Saturday, August 31, 2019

Contemporary Hawaiian Music Essay

There is a famous Hawaiian saying, â€Å"You know if the Hawaiian harmonies are good if they give you chicken skin† (Alternative Hawaii, 2002) and, I must say, listening to the online radio streaming of KCCN FM100 gave me goosebumps. Being more attuned to â€Å"Western pop† culture, it was a pleasantly refreshing experience for me to sit for an hour and listen to contemporary reggae, urban music and ragga with an island beat that’s truly Hawaiian. Fourteen original Hawaiian songs, including the Top 5 hits in KCCN charts, were played during a late afternoon program that also aired a couple of brief â€Å"Hele On† traffic news, a commercial each from Earth Share and Hawaii. gov, and 8 radio ads encouraging the people to participate at the ongoing 2010 Census. The DJ on deck did not talk much except to give quick, in-between plugs for a party event and to introduce songs. A distinctly noticeable feature in the contemporary Hawaiian music is its fondness to love and desire. The soulful songs I listened to speak of the excitement of love, romancing the heart of another or accepting a love’s rejection. But even though the lyrics contain sad words, the melody is always upbeat and sensual. The island reggae beat and the smooth ballad is very easy on the ears especially when instruments, like the ukulele, saxophone and native drums blend together to produce the perfect harmony. The result is one relaxed listener mentally transported in an island paradise in Hawaii, and its effect to music lovers is no less than rejuvinating the soul. I think KCCN FM100, being a radio station that plays modern hip-hop and soul Hawaiian music, carries the familiar radio spunk of other American hiphop stations. The DJ was very energetic and in a party mood, and even the traffic reporter was such a chipper in delivering traffic updates as a local RnB song played in the background. The advertisements aired between the 4:30-to-5:30pm radio show were mostly the varying versions of promoting the 2010 Census Count – explaining what the census results would mean to businesses, the improvement of social services and what it means to the future generation. I think delivering the message using both in English and the local dialect reveals a lot about the listeners’ profile of KCCN, which is a mixture of both modern and traditional Hawaiian folks. I also believe that although all local songs aired were sang in English, they always make it a point to bring out the traditional Hawaiian flavor. This much is obvious in both the songs and commercials played. Listening to KCCN and the music aired there makes me realize how global Hawaiian music can be in terms of its appeal to both young and old, locals and foreigners. Everybody can appreciate an island style music inspired by the world-loved Bob Marley and urban rhythm of the modern RnB.

Friday, August 30, 2019

Gay Marriage Essay

The issue of gay marriage remains controversial. Some people think that this trend has adverse effects on the society while others believe that it is seen as a natural trend and right for people to choose this type of marriage. My essay will discuss causes and effects of this problem. First, gay marriage is the result of psychological, legal, economic and biological effects. Medically speaking, if someone is born to be gay, the tendency is that he will not change his nature and want to live with people of the same sex. There are cases of men who marry the opposite sex and end up being unhappy till the day they decide to lead their own lives and stay with the same sex. Another reason is derived from economic drive. Despite not being inborn gay, several people, for sake of profit, opt for the solution to marry the similar sex. Besides, only after undergoing painful break-ups with so many people of the different sex do people lose their belief in love, and hence, choose to be by the side of the same sex. These people are believed to sympathize and care about them more. In addition, in such an open society where equality is recognized, it is inevitable that people can marry the one they love, despite the differences in age, race, family background and marriage notion. There are both positive and negative effects in this problem. As a result of recognizing the right of gay people in form of marriage, the society bestows upon these people the feeling of equity which makes them motivated to work as hard as other people. It is the acknowledgement of gay marriage that talented gay people continue contributing their best to social development, without bias. However, the fear is that no sooner has gay marriage become official than the society lacks the next generation since hardly could gay couples give birth. Another disadvantage is that children who are raised in gay families can rarely receive comprehensive education. Such purely male environment or female one is not enough for kids to develop normally, which might result in their mental disorders and sexual disorientation.

Thursday, August 29, 2019

Change and Development in the English Language Bachelor Essay

Change and Development in the English Language Bachelor - Essay Example ..is evidently Germanic." (Domingue, 90) Topic Sentence 2: The Middle English phonological component, as against that of the Old English, exhibits significant innovations such as the addition of a French stress pattern carried by the lexical loans and the reinforcement of a phonemic status for the voiced fricatives which also contributed to the development of the Middle English. Topic Sentence 3: Another chief characteristic that helped in the formation of the Middle English is the lack of any specific standards as in the Old English and "the fact that there was no written standard in Middle English as in Old English gives us evidence that these changes took place at different times in different areas..." (Trips, 7) Topic Sentence 4: Syntactic differences between Old English and Middle English can be apparently comprehended and "While (classical) Old English had a rather elaborate inflectional system for both verbs and nouns, much of this had withered away by early Middle English, and further reductions took place in the course of the Middle English period." (Fischer, 69) There have been significant changes in the Middle English phonology and syntax compared to Old English which helped the development of Middle English.

Wednesday, August 28, 2019

REGULATION, COMPLIANCE AND GOVERNANCE Essay Example | Topics and Well Written Essays - 2000 words - 1

REGULATION, COMPLIANCE AND GOVERNANCE - Essay Example The essay highlights on similarities and dissimilarities between the failures of Enron and Northern bank. Regulations that are introduced for addressing such corporate failures are also discussed. Enron Corporation was an esteemed energy provider company, which had its headquarters in Houston, Texas. Prior to the period of December 2001, Enron had enjoyed a prosperous position in the United States (US) and achieved the seventh position for being the most innovative firm operating worldwide. The main problem for Enron had surfaced from wrong and questionable practices followed therein. The company desired to expand its territory and operations through diversification of the products as well as introduction of online trading. Nevertheless, following its success, Enron breached the usual practices that are prevalent in the industry. Instead of acting as a broker between the sellers and buyers, the company traded in products and gas. This fact indicated that purchasers bought the products and gas from Enron directly, whereas the latter bought the same directly from suppliers (The Economist Newspaper Limited, 2014). Hence, it can be stated that continuity of business operations wa s solely dependent on proper credit rating. Eventually, when the credit rating of Enron dropped drastically, the sellers and buyers stopped the trade. The board of Enron had devised a very risky strategy, which could not be undertaken by the security of the company, given that there was a drastic slump in credit rating and consequently, in the trade (The Economist Newspaper Limited, 2014). Enron had devised another strategy by appointing Special Purpose Entities (SPEs), which were basically a third party who collected investment funds from companies and people. Even though these entities were not directly related to Enron, yet the latter was the guarantor of payment for the borrowed funds. This process was executed by offering shares to the investors. It was observed

Tuesday, August 27, 2019

Coco Chanel Research Paper Example | Topics and Well Written Essays - 2000 words

Coco Chanel - Research Paper Example Coco Chanel was a pioneering style maven who was born in the 1890s, and was apparently orphaned at a young age. The movie Coco Avant Chanel begins with young Gabrielle arriving at the orphanage, although it was later made clear that Coco was not actually an orphan, but that her father left the family when she was young and never returned. (Coco Avant Chanel, 2009). Perhaps it was this unusual early childhood that inspired Chanel’s iconoclastic personal style that was so completely different from the prevailing style at the turn of the century. It probably was also a basis for Chanel’s strong sense of independence, and her ability to make her fortune in a male-dominated society. Chanel was different from all other women during this time, for she not only was not satisfied with the lot bestowed upon women, but she also did not dress the part. This was a period of time when society women were in invariably in corsets, high boots and large hats with feathers. In contrast, Chanel opted for comfort, simplicity and clean lines. While other women wore corsets and frilly dresses, Chanel dressed in menswear, simple dresses with no corsets, low-heeled shoes and unadorned hats. (Coco Avant Chanel, 2009) Chanel saw that the fashion of the day was not comfortable for women, nor practical. At first, it seemed as if Chanel simply rebelled against the societal restrictions, in that she chose to wear men’s wear and comfortable clothes, while the rest of the women went about their day in fashions that were no doubt impossibly hot and uncomfortable. She did not necessarily aim to change societal fashion. She just did not go along with it. She was her own person in a so ciety where individualism was not necessarily admired. While it might not have been her aim to change society, this is exactly what she did, with the guidance, encouragement and financial

Monday, August 26, 2019

What can be done about prison overcrowding Research Proposal

What can be done about prison overcrowding - Research Proposal Example it was able to come up with additional resources to build prison cells, the increase of inmates has still proven to be too overwhelming for the government to keep up with. In California, some inmates have taken to sleeping on floors because of the shortage of cells (Lake â€Å"News†). In other parts of America, the early release of prisoners has been sought by prison administrators just to ease inmate population. America has been shelling out billions of dollars to support the prison system. â€Å"State prison systems spend more than $30 billion annually, and the Bureau of Prisons budgeted $5 billion for just 182,000 federal inmates this year† (Myser â€Å"Business†). This overcrowding problem is attributed to a variety of factors, from the economic to the sociological, to the political. On an economic standpoint, the increase of poverty rates has unfortunately contributed to the increase of criminal activities. Various societal problems also encourage and breed criminal behavior. Legislative changes and new laws like mandatory life sentences, the three-strike rule, and strict parole eligibility provisions have also served to increase prison population. Without the corresponding increase in funding and in prison cells, these numbers will continue to rise. This paper will discuss some possible solutions to the problem of prison overcrowding, the viability of these solutions, the risk of unintended or undesirable consequences to these solutions, and the practical impediments that could hamper the development, approval, and implementation of the proposed solutions. Solutions to prison overcrowding that will be discussed in this paper shall focus on measures to reduce the number of prisoners and not solutions to increase the number of prison cells. These solutions will be more long-term. Increasing the number of cells will not stop prison overcrowding, especially if more inmates will keep coming in and filling up the new cells. This paper suggests changes

Sunday, August 25, 2019

Deniers of Genocide Essay Example | Topics and Well Written Essays - 2000 words

Deniers of Genocide - Essay Example One of the most controversial cases of genocide occurred in Nanking China in 1937-38 when occupying Japanese forces tortured, brutalized, raped, and murdered hundreds of thousands of Chinese men, women, and children over a six-week period. Its limited duration and scale of devastation portrays it as one of the most intense periods of violence in world history. Yet, decades of denial by the Japanese government and conflicting first hand accounts have fuelled a debate in regards to the accuracy of the event, and it has even been questioned as to its authenticity. As the story continues to evolve and more facts come to light, historical researchers revise the history of the incident and are themselves targets of controversy and risk the accusation of being revisionists. Psychological, cultural, and pragmatic forces delayed and minimized Japans public acknowledgement of their involvement in the Nanking massacre and have routinely impeded the historians efforts to adequately record the ev ent. History is not a set of facts, but is a dynamic concept of evolving knowledge that is interpreted in the context of the past and re-evaluated in the framework of the present. Terms such as genocide, ethnic cleansing, massacre, and atrocities suffer from semantics and the diverse subjectivity of worldviews can characterize an event to a nations advantage or disadvantage. Determining when an excessive use of force crosses over into genocide can make, "Politicians, scholars, relief agencies, and distinguished judges at international tribunals regularly agonize over whether to apply the label".1 States may suppress information or produce disinformation in a self-serving attempt to protect their image and self-interests. Historical scientists grapple with these complexities as they attempt to draw a clearer picture of past events, and suffer when activists rewrite historical accounts based on their own political or social agendas.

