Thursday, December 26, 2019

A Brief Note On The Culture Of Terrorism - 1518 Words

Culture of Terrorism The Culture of Terrorism The thesis of this paper is that the attacks of 9/11 were the catalysts of a world culture of terrorism that is used by propaganda and censorship to blur the politics of globalization and technology, and restructure a totalitarian society. This paper will argue that the businesses of â€Å"the U.S. media shill factory† (Borjesson, 2004, p.165), the plottings of the â€Å"brand based† (Klein, 2000, P.421) corporations, and the multi-national oil giants influence sectors of government by using deliberate strategies of censorship and propaganda to discredit government effectiveness, alienate populations, and seize control. What is the correlation between censorship and propaganda? â€Å"Intelligent men must†¦show more content†¦A new social order can only be reconstructed by a flow of chaos that compels a populace to request and even accede to such a change. It is essential to this paper that this began to surface publicly during â€Å"the mass popular movements of the 1960’s and 1970’s† (Chomsky, 1988, p.39-40). It was evident in the social activists who protested against the culture of violence that erupted. It was seen in the youth, in the universities, and in the government that had presided over the baby-boomer, white middle class economic boom between 1945 and 1963. This quiet center of American society floated unaware of the iceberg that lurked below, the â€Å"military-industrial complex† that Eisenhower warned of just before he left office in 1961 (â€Å"The Avalon Project†). Eisenhower also noted that â€Å"until the latest of our world conflicts, the U.S. had no armament industry† (â€Å"The Avalon Project†), but society was about to be torn apart. National leaders were assassinated. Kent State students protested Nixon’s unauthorized invasion of Cambodia, which he concealed from Congress. The Vietnamese War also brought the violence of arms directly to the American people along with â€Å"massive amounts of heroin being smuggled into the States in the bodies and body bags of GI’s killed in Vietnam† (Borjesson, 2004, p.165). Although â€Å"it was clear to us that CIA protection of international narcotics traffickers depended heavily on the

Wednesday, December 18, 2019

John F. Kennedy Moon Speech - 1744 Words

Caleigh Meyers 8GH 4/29/15 John F. Kennedy Moon Speech On September 12th, 1962, President John F. Kennedy rose a platform before a vast group assembled at Rice University in Houston, Texas, and arranged to give a discourse that would significantly shape the course of the United States endeavors over the accompanying decade. For sure, his discourse would stamp the start of a strong new time for mankind; a period of investigation and development in space. The connection and circumstances of President Kennedy s we go to the moon discourse, conveyed close to the stature of the Cold War and toward the start of the space race between the United States and the Soviet Union, were hugely critical. The Soviet satellite Sputnik had been beeping overhead for a long time, and one and only year earlier Soviet cosmonaut Yuri Gagarin had turned into the first individual in history to enter space. The United States was quickly losing the race into space, and thusly a rival in innovative matchless quality and eminence, to its Cold War foe. The American open was very nearly freeze over the ramifications of a Red Moon. President Kennedy expected to fashion a new course for the United States, one that would energize and stimulate the American open and restore American prominence in worldwide issues. Thus, on that day in September, 1962, he did simply that, effectively announcing that the United States would go to the Moon before the decade was out. The enduring centrality ofShow MoreRelatedJfk s Rhetorical Masterpiece Of John F. Kennedy s Moon Speech Essay1118 Words   |  5 PagesLivingston English 1101 27 Sept. 2016 JFK’s Rhetorical Masterpiece John F. Kennedy’s â€Å"Moon Speech† is a rhetorical masterpiece, which painted a vivid picture of America’s upcoming role as being a world leader in space exploration. The 1962 â€Å"Moon speech† was delivered by John F. Kennedy at the Rice University stadium in the midst of the space race between the Soviet Union and the United States. Kennedy’s ultimate goal with the â€Å"Moon Speech† was to get the Nation on board to support the NASA space programRead MoreRhetorical Analysis Of John F. Kennedy s Speech1405 Words   |  6 PagesJessica Madinger Composition 1 26 October 2015 We Choose to go to the Moon Rhetorical Analysis There are many things that a speech must contain to make it a well written and spoken speech. John F. Kennedy s speech he gave on September 12th 1962, titled â€Å"Address at Rice University on the Nation s Space Efforts†, better known as â€Å"We Choose to go to the Moon† contains many of the important factors of a successful speech. Kennedy used rhetorical strategies and skills to help him influence the AmericanRead MorePresident John F. Kennedy1675 Words   |  7 Pagesday that a choice was made by the USA. â€Å"We choose to go to the moon. We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard.† (Great Speeches Volume 27: John F. Kennedy, 2012). President John F. Kennedy delivered this infamous speech in the football stadium at Rice University in Houston, Texas on that very day. President Kennedy’s reason for his delivery of this speech was to address the state of our Nation’s Space Effort. The citizensRead MoreThe Dark Side of the Moon Landing1479 Words   |  6 PagesThe Dark Side of the Moon Landing The Final Frontier In 1969, The United States successfully sent the first manned mission to the moon. It was a long time coming, a product of the Cold War’s Space Race. The Cold War began in 1947, between the Soviet Union and the United States. There was no actual fighting in the Cold War, just political conflict, military coalitions, and numerous competitions of brain rather than brawn. Among these competitions is the most famous Space Race. Although the ColdRead MoreJohn F. Kennedy s Speech1361 Words   |  6 PagesJohn F. Kennedy Kennedy’s inaugural speech was remembered in the lines â€Å"Ask not what your country can do for you; ask what you can do for your country†. Kennedy’s speech resounded all over the United States inspiring the American nation to change, prosper and grow. He reassured the citizens of their nation’s strength and gave the people a sense of security. As the 35th President of the United States, John F. Kennedy was known for many accomplishments such as the establishment of the Peace CorpsRead MoreHaving Dreams Of Being On The Moon By John F. Kennedy1294 Words   |  6 Pagesbeing on the moon, President John F. Kennedy approaches the podium on September 12th, 1962 at Rice University in Houston Texas to inspire others to have unimaginable dreams of their own. Kennedy produces a dramatically moving speech to create brilliance across America and for all of America, through his own dreams in the context of â€Å"The decision to go to the moon.† Around this time was the height of the cold war and just the start of the space race, with that said, he starts his speech of with I amRead MorePresident John F. Kennedy1608 Words   |  7 Pagesthey liked and enjoyed where they lead this country. One of those few presidents was President John F. Kennedy. Elected in 1960 as the 35th president of the United States, Kennedy became the youngest and first Roman Catholic president. He won the hearts of many Americans with his youthfulness and charming good looks. Kennedy won the presidential race against Richard Nixon in a very close race. John F. Kennedy s assassination occurred on November 22, 1963, in Dallas Texas, this caused much shock andRead MorePatriotism For The Moon Speech Essay1204 Words   |  5 PagesPatriotism for the Moon On September 12, 1962, President John F. Kennedy delivered his famous Going to the Moon Speech to the American public. During the heightened tensions of the Cold War, Kennedy wanted to appeal to the sense of patriotism of the country and inspire everyone to support the Space Race efforts. He did this through the use of logic and emotion throughout the speech to connect with the Americans that were present and those who were not in attendance at Rice Stadium. The Cold War wasRead MoreEssay about Jfk Was a Great President1431 Words   |  6 PagesPresident John Kennedy Was a Great President The task of the leader is to get his people from where they are to where they have not been† (Henry). This quote from Henry Kissinger is a representation of the Kennedy term in office. President Kennedy took the world to a whole new level; he succeeded in many tasks in his short time as president. John F. Kennedy was great president because of his involvements in the Cuban Missile Crisis, the Space Race, the Civil Rights Movement, and the Peace CorpsRead MoreThe Eagle Has Landed Essay913 Words   |  4 Pagesâ€Å"We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win, and the others, too.† (John F. Kennedy) The nineteen-sixties were the most important decade during the Space Race, because American perseverance overcame a more

Tuesday, December 10, 2019

Ethical Treatment of Prisoners free essay sample

Some people believe the history of corrections shows continuous movement toward more humane treatment of prisoners as society has progressed. In the beginning punishments for prisoners were considered a corporal punishment which was whipping, beheading, dismembering, torture or even death. There was fines, dispersion of property were common which was more common than the physical torture. Execution was the economic and corporal punishment as the estate was forfeited. The economic and physical sanctions have given way of imprisonment less depreciation in the liberty of parole and probation.When there are thousands of crimes incarcerated throughout the United States, the ethical treatment of prisoner’s rights must be analyzed. Throughout the years many modifications have been made to accommodate inmates and preserve their basic human rights. Have we as a society done enough regarding the ethical treatment of prisoners or have we made their lives in prison too easy that it is no longer a punishment for them? There are many people in the United States who have strong feelings of what is right and wrong and fall on both sides of this question. We will write a custom essay sample on Ethical Treatment of Prisoners or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Utilitarianism is the belief that moral rules should be choices made by a society to promote the happiness of its members Mosser (2010). Through the utilitarian view the argument could be made that these prisoners are being treated to good and not good enough. Utilitarianism gives an understandable, theoretical foundation for moral decision making. Prior to coming to a decision upon a course of action, the utilitarian is asked to consider its effects on the entire population over an infinite period of time Mosser (2010).One problem with this method of decision-making is that many people might not agree with the premise that maximization of happiness should be the basis for morality. An example of this is an eye for an eye; if you kill someone in my family then I will have your life. In earlier history like the cowboy era this is how criminals were treated. Now, this is no longer accepted in our society. Our society’s ethical values have changed. For hundreds of years, prisoners had no rights. That is until 1909 when the Georgia Supreme Court ruled that although convicts have lost their freedom; they do have civil rights Davenport (2009).During this era, institutions were legally immune in state and federal courts from lawsuits, also called the hands-off doctrine, wardens ran their facilities as they felt necessary and were not held accountable for the conditions that existed in their facility Davenport (2009). Prisoners were beaten regularly and denied the basics such as food, medical care, and protection from staff or other inmates. These types of incidents continued for many of years. In the 1960’s several legal avenues opened for prisoners. Prisoners would now have the ability to have their grievances heard in state and federal courts.One of the major changes that enabled this is the cruel and unusual punishment clause of the Eighth Amendment; another is the civil rights provisions of Section 1983 of Title 42 of the U. S. Code Davenport (2009). The Eighth Amendment asserts that excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishment inflicted Davenport (2009). The cruel and unusual punishment clause was not intended for prisoners; rather the focus was on punishment outside the law. The clause also did not apply to state prisoners.The Supreme Court heard very few cases in this era. In the 1960’s, the Supreme Court began to incorporate the Bill of Rights to state laws. This meant the cruel and unusual punishment clause now included prisons and prisoners. Prisoner’s then began to file suits to change the way prisons operated, citing cruel and unusual punishment, inadequate healthcare, demanding more access to courts and due process. People who are employed in the justice system have to exhibit strength of mind and body to prove they are worthy to be in charge of those who may be a danger to society.This fact alone places these individuals in a position of power, and without a personal and professional code of ethics to live by; this power could be taken out of context. This could lead to damage within the system, as well as out on the street. For these people must make moral decisions everyday. A personal set of ethics can often be hard to define. Ethics are not on a person’s mind as they make various choices throughout the day. When a person sub-consciously makes one judgment or another, they are not aware that ethics plays a role in the decisions that are made.In examining ethical egoism and utilitarianism my personal view is definitely closer to utilitarianism than ethical egoism. Utilitarianism is an exceedingly, even extremely demanding moral view for most people. If we have a duty to always bring about the best outcome, than any time we can increase the well-being of others, we have a moral duty to do so. I believe it is morally better to help the most people at a time than to serve the self interest of one person. The thousands of crimes incarcerated throughout the United States had their day in court and are now housed in a penal institution to serve out their sentence.As a society we have passed ethical laws to protect the prisoners against harm from others and to make sure they are treated with respect. Through the eyes of utilitarianism arguments are made that these prisoners are being treated to good by some and not good enough by others. Regardless of which theories or ethical beliefs a person chooses to believe in they must follow the law or they could end up as a prisoner in the United States. Those in the justice system sworn to protect prisoners can not choose to follow their own beliefs but they must follow the laws and regulatio n set forth before them. Ethics as a form of intellectual inquiry does not provide answers to moral questions. People with beliefs about right and wrong do. Societies are built upon those beliefs. As we have analyzed the ethical treatment of prisoners with theories of ethics we can argue that society’s views of right and wrong coincide with reality, are representative of the objective moral order, and encompass the will of the people with regards to their treatment. Davenport, A. U. (2009). Basic criminal law: the constitution, procedure, and crimes (2nd Ed. ). Upper Saddle River: Pearson

