Monday, December 23, 2019

The Culture Of Domestic Violence - 1885 Words

Executive Summary (242) On July 29th, 2006, Rafael Dangond and Lissette Ochoa were invited to a wedding party in an exclusive Country Club in the city of Barranquilla, Columbia. Dangond soon became outraged and aggressive after seeing Ochoa was dancing with a young male, who is one of her friends traveled from Venezuela to attend the wedding party. He fiercely attacked Ochoa once she exited the event and the violence constantly continued for over two hours. This extreme brutal act is a product of Dangond’s desires to control and dominate his wife because of his low self-esteem and extreme jealousy. As a result of Dangond’s abusive act, Ochoa suffered multiple physical traumas mainly on her head. Although Dangond’s performance seem to be a case of direct violence stemming from jealousy and frustration, it is also important to recognize the cultural and structural aspects involved in the conflict. The culture of domestic violence in Columbia, which are usually considered as being part of normal married life in the society and the vertically hierarchical relationships between husband and wife in a family must also be examined in order to fully determine the complexity of the conflict. Because of the vertical social structures, Dangond’s action is likely to continue between he and his wife. However, in order to decrease the prospect of future violence, laws regarding violence against women must be enforced and the abolition of the vertical familial patriarchal social system inShow MoreRelatedDomestic Violence : A Part Of Culture1498 Words   |  6 PagesTo this day, domestic violence is seen to be a part of culture in many countries. Some people view domestic violence as unjust and cruel, yet many see it as a form of power and control over another. Domestic violence plays a key role in different societies around the world as it is becoming a social norm. Domestic violence frequently begins when one partner feels the need to control the other. This feeling is sprouted from several factors such as jealousy, low self-esteem, and difficulties in regulatingRead MoreCulture affects Domestic Violence Essay857 Words   |  4 PagesDomestic violence is the act of violence or abuse against a person living in one’s household, especially a member of one’s immediate family (Dictionary.com). I believe that domestic violence is affected by culture. In many communities, domestic violence is not a big topic, but to many women in different cultures; it is an event many women deal with everyday. Domestic violence is more common in other cultures and culture can affect women’s rights. Throughout many cultures around the world, domesticRead MoreWomen During The Hispanic Culture Essay995 Words   |  4 PagesWomen in the Hispanic culture grow up with strong ties to their values, norms and how they were raised by their families. Par ents instill a â€Å"machismo† and familism ideology into the upbringing of these women (Fuchsel, 2012). â€Å"Machismo† is a term to describe what is acceptable and expected of men (Fuschel,2012). Familism is, â€Å"the subordination of the personal interests and prerogatives of an individual to the values and demands of the family† (dictionary.com). An example of â€Å"machismo† is that it isRead MoreEssay On Domestic Violence871 Words   |  4 PagesDomestic Violence Essay Domestic violence refers to violence, abuse and intimidation between people who are or have been in an intimate relationship. The perpetrator uses violence to control and dominate the other person. This causes fear, physical harm and/or psychological harm. Domestic violence is a violation of human rights, (the White Ribbon Australia). The domestic violence abuse includes sexual, verbal, physical, emotional, financial and psychological abuse. This essay will focus on the sociologicalRead MoreDifferent Types Of Domestic Violence1595 Words   |  7 Pagesidentify different types of domestic violence that exist within the American society as well as within other cultures. Domestic violence is defined as abuse that is caused by aggressive behaviors, generally towards a spouse or partner in an intimate relationship. There are different forms of domestic violence that occur to people on a daily basis, and this violence exist mostly amongst women, but does not exclude the fact that there ar e men that fall victim to domestic violence as well. Throughout thisRead MoreConsequences of Popular Culture1060 Words   |  5 PagesConsequences of Popular Culture A Consequence can be defined as, Something that logically or naturally follows from an action or condition. In this matter we are referring to the consequences of Pop Culture towards violence. Violence in general has one meaning, an act of aggression. We will be examining three types of violence in our culture, Domestic violence, Youth violence, and of course Gun