Saturday, August 24, 2019

Course work (see uploaded file) Essay Example | Topics and Well Written Essays - 2000 words

Course work (see uploaded file) - Essay Example In this vein, a firm might use price discrimination to increase sales. Secondly, a firm might use price discrimination to prevent other competitors from capturing the market, for example, a UK business might want to lower prices in a town where cheap Chinese competitors are trying to penetrate. CONDITIONS FOR PRICE DISCRIMINATION For price discrimination to be successful, there are two main conditions that must exist in the market (Tutor2u). First of all, there must be differences in price elasticity of demands between the different markets within which a firm operates. This means that the firm can increase the price of a given product where the demand is inelastic because customers will buy anyway. However, where demand is elastic, prices need to be kept low because it can lead to buyers refusing to buy and the firm will run at a loss. The second condition necessary for price discrimination is that there should be barriers that prevent consumers from switching from one supplier to a nother. This is because when consumers have options, they are likely to switch to other brands or substitutes when prices fluctuate in a way they find unfavourable. Price discrimination could be beneficial or detrimental to consumers. It could be beneficial when the prices are reduced or promotions are run. However, there are some price discrimination drives that exploit consumers. ... Another example is the fact that some professional groups like Chartered Institute of Marketers charge different prices for students and different prices for members although they can access about the same privileges. Second degree price discrimination occurs when prices are varied based on quantities of goods purchased by a consumer (Fisher & Waschik, 2002). An example is a situation where a person gets a discount for buying a certain quantity of goods. Another example is where businesses run promotions where people are given extra units of a product when they buy a given quantity of the product. Third degree price discrimination is where a producer segments the market and varies prices because of distance, cost of production in zones or customers’ identity (Fisher & Waschik, 2002). An example is where a factory based in London charges clients in New York more. Another example could be the situation where university students from some countries are charged higher fees. CASE S TUDIES When Tesco sells Digestive biscuits at ?2.10 per pack, but also have a ‘3 for the price of 2’ offer, there is a second degree price discrimination. The rationale for this is that Tesco wants to increase sales and with a large volume of biscuits sold, they will get a large volume of profits which will be collectively higher than the profits they would have gained by selling a smaller quantity of biscuits at ?2.10 per pack. Also, the profits will come in faster and they can use the revenue for other business activities. In a situation where the return train fare from Birmingham to London is ?35 at 11am, but is ?200 at 8am, it can be concluded that the managers are utilising the principles of the elasticity of demand here. This is because at 8am, there is a high number of people ready

Brainstorming Assignment Example | Topics and Well Written Essays - 250 words - 1

Brainstorming - Assignment Example l events such as essays, debates in their various forms and norms had somehow lost their sheen and it was time for interesting and innovative activities to enter Elite. I guess we had overdone it with the traditional ones. The willful participation and the pure desire to achieve something for the greater good of the student community was exhilarating! Well! In the two hours session that we had, all the boys and girls shared an enthusiastic vibe and the hall echoed with charming and smart ideas pulled out form many corners. The diverse experiences we had in our life and the many backgrounds that we hail from – all started giving results. A fun list was arrived at that included ‘Rhyming Couplets’, Mismatch Story’, ‘Air Crash’, ‘Wake up as a Celebrity, ‘I am stranded on an unknown island’, ‘Translate yourself’ etc. If literary events were meant to strengthen one’s speaking, listening, understanding and analyz ing abilities in a language, why not have some decent fun along? Not only was the effort worth its pain, it in fact gave a certain confidence to the participating members, which reflected in their expressions glowing with satisfaction, when the Convener approved

Friday, August 23, 2019

Nuclear Power Essay Example | Topics and Well Written Essays - 1000 words - 1

Nuclear Power - Essay Example Several countries have presented diverging views on the use of nuclear energy owing to its volatile nature. Nuclear energy is the single most powerful source of energy with the ability of powering the entire world effortlessly (Gibson 23). The discovery of the nuclear energy therefore presents both advantages and disadvantages in equal measure. During the debates, the proponents of the continued use of the nuclear energy based their argument on the ability of the energy source to single handedly replace all other sources of energy thereby saving the world economy. While their argument sounded realistic, such people failed to consider the numerous disadvantages of the use of nuclear energy. Liberal debates give both sides to a discussion thereby determining the winning side based on the number of points that each side earns. The most realistic argument therefore is the immediate abolition of any nuclear related activity. Nuclear has greater potential than any country can possibly mana ge. This therefore makes the world unsafe; some of the arguments to this effect are below. The ongoing debate globally is the climatic change and the effects of global warming. All these are results of pollution of the atmosphere arising from the increasing use of fossil energy that produce a lot of carbon monoxide, a poisonous gas that reacts extensively with the ozone layer thereby depleting it. The invention of the nuclear energy therefore presents an opportunity of overturning the events preceding the depletion of the ozone layer possibly resulting in a safer and more stable world. The fact that the world consumes billions of gallons of petroleum products daily equals the extensive nature of the pollution of the environment thereby making the world increasingly unsafe. Several international environmental bodies such as the Kyoto protocol have tried convincing different countries to emit more carbon monoxide gasses into the environment. A debate that the developed countries such as the United States of America, Japan and China strongly oppose owing to the fact that such policies may hamper their economies. Nuclear energy is clean and renewable implying that it is not possibly exhaustible. It is therefore the only single source energy capable of sustaining the world’s economies while still maintaining the clean healthy environment. Despite the evident advantages of the use of nuclear energy, its use still requires extensive regulation even possible abolition. The widespread lack of trust makes no country safe enough to use nuclear energy. Nuclear is highly unstable yet with great potential, this implies that it requires greater capital for installation and maintenance in order to develop a safer environment for its effective use. Exposure of the nuclear elements in the environment results in immediate reaction to the elements in the environment thereby resulting in mass destruction and loss of lives. Japan, which is the most developed country in the e astern bloc, had all the financial resources to safeguard the use of nuclear as a source of energy (Adams 12). The country took every precaution including the development of an underground laboratory from where the volatile they handled the instable substance. However, the country did not consider the possibility of a natural disaster such as an earthquake. The earthquake that shook the ocean bed therefore broke the tanks in which they

Thursday, August 22, 2019

Confucian In Japan Essay Example for Free

Confucian In Japan Essay It is fundamental that anyone that wants to understand the Japanese understand their way of life, their cultural roots. To be Japanese is to be Confucian. In Japan, there is an order and a structure to every aspect of life from older brother to younger brother on up to emperor and military. There is a Confucian saying, a code of conduct that they live and die by. â€Å"Only when things are investigated is knowledge extended; only when knowledge is extended are thoughts sincere; only when thoughts are sincere are minds rectified; only where minds are rectified are the characters of persons cultivated; only when character is cultivated are families regulated; only when families are regulated are states well governed; only when states are well governed is there peace in the world† (Neo, â€Å"The Confucian Ethics of Raise the Red Lantern,† par. 1). Japan’s attack on Pearl Harbor was strategic let me explain why and how. The rise of militarism in Japan wasn’t just sparked by the imperialist West. Japan has a long history of militarist behaviors and relationships internally and externally. Japan’s foundations in Confucianism exemplify their loyalty to master. This loyalty is first and foremost because, according to Confucius, the emperor is a mandate of heaven, hence, deifying the emperor. Militarism in Japan began to show itself during the Yamamoto period and has continued to grow throughout time. Military structure can be seen through the samurai class and the emergence of the shogun. Japan had almost a 300 year period of time where they remained closed. No one was allowed to leave and no one was allowed to enter. During this time, there weren’t any wars internally or externally. The West re-opened Japan as a stopping point for trade with China. The re-opening of Japan would ultimately be the beginning of hostility between Japan and the West. For some time after Japan had to modernize so that they could keep up with the West and be considered a world contender. â€Å"The Meiji Restoration ultimately revolutionized Japan. Within three years the new government had abolished the domain, erased hereditary status distinctions, and allowed people to change their occupations and move about the country. Ironically for a government that owed its origins to the movement to revere the emperor and expel the barbarians, it invited foreigners to educate Japanese in things Western and launched a drive to bring modern industry and a modern military to Japan† (Walthall 44). During Japan’s modernization and fight for supremacy, the West issued them unequal treaties for their military. The West did this several times. This decision would prove to be fatal for the West. In September 1940, Japan signed the Tripartite Pact with Germany and Italy. â€Å"Germany insisted that any alliance would have to be directed against the United States and Britain† (Craig 123). Germany ultimately betrayed Japan and in an act of desperation, Japan attacked the United States. When you consider Japan’s deep roots in Confucianism and their desire for supremacy, ethnically and militarily, it is easy to understand their disdain for the West. Japan knew that they had to learn from the West, emulate what they do as seen during the Meiji Restoration, in order to defeat them. Japan had the ability to take what the West taught and make it better. If you think about it, it was a brilliant plan. Japan’s only downfall was that their military was to spread out between China and the United States. Had they actually not been, we might actually live in a very different world. To say that the attack on Pearl Harbor was merely a tactical move completely underestimates the Japanese. It is a foolish way to think and discredits their history. Japan has a history that the West can draw from. It’s like comparing an old wise person to a young person. The attack on Pearl Harbor was a strategic move, one that failed, but strategic indeed. Walthall, Anne. Modern Japan. United States of America: Scholarly Resources Inc. , 2002. Craig, Albert M. The Heritage of Japanese Civilization. New Jersey: Prentice-Hall, 2003. Neo, David. â€Å"The Confucian Ethics of Raise the Red Lantern. † Senses of Cinema. August 2004. 18 March 2009 http://archive. sensesofcinema. com/contents/cteq/04/33/raise_red_lantern. html.