Monday, December 2, 2019

Sibling Rivalry free essay sample

Any person, average or unusual, who obtains the unfortunate blessing of having siblings most likely acknowledges the complexity of American family dynamics that are attached among them. In general, families are anything but easily comprehended in one’s mind. Because of this, it is necessary to recognize and identify these alienable creatures we all know as â€Å"brothers and sisters† in order to know how to handle every day situations one may experience at any given time. Chiefly, apparent species of siblings have been divided as follows into these five groups: the Annoyances, the Invisibles, the Mini-Me’s, the Iconics, and of course, the Loveables. The Annoyances take the primary ranking of all siblings due to the fact that they are the most universal species of the five. It is not unusual to see an Annoyance in a typical household and simply put, they are no more than the meddlesome little boys and girls regularly displayed on reality television one grows up being familiar with. We will write a custom essay sample on Sibling Rivalry or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Their conversations consist of mediocre third-grade days at the dinner table and their maturity limits to insisting that the opposite gender is nothing but a cootie-infested nature of some sort. Hair-pulling and pointless screaming are fairly ordinary behavioral acts for this species, also. As far as specialty skills are concerned, jump rope and dodge ball take the ultimate ranking, along with hopscotch and four-square. An Annoyance adores frustrating those around them through giggles, pranks, and other shenanigans of the sort. It is important to remember that Annoyances are a rather ill-behaved cluster that most definitely should not be confided in. Secondly comes the rather dull and dim Invisibles. Being sad, mournful-like creatures, Invisibles are those fellow members that live under the same roof as you, but rarely go past a distant look across the room. If one is lucky, a series of twelve or so words might be exchanged every now and again, but for majority of the time, Invisibles enjoy tending to themselves and themselves alone. To witness an Invisible out and about the home is exceedingly rare, because they tend to be self-governing and independent towards their own affairs. Invisibles take pleasure in an assortment of comic books, video games, and additional activities as such. Despite their seemingly innocent facade, Invisibles tend to be suspicious beings with an almost hidden side. Let it be forewarned now: Be cautious around Invisibles, for their actions and thoughts are almost always unknown. Next are the Mini-Me’s. Ah, an emotional sect of the species indeed. Those young ones who esteem just about anyone for anything and get under the skin in sheer annoyance can be identified as Mini-Me’s. Though they are annoying, one cannot help but love a Mini-Me in some sort of way. Mini-Me’s often times have their older siblings looking out for them regardless if they know of it or not. Respecting a Mini-Me is essential, for they simply reflect the actions of those around them and fail to realize their behaviors often. Ordinarily, these beings morph into well-built individuals with a set vision of the future that lies ahead of them. One should look upon a Mini-Me with admiration and nobility. The Iconics place fourth among the world of brothers and sisters. These children are the stereotypical siblings one reads about in inspirational stories and sees in posed photographs on magazines. Between the perfectly-fitting attire, pearly white smiles, combed back hair, and overall groomed appearance, Iconics live in fantasy realms only. Being severely fictional, Iconics are unfortunately inexistent and not real. Iconic children tend to have plain and straightforward names such as Bob, or Joe, or John; Mary, Kate, or Sue. Iconics are uninteresting and bluntly stated, bland people that lack personality, and are the definition of â€Å"normal†. Consideration should be taken when encountering an Iconic of any sort. Finally, the most astounding beings in the sibling realm arrive; the Lovables. These beings were created to love and be loved, no matter what the situation. Dimples, a crooked smile, missing teeth, or even a disability can be characteristics of a Loveable, and these attributes make it extremely difficult to hate one. Their innocent beauty ranges, and the sole trait Loveables necessitate is TLC itself from those around them. When this thirst is not quenched, the Loveable will slowly fade away; much like a flower. It is for this exact reason that a person must be primarily empathetic and humble toward a Loveable. By performing such a simple task, a Loveable will be compassionate and kind-hearted in return. Taking into account all the siblings on the face of the planet, whether it be of African culture or European descent, all siblings can be identified as an Annoyance, Invisible, Mini-Me, Iconic, or Loveable. By being informed of the different sibling types among the world, one can begin to understand, recognize, and appreciate the complexity of siblings.

