock if all assets were sold at their balance sheet carrying amounts after all the creditors were paid off. Book value per share is based entirely on historical costs. The bank should not approve a five-year $500,000 loan to Stephens Company due to the times interest earned and debt-equity ratios. Stephens Company’s times interest earned ratio is 3.5, lower than Stephen’s industry (5). Also, the debt-to-equity ratio is 1.036, greater than 0.8 (industry ratio). Both of these figures show that the company earnings are lower than competitors and also that the company relies too much on loans or debt. The current ratio is higher than competitors and the acid-test ratio is lower than the industry average. Most of the current assets are inventory and prepaid expenses, which cannot be converted to money quickly. The gross margin is lower than the industry average and the ability of company to generate profit is low. This company does not have good prospects the long

Saturday, November 2, 2019

Movie Piracy Hurts the U.S. Economy Essay Example | Topics and Well Written Essays - 750 words - 13

Movie Piracy Hurts the U.S. Economy - Essay Example The estimated loss in millions because of movie piracy cannot be substantiated; it hurts the economy because IP protection costs for firms continue increasing, brand value and sales are lost, consumers get low-quality goods and the government continues to lose tax revenue. The first way that movie piracy hurts the economy is that it results in lost sales and brand value for companies, in addition to the costs incurred for increased Intellectual Property (IP) protection. Guaranteed protection of these companies is possible when the proprietors get limited exclusive rights to the economic rewards provided by the market for creating products. According to a report released by the U.S Government Accountability Office in 2010, there are many negative, economic effects arising from piracy and counterfeiting on the U.S economy (3). However, based on this report, the many claims that piracy has led to the loss of many American jobs and the loss of millions of U.S dollars are not valid (U.S Government Accountability Office 11). It is as a result of this statement that critics argue that perhaps there are little or no negative economic effects of movie piracy on the U.S economy. Today, movie piracy is so common that a person does not necessarily need advanced c omputer skills to gain access to illegal movies. Of course, this is a move that has led to companies looking for advanced ways of protecting their IP, which is known as costly affairs. If movie piracy was non-existent, new copyright companies in the entertainment industries would not lose their creative work without getting paid for their work. Essentially, piracy of movies is part of the reason contributing to lost sales and brand value for so many movies in the U.S. The second way that movie piracy hurts the economy is because leads to consumers getting low-quality goods and their safety risks increase.