violence. We feel that all three of these types of violence have increased in today s society asRead MoreDomestic Violence : South Africa1709 Words   |  7 PagesDomestic Violence in South Africa Love is looked upon as a beautiful thing but within beauty lies darkness in South Africa. There is an unspoken violence against women going on within the communities of south Africa that is now coming to light; domestic violence. Husbands, not strangers or men with guns, are now the biggest threat to women in post-conflict South Africa, according to a report by the International Rescue Committee. Attacked beaten, abused, killed these are sometimes words to describeRead MoreFice Of Domestic Violence Against Women1213 Words   |  5 PagesThe office of domestic violence against women defines domestic violence as a pattern of abusive behavior in any relationship that is used by one partner to gain or maintain power and control over another intimate partner. Domestic violence does not just affect the immediate victim but is a widespread problem in the United States. Eighty five percent of domestic violence victims are women (Domestic Violence Facts, 2007). Results of violence can be he alth care professionals in the treatment of physicalRead MoreThe Effects Of Domestic Violence On The United States1634 Words   |  7 Pageshuman culture provides us with a look into other cultures from an up-close and distinct perspective, which allows us to better understand their culture and way of life. Taking an objective look at another culture without being somewhat biased can be a difficult task. This being the case, we must examine culture by using emic and etic perspectives. An emic perspective is an insider views; observing the culture from within the culture itself. An etic perspective is an outsider’s view of a culture; evaluatingRead MoreDomestic Violence And Its Effects On Victims And Varies1700 Words   |  7 PagesDefinition, strengths and limitations, and occurrence Domestic violence as a form of trauma can have an impact on victims and varies in the form in which it occurs. Domestic violence can occur directly to an individual or family or indirectly as exposure to domestic violence. The Department of Justice defines domestic violence as â€Å"a pattern of abusive behavior in a relationship that is used by one partner to gain or maintain power and control over another intimate partner†. According to Cross

Sunday, December 15, 2019

The process of preparing and delivering our team’s presentation Free Essays

string(81) " This section addresses the approaches that were used to motivate group members\." Abstract In any organizational or institutional setting, teamwork is usually instrumental in meeting departmental or organizational objectives. Even with the benefits that are associated with groups or teamwork, there are several challenges that may hinder attainment of the set objectives. This paper presents the process that was involved in the preparation and delivery of our group presentation. We will write a custom essay sample on The process of preparing and delivering our team’s presentation or any similar topic only for you Order Now It discusses the stages of development that the group went through, highlighting the exercises that were undertaken at each stage. With reference to group motivation theory, it addresses the approaches that were used during the group exercise to motivate members to contribute towards the exercise. It has also presented the competencies that group members developed in the course of the group exercise. Introduction This paper provides an overview of the processes involved in the preparation and delivery of our team presentation. It relates the group work process to theories and literature on organizational behavioural theory that can be used to explain dynamics in group and teamwork. The main concepts to be covered in this paper include group and team development, motivation and learning at work. Group development is defined as the stages that groups undergo, from creation of the group to accomplishment of the assigned task (Bonebright, 2010). Motivation, which is a vital determinant of productivity, refers to the approaches used to trigger a desire in an individual to be more dedicated to the accomplishment of their tasks (Sachau, 2007). Learning at work, or team learning, is the attainment of skills by individuals in the course of the group task (Zellmer-Bruhn Gibson, 2006). Group and Team Development This are the stages through which undergo from assembling team members to attainment of the set objective. There are different models that can be used to describe the process or group development. One of the widely used models is Bruce Tuckman’s four-stage model formulated in 1965, which divides the development process into four stages. These are forming, storming, norming and performing (Egolf Chester, 2013). Whereas some