Wednesday, November 27, 2019

Reaction Times Essay Example

Reaction Times Essay Example Reaction Times Essay Reaction Times Essay Hypotheses: 1) Boys are faster than girls are 2) Right-handed students are faster than left-handed students are 3) Right-handed boys are faster than right-handed girls are Possible methods of testing 1. Hit the mole (arcade game)- I would time how many moles they could hit in one minute, repeat this 3 times to get a fair result and then find an average. This would be read as the higher the number of moles that are hit, the faster the reaction. However you would have to travel to an arcade to carry this test out and it would be extremely expensive. 2. Stopwatch- I would tell the student to stop it at a certain time e.g. 2 minutes, and however many seconds before or after they stopped the stopwatch, would be their reaction time, the closer the number of seconds it is to 2 minutes, the faster the reaction. This would of course be repeated 3 times to get a fair result and then the average found. However the stopwatch buttons may get stuck, therefore altering results. 3. Dropping a ruler- I would take a 30cm ruler and make sure that the zero is inline with the index finger. I would then drop the ruler, which would be caught by the student (who is standing), then the number of cms nearest to the index finger where the zero was lined up with, would be taken down as the reading for their reaction times. The results would be read as, the lower the number of cms, the quicker the reaction. This would be repeated 3 times for each student, to get a fair result, and then the mean found. This is the best method of testing, because it doesnt cost money, you dont need to travel and no errors can be found with a ruler. How is it a fair test? I will make this a fair test by: * Using the same 30cm ruler * Making sure the students are standing * Making sure the zero on the ruler is in line with the index finger of the student * Standing the students in the same position * Testing all students at the same time of day * Repeating each test 3 times * Using only year 10 students Note: All Reactions are measured in cms Methods of sampling Hypothesis 1 Boys are faster than girls are There are 307 year 10 students in this school, of which I need 50. I will use stratified sampling to find a fair number of girls and boys. Out of 307 students, 156 are girls and 151 are boys. To pick the 25 girls and 25 boys from the data bank, I will use systematic sampling whereby I will role a dice, then take the number it lands on and then pick every nth person on the list. I have rolled a 4, so I will pick every 4th person on the list, until I have my complete total of 25 girls and boys. I will use 4 to select the people for all 3 hypotheses. Hypothesis 2 Right-handed students are faster than left-handed students are I will again use stratified sampling, to find a fair number of left-handed and right-handed students that I need to total 50, out of the 307 year 10 students. There are 234 right-handed students, and 73 left-handed people. To select the 38 right-handed students and the 12 left-handed students, I will pick every 4th person, as I did for hypothesis 1. Hypothesis 3 Right-handed boys are faster than right-handed girls are Out of the 307 year 10 students, 127 are right-handed boys, and 107 and right-handed girls. To find the proportion of right-handed boys and girls that I need to make 50 I will again use stratified sampling. To select my 27 right-handed boys and 23 right-handed girls, I will pick every 4th person from the data bank. Testing Hypothesis 1 Boys are faster than girls are I found the averages for my sample of 50 students, and decided to arrange the results into grouped-data tables for convenience and accuracy. My groups were decided as: Reaction (cms) 0-5 extremely fast 5-10 fairly fast 10-20 average 20-25 slow 25-30 Very slow The results for boys were as follows- Reaction Tally Frequency Cumulative Frequency 0 ; r ; 5 0 0 5 ; r ; 10 12 12 10 ; r ; 20 12 24 20 ; r ; 25 1 25 25 ; r ; 30 0 25 The results for girls were as follows- Reaction Tally Frequency Cumulative Frequency 0 ; r ; 5 0 0 5 ; r ; 10 5 5 10 ; r ; 20 16 21 20 ; r ; 25 03 24 25 ; r ; 30 01 25 I will use a cumulative frequency graph with the inter-quartile range and box-plots. I will use A Cumulative Frequency Graph as I will be able to compare ranges (I.Q.R.), find the median and aid with boxplots to identify outliers and show skewness. As I expect the boys reaction to be faster than the girls I will expect the line representing the boys to be steeper than the line representing the girls. Testing Hypothesis 2 Right-handed students are faster than left-handed students I found the averages for my sample of 50 students, and decided to arrange the results into grouped-data tables for convenience and accuracy. My groups were decided as: Reaction (cms) 0-5 extremely fast 5-10 fairly fast 10-20 average 20-25 slow 25-30 very slow The results for right-handed students were as follows- Reaction Tally Frequency Frequency density 0 r 5 0 0/5=0 5 r 10 11 11/5=2.2 10 r 20 23 23/10=2.3 20 r 25 3 3/5=0.6 25 r 30 1 1/5=0.2 The results for left-handed students were as follows- Reaction Tally Frequency Frequency density 0 r 5 0 0/5=0 5 r 10 0 0/5=0 10 r 20 12 12/10=1.2 20 r 25 0 0/5=0 25 r 30 0 0/5=0 I will use a Histogram, to find the median. As I expect the right-handed students to be faster, I will expect the median for the right-handed students to be lower than for the left-handed students. Right-handed Median = 13.5 Left-handed Median = 15 Conclusion for Hypothesis 2 The medians again prove that my 2nd hypothesis is correct. Right-handed students are faster than left-handed students because the right-handed students achieved a median of 13.5 whereas the left-handed students achieved a median of 15, making the right-handed students average faster. Testing Hypothesis 3 Right-handed boys are faster than right-handed girls are I found the averages for my sample of 50 students, and decided to arrange the results into grouped-data tables for convenience and accuracy. My groups were decided as: Reaction (cms) 0-5 extremely fast 5-10 fairly fast 10-20 average 20-25 slow 25-31 very slow The results for right-handed boys were as follows- Reaction Tally Frequency Mid-point Mid-point x Frequency 0 r 5 0 2.5 0 x 2.5=0 5 r 10 10 7.5 10 x 7.5=75 10 r 20 15 15 15 x 15=225 20 r 25 02 22.5 2 x 22.5=45 25 r 30 0 27.5 0 x 27.5=0 27 345 The results for right-handed girls were as follows- Reaction Tally Frequency Mid-point Mid-point x Frequency 0 r 5 0 2.5 0 x 2.5=0 5 r 10 7 7.5 7 x 7.5=52.5 10 r 20 13 15 13 x 15=195 20 r 25 2 22.5 2 x 22.5=45 25 r 30 1 27.5 1 x 27.5=27.5 23 320 The estimated mean for right-handed boys is 13 The estimated mean for right-handed girls is 14 Conclusion for Hypothesis 3 The estimated mean for the right-handed boys is 13 whereas the estimated mean for the right-handed girls is 14, this means that the boys are faster because they have a faster average than the girls do. This proves my 3rd hypothesis correct I used the estimated mean in order to get an immediate result of who is faster out of everybody. It also means I will be able to find the standard deviation (page 7 7a). Testing Hypothesis 3 (continued) Although I have already proved the 3rd hypothesis correct, I am going to put the data into a histogram, to secure my conclusion. The tables of results were arranged in the same way Right-handed boys- Reaction Tally Frequency Frequency density 0 r 5 0 0/5=0 5 r 10 10 10/5=2 10 r 20 15 15/10=1.5 20 r 25 2 2/5=0.4 25 r 30 0 0/5=0 27 Right-handed girls- Reaction Tally Frequency Frequency density 0 r 5 0 0/5=0 5 r 10 7 7/5=1.4 10 r 20 13 13/10=1.3 20 r 25 2 2/5=0.4 25 r 30 1 1/5=0.2 23 The Medians Right-handed boys = 12 Right-handed girls = 13.5 Conclusion for 2 for hypothesis 3 I can see from the Medians, which I read off of the histograms, that Right-handed boys are faster than Right-handed girls are. The right-handed boys median was 12 whereas the girls median was 13.5 making the right-handed girls slightly less- faster than the boys are. This proves my 3rd and final hypothesis right for the second time. Testing Hypothesis 3 (continued 2) The estimated mean for boys = 13 The estimated mean for girls = 14 The method of how I found the estimated means, is on page 5 Mid Point (x) Frequency (f) Mid point Estimated mean (x-x) (Mid point Estimated mean) à ¯Ã‚ ¿Ã‚ ½ (x-x) à ¯Ã‚ ¿Ã‚ ½ Frequency x (Mid point Estimated mean) à ¯Ã‚ ¿Ã‚ ½ f(x-x) à ¯Ã‚ ¿Ã‚ ½ 2.5 0 2.5-13= -10.5 -10.5à ¯Ã‚ ¿Ã‚ ½ = 110.25 0 x 110.25= 0 7.5 10 7.5-13= -5.5 -5.5à ¯Ã‚ ¿Ã‚ ½= 30.25 10 x 30.25= 302.5 15 15 15-13= 2 2à ¯Ã‚ ¿Ã‚ ½= 4 15 x 4= 60 22.5 2 22.5-13= 9.5 9.5à ¯Ã‚ ¿Ã‚ ½= 90.25 2 x 90.25= 180.5 27.5 0 27.5-13= 14.5 14.5à ¯Ã‚ ¿Ã‚ ½= 210.25 0 x 210.25= 0 ? =27 ? =543 The standard deviation for the right-handed boys is (to 3 s.f.): 4.48 Mid Point (x) Frequency (f) Mid point Estimated mean (x-x) (Mid point Estimated mean) à ¯Ã‚ ¿Ã‚ ½ (x-x) à ¯Ã‚ ¿Ã‚ ½ Frequency x (Mid point Estimated mean) à ¯Ã‚ ¿Ã‚ ½ f(x-x) à ¯Ã‚ ¿Ã‚ ½ 2.5 0 2.5 14 = -11.5 -11.5à ¯Ã‚ ¿Ã‚ ½ = 132.25 0 x 132.25 = 0 7.5 7 7.5 14 = -6.5 -6.5à ¯Ã‚ ¿Ã‚ ½ = 42.25 7 x 42.25 = 295.75 15 13 15 14 = 1 1à ¯Ã‚ ¿Ã‚ ½ = 1 13 x 1 = 13 22.5 2 22.5 14 = 8.5 8.5à ¯Ã‚ ¿Ã‚ ½ = 72.25 2 x 72.25 = 144.5 27.5 1 27.5 14 = 13.5 13.5à ¯Ã‚ ¿Ã‚ ½ = 182.25 1 x 182.25 = 182.25 ? =23 ? =635.5 The standard deviation for the right-handed girls is (to 3 s.f.): 5.26 Conclusion 3 for Hypothesis 3 The standard deviation value of the right-handed boys is lower, which means that the right-handed boys are more consistant Also I can see from the Standard deviation methods on page 7a, that 95% of the right-handed boys reaction ranged between 4.04cm and 21.96cm whereas 95% of the right-handed girls ranged between 3.48cm and 24.52cm, this again shows that the boys are more consistent. I expect to find the median and expect of the boys to be lower than the girls. Further improvements If I were to do this investigation again, I would re-do Hypothesis 1. I would find and remove the outliers from the data, and re-construct my cumulative frequency graph, to see if it altered the results, which I have found. Also I would place the data for each hypothesis, into other forms of graphs (i.e. histograms for hypothesis 1, cumulative frequency for hypothesis 2 etc). This would ensure that my conclusions are more precise and correct, as I did for hypothesis 3 where I used the estimated mean, a histogram and then found the standard deviation. Furthermore, I would test other hypotheses such as Right-handed girls are faster than Left-handed boys are etc. I could also change the age group, and see if I get different results to what I have, for each hypothesis. Another thing I could change is the form of test, so instead of dropping the ruler I could try the stopwatch experiment. Overall Conclusion After analyzing all of the results from the tests for all 3 hypotheses, I can see that my hypotheses were correct. For hypothesis 1, the Median for the boys was 10 whereas the median for the girls was 13. This meant that the boys were faster than the girls were. Also the box plots and the steepness of the lines from cumulative frequency graph showed the boys were faster. For hypothesis 2, the Right-handed students proved to be faster than left-handed students because the right-handed students had a median of 13.5 whereas the left-handed students achieved a median of 15. This meant that right-handed students average was faster. For the 3rd hypothesis the boys estimated mean was 13 whereas the girls estimated mean was 14. This showed that the right-handed boys average was faster than the right-handed girls was, making the right-handed boys faster. I also put the data into a histogram. The Median for the right-handed boys was 12 whereas the right-handed girls, was 13.5. This proves again that the right-handed boys were faster than the right-handed girls were. I found the standard deviations for the right-handed girls and boys. It showed that the boys were more consistent than the girls were. Conclusion for Hypothesis 1 The Median for the boys is 10 whereas the median for the girls is 13. This already proves my hypothesis correct boys are faster than girls are. Also, on the box-plots 3/4 of the boys have a reaction between 10 and 13 whereas 3/4 of the girls have a reaction between 13 and 17, so the majority of boys are faster than the girls are. I can also see from the whiskers of the box plots that there are outliers. There is a boy who is extremely slow in comparison to the majority of the boys and a girl who is also extremely slow in comparison to the majority of the girls. The steepness of the boys graph proves again that the boys have a faster reaction than the girls do. Furthermore, I can see from the inter-quartile ranges, (which represent the middle-half of the sample) that the girls are slower, the reaction of the middle half being 6.5 and the boys being 4.5. In addition to this, I can see from the inter-quartile ranges that the boys are more consistent as their range is closer together 8.5 13 compared to the girls ranging from 10.5 17 Maths Statistics Coursework: Reaction times

Saturday, November 23, 2019

Executive Order 9835 Demanded Loyalty

Executive Order 9835 Demanded Loyalty In 1947, World War II had just ended, the Cold War had just begun, and Americans were seeing communists everywhere. It was in that politically-charged atmosphere of fear that President Harry S. Truman on March 21, 1947, issued an executive order establishing an official â€Å"Loyalty Program† intended to identify and eliminate communists in the U.S. government. Key Takeaways: Executive Order 9835 Executive Order 9835 was a presidential executive order issued by President Harry S. Truman on March 21, 1947. The so-called â€Å"Loyalty Order† created a controversial â€Å"Federal Employee Loyalty Program† charged with eliminating communists from all areas of the U.S. government. The order empowered the FBI to investigate federal employees and created presidentially-appointed Loyalty Review Boards to act on reports from the FBI.Between 1947 and 1953, more than 3 million federal employees were investigated, with 308 fired after being declared security risks by the Loyalty Review Boards.   Truman’s Executive Order 9835, often called the â€Å"Loyalty Order,† created the Federal Employee Loyalty Program, which authorized the Federal Bureau of Investigation (FBI) to conduct initial background checks on federal employees and carry out more in-depth investigations when warranted. The order also created Presidentially-appointed Loyalty Review Boards to investigate and act on the findings of the FBI. â€Å"There shall be a loyalty investigation of every person entering the civilian employment of any department or agency of the executive branch of the Federal Government,† the Loyalty Order decreed, also providing that, â€Å"equal protection from unfounded accusations of disloyalty must be afforded the loyal employees.† According to the paper The Second Red Scare, Digital History, Post-War America 1945-1960 from the University of Houston, the Loyalty Program investigated over 3 million federal employees, 308 of whom were fired after being declared security risks. Background: Rise of the Communist Threat Shortly after the end of World War II, not only had the entire world learned the horrors of nuclear weapons, America’s relationship with the Soviet Union had deteriorated from wartime allies to staunch enemies. Based on reports that the USSR had succeeded in developing its own nuclear weapons, Americans, including government leaders, were gripped by a fear of the Soviets and communists in general, whoever and wherever they might be.  Ã‚   Growing economic tension between the two nations, along with fears of uncontrolled Soviet spy activity in America began to influence ​U.S. foreign policy and, of course, politics. Conservative groups and the Republican Party sought to use the so-called â€Å"Red Scare† threat of Communism to their advantage in the 1946 midterm Congressional elections by claiming that President Truman and his Democratic Party were â€Å"soft on Communism.† Eventually, the fear that communists were beginning to infiltrate the U.S. government itself became a key campaign issue. In November 1946, Republican candidates won sweeping victories nationwide resulting in Republican control of both the House of Representatives and the Senate.   Truman Responds to the Red Scare Two weeks after the election, on November 25, 1946, President Truman responded to his Republican critics by creating the Presidents Temporary Commission on Employee Loyalty or TCEL. Made up of representatives from six Cabinet-level government departments under the chairmanship of a Special Assistant to the U.S. Attorney General, TCEL was intended to create federal loyalty standards and procedures for the removal of disloyal or subversive individuals from federal government positions. The New York Times printed the TCEL announcement on its front page under the headline, â€Å"President orders purge of disloyal from U.S. posts.† Truman demanded that the TCEL report its findings to the White House by February 1, 1947, less than two months before he issued his Executive Order 9835 creating the Loyalty Program. Did Politics Force Truman’s Hand? Historians contend that the timing of Truman’s actions, taken so soon after the Republican Congressional victories, show that both the TCEL and the subsequent Loyalty Order had been politically motivated.   Truman, it seems, was not as worried about Communist infiltration as the terms of his Loyalty Order indicated. In February 1947, he wrote to Pennsylvania’s Democratic Governor George Earle, â€Å"People are very much wrought up about the communist bugaboo but I am of the opinion that the country is perfectly safe so far as Communism is concerned- we have too many sane people.† How the Loyalty Program Worked Truman’s Loyalty Order directed the FBI to investigate the backgrounds, associations, and beliefs of any of the approximately 2 million executive branch federal employees. The FBI reported the results of their investigations to one or more of the 150 Loyalty Review Boards in various government agencies. The Loyalty Review Boards were authorized to conduct their own investigations and to collect and consider testimony from witnesses whose names were not disclosed. Notably, the employees being targeted by the loyalty investigations were not allowed to confront the witnesses testifying against them. Employees could be fired if the loyalty board found â€Å"reasonable doubt† regarding their loyalty to the U.S. government or ties to communist organizations. The Loyalty Order defined five specific categories of disloyalty for which employees or applicants could be fired or rejected for employment. These were: Sabotage, espionage, spying or the advocacy thereofTreason, sedition or the advocacy thereof;Intentional, unauthorized disclosure of confidential informationAdvocacy of the violent overthrow of the U.S. governmentMembership in, affiliation with or sympathetic association with any organization labeled as totalitarian, fascist, Communist or subversive The Subversive Organization List and McCarthyism Truman’s Loyalty Order resulted in the controversial â€Å"Attorney Generals List of Subversive Organizations† (AGLOSO), which contributed the second American Red Scare from 1948 to 1958 and the phenomenon known as â€Å"McCarthyism.† Between 1949 and 1950, the Soviet Union demonstrated that it had indeed developed nuclear weapons, China fell to Communism, and Republican Senator Joseph McCarthy famously declared that the U.S. Department of State employed more than 200 â€Å"known communists.† Despite having issued his Loyalty Order, President Truman again faced charges that his administration was â€Å"coddling† communists. Results and Demise  of Truman’s Loyalty Order According to historian Robert H. Ferrell’s book Harry S. Truman: A Life, by mid-1952, the Loyalty Review Boards created by Truman’s Loyalty Order had investigated more than 4 million actual or prospective federal employees, of which 378 were fired or denied employment. â€Å"None of the discharged cases led to discovery of espionage,† noted Ferrell. Truman’s Loyalty program has been widely criticized as an unwarranted attack on innocent Americans,  driven by the Red Scare. As the Cold War’s threat of nuclear attack grew more serious during the 1950s, Loyalty Order investigations became more common. According to the book Civil Liberties and the Legacy of Harry S. Truman, edited by Richard S. Kirkendall, â€Å"the program exerted its chilling effect on a far larger number of employees than those who were dismissed.† In April 1953, Republican President Dwight D. Eisenhower issued Executive Order 10450 revoking Truman’s Loyalty Order and dismantling the Loyalty Review Boards. Instead, Eisenhower’s order directed the heads of federal agencies and the U.S. Office of Personnel Management, supported by the FBI, to investigate federal employees to determine whether they posed security risks.