Wednesday, August 21, 2019

Market Development Strategy Implementation For MS

Market Development Strategy Implementation For MS Marks Spencer is the UKs top retailer and is listed in the FTSE 100 of London Stock Exchange. The company has expanded its business in many different global markets. The organization has its products and services in the food, clothing, hosing, and financial service businesses. The assignment is based on the business strategies used by the firm to grow its business in the current global and domestic market. The assignment is based on how the author analyzes individual product line (Strategic Business Units) and their overall business by using business tools like Stakeholder Analysis, Porters 5 Forces Analysis, Value Chain Analysis, BCG Matrix and Ansoff Matrix. After collecting the necessary date from the respective business tools the date is processed and used to draw new Business Strategies for MSs businesses. Once the business strategies are drawn then the author can make plans on how to apply them in MSs businesses. The new business strategies will help MS to improve their busine ss processes and help them to expand their businesses in new markets. Marks Spencers has many strategic intends to achieve its Vision. They are the number one retailers in UK so the management has adopted new milestones on how to conduct business by causing less damage to the environment. They have started their project Plan A in which the firm will try to minimize the damage to the environment as less as possible by their business processes. One of the most important milestones is to maintain existing customers and gain new customers for their products, for which they have special offers and schemes in form of membership cards, free shipping charges in domestic market and discounts during special occasions for their loyal and new customers. They have started conducting their business online with help of new ICT systems which has helped them increase their sales and serve their customers more effectively and efficiently. They also have many quality controls and strategies to improve their business processes and maintain their position in domestic and international markets. Marks Spencer has six main objectives which are Profit Maximization, Increase Sales, Market Leadership, Offering High Quality Services, Growth and Reward Shareholders. Profit Maximization is the most important objective of MS. The management has made plans to maximize their profits by increasing their revenues from all different business ventures and by cutting their cost by avoiding wastage of resources (raw material, labor, etc). Marks Spencers profit in last two years was in 2009 it was 506.8 Â £m and in 2010 it was 523.0 Â £m. Increasing Sales is also one of the most important business objective of MS. In order to increase sales they have expanded their business ventures globally by entering new markets and by upgrading their products with quality controls and tests they are able to satisfy their existing customers and attract new customers for their different business ventures. MS is able to increase its turnover from 8,164.3 Â £m in the year 2009 to 8,567.9 Â £m in the ye ar 2010. Market Leadership is one of the business objectives of MS, MS is the largest retailer in UK and so one of its business objectives is to maintain market leadership by constant reviewing of their previous performance and of their competitors. They have drawn plans on how to become the leaders of international markets by diversifying and improving their products according to the taste of the local customers. MS has made constant efforts to compete with the local competitors in international markets and their international turnover has increased from 897.8 Â £m in the year 2009 to 968.7 Â £m in the year 2010. High Quality Services is one the business objectives of MS, they have always maintained a high standards in quality of goods and services which has kept them on top of the UK retailers for many decades. The management is making new plans on how to evaluate and improve their services and goods to maintain their high standards to which other companies can compare and impro ve their performances. Growth is one the important business objectives of MS as the management understands the importance of growth that is if the firm doesnt grow it will not survive in todays competitive markets. Marks Spencer has made maximum expansions from the year 2001 after a new board was setup. MS has expanded its business by giving franchise to local people in different countries and has successfully expanded its business in more than 35 countries globally. Reward Shareholders is also an important business objective since its a listed public company in London Stock Exchange. It is in FTSE 100 list and like all the other companies MS has declare dividends every year based on their profits in order to keep a healthy relationship with their shareholders. The shareholders are the backbone as they have invested huge amount of liquid wealth through IPOs in MS to allow the firm to carry out its business with calculated risks. The Threat of Entry is one of the key areas in which the firm requires unique strategies on how to stop the new firms from entering their market segment. The firm either has slash down their prices to an extend that new firms cannot enter their market or have such a strong brand value that the customers stay loyal to their products. MS is able to maintain its brand loyalty and maintain itself as UKs number one retailer giant. MS has planned a long term strategy for growth which hinders new firms to enter in its market segment. The firm is thus successfully in this area of business. The Power of Buyers is the area of business that deals with how the firm satisfies its customers with products which are of better quality and are at lower price range. The customers have the bargaining power as there are large retail giants like Tesco, Sainsbury, Asda (Wal-Mart), etc to cater their needs. The quality and price range of MSs goods and services is still better than the rest retail giants so they are able to keep customers loyal to their products. The Power of Suppliers is the area in which the firm deals with its suppliers for its raw material. MS has supplies only from local suppliers and since they are few in number MS has less negotiation power. The suppliers of MS enjoy the power of controlling price of the raw materials. This is one area where the firm can really improve its business process by shifting their manufacturing units to places where the number of suppliers is more and they can have a better chance of bargaining with their suppliers. The Threat of Substitute is area of business that deals in planning on how to avoid customers from switching into new products. MSs management and RD department are responsible in upgrading their products so that the customers remain satisfied and not switch over to an alternative product made by its rivals. The RD department is so efficient in its work that not only they are able to satisfy their existing customers but als o attract new customers to their product line. Competitive Rivalry is the area of business in which the firm keeps a close check on its rival firms and plans on how to compete with them in a competitive market in a profitable manner. MS is able to maintain high standards of goods and services which allowed them to stay as the largest retail giant till date in UK. MS has used the BCG matrix from time to time and have used the data wisely. The matrix has helped them to penetrate in new and old markets with various new products and services. The products of MS are able to capture huge markets in high growing industries. MS has a diverse range of products and services so they have allocated their resources in the star products. They have opened many new outlets in prime areas for retail and helped their question mark products in becoming star products. MS has expanded their business globally so their star products are able to capture new markets easily. MS management has minimized their dog SBUs and has diversified those funds towards star products. This has helped the firm to be at the top of the retailers in UK and a major competitor in other international markets. Currently MS has only cash cow and star SBUs in market. The cash cows are not giving much return due to the recession and slow growth of global market but the star products are doing exceptional well because of their high reputation. The BCG matrix helps the firm understand their products life cycle and allocation of resources in the SBUs. BCG matrix has been one of the most important business tool for MS in analyzing their performance from time to time http://www.scribd.com/doc/24329524/Introduction 3.2 Ansoff Matrix Igor Ansoff had invented the Ansoff Matrix in 1941 and was first published in 1957 in Harvard business review. The Ansoff Matrix is a strategic marketing tool that links a firms marketing strategy with its general strategy and outlines the options open to the firm if they wish to grow, improve profitability and revenue. These options indicate to how to manage the development of the product range. It mainly presents four alternative growth strategies in a table (matrix) which are market penetration, market development, product development and diversification. Market Penetration is a growth strategy for existing products in existing market. The company tries to increase its market share by increasing the sale of its existing product in its current market by using new marketing strategies. Market Development is a growth strategy for developing new markets for existing products. The main objective is to find new markets domestic or international for the firms existing product. Product Development is a growth strategy for new product in existing markets. The firm has to develop new products and launch them in their current market to capture market share. Diversification is a growth strategy for new products for new markets. The firm has to launch new products for new markets in order to expand their business in different markets. This is one of the most important growth strategy as the company has to study the taste of new customers and design their products in order to capture market share of a new market. Marks Spencer uses Ansoff Matrix to analyze their overall business portfolio. Since MS is one of the largest retailers in global market they use all the four growth strategies of Ansoff Matrix in their business. Market Penetration is used by MS to attract customers and make them loyal to their brand by offering good quality and services. They have special offers and customer loyalty programs during special occasion which helps them to attract new customers. The firm has opened many outlets in their captured markets in order to increase sales of their existing products. Product Development is one of the main growth strategies used by MS, the firm develops it new products according to the change in fashion. This has helped the firm to grow rapidly over the years. Market Development is also a growth strategy practiced by MS as they are expanding their business globally. The firm has opened many new outlets in many other countries over the world. Their products have such high demand tha t they are able to expand their business in many countries. MS is a cash rich company therefore it can easily capture new emerging markets by opening new outlets at prime areas in different counties. Diversification as a growth strategy is also used by MS as they develop new products for new customers to cater their needs. The RD department of MS is highly efficient in developing new products for new targeted markets of the firm. MS when enters new market they modify or make their products according to the taste of their new customers. MS uses both Ansoff BCG Matrix to analyze their business processes and to draw up business strategies for growth in existing and new markets. The analyzed data is used effectively by the management and MS is growing its business over the years successfully. Develop evaluate possible alternative strategies for the organisation you have chosen. 4. Alternative Strategies Growth Growth strategies are adopted by companies when they try to win large market share, even at the expense of short-term earnings. The growth strategies can be classified into four types and they are market penetration, product development, diversification and market development. Marks Spencer also has to use alternative strategies to grow their business in this competitive world market. The management has to use all of their resources to plan new strategies on how to utilize their current products, current markets, new products and new markets, in order to ensure there is maximum business growth. 4.1 Alternative Strategies used by Marks Spencer Marks Spencer uses a mixture of many strategies to draw up plans for growth. MS having a diverse business can use many strategies to expand their business in domestic and in international markets. The strategies used are market development strategies, market penetration strategies, product development strategies, and diversification strategies. 4.1.1 Market Development Strategies Marks Spencers management can grow their business by using market development strategies in which they can expand their business in new countries. The products of MS are of high quality therefore their reputation can help the firm easily grow into new markets. The brand value of MS can even help the firm to venture into new market segment and attract new customers as the products are of good quality and are placed at competitive prices. The food, clothing and house ware businesses of MS can use this strategy to grow and reap huge benefits for the company. 4.1.2 Product Development Strategies MS uses Product Development Strategy for its house ware, food and clothing business. In food business MS has changed the packaging to cater the needs of customers who buy in bulk and in small quantity. In clothing line they introduce a new collection according to the change in fashion to attract customers to their clothing business. House ware being the largest business the firm is launching new products frequently to remain at the top of other retailer in UK. 4.1.3 Market Penetration Strategies MS uses Market Penetration strategies for all of existing businesses. This strategy has helped MS to remain at the top of all the retailers in UK. The clothing and food business use strategies like customer loyalty and value improvement strategies whereas the hose ware and financial service businesses use market share growth strategies to grow business. 4.1.4 Unrelated Related Diversification Strategies Relative diversification is the development of a new product line for the new market. Related diversification is of two types horizontal and vertical. Horizontal diversification is development of a product which is an alternative to your current product and Vertical diversification is when the company becomes its own supplier or distributor. Unrelated diversification is the development of a new product which has no relation to the market or the industry in which the firm conducts its current business. MS uses relative diversification strategies for its food and clothing business. For both businesses it uses horizontal diversification strategy by which it develops new food and clothing products as per the change in taste and trend of the people. Recently MS has started its business in Financial Service area this is a complete new business therefore the growth of these services are planned by unrelated diversification strategies. Therefore the firm has used many strategies to diversify and expand its business in order to sustain in the competitive market. The selection of strategies by the management has helped the firm to reap exceptional benefits and has helped the firm to maintain its position at the top of all the retailer giants in UK. The strategies used in global markets have also been successful and the growth rate of the firm is tremendous in foreign markets. The products and services are of high net worth therefore the firm can easily use the planned strategies to grow their business in local and international markets. Outline an implementation plan for the chosen strategies in question 4. 5. Growth Strategies Implementation for Marks Spencer Many of the plans for the strategic growth discussed before are already implemented by the firm. New plan for expansion in new markets (market development) is to be drawn and implemented to ensure strategic growth for clothing business. 5.1 Market Development Strategy Implementation for MS MS has to develop and implement strategic plans for capturing markets in different countries. MS has already expanded its business in many countries and their products are capturing huge market shares. Seeing tremendous international growth MS should capture new markets as their products are of good quality. The new markets will help the clothes business grow internationally and MS brand image will further appreciate. The steps for planning market development strategies are planning, organization structure, human resources, annual business plan, monitoring and control and linkage. Planning is the first step for developing a market developing strategies. The firm has to first decide which new market they should capture and what product line they should launch for their new market segment. A detailed research on the taste of their new customers needs to be conducted and then accordingly the firm needs to launch their existing or new product line. Organizational Structure needs to be decided by the firm before they layout their business foundation in the new market. Usually the firm gives franchise to the local people to open new store in new countries, this step helps in minimizing risk and the management is in the hands of the franchise holder. The firm still has control over the layout of the store and pricing of the products. Human Resources of every new store is taken care by the franchise holder but MS organizes workshops to train and help the workers to develop new skills. This helps MS to have employees which can cater the need of their customers effectiv ely. Annual Business Plan helps the firm to estimate or forecast their sales in the new market. The firm and the franchise holder have to allocate resources according to the annual business plan in order to ensure business growth. Monitoring Control is a crucial step in making the new business successful. MS has to monitor how the employees are trained to serve their new customers. The firm has to check if the products are properly displayed in their new stores. They have to carry out regular surveys to check the preference of the people and develop new products based on the analysis of the data collected. The firm has to give franchise to the people who will conduct business ethical or else their brand value will decline in that market segment. Linkage is when the firm keeps a close check on all the activities and makes sure that all the processes are conducted in the decided sequence regularly to ensure business growth. Linkage MS can use this growth strategy to develop a new market and by implementing this strategy it can grow its business in many part of the world. One of the business objective of MS is to grow therefore growing in international market is really profitable as MS has made constant efforts to compete with the local competitors in international markets and their international turnover has increased from 897.8 Â £m in the year 2009 to 968.7 Â £m in the year 2010. The international market of MS has shown a tremendous growth and so MS should make full use of this plan and grow its business in new markets. This plan also gives the firm the advantage of developing new products for their new market segments. The brand image has helped the firm to grow in many new markets therefore MS should utilize this growth strategy to develop new markets. Conclusion Quinn (1980, pg. 3) defines Business Strategy as the pattern that integrates an organizations major goal, policies and action sequences into a cohesive whole. A well formulated strategy helps to marshal and allocate an organizations resources into unique and viable posture based on its relative internal competencies and shortcomings, anticipated changes in the environment and contingent moves by intelligent opponents. The author has used many business measuring tools (BCG Matrix, Ansoff Matrix, Porters 5 Forces Analysis, Value Chain Analysis, Stake holder analysis, etc) appropriately to collect relevant data on each of the SBUs and on overall business. The data was processed and used to form new alternative growth strategies for MS. The growth strategy if used by the firm can help them expand their business and also to develop new product lines for new markets. Therefore the business strategies suggested by the author in the assignment are relevant for the firm if they want to grow their business in current global market and retain their position at the top of UKs retailer list. Reference List Books Referred Mooij, M, 2009. Global Marketing and Advertising, 3rd Edition. SAGE John, R, Gillies, G, 1996. Global Business Strategy. Cengage Learning EMEA. Johnson, 2008. Exploring Corporate Strategy. Pearson Education India. Johnson, G, Scholes, K, Whittington, R, 2006. Exploring Corporate Strategy, 7th Edition. Financial Times. Websites Referred History Introduction of MS taken (online), Available at: http://corporate.marksandspencer.com/aboutus/company_overview (Accessed 15th April, 2011) Mission Vision taken (online), Available at: http://www2.marksandspencer.com/thecompany/our_stores/world.shtml (Accessed 15th April, 2011) Definition of Strategic Intent taken (online), Available at: http://dilipnaidu.wordpress.com/2010/05/06/strategic-intent/ (Accessed 15th April, 2011) Objectives of MS taken (online), Available at: http://bizcovering.com/major-companies/a-case-study-on-marks-and-spencer/2/ (Accessed 15th April, 2011) MS 5 Years Records taken (online), Available at: http://corporate.marksandspencer.com/investors/fin_highlights/five_year_record (Accessed 16th April, 2011) Stakeholder Analysis taken (online), Available at: http://www.businessdictionary.com/definition/stakeholder.html (Accessed 16th April, 2011) Porters 5 Forces Analysis (online), Available at: http://www.1stessays.com/samples/businessanalysis.pdf (Accessed 16th April, 2011) BCGs Matrix taken (online), Available at: http://www.managementstudyguide.com/bcg-matrix.htm http://www.scribd.com/doc/24329524/Introduction (Accessed 17th April, 2011) Ansoff Matrix taken (online), Available at: http://www.ngfl-cymru.org.uk/ansoff_matrix-2.pdf http://www.businessdictionary.com/definition/Ansoff-matrix.html (Accessed 17th April, 2011) Alternative Growth Strategies taken (online), Available at: http://www.businessdictionary.com/definition/growth-strategy.html http://paulcurtis.files.wordpress.com/2011/03/growthstrategymatrix.jpg?w=500h=446 (Accessed 17th April, 2011)