teams undergo all these stages in group development, some end at the norming stage, which was also the case with our team. This section relates the development of our group with reference to Tuckman’s four-stage model. According to Bonebright (2010), the forming stage involves creating an understanding of one’s team members. It is also characterized by the desire of individual team members to be accepted as part of the larger group (Hill Parsons, 2014). In our team, this stage of group development involved activities that could enable us to work together and be more productive. Team members spent time interacting and knowing about each other so as to eliminate the tension that could prevent them from effectively working together. This stage also involved the appointment of the group leader, setting of ground rules and agreeing upon the meeting schedules. Conflicts were minimal at this stage, which can be attributed to the fact that challenges associated with teamwork had not yet arisen. The second stage in group development is storming. This is the stage where different ideas or opinions are presented by group members for consideration (Garfield Dennis, 2012). It is highly likely for group members to present conflicting opinions, which also triggers rivalry and tension within the group. Whereas conflicts might be considered as being adverse towards attainment of the team’s objectives, constructive conflicts provide a chance for group members to select the appropriate options to pursue in addressing the task at hand (Fleishman et al., 2008; De Wit et al., 2012). This is the most critical stage in group development, and issues have to be resolved before moving to the next stage (Egolf Chester, 2013). Referring to the process of delivering our team’s presentation, some of the conflicts that arose included the theories to incorporate in the presentation or the sources to be used. For instance, I questioned why the group leader insisted on using books as our main sources, yet peer reviewed journals that were readily available in the college library database could also be used to compliment books. Other group members also questioned why they could not use any source they come across on the internet. However, these conflicts were minor and short lived. The third stage is of group developing is referred to as norming (Egolf Chester, 2013). After the conflicts have been resolved in the storming stage, the effectiveness of the team begins to increase, trust among team members grows and the individual differences are appreciated (Garfield Dennis, 2012). This was the final stage of development for our group. For the functionality of the team, some group members stopped persisting with their ideas for the sake of avoiding conflict. There was also an increased cohesion among members, and as opposed to conflicting opinions that characterized the storming stage, team members showed support for each other, and provided constructive feedback for each others’ contribution to the team. The fourth stage of group development is referred to as productivity. According to Egolf and Chester (2013), not all groups progress to this stage. Our group did not get to this stage based on the fact that the task that was to be accomplished was short- term. In summary, the developments that took place in our group, as well as the issues that characterized them, closely relate to Tuckman’s four stage model (forming, storming norming and performance). The fact that the group exercise was short-term meant that the group development did not progress to the performance stage, but the objective of the team was met. Group Motivation Motivation in teamwork incorporates all the efforts that are made by team members to increase the cohesion and levels of productivity of the entire team (Wright et al., 2012). With reference to Hertzberg’s dual factor theory of motivation, there is a set of factors that increases the productivity of individuals in accomplishing their tasks. There is also another separate set of factors that cause dissatisfaction and thus, limit individual productivity (Sachau, 2007). This section addresses the approaches that were used to motivate group members. You read "The process of preparing and delivering our team’s presentation" in category "Essay examples" In group work, one of the motivation approaches is through ensuring effective communication among all people within the group (Dunin-Keplicz Verbrugge, 2011). In group work, responsibilities are divided into smaller tasks and assigned to members depending on their competence. Given that all these sub-tasks contribute towards the attainment of the overall team objective, it is necessary for all team members to communicate about the progress of their respective tasks. This will avoid situations where some members unknowingly derail, or fail to complete their tasks within the agreed upon time limits (Lencioni, 2012). During the preparation and delivery of our group presentation, we ensured that communication between us was effective. This was done by requesting all group members to provide their phone numbers and email addresses. We also followed each other on social media platforms. This ensured that if there was a breakdown in one communication channel, there was always another viabl e objective. When handling group tasks, it is vital to schedule regular meetings in consideration of the responsibilities of all group members. This ensures that every group member is available during the meeting (Dunin-Keplicz Verbrugge, 2011). Regular meetings also allow for close consultations between group members in case some group members hit a snag in completing the tasks that they have been assigned (Lencioni, 2012). Most of the members in our team were dedicated and never skipped meetings. Whereas there were team members who easily handled the tasks that they had been allocated, there are some who found it quite challenging to accomplish their tasks. We understood the fact that there are some people who are quicker than others in accomplishing their assigned tasks than others is common. Thus, instead of reprimanding them, we took to the initiative to ensure that group members who had a challenge in completing their tasks were assisted to complete them. Motivation in teamwork also entails making everybody feel like they valuable members (Hill Parsons, 2014). For instance, if a decision is to be made about a project, the opinions of all group members have to be considered. This encourages constructive debates, which are vital for rational decision making. The group members’ motivation to deliver may be adversely affected if major decisions are only made by a section of the team, which may also lead to groupthink. Groupthink is a common phenomenon in teamwork where the fear of conflicts, or desire for group conformity and harmony, causes other group members to agree with decisions made by others. This is regardless of whether they are suitable or not (De Wit et al., 2012). During our group work, all members were allowed to actively engage in discussions and every opinion presented was listened to. Even though it was not possible to implement incorporate all members’ opinions in decision making, reasons why some opinions were considered over others was also clearly explained to all group members. Our team was culturally diverse, and included people from both genders. Therefore, tasks were distributed in consideration of this diversity. Different approaches were used to motivate group members. However, even with the efforts that were made to optimize the productivity of every group member, there were some individuals who failed to attend group meetings without good reasons. Regardless of these drawbacks, the rest of the team worked diligently to the completion of the project. Learning at Work Learning at work refers to the skills and competencies that members of a team learn as they collectively accomplish a task (Zellmer-Bruhn Gibson, 2006). Typically, the abilities of each individual in the team will vary, with each being more competent in some areas, less competent in others In this regard team members learn from each other through sharing knowledge so as to compliment one another’s skills (Dunin-Keplicz Verbrugge, 2011). This section discusses the process of team learning within the group during the exercise. Team members have to ensure that they have created strong relationships and trust amongst themselves to facilitate team learning. Failure to create a team environment that allows members to learn from one another may undermine the attainment of the overall team objective (Lencioni, 2012). Learning at work or team leaning can be made possible through observations, dialogue and reflection (Hill Parsons, 2014). Team members should be willing to enable those who are not as competent as they are in certain aspects that are vital to the accomplishment of the team’s objective to improve. Likewise, team members who lack some competencies ought to take the initiative to learn through observation or asking for assistance (Zellmer-Bruhn Gibson, 2006). One of the models that can be used to understand team leaning is the action-learning cycle (Coghlan Rigg, 2012). Action learning is a continuous learning process, where individuals from their own experiences and actions, as well as those of other members of their team. Through their own experience, people learn to avoid repeating mistakes they did and continue to improve their competencies in certain disciplines. The action-learning cycle was designed to enable individuals to draw lessons from their experiences by making analytical reflections of their actions (Pedler ?Abbott, 2013). This means that lessons from past experiences can guide present actions, while lessons learnt from the current