Thursday, November 21, 2019

The impact of Leadership Style on Employees Performance Research Proposal

The impact of Leadership Style on Employees Performance - Research Proposal Example The continuously evolving and turbulent business situations have made it necessary to steer an organization in the right direction to achieve higher performance. Although a number of factors influence the success and continuity of an organization, the role of leadership is found to be critical in this aspect. Leadership effectiveness is considered to be a key requirement in every organization for being successful in the present undertakings and also for ensuring continued success and competitiveness in the future (Manning & Curtis, 2003). Exceptional organizational performances are often mapped back to the presence of dynamic leadership within the company. Also, leadership effectiveness in enhancing organizational performances is often considered to be the result of skillfulness in a business. The quality of leadership in an organization is one of the most significant determinants of the level of performance of the organization (Lussier & Achua, 2004). Thus, the research topic seems to be highly relevant and contextual for study in the modern business world. It is important to understand the terms such as leadership, leadership style and performance to conduct the proposed research. Leadership in an organization is a component that is inclusive of a number of strategies that can be used in the organization. Goleman, Boyatzis, and Mckee (2001) stated that leadership behavior is found to play an influential role in enhancing motivation, job satisfaction, and work quality. On the other hand, the performances of the employees are the building blocks of an organization. These also form the foundation on which the overall performance of the organization rests. Performance is identified by Cunningham and McGregor (2000) to be a multidimensional aspect that is aimed to achieve goals and is significant for an organization in achieving its strategic objectives. Figure 1. Five levels of hierarchy of performance excellence. Adapted from â€Å"Trust and the

Tuesday, November 19, 2019

Capitalism and Socialism Essay Example | Topics and Well Written Essays - 1500 words

Capitalism and Socialism - Essay Example The table below pinpoints the differences between the forms of capitalism based on the institutional characteristics; An example of a ‘humane’ capitalist country is Germany. Such capitalist countries get referred to as ‘humane’ due to the characteristic of their institutional set up. As much as their capitalist economies get based on profit making, accumulation, and direct competition; these economies value their human population through their institutional set up (Soskice & Hall 65). ‘Humane’ capitalist economy setup aims at attaining equitable income distribution for each individual in the economy. They try to create a sustainable and equitable economic environment for every player to make their contributions through their policies. ‘Humane’ capitalist economies gear their policies towards efficient service delivery for the people. An example of a ‘brutal’ capitalist economy is the United States. Such countries get considered as ‘brutal’ as they advocate for direct competition among its economy players. This competition leaves a percentage of the population vulnerable to poverty (Soskice & Hall 123). ‘Brutal’ capitalism represents a man eat man society where the more an individual has, the more the individual is likely to accumulate more and take part in the economy. ‘Brutal’ capitalist countries are more likely to place profits over the people. A ‘humane’ and ‘brutal’ capitalism cannot exist together. This is so because if they do, then it would revert to the general capitalist economy which contains strains of both forms of capitalism (Soskice & Hall 133). These forms of capitalism cannot compete directly but rather, indirectly. Einstein argues for a socialist future over capitalism. This is so as Einstein believed that a socialist future would help cure the evils of capitalism. He suggests that there be a socialist economy

Sunday, November 17, 2019

Can This Bookstore Be Saved Essay Example for Free

Can This Bookstore Be Saved Essay The internet has brought an end to most brick and mortar locations of book stores and have changed the ways that book publishers market and sell their books. Publishers had to change the way they allocate printed books as well as beginning to release books as apps in order to change the ways that books are sold and open up to a wider audience. Paper books would create a bigger profit but do not sell as well as e-books. Book stores either had to adapt to the change or ultimately meet their end. Book stores had to reach to selling e-books and e-readers in order to maintain their sales. BN as well as book publishers are changing their business model to deal with the internet and e-book technology by increasing the features which they offer to their clientele. They are constantly upgrading the r-readers they provide and increasing the functionality of their e-books. Also they are looking to cater to the college student for their text book needs. 3. Yes BN’s new strategy will be successful. I feel that their new strategy will be successful because they are not appealing to more people especially college students that will repeatedly need to purchase or rent textbooks. As with new features they allow people to do more things even though some people may never use them the younger demographic would more than likely be drawn to those new features. 4. I feel that BN and publishers should be giving people more of a preview of the books to stimulate more business. With e-books it is harder to just impulse buy one because you cannot hold the book in your hand and read a few pages to see if you have a true feel for the book. The weaknesses   within Facebooks privacy policies and features are the fact they want you to share as much information as possible but they make your information openly readily available to anyone if you do not know how to go through all of Facebooks settings. They do not automatically protect your account and do not easily give you the information to do so. The factors that contribute to those weaknesses is the lack of information given to consumers, they do not tell you how your information will be used, the difficulty involved with updating how your information is shared and the fact they do not ask your permission for images. The way in which Facebook currently conducts business I do not think they can have a successful business model without invading privacy. I feel like they make the most of their business exploiting people’s privacy and their lack of knowledge with how to change their privacy settings. The only way I feel that they can make it successful would be to educating the people that use facebook to take the proper measures to make sure their information is not shared without their approval.

Thursday, November 14, 2019

Maharaja Ranjit Singh: The Sikh Ruler, In The Eyes Of Non-sikhs :: essays research papers

According to the famous historian Carlyle, a worthy sovereign should be judged from a sole factor as to how he employs his sword after being victorious. ********** Le Griffin writes that: "Maharaja Ranjit Singh ruled his kingdom exactly according to the Sikh way of life and Sikhism considers everyone as friends and talks about the welfare of all irrespective of caste and creed." ********** The spirit of Gurbani couplet, "The one Lord is the Father of all and we are the children of the one Lord rules supreme in every Sikh heart." Charles Hugal, writes in his book, "Travels in Kashmir and Punjab", that, "probably no person in the world could have established such a large empire with minimum bloodshed as Ranjit Singh has established his kingdom." ********** Affirming Hugal's views, Prinsep, also writes in his book, "Origin of Sikh Power in Punjab", that, "Ranjit Singh's whole career was free of any blemishes like unnecessary atrocities and cruel bloodshed." ********** Historian R.S. Kanungo praising all the aspects of the Kingdom of Maharaja Ranjit Singh, in his writings says, "his empire was the kingdom for 'Welfare for All', in which all were equal sharing partners. In his kingdom there was no special love for Sikhs and no animosity for non-Sikhs. There were no special taxes on any caste to show it down from the other or to label it inferior." ********** W.G. Osborne writes that, "Maharaja Ranjit Singh was so compassionate that outside a battle he did not kill anyone, so much so that in generosity he even forgave those who tried to kill him and felt happiness in forgiving." ********** Charles Hugal in his book, "The Court and Camp of Ranjit Singh", writes that, "Ranjit Singh ruled his kingdom according to the Sikh tenets. All the important positions were given to Hindus, Muslims and Sikhs, entirely based on merit. Even his main advisors were three famous Muslim brothers: Fakir Aziz-ud-Din, his foreign minister; Fakir Nur-ud-Din, his home minister; Fakir Imam-ud-Din, his custodian of the arsenals. Forty-six senior Army officers and two top ranking Generals were Muslims. One General was French and score of military officers were Europeans. In police and civil services he has about one hundred Muslim officers alone. Hindus too, used to hold many key positions in Sarkar-e-Khalsa. Ranjit Singh was secular through-and-through. Since he had lost his one eye in childhood, due to small pox, he used to remark jokingly about himself that, "God Willed that as a true Sikh I should look upon all religions with one eye". Maharaja Ranjit Singh: The Sikh Ruler, In The Eyes Of Non-sikhs :: essays research papers According to the famous historian Carlyle, a worthy sovereign should be judged from a sole factor as to how he employs his sword after being victorious. ********** Le Griffin writes that: "Maharaja Ranjit Singh ruled his kingdom exactly according to the Sikh way of life and Sikhism considers everyone as friends and talks about the welfare of all irrespective of caste and creed." ********** The spirit of Gurbani couplet, "The one Lord is the Father of all and we are the children of the one Lord rules supreme in every Sikh heart." Charles Hugal, writes in his book, "Travels in Kashmir and Punjab", that, "probably no person in the world could have established such a large empire with minimum bloodshed as Ranjit Singh has established his kingdom." ********** Affirming Hugal's views, Prinsep, also writes in his book, "Origin of Sikh Power in Punjab", that, "Ranjit Singh's whole career was free of any blemishes like unnecessary atrocities and cruel bloodshed." ********** Historian R.S. Kanungo praising all the aspects of the Kingdom of Maharaja Ranjit Singh, in his writings says, "his empire was the kingdom for 'Welfare for All', in which all were equal sharing partners. In his kingdom there was no special love for Sikhs and no animosity for non-Sikhs. There were no special taxes on any caste to show it down from the other or to label it inferior." ********** W.G. Osborne writes that, "Maharaja Ranjit Singh was so compassionate that outside a battle he did not kill anyone, so much so that in generosity he even forgave those who tried to kill him and felt happiness in forgiving." ********** Charles Hugal in his book, "The Court and Camp of Ranjit Singh", writes that, "Ranjit Singh ruled his kingdom according to the Sikh tenets. All the important positions were given to Hindus, Muslims and Sikhs, entirely based on merit. Even his main advisors were three famous Muslim brothers: Fakir Aziz-ud-Din, his foreign minister; Fakir Nur-ud-Din, his home minister; Fakir Imam-ud-Din, his custodian of the arsenals. Forty-six senior Army officers and two top ranking Generals were Muslims. One General was French and score of military officers were Europeans. In police and civil services he has about one hundred Muslim officers alone. Hindus too, used to hold many key positions in Sarkar-e-Khalsa. Ranjit Singh was secular through-and-through. Since he had lost his one eye in childhood, due to small pox, he used to remark jokingly about himself that, "God Willed that as a true Sikh I should look upon all religions with one eye".