Tuesday, August 20, 2019

Wireless Sensor Networks: Applications and Forms

Wireless Sensor Networks: Applications and Forms 1 Wireless Sensor Network In this chapter, wireless sensor network (WSN) principles are being shortly introduced and discussed. In order to increase the level of understanding for analyzing Wireless Sensor Network (WSN) systems it is useful to study the technology behind them the technologies which are presented in this section. Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations [5]. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion [5]. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, first we need to consider about WSN technology, components and communication topology and protocols. Therefore, first, in this chapter, basic information about WSN components, the communication devices and process unit of WSN will be described. Then, the chapter will be followed by a description of the WSN topologies and protocols emphasizing on mesh WSN technology with ZigBee Protocol. 1.1 Wireless Sensor Network component To provide comprehensive view of WSN hardware, understanding of WSN components structure is required. Wireless sensors are small microcontrollers equipped with wireless communication device and an energy supplier. The architecture of WSNs is illustrated in Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 . As Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 shows the components of WSNs are sensing unit, processing unit, power supplier and communication device. The sensing unit consists of sensors and Analog to Digital Converters (ADCs). ADCs are responsible for gathering the signals and converting them into digital signals data and transfer them through each other using network topology to the processor unit. In the sensing unit, each sensor is called an ‘end node and varies in size and cost. The mission of these multifunction sensor nodes are to sense, process data and collaborate with other nodes [8]. Wireless sensor network can be positioned in two ways, either using a complex technique with the large sensors far from the object or using several sensors with an engineered design on position and topology [5]. In addition, each node provided with a wireless communication transceiver as a communication component. In the process unit, the controller and small memory storage are responsible for managing the collaboration within the sensors to achieve the assigning task. In addition, the communication device with a transceiver makes the network connection. Above all, the essential component of WSN is the power unit, which supports the power for all units [5]. One of the unique characteristics of sensor networks is that they are equipped with an on-board processor. This feature enables them to locally process some simple computations and broadcast only necessary processed data [5]. Network communication is really complicated and needs years of study [8], but to be able to implement WSN, we need to know some basic primary concepts of communication technology such as; network topologies, network protocol and their standards and specifications. 1.2 Communication technology To cover technical aspects of WSN, network topology and network protocol studying is needed. This study will help to provide information about reliability, robustness, security and stability and of WSNs software aspect to answer the research questions RQ. 1 ,RQ. 2 and RQ. 3 . 1.2.1 Topologies in WSN Communication In network communication, the big issue is how data transfers through nodes and nodes interconnect with each other. Several basic network topologies may be used for transmitting to and receiving from a node. The Alliance for Telecommunications Industry Solutions (ATIS) the standards organization of telecommunication industry explained the network topology as â€Å"The physical, real, logical or virtual arrangement of the nods/elements of a network† [9]. The topology shows the diameter and the number of nodes between any two nodes. Moreover how a data process and the data routing complexities are relied on the chosen topology. Consequently, some characteristics of a sensor networks such as latency, robustness and capacity are changed by their topology [10]. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 is a graphic mapping of networks topology which shows the links of one or more nodes and explains the physical topology of the network. Despite having the same topology, two networks can differ in transmission rates because of their physical interaction, signal types and distance between nodes [9]. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 describes the different types of network topology. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 Topology TYPES [9]. Since Mesh topology is a main topic in the thesis, it is studied more in-depth in this section 1.2.1.1 Mesh Wireless Network Wireless mesh network is a term used when all wireless nodes are connected to each other within an ad-hoc multi-hob and mesh topology. In this network, any pair of nodes is able to communicate between each other within more than one path. In this network each node is used as a router to forward packets to the neighbor nodes which they have linked to. That means all nodes communicate directly or through other midway nodes without any manual configuration. Therefore, this network also called a self-configuration and self-organized network [11; 12]. As described in Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1, there are two types of mesh topology ‘Partially connected and ‘Fully connected (See Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ3). In a fully connected topology each node has the ability to communicate with all other nodes in the network and creates an interconnection links. By increasing the number of nodes in a mesh network, the number of links increases as well. On the other hand, in a partially connected topology, instead of direct interconnection between nodes, each node has two or more links to others to provide alternate routing and traffic balancing. Due to more links and indirect connections between nodes, traffic can flow through one or more router nodes to the destination [7] and create more reliable interconnections between nodes. Moreover, in partial network, the nodes are connected to either the node with higher rate of data transaction or the nearest neighbor node while in fully connected network all nodes have a direct links with each other. This multiple link path conducts a reliable communication. Therefore, whenever a connection fails or a node breaks down, the packages can automatically change their path by ‘jumping from a disconnected node. This is often called the self-healing of the network. This means that the networks connection stability and reliability are not essentially affected by node failures [11]. Due to the characteristics of wireless sensor network mesh, this network is self-configuring and self-organizing network in which each end-node is also used as a router (dual role- data originator /data router) to forward the signal packages all the way back of the main gateway. Therefore, due to the characteristics of mesh networks, this network is becoming one of the most implemented networks which able to have the flexible architecture for the network, easy self-configuration and robust fault tolerance connectivity [11; 12]. Additionally, the self-configuring characteristic of mesh WSN, bring the ability for the network to connect or disconnect nodes from the network. This brings the ability to grow/decrease the network by adding/removing nodes of a system. Mesh WSN has reliable self-healing and robust fault tolerance. This means if ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­ a node fails or breaks down the signal packages jump from the disconnected node and automatically conducts a new path through the nearest node. However, the new path imposes re-routing and re-organizing to the network [5], which consumes too much power from the system. Therefore, having a power-aware protocol and algorithm is necessary for mesh network. ZigBee protocol is one of the protocols which provides this ability for WSN. 1.2.2 Protocols in WSN Communication WSN systems include variety of protocols for communication. Protocols need to program in different architectural layers. One of these architectural standard is OSI (Open System Interconnection) framework. In this session a brief introduction of each protocol and OSI are delineated. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ4 shows the graphic overview of all wireless network technologies. This figure illustrated IEEE PAN/LAN/MAN technologies and clearly shows how these standards and protocols can be used in different conditions. For instance, 3G protocol is used to cover a long range of audio information in a wide area network (WAN) while for the same information in a short range and personal area network (PAN), Bluetooth is better. The standard conceptual rules set for data representation, data communication and error detection across two ends in telecommunication, are called communication protocols. These abstract rules represent in different layers of communication. There are different protocol stacks introducing different architectures for these layers such as AppleTalk, Distributed Systems Architecture (DSA), Internet protocol suite (TCP/IP) and Open Systems Interconnect (ISO/OSI). Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 (a) illustrates the different layers of an OSI Model and their functionalities. The OSI model has seven layers and each layer provides services for the upper layer and requests services from the lower layer. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 (b) shows the typical communication protocols layers. Each of these layers has to deal with different issues regarding the communication procedure. As the typical protocol stack model shows in Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 the communication protocols should implement all layers from bottom to top. In addition, a management protocol needs to be applied in each layer to manage power efficiency, robust connectivity and connection reliability (see: Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 b). Below, rules and functionality for each layer are described: * Physical layer: is responsible for signal processing and physical interface connectivity between a device and physical medium and used bit stream in its data unit. It acted as communication channel for sensing and actuation in cost-efficient and reliable manner. Some examples of this layer are: IEEE 802.11b/g Wi-Fi, IEEE 802.15.1 Bluetooth, IEEE 802.15.4 ZigBee, etc. [7] * Data link layer: provides functionality toward channel sharing, Medium Access Control (MAC-Layer), timing (e.g. data time arrival), local link and capacity. It is responsible for detecting and correcting the data errors in physical layer and control the locality data comparison. It follows the protocols such as point-to-point protocol (PPP) and IEEE 802 Local Link Control (LLC). [7] * Network layer: is responsible for network routing functionality, network security, energy and power efficiency and reliability of the communication. It includes the network topology management and manages the information and detects errors in data transfer from router to router. A number of protocols is address in this layer such as: Internet protocol (IP), Threshold Sensitive Energy Efficient Sensor Network Protocol and etc. [7]. * Transport layer: provides end-to-end transportation (distributing and gathering) of data between end users. It includes storage and responds for caching and controlling the data to recover them back to the initial message that has been sent. Best-known protocols for this layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) [7]. * Upper layers: The Upper Layers are responsible for application processing, external query processing and etc. Upper layers include presentation layer session layer and application layer [7]. The summary of these standards and protocols are shown in Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ6 Among all the standard and protocols, IEEE PAN/LAN/MAN technologies are the ones applied in the majority of commercialWSNs to support physical layer and link-data layer signal transmission. As SOHRABY and ZNATI (2007) mentioned, the most common best-known protocols are:† (1) the IEEE 802.15.1 (also known as Bluetooth); (2) the IEEE 802.11a/b/g/n series of wireless LANs; (3) the IEEE 802.15.4 (ZigBee); (4) the MAN-scope IEEE 802.16 (also known as WiMax); and (5) radio-frequency identification (RFID) tagging† [7]. Each of these protocols has their own benefits and constraints. The comparisons between IEEE technologies are mentioned in Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2. As Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 shows the IEEE 802.15.4 standard provides data rate of 20 to 250 kbps and operates in the 2.4-GHz ISM band. This standard covers signals in range of 10 m and requires the lowest power among other IEEE class. While IEEE 802.11a/b/g/n transmits the data in the rate of 54 Mbps ideal for wi reless internet connections and operates in the 2.4-GHz ISM (Industrial, Scientific and Medical) radio band as well as the 5-GHz ISM / 5-GHz U-NII (Unlicensed National Information Infrastructure) radio band. However, it requires much higher power consumption than IEEE 802.15 [7]. Recently, researchers put much effort to develop â€Å"a cost-effective standards-based wireless networking solution that supports low-to medium data rates, has low power consumption, and guarantees security and reliability† [7]. ZigBee Alliance is an association of companies which aims to provide such a standard for WSN consumers. Their mission is to have a simple, reliable, low-cost, low-power and standards-based wireless platform 1.2.2.1 ZigBee standard The ZigBee standard builds on IEEE 802.15.4 and is suitable for remote monitoring and controlling applications. Although it has lower-data-rates than the other standards, its reliability, security, long life battery with less complexity mechanism make it ideal for building automation in industrial network applications. The architecture of the ZigBee stack is established on the Open System Interconnection (OSI) model. The IEEE 802.15.4 defines the physical layer (PHY) and medium access control (MAC) sub-layer and In addition, ZigBee Alliance defines other functionalities for upper layers [7]. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ7 is a graphic overview of ZigBee protocol stack and shows the responsibility areas of IEEE 802.15.4, ZigBee Alliance platform and users applications [7]. This picture also shows the basic functionality of each layer. The data transmission service is provided by PHY layer and the protocol in this layer enables the connection between data units and the physical radio channel. ZigBee provides three different frequency band options for PHY layer. First, the transmission data-rate of 250kbps in 16 channels at 2.45GHz (Global) frequency. Second, with 40Kbps in 10 channels at 915MHz (Americas). And the last one, with 20kbps in 1 channel at 868MHz (Europe). The higher data-rate causes a higher order in modulation design and the lower frequency cause a larger cover area and better sensitivity. Depending on the power output, the transmission distance rate can change from 1 to 100 meters. (For more detail information see: Table 7à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 in Appendix A) ZigBee WSN has the ability to have static or dynamic network/component with either star or mesh topology and it has three types of nodes: a ZigBee Coordinator (ZC), ZigBee Routers (ZR), and ZigBee End-Devices (ZED). In order to have a communication protocol and physical connection both PHY layer and MAC sub-layers of the architecture should be defined upon agreement between server and clients. These layers require manual administrative procedures setting for server/client gateway. The next three levels namely: the network layer, security protocol and transport layer are defined by ZigBee alliance platform automatically. The last layer, application layer, has to interact with the user-interface and other applications; it ought to be programmed with high-level language so that integration with any existing devices applications becomes more conveniently practical. The ZigBee stack in gateway is responsible for all the network functionality such as network process management, authentication of the joined nodes, binding nodes and routing the messages throughout the network. ZigBee stack as a standard protocol, has clusters and libraries for improving the implementation process, therefore, using ZigBee compare to other protocols makes the system (including both hardware and software) development process much faster and easier. On the other hand, such standardisation provides easiness of adopt with third party sensors regardless of manufacturer, which might be attached to the network later. 2 Software Aspects To address the research question regarding the reliability, robustness, and security of any WSN application, it is essential to investigate the software architecture of that network. For convenience in description of the architecture of a WSN application, it is divided into three segments: Physical devices (such as lamps, sensors, nodes), Communication Protocol (terminals and servers, bridge, switch, network topology and standard) and Carried Information (application, functions, etc.). Any attempts to retain a precise design on software architecture for each part will cause an effective data transmission, which ensures reliability and security of the system [7]. Hence achieving any desired data transmission precision level in a WSN, network management (NM) techniques are applicable. Such techniques assist in network status monitoring, reliability and security amendment, and cooperation supervision between components [7]. NM techniques could also detect and resolve network faults in addition to restoring the system respectively [7]. In practice, designing WSN application necessitates tailoring NM techniques for each architectural segment. Various NM techniques regarding each segment are summarized as follows [7; 12; 5]: a) Physical architecture: Sensing and processing management, operation and administration, fault tolerance, maintenance, energy efficiency management, configuration management, performance management, security management, network element management. b) Communication architecture: Network management, networking protocols, network topology, function management, monitoring functions, fault management, performance management, security management, service management and communication, maintenance management, network configuration and organization, network behavior, data delivery model, sensor mobility, naming and localization, sensing coverage area, communication coverage area energy efficiency management c) Information architecture: Real-time information management, mapping management, service management, analyze information, control application, business application management report management, sending and receiving commands or response, naming, localization, maintenance, fault tolerance Aforementioned NM techniques enhance quality of the system. According to ISO 9126-1 software quality model Table 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 [13; 14; 15], the quality characteristics of a system could be divided into six fundamental properties: functionality, reliability, usability, efficiency, maintainability, and portability. According to the same documentation, these characteristics are broken to sub-characteristics such as suitability, security, maturity, fault tolerance, adaptability, analyzability, stability, testability and so on [13]. However, focusing on all subcategories collectively exceeds the time horizon of this research, from this stance three dimensions namely reliability, robustness and security are brought into attention. This section will be divided to two subsections describing the architecture issues and NM techniques for (1) Reliability and Robustness, (2) Security, of WSN and other characteristics is relegated to future studies. 2.1 Reliability and Robustness In WSNs context, the probability that a network functions properly and aggregates trustworthy data without any interruption continuously, is usually referred to as reliability characteristic of the network [23; 20]. According to ISO 9126-1 software quality documentation, reliability characteristic shows the capability of a network to maintain or re-built (re-start) the service in certain period of time [13]. So, it is important that during long sensing, the network has to service up continuously. Reliable service of a network includes precise and proper sensing, delivering and sending acceptable data to the base station. In other words as Taherkordi et al. (2006) put: â€Å"The less loss of interested data, leads us to higher reliability of a system†. Systematic approach perceives reliability as probability of data delivery to the base station rather than point-to-point reliability [16]. Robustness defined by Sohraby et al. (2007) as: â€Å"a combination of reliability, availability, and dependability requirements†, reflects the degree of the protocol insensitivity to errors and misinformation†. Achieving system robustness in WSN, necessitates system capability to detect, tolerate and confine errors as well as reconfigure and restart the network respectively [7]. According to the given definition by Sohraby et al. (2007), it is apprehensible that reliability and robustness share commonalities with each other; this is the main rational behind discussing these two attributes together in this section [7]. Considering the nature of communication in WSN, a network is unpredictable and prone to fail caused by any physical damages in hardware devices, energy depletion, communication link error, information collapses in packages and etc. [17; 16]. Therefore, one of the critical issues in design phase of WSN is applying fault tolerance techniques to optimize the network so that reliability and robustness attained [17]. These techniques enable the network to withstand and recover any upcoming failure and restart operation [13]. Liu et al. (2009) categorized fault tolerance techniques into: node placement, topology control, target and event detection, data gathering and aggregation, and sensor surveillance. Reminding from the beginning of this chapter architecture design divided into three segments. Table 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 depicted a summary of the plausible related faults and their solutions in each segment. In the following, each aforementioned fault tolerance techniques are being discussed in each design segment. Table 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 The most probable fault and their fault tolerance solutions in WSN [17; 7; 18] 2.1.1 Reliability and Robustness of Physical Architecture: Fault: any physical interruption in sensor surveillance Solution: Node placement management and signal-effect management First item that should be considered in designing physical components architecture for reliability and Robustness is: physical placement and signal-effect management. As it is mentioned in section 3, although the mesh network communication is self-organize topology and does not need any manual configuration to bind the network for mobile sensors, the physical architecture and the location schema of the hardware components, sensors and gateways need to be designed carefully [7]. As a characteristic of mesh WSN, the sensors in network are free of any installation restrictions, even though, the placement should be far from any physical destruction or hostile locations. Inappropriate physical placement of sensor transmitters and gateway antenna can cause noise or significant lost in signals [7]. In addition, the signal coverage is decayed by surrounding objects and materials such as metal wall and the like. (E.g. exterior wooden, concrete, brick or gypsum frame, block or wall). Especially in the case of vehicles, the main body can impose such problem and henceforth installation of the sensors in this manner would be delicate. Moreover, the signal waves might be faded and affected during the transmission, due to various physical phenomena such as reflection, diffraction or scattering [7]. These effects would cause significant interruption in sensor surveillance. Therefore, it is important to manage these signal-effects in early stage of WSN physical architecture design. Reflection occurs when electromagnetic wave of signals is duplicated due to impinge of the wave on large object or surface such as walls, buildings and the Earth [7]. Therefore, all the reflection of the walls and also the Earth should be acknowledged in physical architecture design. Diffraction refers to any defection and obstruction in waves caused by irregular sharp edges during the data transmission between the transmitter and receiver [7]. In this case, designers have to be prudent in sensors placements in the proximity of sharp edges and corner angels. Scattering refers to any deviation from straight line. Environmental obstacles in the propagation path affect passing waves from their original structure. Even small irregular object such as street signs, and lampposts might encounter and scatter the wave. Hence WSN should be design to face with any irregular scattering during the wave transmission. Above all, the mobility of sensors and surrounding objects might fade the signals and add noises that should be considered in architecture design [7]. These issues are the basic physical factors, which cause major fault in data aggregation of WSN and cut down reliability and robustness. These destructive signals need to be subtracted from the received signal paths [7] before sending the data to gateway. Therefore, reflection, diffraction and scattering should be considered not only by designers in the physical components placements, but also by programmers in network development. Fault: Sensors failure Solution: Hardware replacement The next issue that needs to be considered in designing the physical architecture of a WSN is hardware failure. Sensors energy suppliers or any damages to the sensors and/or their transmitters are the sources of hardware failure. Regardless of source of failure, the WSN must be capable of functioning as well as replacing and switching sensors when necessary. Additionally, any changes in the physical components, on one hand, needs an explicit and well-defied consideration on security issue to prevent any potential threats, and on the other hand, needs an adaptable and configurable communication connection network [18]. 2.1.2 Reliability and Robustness of Communication Architecture Fault: communication link errors Solution:Topology control and event detection , Replicated services in communication model, Communication link error is an important concern in dealing with reliability and robustness of a network in communication architecture. The sensors in WSN are prone to fail and make link errors in point-to-point reliability of communication protocol. Therefore, it is the network topology responsibility to detect the errors and guarantee the overall reliability of the syste