experience can be used to guide future actions. In the course of the preparation and delivery of our group presentation, team members learnt from each other in different ways. Based on the relationship that had been developed between team members, dialogue was one of the most used approaches for team learning. Group members were willing to share information with others to improve each other’s levels of competence. For instance, one two of our team members were competent in using different data analysis approaches so as to come up with relevant conclusions on the research topic. In addition to this, while most of us were comfortable with the basic function of Microsoft Word, Excel and PowerPoint, one of the team members and I, were more competent with the more advanced options. Therefore, we spent some time during meetings learning from and teaching each other. Learning took different approaches, which included reflections and observations. Even though some of the competencies that were learnt were not improved to the extent that perfection was attained, most of the group members had improved their skills in one aspect or other. I improved my confidence and public speaking skills through the mock presentations that were held by the group in preparation for the final presentation to a larger audience.. All team members also learnt several concepts that could enable them to be more productive members of teams in future. In summary, the group exercise was instrumental in developing some competencies that every group member lacked. As mentioned, different approaches were used in learning or teaching each other about different concepts that were challenging for different group members. Conclusion The capability of an individual to be a productive member of a team is one of the vital competencies that are required for success in any aspect of life. In the preparation and delivery of our group presentation, several characteristics of groups, which relate to organizational behavioural theory, were identified. This paper has presented an overview of the factors that characterized the team working process. One of these is the process through which the ram developed through the formation, storming and norming stages. Based on the fact that the group assignment was short-term, we did not get into the performance stage. The motivation factors that contributed towards the achievement of the overall team goal have also been presented in this paper. Ways in which different group members leant from each other to improve their competencies in several areas have also been addressed in this paper. Whereas the group task was successfully accomplished, some of the few drawbacks that affected the research have also been presented. References Bonebright, D.A., 2010. 40 years of storming: a historical review of Tuckman’s model of small group development. Human Resource Development International, 13(1), pp.111-20. Coghlan, D. Rigg, C., 2012. Action learning as praxis in learning and changing. Research in Organizational Change and Development, 20, pp.59-89. De Wit, F.R.C., Greer, L.L. Jehn, K.A., 2012. The Paradox of Intragroup Conflict. Journal of Applied Psychology, 97, pp.360-90. Dunin-Keplicz, B. Verbrugge, R?., 2011. Teamwork in Multi-Agent Systems: A Formal Approach. New Jersey: John Wiley Sons. Egolf, D. Chester, S., 2013. Forming Storming Norming Performing. Bloomington: IUniverse. Fleishman, R., O’Leary, R?. Gerard, ?C., 2008. Recent Developments in Conflict Resolution and Collaboration. London: Emerald Group Publishing. Garfield, M.J. Dennis, A.R., 2012. Toward an Integrated Model of Group Development: Disruption of Routines by Technology-Induced Change. Journal of Management Information Systems, 29(3), pp.43-86. Hill, F. Parsons, L?., 2014. Teamwork in the Management of Emotional and Behavioural Difficulties. New Jersey: Routledge. Lencioni, P., 2012. The Five Dysfunctions of a Team: Intact Teams Participant Workbook. San Francisco: Pfeiffer. Miner, J.B., 2005. Organizational Behavior: Essential theories of motivation and leadership. New York: M.E. Sharpe. Pedler, M. ?Abbott, C., 2013. Facilitating Action Learning: A Practitioner’S Guide. Berkshire: McGraw-Hill International. Sachau, D.A., 2007. Resurrecting the motivation-hygiene theory: Herzberg and the positive psychology movement. Human Resource Development Review, 6(4), pp.377-93. Wright, B.E., Moynihan, D.P. Pandey, S.K., 2012. Pulling the Levers: Transformational Leadership, Public Service, Motivation, and Mission Valence. Public Administration Review, 72(2), p.206–215. Zellmer-Bruhn, M. Gibson, C., 2006. Multinational organization context: Implications for team learning and performance. Academy of Management Journal, 49(3), pp.501-18. How to cite The process of preparing and delivering our team’s presentation, Essay examples

Saturday, December 7, 2019

Pur carum Essay Example For Students