Tuesday, November 12, 2019

IBM Essay

IBM is a multinational corporation that deals with communication technology, designing and selling of networking services. The company employees over sixty six thousand employees, its annual revenue as per 2008 was over thirty nine billion US dollars. It has its headquarters in New Orchard Road Armonk, New York. IBM is one of the top ten companies in the world that has been the most successful in acquiring other companies. Some of the best companies it has acquired have made it expand its operations as it integrates new skills and technology. IBM stands for International Business Machines. The company has won a good number of awards as it continues to receive recognition as the best in computer networking services. A part from networking business, the company is also involved in training programs to ensure empowerment of employees in the area of modern technology, Pugh (pp 20-26, 1995). It is also involved in environmental sustainability to maximize energy use. Despite the company being founded many years ago when technology was not at its peak, it has continued to make adjustments that has made its products to stand the taste of time. The company is sensitive to technological innovations and is therefore quick to make the necessary adjustments to its product. Being a networking industry, it believes in working with other companies to enhance sharing of ideas. Its consumer oriented focus has made it to diversify its productions. The company has always responded to the needs of consumers by reaching them despite their geographical locations. The company has several branches in other nations making their products even more accessible. IBM has had visionary leaders who have always strived to produce quality services. The current CEO, Samuel J. Palmisano is credited for his quality leadership that has made him work with reputable organisations. He is a focused leader who clearly understands his role as a CEO of IBM system. The company continues to grow strategically as its employees enjoy a good remuneration. Background of the company Harlow Bundy who was a manufacturer of time records founded IBM which was previously referred to as ITR in 1906. He moved his time recording company from Binghamton to Endicott in 1911. ITR merged with two other companies to form IBM. In the early years of its inception, the company employed three hundred workers bit by 1924 the employees had tripled to over nine hundred. The company had five buildings but by the end of ten years, the buildings had increased to twenty-five. Currently the company has numerous branches with thousands of employees. Currently IBM deals in products such as, IBM 650 RAMAC, the IBM 709 electronic data processing machine, the IBM 1401 data processing system and some of the System/370. The company was listed on the NASDAQ stock exchange. To enhance its operations, IBM liaised with other companies that would merge their products and talents. The biggest deal of the company was with star wind software. The company acquired Bundy manufacturing corp. , computing Scale Company, dey patent company, productivity solutions, green pasture software, trigo technologies and many more Thompson (pp 15-21, 1999). IBM has made several acquisitions, even though some have not been successful; it remains to be a leader in comparison to other companies in similar operations. During the dot com boom of 2000, IBM was the best in the world with a capitalization of over five hundred billion US dollars. By April 2009, the company had a capitalization of one hundred and four US dollars and still being ranked among the top companies. It was voted stock of the decade on NASDAQ. In 1990-2000, its7500 serious router was ranked third as the product of the decade. Apart from routing systems, IBM also deals in branch office routers, Ethernet switching, ATM networking, IP telephony, remote access and security. In 2002-2003, the company has received several awards namely; disaster relief and social responsibility in 2008, accessibility and kid smart in 2007, web adaptation in 2006 and reinvention education in 2005. The vision of the company is ‘we strive to lead in the invention, development and manufacture of the industry’s most advanced information technologies, including computer systems, software, storage systems and microelectronics. The revenue of the company is one hundred and three billion US dollars, net income is twelve billion US dollars, and total assets are one hundred and nine billion US dollars. The company has three hundred and ninety eight thousand, four hundred and fifty five worldwide. The records of stockholders are five hundred and sixty four thousand, two hundred and forty four.

Sunday, November 10, 2019

Cyber education Essay

Examinations are a means of measuring the students’ learning in school and their capacity for further education. In this regard, the manner of teaching and the students’ learning methods are important. A student, while in primary and secondary schools, greatly relies on the teachers for knowledge, except for a few who do personal researches to further their understanding. More often than not, a student accepts what the teachers offer in school. With this set up, a student has to be abreast and attentive with classroom discussion. He should take down notes and submit in a timely manner the projects and assignments given in school. Participation in classroom discussion and school activities must be encouraged. Interest in school must be inculcated in the mind of every student to support the knowledge and understanding obtained from the classroom. This is to enable the student to have a more enjoyable stay in school. The more enjoyable the learning process is, the more retention of knowledge there. Cyber education is not at all detestable. Students’ learning is more enhanced if the mode of teaching is something which interests him. Cyber education is one that interests me and I think, is equally true with others. Where there is not much interaction with the teachers, the concept that it is more enjoyable makes the information stick into our minds. However, the concern of many that this might lead to no interaction at all with teachers, thus prevents the control of teachers on the students disregarding their personal differences and characteristics, should not be disregarded. Their concern is equally important. Thus, it is humbly proposed that learning be not limited to the traditional type of teaching, but must be combined with cyber school on some selected subjects suitable to it. A student must be exposed to both the traditional type of teaching and cyber school. It is of utmost importance that he is able to retain the information and apply what have been learned in school.

Friday, November 8, 2019

Breath, eyes, memory essays

Breath, eyes, memory essays In todays society females evolve into womanhood overtime through a series of events such as; having your first menstrual cycle, first sexual encounter, and going out and doing as you please. In the memoir, Breath, Eyes, Memory, Sophie is unable to go through the process of becoming a woman. Because her mother Martine wasnt willing to accept her growing up and doing things besides focusing on her education and living through her mothers eyes. Sophie becoming a complete woman was put off because her mother and the Haitian society was only concerned about her education and keeping her pure, instead of letting Sophie focus on things she wanted to pursue. This leads to a life of wonder, emptiness, sexual frustration, and a feeling of abandonment. The problem Sophie had is that she isnt able to become a complete woman until her mother Martine is diseased. The definition of freedom to Sophie it to have sexual liberation and to be able to have sex with her husband Joseph and also not having to go to her sexual phobia group anymore. Sophie wants her mother to look into her eyes without seeing the mans face who raped her and placed Sophie inside of her. Sophies mother creates somewhat of a dark cloud over her and doesnt let her grow up into the independent woman that she wants to be. With her mothers death Sophie goes from being a follow to becoming a leader of her own destiny instead of her mothers. Sophies actions bid for freedom and autonomy are set off when she hits herself with a pestle to free herself from her mother checking how pure she is. Martine would check how pure she is to ensure Sophie had not committed any sexual acts before she is married so she remains pure. This is symbolic because it starts the transformation of Sophie in breaking away from her mothers rule and starting to try and become more independent and take a step towards wo ...