Monday, August 19, 2019

Ethics and Moral Reasoning Essay -- Morality/Ethics

Aristotle's Virtue Ethics Aristotle in his virtue ethics states that a virtuous individual is someone with ideal traits. These characteristic traits normally come from an individual’s innate tendency but should be cultivated. After they are cultivated, these character traits supposedly become stable in an individual. Moral consequentilaists and deontologists are normally concerned with universal doctrines that can be utilized in any situation that requires moral interpretation. Unlike these theorists, Aristotle’s virtue ethics are concerned with the general questions such as â€Å"what is a good life†, â€Å"what are proper social and family values†, and â€Å"how should one live† (Bejczy 32). Aristotle developed his virtue ethics based on three central principles; eudaimonia, ethics of care, and agent based theories. Eudaimonia stipulates that virtues can be seen in the way an individual flourishes; flourishing under this concept refers to one’s ability to perform their functions with distinct accuracy (Bejczy 33). The distinct function of humans according to Aristotle is reasoning, and a worthy life is characterized by good reasoning. The agent based theory places emphasis on the fact that virtues are determined by common institutions people use to label traits in other people as admirable. According to Aristotle’s virtue ethics, a virtue like honesty does not necessarily refer to the tendency of people acting honestly, or the classification of the virtue as a desirable trait. Instead, Aristotle purports that the virtue of honesty is predisposed and entrenched in an individual (Bejczy 34). In virtue ethics, therefore, an individual cannot be labeled as honest since he is not cheating, or by observing the honesty in one’s dealings. In addi... ... the majority, rights become the greatest good (Troyer 60). Conclusion Aristotle's virtue ethics argue that morality should be based on an individual’s ideal traits that are internalized as opposed to observing outward actions or the consequence of his/her behavior. Kant on the contrary argues that for an individual to be considered morally upright, then his/her actions should be based on duty. Mills maintains that if an action provides long-term pleasures to the majority, then it is morally upright. Works Cited Bejczy, Istvan. Virtue ethics in the middle Ages: Commentaries on Aristotle's "Nicomachean Ethics", 1200 - 1500. Leiden: Brill, 2008. Print. Troyer, John. The Classical Utilitarians Bentham and Mill. Indianapolis: Hackett Publishers, 2003. Print. Wike, Victoria S. Kant on Happiness in Ethics. Albany: Albany State University Press, 1994. Print.

Sunday, August 18, 2019

Immanuel Velikovsky :: biographies bio

Correspondence Before the Day Breaks, When I first ran across any of Velikovsky's ideas it was in this online book Before the Day Breaks. In this book Velikovsky writes about his correspondence and conversations with Albert Einstein. I read some of this book before ever reading anything else of Velikovsky, or having any idea of what was proposed in his book Worlds in Collision. Before the Day Breaks is a very well written book, where Velikovsky's main argument is that gravity and inertia are not the only forces acting on the solar system. After Velikovsky published his book Worlds in Collision he has had much difficulty getting anyone in the scientific community to listen to him. There were numerous accounts of unjust behavior towards him from many famous scientist. It is ironic that while many people were ignoring him, he was discussing scientific matters with Einstein. While Before the Day Breaks may not have any substantial scientific impact, it does two separate other things. Provide a good insight to som e of the prejudices of the general scientific community at that time. Give good clues as to what Einstein's personality was like. Background Info. / History 1895, June 10, Immanuel Velikovsky was born in Vitebsk, Russia 1913> studied medicine at Montpelier, France, 1921 Velikovsky received a medical degree at the University of Moscow 1921 moved to Berlin, married, edited a journal called Scripta Universitatis atque Bibliothecae Hierosolymitarum, the mathematical-physical section was prepared by Albert Einstein. This journal played a big role in developing the Hebrew University in Jerusalem, 1924-1939 "Velikovsky lived in Palestine, practicing psychoanalysis- he had studied under Freud's pupil, Wi1helm Stekel in Vienna" quoted from (Short Biography) 1950 published Words in Collision right away it was a NY Times non-fiction #1 international best seller for 7 weeks until the publisher (Macmillan) dropped the book due to opposition to it led by Harvard astronomer Dr. Shapley -This book was about Velikovsky's claims that incidences in numerous independent cultures around the world were not due to terrestrial origin (i.e. comets and planets caused massive disasters) 1960s Velikovsky was considered as quack by most everyone

The Sanctity Of Oaths In Medea :: essays research papers

Medea The Sanctity of Oaths Through the play Medea, Euripides shows us the importance of keeping a promise given. At the beginning of the story, we see the play's two opposing views of promise keeping represented by the Nurse and the Tutor. As she stands outside of Medea's house and laments the way Jason has slighted Medea by taking another wife, the Nurse speaks of the 'eternal promise'; Jason and Medea made to each other on their wedding day (17-21). The Nurse wishes Jason were dead for the way he has abandoned his wife and children, so strongly does she feel vows should not be broken (83). When the Tutor enters the scene, he expresses a much more cynical view regarding Jason's decision to leave his wife. He asks the nurse, 'Have you only just discovered / That everyone loves himself more than his neighbor? / Some have good reason, others get something out of it. / So Jason neglects his children for the new bride'; (85-88). The Tutor feels that Jason's leaving Medea is only a part of life, as 'Old ties give place to new ones';. Jason "No longer has a feeling'; for his family with Medea, so he leaves her to marry the princess who will bring him greater power (76-77). Medea is outraged that she sacrificed so much to help Jason, only to have him revoke his pledge to her for his own selfish gain. She asks him whether he thinks the gods whose names he swore by have ceased to rule, thereby allowing him to break his promise to her. Medea vows to avenge her suffering by destroying Jason's new family and his children. When Jason curses his wife for her murdering at the end of the play, she says to him, 'What heavenly power lends an ear / To a breaker of oaths, a deceiver?

Saturday, August 17, 2019

Variable Voltage Regulator

1. INTRODUCTION 1. OVERVIEW In order to achieve several small scale and large scale objectives in various electronic circuits, it is highly essential to regulate the voltage supply, given to electronic circuits. This project, namely VARIABLE VOLTAGE REGULATOR, aims at fulfilling such small goals, using the 3-terminal voltage regulator LM317. The circuit consists of an IC LM317 and a set of resistors and capacitors, in addition to the transformer and the rectifying element. The AC voltage, from the mains supply is initially stepped down to the desired voltage, which is then rectified to be applied to the input terminal of the voltage regulator IC. As mentioned earlier the voltage regulator then takes care of supplying a constant voltage at the output terminal. This voltage can be varied according to our requirements with the help of a variable resistor. This project designed has the ability to vary the voltage values from 1. 5V to 25V at an output current of 1A. 2. APPLICATIONS The LM317 is versatile in its applications, including uses in programmable output regulation and local on-card regulations Typical other applications of the voltage regulator circuits include the following: †¢ 5V Logic Regulator with Electronic Shutdown †¢ Slow Turn-On 15V Regulator †¢ High Stability 10V Regulator †¢ 0 to 30V Regulator †¢ Power Follower †¢ High Gain Amplifier †¢ 4A Switching Regulator with Overload Protection †¢ Precision Current Limiter †¢ Tracking Preregulator †¢ AC Voltage Regulator †¢ Digitally Selected Outputs Besides replacing fixed regulators, the LM317 is useful in a wide variety of other applications. Since the regulator is â€Å"floating† and sees only the input-to-output differential voltage, supplies of several hundred volts can be regulated as long as the maximum input to output differential is not exceeded, i. e. , avoid short-circuiting the output. 1. CIRCUIT DESCRIPTION 1. BLOCK DIAGRAM: LIST OF COMPONENTS: IC – LM317 D1-D4 – 1N4007 diode C1 – 2200 µF, 50V electrolytic capacitor C2 – 0. 1 µF, ceramic disc capacitor C3 – 10 µF, 40V electrolytic capacitor C4 – 22 µF, 35V electrolytic capacitor R1 – 47? , 1/4W resistor R2 – 10? , 1/2W resistor R3, R4 – 100? , 1/2W resistor VR1 – 1k? 1/2W wire wound potentiometer LEDs – green, red 1. IC LM317: An Adjustable Linear Voltage Regulator [pic] LM317 is the standard part number for an integrated three-terminal adjustable linear voltage regulator. LM317 is a positive voltage regulator supporting input voltage of 3V to 40V and output voltage betw een 1. 25V and 37V. A typical current rating is 1. 5A although several lower and higher current models are available. Variable output voltage is achieved by using a potentiometer or a variable voltage from another source to apply a control voltage to the control terminal. LM317 also has a built-in current limiter to prevent the output current from exceeding the rated current, and LM317 will automatically reduce its output current if an overheat condition occurs under load. LM317 is manufactured by many companies, including National Semiconductor, Fairchild Semiconductor, and STMicroelectronics. Although LM317 is an adjustable regulator, it is sometimes preferred for high-precision fixed voltage applications instead of the similar LM78xx devices because the LM317 is designed with superior output tolerances. For a fixed voltage application, the control pin will typically be biased with a fixed resistor network, a Zener diode network, or a fixed control voltage from another source. Manufacturer datasheets provide standard configurations for achieving various design applications, including the use of a pass transistor to achieve regulated output currents in excess of what the LM317 alone can provide. LM317 is available in a wide range of package forms for different applications including heatsink mounting and surface-mount applications. Common form factors for high-current applications include TO-220 with part number LM317T and TO-3 with part number LM317K. LM317 is capable of dissipating a large amount of heat at medium to high current loads and the use of a heatsink is recommended to maximize the lifespan and power-handling capability. LM337 is the negative voltage complement to LM317 and the specifications and function are essentially identical, except that the regulator must receive a control voltage and act on an input voltage that are below the ground reference point instead of above it These voltage regulators are exceptionally easy to use and require only two external resistors to set the output voltage. Further, both line and load regulation is better than standard fixed regulators. Also, the LM117 is packaged in standard transistor packages which are easily mounted and handled. The general circuit of a voltage regulator circuit containing LM317 is as given below: [pic] Normally, no capacitors are needed unless the device is situated more than 6 inches from the input filter capacitors in which case an input bypass is needed. An optional output capacitor can be added to improve transient response. The adjustment terminal can be bypassed to achieve very high ripple rejection ratios which are difficult to achieve with standard 3-terminal regulators. Here we have designed the circuit according to the required specifications of the output current and output range of voltage. Before analyzing the design and calculation part, let us look into the general operation of the circuit for the variable voltage regulator. 2. OPERATION: 1 is the mains step down transformer (12-0-12), with a current rating of 500mA. It supplies a voltage of 12V or 24V to the regulator circuit. C1 is the main filter capacitor. The unregulated DC voltage across C1 at no load forms the input to LM317 regulator. The LM317 is a complete regulator. It has internal feedback, regulating voltage and current passing elements. In operation an accurate reference voltage, typically 1. 25V is developed between the output and adjust terminals. This reference voltage, when impressed across the resistor R1, sets up a current I1 that equals Vref/R1 in R1. I1 together with the quiescent current Iadj from the adjust terminal of the IC flows in the output set resistor R2, so that the voltage across R2 is V2 = (Vref/R1 + Iadj)*R2 The output voltage Vo at the output terminal of the IC is hence Vo=Vref + V2, given by Vo = Vref + (Vref/R1 + Iadj)*R2 Or Vo = Vref(1+R2/R1) + Iadj. R2 he LM317 is designed to minimize Iadj, this being an error term and also to make Iadj independent of line and load changes. To achieve this quiescent current is returned to the output terminal, thus establishing a minimum load current requirement. If the Iadj is neglected then the output voltage is then given by: Vo = Vref(1+R2/R1) In our project, this output voltage is available from a range of 1. 5V to 25V. This is attained with the help of the variable resistor, whose value can be varied to change the Iadj value and consequently get the desired voltage value at the output 3. DESIGN AND CALCULATIONS: 1. SPECIFICATIONS:- Output voltage: adj from 1. 25V to 25V Output current: 26. 5mA Line regulation:

Friday, August 16, 2019

Research and Background on Research Methodology

Methodology can be defined as the analysis of rules of methods, techniques and regulations. The methodological analysis involves the systematic survey of methods. Which are applied to analyse the survey or a specific undertaking. To make the survey planned and increase the trusty in the survey, the different of the methodological analysis can be accepted in the planned of the survey or frame of the survey. The research methodological analysis affecting the aggregation of theory, thought or construct of the survey, comparison of the survey that have different of the attack and single methods that have different of the attack and single methods that are conduced when the research is being performed. These mean that research methodological analysis was the bosom of the survey. It is a peculiar or set of processs. Research methodological analysis besides can be defined as the system of roll uping informations for surveies project. There are two manner of roll uping the information, either theoretical or practical research. Theoretical research is a procedure of placing a attention set of connections within a subject and the demoing how they fit together or related to the topic. For the practical research is, associating to, governed by or acquired through pattern or action, instead than theory, guess, or thoughts, by free lexicon ( hypertext transfer protocol: //www.thefreedictionary.com/practical ) . Harmonizing to M S Sridhar, ( October 17, 2010 ) says that research methodological analysis is a scientific discipline of analyzing how research is done scientifically. A manner to consistently work out the research job by logically following assorted stairss. Methodology aid to understand non merely the merchandises of scientific enquiry but the procedure itself. Harmonizing to S M Sindhar ( October 17, 2010 ) besides tell about the benefits of making the methodological analysis of research. The benefits are: Promotion of wealth of human cognition. Tool to the trade to transport out research ; provide tools to look at things in life objectively. Develop a critical and scientific height, disciplined thought or a ‘bent of head ‘ to detect objectively. Enriches practician and his pattern ; provide chance to analyze a topic in deepness ; enable the research workers to do intelligent determinations ; understand the stuffs which no other lend of work can fit. As consumers of research end product helps to instill the ability to measure and utilize consequences of earlier research with sensible assurance and take rational determinations. Making research is the best manner to larn to read and believe critically. For the societal scientific disciplines are methodologically diverse utilizing qualitative, quantitative and assorted method attacks. Qualitative information is highly varied in nature. It includes virtually any information that can be captured that is non numerical in nature. There is the type of qualitative informations: In-depth interviews Direct observation Written paperss Quantitative information is the term that used to depict a type of information that can be countered or expressed numerically. This type of informations collected in experiments, manipulated and statistically analyzed. To stand for the quantitative information is in graphs, histograms, charts and tabular arraies. Assorted method in research is the combine of quantitative and qualitative informations. In the survey consequences subsequently, there will be the combine of the two informations, the information from the qualitative informations and informations from the quantitative information. It besides can supply more comprehensive replies to research inquiries. In the instance of research ‘Reading wonts among pupil in Faculty of Information Management ‘ , some method is used consistently to do the consequences of the hypothesis can be more clarify. In this survey, a batch of information was gathered from two types of beginnings which are printed and electronic beginnings. The printed stuffs can be easy found in Perpustakaan Tun Abdul Razak PTAR, Puncak Perdana Library, and electronic beginnings can be easy happen utilizing internet or any database. From these beginnings, a batch of information about this article ‘Reading ‘ easy to be found but it difficult to happen when the rubric focused to the specific range, which is ‘Reading wonts ‘ , or ‘Reading wonts among University pupils ‘ and ‘reading wonts among pupils ‘ . So, I forced to broad range to finish this survey. 3.1 TYPE OF RESEARCH AND RESEARCH DESIGN In this range will stating about the type of the research and the research design that will be use in this survey. Here will be the particular of the type of the research and the research design to do others easy to cognize about this survey. 3.1.1 TYPE OF RESEARCH Harmonizing to Department of Health and Human Service ( DHHS ) , ( February, 2009 ) says that research wasaˆÂ ¦ . â€Å" a systematic probe, including research development, proving and rating, designed to develop or lend to generalise cognition. Activities which meet this definition constitute research for intent of this policy whether or non they are conducted or supported under a plan which is considered research for other a plan which is considered research for other intents. For illustration, some presentation and service plan may include research activities ; hypertext transfer protocol: //www.hhs.gov/ohrp/humansubject/guidance/45cfr46.htm # 46.102. † However, harmonizing to University Research Council, Nipissing University, ( January 29, 2008 ) says that research is any original and systematic probe undertaken in order to increase cognition and apprehension and to set up facts and rules. It comprises the creative activity of thoughts and coevals of cognition that lead to new and significant improved penetrations and/or development of new stuffs, devices, merchandises, and processes. It should hold the potencies to bring forth consequences that are sufficiently relevant to increase cognition. Good brooding enquiry produces theories and hypothesis and benefits ay rational effort to analyse facts and phenomena. This hunt for single facts or informations requires an open-ended inquiry for which is there no ready reply. Datas are gathered through experiments, studies or other methodological analysiss. So, the research significance is the original plants and systematic probe on cognition by person who have the involvement to make the research. It is besides to increase cognition and understanding on a topic. There are two type of research. However, research can be classified by intent or by method. If the research by intent, it have two classs, basic research and applied research. If the research by method, there are besides have two classs, deductive research and inductive research. In this survey of ‘reading wonts among pupil in Faculty of Information Management ‘ can be classs as applied research because this survey utilizing the basic research to increase the past theories, cognition and methods to work outing this survey. 3.1.2 RESEARCH DESIGN Research design is a model or design for carry oning the research undertaking. Harmonizing to the instruction lexicon, ( Jan 14, 2009 ) , research design is a program sketching how information is to be gathered for an appraisal or rating that includes placing the informations assemblage methods, the instruments to be used or created, how to instrument will be administrated, and how the information will be organized and analyze. There are few constituents of research design. It is: Specify the information needed. Design the exploratory, descriptive, and caused stages of the research. Stipulate the measuring and grading processs. Construct the pretest a questionnaire or appropriate signifier for informations aggregation. Stipulate the sampling procedure Develop a program of informations analysis There are two type of research design. It is quantitative research design and qualitative research design. In the quantitative research design, there are three constituent of quantitative research design. It is descriptive research, experimental research, and Quasi-experimental research. For the qualitative research design besides have three constituents in it. It is historical research, ethnographic research and instance surveies research. So, the research design is the general program on how research goes about replying research inquiry. This research on ‘reading wonts among pupil in Faculty of information direction ‘ will utilize on descriptive research because this type of research can accurately portrays the state of affairs of pupil perceptual experience on reading wonts among pupil in Faculty of Information Management. Descriptive research phenomena as they exist and it will analyze by and large take natural informations and sum up it in a functional signifier. This type of research design that involve doing careful description of the state of affairs of the reading wonts. It is necessary to hold clear image of the state of affairs how the information should be collected and sum up. The study design conducted indiscriminately to the pupils in Faculty of Information Management semester five and six merely. However, there are four classs in module of Information Management. It is IM221 ( Library Science Management ) , IM221 ( System Management ) , IM222 ( Records Management ) , and IM223 ( Resource Center Management ) for semester five and six. These types of pupil normally know about reading and reading wonts mean in finishing the surveies. The suggestion from them can better reading wonts among pupil and besides can better the stuffs in library that can increase reading wonts among pupil in Faculty of Information Management. The study on pupils will assist the lector, pupil and librarian in Faculty of Information Management to increase the reading wonts and besides foster the spirit of reading among pupils. The research will utilize questionnaire to acquire back the feedback from the pupil. The questionnaire is a research tool that consists of a series of inquiries defined by the research workers. From the questionnaire, the research workers can cognize and the research besides can make the summarize on the research. The questionnaire will be distributed among pupil in Faculty of Information Management, UITM Puncak Perdana. In module of Information Management, there are four classs, which are IM220 ( Library Science Management ) , IM221 ( System Management ) , IM222 ( Records Management ) , and IM223 ( Resource Center Management ) . From 100 sets of questionnaire, 25 sets will be distributed for each class. The distribution of the questionnaire will take the topographic point in the country of Faculty of Information Management, UITM campus Puncak Perdana, Shah Alam. The questionnaire will be collected by custodies of me as a research worker. 3.1.3 THEORETICAL PERSPECTIVE Figure1: Theoretical position: reading wonts, reading stuffs, frequence of reading, sum of stuffs in reading, and reading stuffs types harmonizing to gender. Independent Variable: Dependent Variable: Reading stuffs Reading Habits Frequency of reading Sum of stuffs in reading Factor influence reading wonts 3.2 VARIABLE In the research works, there are two type of variable that a normally usage. It is dependent variable and independent variable. Dependent variable is the use or introduces the independent variable. This sort of variable is depending on itself. The independent variable is the variable that needs the dependant variable to stand. Independent variable can non stand itself. This conceptual model indicates the relationship which consists of the dependent and independent variables. This model denotes the four variables which causes to individual variable which were affected by the independent variable. Reading wonts is dependent variable, the discrepancy in which to be explained by the four independent variables which are reading stuffs, frequence of reading, sum of stuff in reading, and reading stuffs types harmonizing to gender. The independent variables in this instance are reading stuffs, frequence of reading, sum of stuff in reading, and reading stuffs types harmonizing to gender. Therefore, it is really of import of reading wonts for pupils. On the other manus, the dependent variable is the reading wonts. It can be seen clearly that the independent variables have influenced the dependant variable. This research indicate and lucubrate clearly that the reading stuffs, frequence of reading, sum of stuffs in reading, and reading stuffs types harmonizing to gender among pupil as an independent variables that will hold an consequence and supported to reading wonts among pupil as a dependent variables. Reading wonts Reading wonts is the behaviour of the pupil in their reading. It is about the continued and regularly reading the stuff they like to read. Example, the pupil read the newspaper on a regular basis. Reading stuffs Reading stuff is the stuff that the pupil return and like to read, but the stuffs they read for reading wonts is the stuffs that they read on a regular basis. Example, newspapers, magazines, cartoon strips, and novels. However, they must depict what name or types of newspapers, magazines, cartoon strips, and novels they frequently to read. Frequency of reading Frequency of reading is how frequent the pupil read the stuffs. How much clip they spend in their reading every twenty-four hours. Sum of stuff in reading Sum of stuffs in reading is the Numberss of stuffs they take to read in a twenty-four hours. Means that do the pupil refer to take more than one stuffs in a twenty-four hours for their reading wonts. Factor influence reading wonts In the reading wonts there must be the factors that influence people or pupil to read. Usually pupil reading because they want to complete their assignment and plants and they besides influence by their household and friends. There are ever holding influence why people or pupil read and why they take the stuffs as their reading wonts. 3.3 RESEARCH METHODOLOGY Research methodological analysis is the manner that shows the aggregation of informations for the research undertaking. In this subdivision would state about the type of informations and aggregation methods, the population for this survey, and the sampling design for this survey. 3.3.1 PURPOSE OF RESEARCH To make or to get down the research, the research workers need to cognize what capable that have meet his or her involvement to pull him or her to make the research. Then, there besides must hold the intent of making the research. This is the first measure to make a research, must cognize the ground why the research workers do the research. There is few intent of the research workers do the research. First intent is account. Every research workers need to cognize the intent of the research that he or she making. The research workers do the research because they want to increase the cognition and develop the new cognition that already has done by the past research workers. So, to make the research is like to explicate on the topic that has being chosen to make. The research workers must explicate why the research must be conducted and explicate his or her involvement on the topic that they have chosen to be their research. The 2nd intent is anticipation. Doing research is for the research workers make the anticipation. Research is assisting the research workers to measure the state of affairs and give the prognosis what will go on in the hereafter. Type of the information that has high demand in the market now is the anticipation of new merchandise. These besides use to do anticipation that what will go on in the hereafter. This will do the research more interested by the research workers in the hereafter. The 3rd intent of making research is discovery. Making research like the research workers found something that truly of import and this information will be so valuable in the hereafter. That why research making the research. It is to detect new thought, new cognition, and besides increase the cognition that has being done by the past research workers. The last intent of making the research is hypothesis. Making the research, the research workers must cognize and make the hypothesis of their research. The research workers should cognize the hypothesis of the research that he or she conducted. For this survey ‘reading wonts among pupil in Faculty of Information Management ‘ is utilizing the applied research. So, here the intent of the applied research, proving theories, generates the survey, use the survey in the existent universes, and address more than merely the abstract rules. The hypothesis of this survey is promoting pupils to read and do reading as their wonts. After administering the questionnaire and do the analysis of the questionnaire, this survey can be applied by the existent universes as the mention. 