Tuesday, November 5, 2019

How to engage your team with better writing - Emphasis

How to engage your team with better writing How to engage your team with better writing If youve ever put off DIY, youll know that a dripping tap or peeling skirting board eventually just becomes one of lifes tolerations. If you put off the task long enough, it gets pushed to the dusty recesses of your mind. But it still chips away at your contentment, leaving you feeling uninspired and slightly uncomfortable in your own home. Our relationship with work is often the same. Unless issues are nipped in the bud, small upsets can lead to apathy. For instance, it can be disconcerting if your firm introduces a debt-collection method that goes against your current client-centred approach. And if this new approach subsequently harms the relationships youve already built with a client, its likely that youll feel conflicted between your roles. You might start to dread dealing with clients you previously enjoyed working with. Your relationships with colleagues can also become strained. If there are no structures in place to fix the issue, it will be hard for you to feel motivated and passionate about your job. After a while, you may begin to accept the new status quo. But youre not as productive because the environment doesnt allow you to perform to your highest ability. These types of work worries are common. The Chartered Institute of Personnel and Development (CIPD) has drawn together academic studies on employee engagement. One study of a cross-section of UK workers from various industries showed that only 35 per cent of people feel they are engaged in their work. Other studies suggest that 22 per cent of workers (6.4 million people) feel discontented and unproductive. Yet the solutions to workplace disgruntlement can be surprisingly simple. Research sponsored by the O.C. Tanner Company found that saying thank you to staff increases engagement by 20-30 per cent. And with such large results from a simple statement, its clear that communication is a powerful weapon in feeling productive and inspired at work. Engagement isnt something that can be demanded from someone, nor can it be part of a job description. Its the willingness to do that little bit extra, simply because you care, or because you feel that it will be appreciated. Its vital that your organisation creates an entrepreneurial-style culture, where employees have the drive and ambition to succeed. So, whether or not youre not part of the senior management team, you need to drive initiatives that enable managers to directly listen to employee views. And by communicating clearly you can help to set clear management objectives. Tools for engagement The first step to engagement is finding ways for you and your colleagues to share your views. Hopefully, your firm will have an internal newsletter or intranet site that welcomes contributions from employees. Reports are also great tools for communicating your thoughts and ideas. This can help you to hone your recommendations so that your internal documents are clear and concise. Taking the write steps The following tips will help you to create a high-impact writing style so that you can express your ideas and recommendations clearly. Engage your reader Before you touch your computer keyboard, spend a few minutes focusing on your reader. Dont assume, for example, that everyone in your organisation will understand detailed aspects of the human resources process. Ask yourself the following questions: What is the document about? Who will read it? How much do they already know about the subject? What do they absolutely need to know? How important is the subject to them? How interested are they in the subject? Focus on your main message Whether youre writing a short newsletter article or a lengthy report, make sure youre crystal clear on what you really want to say. Take a pencil and a piece of paper and create a spidergram of all your ideas. Keep writing until youve exhausted every possibility. Then group together the ideas that have elements in common. Next, decide what you think is most important. This idea needs to come right at the top of your document. Then you present the other points in order of importance, making sure to leave out any unessential points. Apply this same technique when youre writing the executive summary of a report. Managers have competing priorities and many other documents to read. So if your summary isnt compelling they may decide just to skim read the rest of the report. This could mean that the gems in your report are lost. Remember, your task is to create a more engaging working environment. Youve got to connect with your reader first. Create powerful sentences Using verbs instead of nouns makes your sentences more powerful. Consider the sentence, I expect the software to create a 15 per cent increase in productivity. It is much more powerful than, My expectation is that there will be a creation in productivity of 15 per cent when using the software. Using the verbs expect and create over the nouns expectation and creation makes the sentence punchier. And try to limit the length of your sentences to 20 words. This makes them easier to read. (You could shorten this example still further to: I expect the software to increase productivity by 15 per cent.) Use headings, subheadings and bullet points Break up your documents into digestible chunks and keep your paragraphs short. Use subheads and make sure that they highlight your main points. If your reader only reads the subheads they should still be left with the gist of your document. Bullet points are another great tool for making your documents readable. They help to grab attention; reduce word count and help your readers to scan for the important information. Be persuasive Speaking directly to your readers can help them to take action. So dont be afraid to use the words I, you, we and us. Similarly, always opt for the active voice over the passive voice. For example, write, We hold employee forums every Wednesday, instead of Employee forums will be held every Wednesday. The first sentence has more movement and life its also more likely to make someone want to attend a forum. Avoid management speak Aim to make your writing as plain and simple as possible; dont fall into the trap of using management speak. Terms such as raising the bar and low hanging fruit are best left to David Brent from The Office. Your writing will have far more impact if you use simple terms to express your ideas. Create a call to action Know what action you want your reader to take, and then ask them to take it. If appropriate, you could even offer an incentive. (Email us at info@company.com with all your great ideas for improving internal communication. The best ideas will win a 50 MS gift voucher.) This may be a step too far, but at least make sure that theres something in it for the reader. Always keep your readers needs in mind when writing your call to action. Use a fine tooth comb Once youve completed your document, print out a copy and proofread it slowly by stopping a pencil at every word. Look out for typos and spelling mistakes, but also see where you can prune out unnecessary words. For example, terms such as pre-prepare and forward planning contain redundant words. All planning goes forward and preparation is preparation: you cant pre-prepare. Dont be afraid to delete whole sentences if they dont add much to the document, or repeat something that was said earlier. Email made easy Most of us have fired off an email in haste and regretted it at leisure. Hopefully, you didnt do so at work. But if you did, its a lesson that email and emotion dont mix. If youre feeling particularly fired up about a particular workplace issue, by all means type it out on an email. But dont even consider typing in an address or pressing the send button until youve had time to reflect. The rule of thumb is that if you wouldnt want it broadcast on the 10 o clock news, dont send it on an email. The SCRAP formula below will help you to write emails that grab your readers attention for all the right reasons. Situation Begin by explaining the situation (where you or your department are now). Complication Introduce the idea that theres a problem (why you or your department cant stay where you are). Resolution State your resolution to the problem. The reader will perceive you as an expert because you have a ready-made way of fixing things. Action Suggest what action the reader can or should take. Offer a viewpoint that is new and intriguing. Politeness Finally, end with a polite, but thought provoking sign-off. When it comes to email, usually the fewer people you put in the carbon copy box, the better. But distributing important ideas and recommendations isnt spamming. So make sure that important documents are forwarded to the wider organisation. Whether you want to highlight a brand new piece of bookkeeping software or demonstrate an innovative approach to credit control, its important to look beyond your administrative role. So, investigate areas of your work where you can make real improvements. Remember, if a workforce isnt engaged, its likely that the staff turnover will be high. But even if you see colleagues becoming disenchanted and leaving, that doesnt mean you need to join them. The techniques youve learnt such as focusing on your reader and clarifying your main message can also be used in verbal communication and can help you stand your ground. Improving productivity isnt just about working harder. Its also about improving your knowledge so that your work has greater impact. By honing your written communication skills, you make other parts of your job easier. But whatever issues you face at work, dont let them put you off your path. When you take responsibility for driving your own career success and happiness, you set the stage for clear communication. And that ultimately helps you and your colleagues to be more engaged and productive. Robert Ashton is the Chief Executive of Emphasis. Want to write more engagingly? See our courses for individuals or our courses for groups. Alternatively, send us a message or call one of our friendly advisors on +44 (0)1273 961 810

Sunday, November 3, 2019

(research proposal)Exaime the diffculties african carribian lone Essay

(research proposal)Exaime the diffculties african carribian lone parent face in employement in the united kingdom - Essay Example will include, how many employed Afro-Caribbean lone parents in a selected sample have an economically sound job and what is the average distance they have to travel to reach their employment station, how many hours does an Afro-Caribbean lone parent work on an average and how many hours does he/she spend with his/her child/children, what kind of public transport facilities are available for a working Afro-Caribbean lone parent and what kind of support an Afro-Caribbean lone parent receives from his/her family members. One major study on the economic status of lone parents in UK was done by J. Millar and Karen Rowlingson (2001). Millar and Rowlingson (2001, pp.180) have found that the majority of lone-parent families in Britain are White but some ethnic minority groups are over-represented among lone-parent families (such as Afro-carrebian women). Another study (Giddens &Griffiths, 2006, pp.215) has also substantiated this as a fact by noting that â€Å"there are far fewer black women aged between twenty and forty four living with a husband than there are white women in the same age group.† Millar and Rowlingson (2001, pp.183) have observed, â€Å"the link between high rates of lone parenthood and lack of labour demand causes problems for lone parents for seeking paid work.†These researchers (Millar & Rowlingson, 2001, pp.183) have inferred that one reason for the high rate of lone parenthood in certain areas is owing to the deficiency of decent paid jobs for men in the locality, which detracts them from becoming â€Å"husband-father-breadwinners.† Hence they (Millar & Rowlingson, 2001, pp.183) have suggested that â€Å"improving employment opportunities in deprived areas for both men and women could therefore increase the labour market participation of lone parents, while at the same time reduce the number of lone parent families.† It was when New Labour came to power in UK that the policies on lone parents underwent a drastic change. Millar and Rowlingson (2001,

Friday, November 1, 2019

Effects Of Brand Awareness And Website Quality On UK Consumers Essay

Effects Of Brand Awareness And Website Quality On UK Consumers Perceived Risk And Purchase Intention 03095 - Essay Example The effect of brand awareness is found more in the economy of UK since the online retail sales will increase by 14.7% to 38.3 billion pound in the year 2014. The purchase intention of the consumer has increased with the development of websites and which is likely to increase by 82% from 2014 to 2019 (Perreault and MaCarthy, 2003). The use of online shopping among the customers of UK can be observed by the statistics that is conducted which reveals that 95% of the respondents have preferred online shoping.The change in the technology is related to the purchase intention through online and that is influenced by the online trust. The main aim of conducting the study is identifying the importance of the brand awareness in determining the availability and the accessibility of the product and services that the company is offering to its consumers which indicates that the company which has successful brand awareness of its products in the market generally has the high demand and craze for its products among the customers in the market. The research question that is identified by us for discussing on the topic is does brand loyalty, brand awareness and the improvement in the website design influences the purchase intention or purchase decision of the customers and also the perceived risk on building and its affect and relationship with the online purchase intention. Authors like Etzel, Walker, and Stanton, (2004) stated that the increase in the brand awareness will result in the increase in the frequency of buying and if the customer is satisfied from the particular product then the consumer will pass on the information about the particular product to others which will increase the popularity of the brand and as a result will enhance the brand loyalty of the consumers which is considered or regarded as an important factor or element in increasing the sale of the product and

Wednesday, October 30, 2019

Strategic management Link between strategic planning and performance Essay

Strategic management Link between strategic planning and performance - Essay Example Here strategic planning is used as a term to illustrate an organisational decision-making process, which can be generally defined as the process of realising the mission, primary goals, tactics, and approaches that govern the attainment and allocation of resources to accomplish organisational objectives (Pearce et al., 1987, p. 658). The major intention of this essay is to contribute new pragmatic evidence on the connection between strategic planning and performance, and to reflect on the effect of a set of related variables on this association. Mintzberg and Lampel, (1999, pp. 21-30) indicate that the term formal strategic planning is an intention to express that an organisation's strategic planning overall process entails apparent systematic procedures used to increase the participation and commitment of those chief stakeholders influenced by the plan. Study on the association between strategic planning and firm's performance has proved indecisive. From the early researches it is revealed that strategic planning improved performance (Herold, 1972, p. 94). However, later studies revealed that there was no patent systematic relationship between them (Shrader et al., 1984, pp. 149-171). Bresser and Bishop (1983) argued that if strategic planning bring in firmness and supports excessive bureaucracy then it might be called as dysfunctional. Despite the sustained significance of performance aim... 101-109) has mentioned that concentration has not been given to strategic planning and performance in experiential study. According to Greenley (1994), primarily, it should enhance the organisation's performance. The basic conjecture of strategic management emphasises on the planning of a task, aims and targets, of which organisation performance is a component, the practice of strategies to achieve these aims and targets, and control to guarantee that the targets are accomplished. Second, the intention of strategic planning is to increase the value of management all over an organisation. As a result this could bring about indirect perfection in performance, although its effectiveness may, certainly, be lost in the intricacy of variables with the likelihood to influence performance. However, managers may understand that it adds to effectiveness, giving them a sentiment of confidence and control. Strategic planning may therefore be useful as a process of management, in spite of the performance attained. In fact, the entire concentration of strategic management evolves around the accomplishment of objectiv es, which correspond to ambitions for future performance. Boyd (1991, p. 355) defines that strategic planning is a mean to run environmental turmoil, which has been adopted by numerous organisations. In addition, formal strategic planning is an unending managerial process, with a number of elements, embracing establishment of objectives and creation and assessment of strategies. A useful strategic planning system creates a link between long-range strategic objectives with both mid-range and functional plans. Planners gather data, estimate, and frame out and build alternative future scenarios. Ostensibly, such activities permit organisations to

Sunday, October 27, 2019

Vehicle ad-hoc Network (VANETS) Technology

Vehicle ad-hoc Network (VANETS) Technology Chapter 1 Introduction Now a day, everything is moving away from wired technology and leading towards wireless. The fascination of mobility, accessibility and flexibility makes wireless technologies the dominant method of transferring all sorts of information. Satellite televisions, cellular phones and wireless Internet are well-known applications of wireless technologies. This work presents a promising wireless application and introduces a tiny contribution to its research community. Research in wireless communication field is growing faster, day by day, then any other field. It serves a very broad range or series of different kind of applications using different topologies. Every one of these comes with some new and specialized protocols. In this research, we will present an introduction to a wireless technology. This wireless technology directly affects car accidents and the sales of one of the largest markets. It is the technology of building a strong network between mobile vehicles; i.e. let vehicles communicate to each other. This promising technology is literally called Vehicular Ad-Hoc Networks (VANETs). 1.1 Background Since the first invention of mobile vehicles, governments and manufacturers have researched accidents to reduce the number of vehicle crashes in order to reduce costs, injuries and fatalities. First of all, VANET technology is going to reduce crashes by doing research in this field. Accordingly, related governmental authorities initiated new projects to the learning institute for study, research, development in the field of wireless technology and VANETs also paying attention in its standards. The ‘Dedicated Short Range Communications (DSRC) [1] is a pioneer ITS (Intelligent Transportation Systems which is a branch of the U.S. Department of Transportation [2]) project dedicated to VANET standardization. Then, the acronym or short form ‘DSRC becomes a global or familiar name of kind of standards that aim to put VANET technology into life. The DSRC mainly concerns with the communication that is how to make different communication links between vehicle-to-vehicle and vehicle -to/from-roadside units. 1.2 Motivation In the last few years, vehicular network has gained great attention in industry. Federal communication commission (FCC) has assigned 5.850-5.925GHZ frequency band to promote safe and efficient road trips, which is planned for vehicle-to-vehicle and vehicle-to-infrastructure communication. Car manufacturers, e.g., Audi, BMW and DaimlerChrysler, also formed a Car2Car communication consortium [3], in which the prototype development for inter-vehicle communications is underway. In near past, IEEE 802.11-based solutions for VANETs are also studied by IEEE 802.11p. IEEE 802.11p Wireless Access in the Vehicular Environment (WAVE) that defines changes to IEEE 802.11 to help Intelligent Transportation Systems (ITS) applications. IEEE 802.11p helps data exchanges between fast moving vehicles with each other and also exchanges data from vehicles to road side unit or from road side unit to vehicles in the licensed ITS band of 5.9 GHz. The Dedicated Short-Range Communications (DSRC) at 5.9 GHz is here today to provide safety that is increasing safety in case of road accidents, reducing highway or road maintenance cost and also improving mobility. Intersection and road departure collisions report for round about 50 percent of all crashes and victims on our roads. On an average day in the United States, vehicular collisions kill 116 and injure 7900[8]. More health care dollars are consumed in the United States treating crash victims than any other cause of illness or injury [8], [10]; the situation in the European Union is similar, with over 100 deaths and 4600 injuries daily, and the annual cost of â‚ ¬160 billion [11]. By getting rid from road victims and crashes, DSRC can provide or play important role in reducing road accidents, deaths, injuries, heavy traffic and increasing road safety by improving communication between vehicles and between vehicles and road side infrastructure. DSRC emerged from a partnership among automobile manufacturers, state and federal transportation officials, toll transponder equipment suppliers and the Federal Communications Commission. There is a recognized need for on-the-go communication with motor vehicles and reliable communication between vehicles to increase highway safety by providing warnings and alerts that enable drivers to take corrective and/or evasive actions. At the same time, it can be able to provide information i.e. real time information to drivers so that to improve mobility and motorist conv enience, such as information on congestion or traffic incidents. The car manufacturing industrys determination to roll out vehicle-to-vehicle communication in the near future and, on the other hand, to the increasing disillusionment concerning the need for the vast number of protocols developed for general Mobile Ad-Hoc Networks (MANETs) in the past few years while on the other side that is for VANETs, industry pressure has created a situation in which an overwhelming interest in solutions to problems leads to a preference for real-world research as opposed to fancy theory. As the concept came from MANETs which totally depend on the subscribers motion as the motion is random it is difficult to cater it but this problem was very negligible when researchers observed it in VANETS. At highways vehicle move in an organized pattern with different speeds so initially it seemed that VANET will easily be implemented. Another major reason for VANET can be Traffic deaths and injuries which is a major health and social issue. While industrialized nations (e.g., the United States) have continuously reduced annual traffic deaths since 1970, annual traffic-related fatalities and injuries remain high (in the United States alone there were over 41,000 deaths and 5 million injuries in 2000, according to the NHTSA) [7]. The economic impact of vehicle crashes in the United States exceeded US$230 billion or 2.3 percent of the U.S. GDP in 2000 [7]. We want to remain connected with the world through net whether at home, airport, at work or even on the roads. Example Description Obstacle warning Stopped/Skidding/Slowing down vehicle warning, road obstacle/object-on-road warning Lane Merge/Lane Change Assistance Merging/Lane changing vehicles communicates with vehicles in lane to safely and smoothly merge. Adaptive Cruise/Cooperative Driving Automatically stop and go smoothly, when vehicles are in heavy roadway traffic; cooperates driving by exchanging cruising data among vehicles. Intersection/Hidden Driveway Collision Warning vehicles communicates to avoid collisions at intersections without traffic lights or hidden driveway. Roadway Condition Awareness Vehicles communicates to extend vision beyond line of sight (e.g. beyond a big turn or over a hill) Table-1.1: Example of Vehicle Safety Communication [10] 1.3 Scope of Project Some of the industries and universities working on VANETs are as follow DaimlerChrysler AG Fraunhofer FOKUS NEC Europe Ltd. Robert Bosch GmbH Siemens AG TEMIC Telefunken Microelectronic GmbH Universities of Mannheim, Hamburg-Harburg, Karlsruhe, and Hannover. 1.4 Organization of Project Thisthesisis mainly divided into four chapters. In the first two chapters (1-2) introduction and an overview over the topic and used technologies is given. In the following chapter (3), we have discussed the standards of IEEE and also discussed the MAC Layer and PHY Layer of IEEE 802.11 in detail. In chapter 4, simulation analysis of our work is shown along with the results. In the last chapter, we have summarized this whole thesis, what we have concluded from this project and future work needs to be done are discussed. Finally, in appendix some additional information can be found. In chapter two, VANETs characteristics, some of its applications and the research challenges faced by governments and car manufactures are discussed, continued by MAC Layer and PHY in chapter three. We have also discussed the WAVE architecture in chapter 2. From chapter three on, we have a look at some protocol improvements and extensions. Some thoughts, tests and their results on VANETs, those are related to our work, can be found in chapter 4. Chapter 2 VANETs VANETs (Vehicle ad-hoc Networks) is a form of Mobile Ad-hoc Networks (MANETs), which provide a communication between the vehicles and also fixed equipments, usually defined as road side equipments. 2.1 What is VANET Vehicle ad hoc network comprises of three words. i. Vehicle ii. Ad-hoc iii. Networks i. Vehicle â€Å"A machine such as a bus or car for transporting people or goods†. [4] A lot of progress is happening in the field of vehicles since the invention of wheel. Development is due to provide services to the people and make their task easier. ii. Ad-hoc It refers to dealing with special situations as they occur rather than functions that are repeated on a regular basis. For example you just meet someone outside your office and you exchange some words. On the other hand infrastructure system is a system which is fully installed and deployed than it works according to some predefined rules and regulations. iii. Network â€Å"A system, as in a business or university, consisting of a computer or computers and connected terminals, printers etc. specific, a local area network†.[3] The concept of networking is introduced because resources are limited and we have to utilize them efficiently. As it is not possible for firms to provide printer, faxes and other machines to everyone so they just inter linked all the devices so that each one can utilize it keeping the cost at minimum. Vehicular connectivity can be fairly considered a future killer application, adding extra value to the car industry and operators services. Taking into account the constant growth of automotive market and the increasing demand for the car safety, also driven by regulatory (governmental) domain, the potential of car-to-car connectivity is immense. Such system should be suitable for a wide spectrum of applications, including safety related, traffic and fleet control and entertainment. First, issues concerning architecture, security, routing, performance or QoS need to be investigated. Standardization of interfaces and protocols should be carefully planned to ensure interoperability, as vehicles coming from different vendors must communicate seamlessly. Having different competing systems would result in decreased market penetration and poor overall system efficiency, thus only one common system can be deployed. And finally, wise deployment strategy has to be proposed, as most applicatio n would become functional only after certain market penetration is reached. The first milestone of standardization process was the allocation of 75 MHz of DSRC (Dedicated Short Range Communications) spectrum to accommodate Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) communication for safety-related applications by US Federal Communications Commission (1999). Commercial applications are also allowed to operate in this spectrum. 2.2 VANETs Applications According to the DSRC, there are over one hundred recommended applications of VANETs. These applications are of two categories, safety and non-safety related application. Moreover, they can be categorized into OBU-to-OBU or OBU-to-RSU applications. Some of these applications are as followed: 2.2.1 Co-operative Collision Warning Co-operative collision warning is an OBU-to-OBU safety application, that is, in case of any abrupt change in speed or driving direction, the vehicle is considered abnormal and broadcasts a warning message to warn all of the following vehicles of the probable danger. This application requires an efficient broadcasting algorithm with a very small latency. 2.2.2 Lane Change Warning Lane-change warning is an OBU-to-OBU safety application, that is, a vehicle driver can warn other vehicles of his intention to change the traveling lane and to book an empty room in the approaching lane. Again, this application depends on broadcasting. 2.2.3 Intersection Collision Warning Intersection collision warning is an OBU-to-RSU safety application. At intersections, a centralized node warns approaching vehicles of possible accidents and assists them determining the suitable approaching speed. This application uses only broadcast messages. In June 2007, General Motors ‘GM addressed the previously mentioned applications and announced for the first wireless automated collision avoidance system using vehicle-to-vehicle communication (Figure-2.1), as quoted from GM, If the driver doesnt respond to the alerts, the vehicle can bring itself to a safe stop by avoiding a collision. 2.2.4 Approaching Emergency vehicle Approaching emergency vehicle is an OBU-to-OBU public-safety application, that is, high-speed emergency vehicles (ambulance or police car) can warn other vehicles to clear their lane. Again, this application depends on broadcasting. 2.2.5 Rollover Warning Rollover warning is an OBU-to-RSU safety application. A RSU localized at critical curves can broadcast information about curve angle and road condition, so that, approaching vehicles can determine the maximum possible approaching speed before rollover. 2.2.6 Work Zone Warning Work zone warning is an OBU-to-RSU safety application. A RSU is mounted in work zones to warn incoming vehicles of the probable danger and warn them to decrease the speed and change the driving lane. 2.2.7 Near Term [5] Traffic Signal Violation Warning Curve Speed Warning Emergency Electronic Brake Lights 2.2.8 Mid Term [5] Pre-Crash Warning Cooperative Forward Collision Warning Left Turn Assistant Lane Change Warning Stop Sign Movement Assistance Application Comm. type Freq Latency Data Transmitted Range Traffic Signal Violation 12V One-way, P2M 10 Hz 100msec Signal Status, Timing, Surface Heading, Light Position, Weather 250m Curve Speed Warning 12V One-way, P2M 1 Hz 1000msec Curve Location, Curvature, Speed Limit, Bank, Surface 200m Emergency Brake Light Vehicle to Vehicle Two-way, P2M 10 Hz 100msec Position, Deceleration Heading, Velocity 200m Pre-Crash Sensing Vehicle to Vehicle Two-way, P2P 50 Hz 20msec Vehicle type, Yaw Rate, Position Heading, Acceleration, 50m Collision Warning Vehicle to Vehicle One-way, P2M 10 Hz 100msec Vehicle type, Position, Heading Velocity, Acceleration, Yaw Rate 150m Left Turn Assist 12V and V21 One-way, P2M 10 Hz 100msec Signal Status, Timing, Position, Direction, Road Geom., Vehicle Heading 300m Lane Change Warning Vehicle to Vehicle One-way, P2M 10 Hz 100msec Position, Heading, Velocity, Acceleration, Turn Signal Status 150m Stop Sign Assist 12V and V21 One-way 10 Hz 100msec Position, Velocity, Heading, Warning 300m Table-2.1: Eight high-priority vehicular safety applications as chosen by NHTSA and VSCC. Note that communication freq. ranges from 1-50 Hz and Max. Communication range spam 50-300 meters. P2M represents â€Å"Point-to-Multipoint†, 12V represents â€Å"infrastructure to vehicle† and V21 represents â€Å"Vehicle-to-Infrastructure†. [5] 2.2.9 Comfort related applications Traffic efficiency Better navigation Internet access The whole theme of these applications is improving passengers comfort and traffic efficiency. That includes nearest POI (Points of Interest) localization, current traffic or weather information and interactive communication. All kinds of applications might be applied here. Another application is reception of data from commercial vehicles and roadside infrastructure about their businesses (wireless advertising). Enterprises (shopping malls, fast foods, gas stations, hotels) can set up stationary gateways to transmit marketing data to potential customers passing by. The important feature of comfort/commercial applications is that they should not interfere with safety applications. In this context traffic prioritizing and use of separate physical channels is a viable solution. 