3.3.2 TYPE OF DATA AND DATA COLLECTION METHOD There are two types of informations that normally use in research plant. It is quantitative informations and qualitative informations. Quantitative information is in the numerical information. The information can be countered and showed in the numerical information. Normally this sort of informations collected in experiments, statistical analyzes and manipulated. For the qualitative information is sort of informations that non in numerical informations. It is much more than words and text. Normally, it showed the exposure, picture, sound recordings and so on. This sort of informations can be collected by making interview, direct observation, and written papers. The survey ‘reading wonts among pupil in Faculty of Information Management ‘ utilizing the quantitative information. The information for this survey will be collected by distribute the questionnaire. In this questionnaire there must be the inquiry inquiring the respondent about the survey. From the informations that collected by questionnaire, I can acquire the reply about the survey I am making. 3.3.3 Population Population in research plant is stating about the group of people that where the topic that the research workers taking. The group besides will stand for the plants of the research workers. Before the research workers set the population for his or her research, the research workers must cognize about the community that he or she wants to go his or her population. The characters of the community besides must be known. The community that will became the population in the research works besides must hold experience and cognition about the research that the research workers conduct. The population besides is a group of the possible participants that will go the researcher population so that the research workers can generalise the consequences for his or her survey. The population of the research for the survey ‘reading wonts among pupil in Faculty of Information Management ‘ is the pupil from semester five and six in the Faculty if Information Management. But, the pupils as the population in this survey come from the 4 classs in the Faculty of Information Management. The four classs is IM220 ( Library Science Management ) , IM221 ( System Management ) , IM222 ( Records Management ) , and IM223 ( Resource Center Management ) . The selected inquiry will be give one questionnaire and they have to finish the questionnaire. The pupils that will be selected are indiscriminately in the country of pupil semester five and six from the four classs. The feedback that given by the respondent will give the consequence to the survey that conducted. 3.3.4 SAMPLING DESIGN Sampling design of the research works is one of the procedure, action or technique in the choosing of the sample that the researcher demand to make to acquire the information from the population that he or her mark as the respondent of his or her survey. These samplings besides refer to the communities that represent the information for the survey from the hall community. This mean that there will be some of the community will be taking to be the respondent of the research. The research workers need to make the sampling design to do the decision from the sample that on the population or from the questionnaire that have been distribute. From the trying design besides the research workers would acquire the reply for his or her research. Sampling design is of import because the sampling can demo the mark of the research workers on the survey. In this research, the simple random sampling has been used. Selected a group of the topic ( a sample ) and for the survey from the larger group ( a population ) is one of the simple random trying design in the basic technique. Each individual in the population will be selected as the mark respondent. In the conceptual, simple random sampling was the simplest of the sampling technique. It is non necessitate a big population. In the simple random sample, the research workers must take one of the people in the population and from that, there must non hold any order to take a specific person. Here mean that, there no specific person but choose the individual in the population indiscriminately. Exploitation and make the sampling design have the advantage. The advantage of making the trying design is it is easy, simple and can be apply in the little population. However, there are disadvantages making this trying design. It is the research worker demand to name the point and individual in a population before making the distribution of questionnaire so the research workers need to make the distribution work in the big population harmonizing to what he or she listed in the sampling design. In this survey of ‘reading wonts among pupil in Faculty of Information Management ‘ , the questionnaire will be distributed indiscriminately to the pupil on Faculty of Information Management, UITM Puncak Perdana, for the four classs which is IM220 ( Library Science Management ) , IM221 ( System Management ) , IM222 ( Records Management ) , and IM223 ( Resource Center Management ) . There are 80 questionnaire will be distributed indiscriminately to the pupil in Faculty of Information Management and the pupil that have been choose was pupil from semester five and six merely. 3.4 INSTRUMENT DEVELOPMENT The instrument is used to mensurating some of the quality or the ability of the topic or the research works. The intent of the instrument is to assist the research workers to do the sampling of the survey to acquire the information for the survey. An instrument can be a trial, signifier, interview, checklist, and a set of classs. Normally in research plants they use two of this instrument, questionnaire or interview. Questionnaire is the inquiry that have stated by the research workers in the documents and this inquiry must be fill wholly by the respondent. The questionnaire is the open-ended inquiries. Interview is when the research workers go run into person that a professional in the topic that research workers do and making the interview by face-to-face. The questionnaire is the simple manner to administer the study to the population that has been chooses by the research workers. The questionnaire will be giving and collected by manus by the research workers itself. It is different in making interview study. The research workers need to travel personally making the interview and normally the individual that being interviewed must be professional in the field that the research workers research. The format questionnaire can act upon the quality of informations collected, but the order of the points in the questionnaire can act upon the reply from the response given. The questionnaire must be stick to the intent of the topic, the topic that have been taking, and the aim of the research. The questionnaire strategically composed utilizing assorted inquiries formats, it is unfastened inquiry and close inquiry. Giving the questionnaire to the respondent is the appropriate for this sort of research which is needed the sentiment and perceptual experience from the respondents on the research subject which is ‘reading wonts among pupil in Faculty of Information Management ‘ . The questionnaire content three ( 3 ) parts focused on specific countries. The countries of the probe focal point on: answering involvement in reading, respondent reading behaviours, and answering sentiment. Each of the subdivision will be described below: Part A: Demographic This subdivision will state about the characters of the respondents that have being chosen. Part B: Answering Interest IN READING In this subdivision consist of inquiry on the questionnaire is about the involvement of the pupil in the stuffs the ever read, the stuff that the pupil choose to read as their reading wonts, and why they choose the stuffs as their wonts in reading. Part C: RESPONDENT READING BEHAVIORS Answering reading behaviours tell about the times the pupil refer to do the reading, where the topographic point the pupil want to read normally, type of the stuff the pupil refer to read, the type of the entree stuff the pupil choose to read, and how many stuffs the pupil read in a hebdomad. Part D: Answering Opinion This subdivision ask the sentiment of the pupil on the bash they agree or disagree with the stuffs they choose can assist them in survey, do the reading spring or increase their cognition and experience, and what the pupil sentiment about the reading wonts and do the reading wonts can assist to determining the personalities of the pupil. 3.5 DATA COLLECTION Data aggregation is the procedure where the research workers roll uping the information from the respondent that being take either the research workers distribute the questionnaire or interview. Data aggregation besides the manner of colleting the information for the usage in the assorted of survey or doing determination in some state of affairs. Data aggregation is the of import component in the research survey. Data aggregation can be made in several ways, either the research workers choose to utilize the distribution of questionnaire, interview, or direct observation. To be after the informations aggregation the research workers must carefully believe on the inquiry that he or she will set in the questionnaire or in the interview because the reply or the consequence from the questionnaire and the interview will give impact to the information analysis and the research the terminal of it. The research workers besides must believe how to form the information, the inquiry and information subsequently and before the distribution of questionnaire and interview. The research workers should believe in this information aggregation, what inquiry or information should he or she put and how much the information the research workers should roll up. In the informations aggregation the research workers should set the information about the sum of the participant that will be in the research, feature of the research, type of the participants, demographic informations and what the research privation to make. All the informations aggregation must associate to the research. To roll up the information for the research, the research workers must utilize this type of informations aggregation method. It is sentiment study, questionnaire, single interview and group interview, simulation, and direct observation. But, normally the celebrated method in the information aggregation is utilizing the questionnaire and interviews. It is easy to utilize and faster to acquire the informations feedback. To take the method for the informations aggregation, the research workers must cognize the handiness, dependability and cogency. Availability is about the inquiry that the research workers want to utilize in the questionnaire or in the interview, is it the inquiry is available and is it the information from the consequence subsequently is available to the research. Making the research works, the research must hold the dependability and the cogency. If non there must be job in the research works. In this survey ‘reading wonts among pupil of Faculty of Information Management ‘ the research workers use the questionnaire in the information aggregation. For the informations aggregation, in the questionnaire, the research workers divide inquiry into four subdivisions harmonizing to the of import of the surveies. The four subdivisions is demographic, answering involvement in reading, answering behaviours and the last subdivision is answering sentiment. In the questionnaire, there are parts that I do the inquiry utilizing the likert grading. Likert grading is the popular format in the research questionnaire. For this survey, I ‘m utilizing the disposal likert grading, it is each respondent is asked to rate the inquiry have been inquiring in the questionnaire harmonizing the sentiment of the respondent. Example of the disposal likert grading is figure 1 until 5, figure 1 refer to the strongly disagree and figure 5 refer to the strongly agree. In this survey besides have the inquiry inquiring about the sentiment of the respondent on the topic that I take to be his or her surveies. Besides, in the questionnaire, I ‘m inquiring on the behaviour of the respondent about the survey that I conduct. Using the questionnaire in these surveies has the advantages and disadvantages. The advantage is utilizing the questionnaire, the collected informations faster because I can give to the respondent by manus and acquire feedback besides by manus. But, the disadvantage is some of the respondent will make non desire to reply the questionnaire and if they want to reply, sometimes they do non reply the inquiry. 3.6 DATA ANALYSIS After the research workers collect the information, the research workers must making the informations analyze to analysis the information that have been get by the research workers. The information analysis is the procedure on to measure the informations that have been collected. There are three plants have to be considered in the information analysis, it is data readying, descriptive statistics, and illative statistics. Datas that have been get from the respondent must be prepare to analyse it. In this readying of the informations, the respondent must make the checking works, reexamine the information for the truth of the informations, altering the information, and develop the informations and certification the construction of the informations utilizing the assorted actions, either utilizing the computing machines or manual. Descriptive statistic is used to give the basic visual on the information in the survey. In this descriptive statistic, the action that been taken is making the simple analysis and simple sample of the steps. In this action, there must already hold the simple graph that shows the analysis from the information that have been collected. The last of the plants in the information analysis that research workers should see is the illative statistic. In this works the research workers do the decision of the informations that the research workers have been prepare, and analyse it in the descriptive statistic. In this subdivision besides the research worker do the hypothesis works. However, the research workers must cognize about the informations methods of the information analysis that the research workers will used. Is it the informations that the research workers collected is more on the qualitative informations or in quantitative informations. In this survey ‘reading wonts among pupil in Faculty of Information Management ‘ , I am utilizing the SPSS ( Statistical Package for the Social Sciences ) . SPSS is the characteristic that are truly of import to analyse the statistic for the societal research. 3.7 Decision For the decision, the research methodological analysis is stating about the method that being used in the research works by the research workers to complete the thesis. In this chapter, there must be about the type of research that research workers used, research design for this surveies, the variable of the surveies, research method have to used to finish this research works, the informations aggregation, and the information analysis that must make in this research. In this chapter will state briefly about the research method that must be used before continue to another chapter that more profoundly about this surveies.