2.2.10 Safety related applications Accidence avoiding Danger warnings Intersection coordination Cooperative driving Safety-related applications may be grouped in three main classes: assistance (navigation, cooperative collision avoidance, and lane-changing), information (speed limit or work zone info) and warning (post crash, obstacle or road condition warnings). They usually demand direct communication due to their delay-critical nature. One such application would be emergency notifications, e.g. emergency braking alarms. In case of an accident or sudden hard breaking, a warning is sent to the subsequent cars. That information could also be propagated by cars driving in the opposite direction and, thereby, conveyed to the vehicles that might run into the accident. Another, more advanced example is cooperative driver assistance system, which exploits the exchange of sensor data or other status information among cars. The basic idea is to broaden the range of perception of the driver beyond his field of vision and further on to assist the driver with assistance applications. Transmitting this data to cars following on the same road, drivers get information about hazards, obstacles or traffic flow ahead; hence driving is more efficient and safer. Some applications of this kind are operating only when certain penetration of VANET enabled cars is reached. [6] 2.3 VANETs Characteristics Although VANETs, Wireless Sensor Networks and Wireless Mesh Networks are special cases of the general MANETs, VANETs possess some noticeable characteristics that make its nature a unique one. These properties present considerable challenges and require a set of new especially designed protocols. Due to the high mobility of vehicles, that can be up to one hundred fifty kilometers per hour, the topology of several VANET changes frequently and unexpectedly. Hence, the time that a communication link exists between two vehicles is very short especially when the vehicles are traveling in opposite directions. A one solution to increase the lifetime of links is to increase the transmission power, but increasing a vehicles transmission range will increase the collision probability and mortify the overall throughput of the system. The other solution having a set of new protocols is employing a very low latency. Another effect of these high speed nodes is that the usefulness of the broadcasted messages is very critical to latency. For example, if we assume that a vehicle is unexpectedly stopping or suddenly stops, it should broadcast a message to warn other vehicles of the probable danger. Considering that the driver needs at least 0.70 to 0.75 sec to initiate his response [7], the warning message should be delivered at virtually zero sec latency. In VANETs, location of nodes changes very quickly and unpredictably, so that, building an efficient routing table or a list of neighbor nodes will tire out the wireless channel and reduce the network efficiency. Protocols that rely on prior information about location of nodes are likely to have a poor performance. However, the topologies of a VANET can be a benefit because vehicles are not expected to leave the covered road; therefore, the running direction of vehicles is predictable to some extent. Although, the design challenge of protocols in wireless sensor networks is to minimize the power consumption, this is not a problem in VANETs. Nodes in VANETs depend on a good power supply (e.g. vehicle battery and the dynamo) and the required transmission power is small compared with power consumption of on-board facilities (e.g. air-condition). It is predicted that, as VANET is deployed in the beginning, only a small percentage of vehicles will be outfitted with transceivers. Thus, the benefits of the new technology, especially OBU-to-OBU applications, will not go up until many years. Furthermore, the limited number of vehicles with transceivers will lead to a numerous fragmentation of the network. Even when VANET is fully deployed, fragmentation may still exist in rural areas, thereupon, any VANET protocol should expect a fragmented network. Privacy, safety and security are of fundamental effect on the public receiving of this technology. In VANETs, every node represents a specific person and its location tells about his location. Any requirement of privacy can ease a third party monitoring persons daily activities. However, from the other point of view, higher authorities should gain access to identity information to ensure punishment of illegal actions, where, there is a fear of a possible misuse of this feature. The tampering with messages could increase false alarms and accidents in some situations defeating the whole purpose of this technology. Finally, the key difference between VANET protocols and any other form of Ad-Hoc networks is the design requirement. In VANETs, the key design requirement is to minimize latency with no prior topology information. However, the key design requirement of Wireless Sensor Network is to maintain network connectivity with the minimum power consumption and the key proposed design requirement of Wireless Mesh Network is reliability. WE can summarize the main characteristics of VANETs as follows; High mobility of nodes No prior information about the exact location of neighbor nodes Predictable topology (to some extent) Significant latency requirement especially in cases of safety related applications No problem with power Slow migration rate High possibility to be fragmented Crucial effect of security and privacy 2.4 Research Challenges in VANETs When deploying of a vehicular networking system, a number of issues have to be determined, often from distant fields of expertise, ranging from applications improvement up to efficient issues. VANET could be considered as an instantiation of MANETs (Mobile Ad hoc Networks); however their behavior is fundamentally different. These unique characteristics of these networks are as follows: Rapid topology changes and fragmentation, resulting in small effective network diameter Virtually no power constrains Variable, highly dynamic scale and network density Driver might adjust his behavior reacting to the data received from the network, inflicting a topology change Here we briefly mention some of the core research challenges that need to be discussed. 2.5 Wireless Access technology There are several wireless access standards that could be used as a foundation for VANET technology. In general the major seek is to provide a set of air interface protocols and parameters for high-speed vehicular communication by mean of one or more different media. 2.5.1 Cellular technology (2/2.5/3G) The key role of 2/2.5G i.e. cellular technology are coverage and security, and 3G, slowly but steadily coming over 2/2,5G, provides enhanced and better capacity and bandwidth. Several telematic and fleet management projects already uses cellular technology (e.g. SMS reports), on the other hand it is comparatively more expensive, together with limited bandwidth and latency make it impossible to use as a main communication means. 2.5.2 IEEE 802.11p based technology IEEE is working on a variation of 802.11 standards that would be applied to support communication between vehicles and the roadside, or, alternatively, among vehicles themselves, operating at speeds up to 200 km/h, handling communication ranges as high as 1,000 meters. PHY and MAC layers are based on IEEE 802.11a, shifted to the 5.9 GHz band (5.850-5.925 GHz within US). The technology is promoted by the car industry both in Europe and US. Estimated deployment cost is foreseen to be relatively low due to large production volumes. C. Combined wireless access one of the most significant and important efforts in combining those wireless access technologies is done by ISO TC 204 WG16. It builds on the top of IEEE 802.11p, using additional set of interface protocols. Currently supported standards include: Cellular Systems: GSM/GPRS (2/2.5G) and UMTS (3G), Infrared Communication and wireless systems in 60 GHz band. Using all those interfaces in a single, uniform system would result in incre ased flexibility and redundancy, thus improving applications performance. Apart from interoperability issues, CALM is also engaged in the standardization of the protocols, network layer and the management services. 2.6 WAVE Architecture WAVE system architecture is totally a set of WAVE standards that describes the communication stack of vehicular nodes and the physical air link between them. Any RSU may have two interfaces, one for the WAVE stack or architecture or wireless networks and the other for external interfaces like wired line Ethernet that may be used to get access to internet and for connection to internet it is mainly used. Similarly, each OBU may have two interfaces, one for the wireless WAVE stack and the other for sensor-connections and human interaction. OBU is not full-duplex so, therefore, it cannot transmit messages simultaneously, so DSRC is half-duplex. The RSU and OBU can send messages only when the channel becomes idle and also confirmed that it is idle. If the channel is busy, RSU and OBU need to wait and if the channel is idle then RSU or OBU will send the signal Request to Send (RTS) to control channel. The control channel will allocate the channel on the basis of high priority first followed by low priority. The high priority messages are those messages related to public safety. The WAVE architecture is defined by the IEEE 1609 family of standards and uses the IEEE 802.11p amendment to extend the use of 802.11 to vehicles. The IEEE 1609 family is composed of four standards describing the resource manager, security services, networking services and multi- channel operations. WAVE standard consists of five complementary parts 802.11p â€Å"Wireless Access in Vehicular Environments (WAVE)† [8] which is an amendment to the well known IEEE 802.11 Wireless LAN Standard and covers the physical layer of the system. 1609.1 â€Å"Resource Manager† [8] that covers optional recommendations for the application layer. [13], [14] 1609.2 â€Å"Security Services for Applications and Management Messages† [8] that covers security, secure message formatting, processing and exchange. [13], [14] 1609.3 Networking Services† [8] that covers the WAVE communication stack. [13], [14] 1609.4 â€Å"Multi-Channel Operation† [8] that covers the arrangement of multiple channels and how they should be used. [13], [14] The most evident part is its dual stack. Whereas there is a well-known stack, called TCP/IP stacks and on the other hand there is a stack, called WAVE Short Message stack. The function of the WAVE Short Message stack is to provide a connectionless transport protocol i.e. without checking the connection that whether connection is made or not, similar to UDP but on a single-hop basis. The safety applications are supposed to use this stack only while non-safety applications can use both. It should be noted that the devise or design of this approach is focused on non-safety applications and considers safety as a black box. 2.6.1 IEEE 1609.1 Resource Manager The IEEE 1609.1 standard defines the architecture and data flows of WAVE. It also describes command messages and data formats. [9], [8]. The standard explains how data communication between road side units and vehicle on board units occurs. The discussion of this standards operation will be based on the standard defines applications residing on the on board unit as Resource Command Processors and those residing in road side units or elsewhere as Resource Manager Applications. The Resource Manager is the focus of this standard and is also the application that is responsible for managing communication between multiple Resource Manager Applications and Resource Command Processors. [9], [8] WAVE communication imitates a client-server architecture that is managed by the Resource Manager. For example, in the case where a company wants to provide traffic updates by analyzing vehicle speed statistics in a stretch of highway, the application that analyzes the traffic data (a Resource Manager Application) would reside on the road side unit or a remote server that is connected to a road side unit. When the Resource Manager Application sends a request for the speed of the vehicle the Resource Manager application in the road side unit receives the request then forwards it to the vehicles Resource Command Processor application using WAVE. The vehicle then replies to the Resource Manager which forwards the message to the Resource Manager Application. If another passing vehicle asks for traffic updates by sending a request to the road side unit, the roles of client and server from the previous case are switched. WAVE is designed to provide secure communications and minimize the cost of on board units by minimizing the amount of processing required by them. All only desired information relevant to road safety will be transferred. 2.6.2 IEEE 1609.2 Security Services The IEEE 1609.2 standard defines secure message formats and processing and infers circumstances for using secure message exchange. [13], [8]. It deals with security services for applications and management messages. Security is important in WAVE because vehicles transmit sensitive information that could constitute a violation of privacy if accessed by unauthorized parties. The efficacy and reliability of a system where information is gathered and shared among autonomous entities raises concerns about the authenticity of the received data. For example, a bad actor could misrepresent its observations in order to gain advantage (e.g. a vehicle V falsely reports that its desired road R is stopped with traffic, thereby encouraging others to avoid R and providing a less-congested trip for V on R). More malicious actors could impersonate other vehicles or road-side infrastructure in order to trigger safety hazards. Vehicles could reduce this threat by creating networks of trust, and ignorin g, or at least distrusting, information from un-trusted senders. [13], [8] A trusted communication generally requires two properties are met: The sender is conclusively identified as a trusted source. While in transit, the contents of the senders message are not tampered. WAVE maintains security by ensuring confidentiality and authenticity in message transmissions. The final standard is expected to address privacy issues with the current version. WAVE ensures confidentiality