Pur carum Essay (Slip Opinion) Cite as: 531 U. S. ____ (2000) 1NOTICE: This opinion is subject to formal revision before publication in the preliminary print of the United States Reports. Readers are requested to notify the Reporter of Decisions, Supreme Court of the United States, Wash- ington, D. C. 20543, of any typographical or other formal errors, in order that corrections may be made before the preliminary print goes to press. GEORGE W. BUSH, ET AL., PETITIONERS v. ON WRIT OF CERTIORARI TO THE FLORIDA SUPREME COURTOn December 8, 2000, the Supreme Court of Floridaordered that the Circuit Court of Leon County tabulate byhand 9,000 ballots in Miami-Dade County. It also orderedthe inclusion in the certified vote totals of 215 votes identi-fiedin Palm Beach County and 168 votes identified inMiami-Dade County for Vice President Albert Gore, Jr.,and Senator Joseph Lieberman, Democratic Candidatesfor President and Vice President. The Supreme Courtnoted that petitioner, Governor George W. Bush assertedthat the net gain for Vice President Gore in Palm BeachCounty was 176 votes, and directed the Circuit Court toresolve that dispute on remand. ___ So. 2d, at ___ (slipop., at 4, n. 6). The court further held that relief wouldrequire manual recounts in all Florida counties where so-calledundervotes had not been subject to manual tabu-lation. The court ordered all manual recounts to begin atonce. Governor Bush and Richard Cheney, RepublicanCandidates for the Presidency and Vice Presidency, filedan emergency application for a stay of this mandate. OnDecember 9, we granted the application, treated the appli-BUSH v. GOREcation as a petition for a writ of certiorari, and grantedThe proceedings leading to the present controversy arediscussed in some detail in our opinion in Bush v. PalmBeach County Canvassing Bd., ante, p. ____ (per curiam)(Bush I). On November 8, 2000, the day following thePresidential election, the Florida Division of Electionsreported that petitioner, Governor Bush, had received2,909,135 votes, and respondent, Vice President Gore, hadreceived 2,907,351 votes, a margin of 1,784 for GovernorBush. Because Governor Bush s margin of victory wasless than one-half of a percent . . . of the votes cast, anautomatic machine recount was conducted under102.141(4) of the election code, the results of whichshowed Governo r Bush still winning the race but by adiminished margin. Vice President Gore then soughtmanual recounts in Volusia, Palm Beach, Broward, andMiami-Dade Counties, pursuant to Florida s electionprotest provisions. Fla. Stat. 102.166 (2000). A disputearose concerning the deadline for local county canvassingboards to submit their returns to the Secretary of State(Secretary). The Secretary declined to waive the Novem-ber14 deadline imposed by statute. 102.111, 102.112. The Florida Supreme Court, however, set the deadline atNovember 26. We granted certiorari and vacated theFlorida Supreme Court s decision, finding considerableuncertainty as to the grounds on which it was based. Bush I, ante, at ______ (slip. op., at 67). On December11, the Florida Supreme Court issued a decision on re-mandreinstating that date. ___ So. 2d ___, ___ (slip op. atOn November 26, the Florida Elections CanvassingCommission certified the results of the election and de-claredGovernor Bush the winner of Florida s 25 electoralvotes. On November 27, Vice President Gore, pursuant toFlorida s contest provisions, filed a complaint in LeonCite as: 531 U. S. ____ (2000) 3County Circuit Court contesting the certification. Fla. Stat. 102.168 (2000). He sought relief pursuant to102.168(3)(c), which provides that receipt of a numberof illegal votes or rejection of a number of legal votessufficient to change or place in doubt the result of theelection shall be grounds for a contest. The Circuit Courtdenied relief, stating that Vice President Gore failed tomeet his burden of proof. He appealed to the First DistrictCourt of Appeal, which certified the matter to the FloridaAccepting jurisdiction, the Florida Supreme Court af-firmedin part and reversed in part. Gore v. Harris, ___So. 2d. ____ (2000). The court held that the Circuit Courthad been correct to reject Vice President Gore s challengeto the results certified in Nassau County and his challengeto the Palm Beach County Canvassing Board s determina-tionthat 3,300 ballots cast in that county were not, in theThe Supreme Court held that Vice President Gore hadsatisfied his burden of proof under 102.168(3)(c) withrespect to his challenge to Miami-Dade County s f ailure totabulate, by manual count, 9,000 ballots on which themachines had failed to detect a vote for President (under-votes). .u6f7eabc2a02832dd8ce02fade2bd6709 , .u6f7eabc2a02832dd8ce02fade2bd6709 .postImageUrl , .u6f7eabc2a02832dd8ce02fade2bd6709 .centered-text-area { min-height: 80px; position: relative; } .u6f7eabc2a02832dd8ce02fade2bd6709 , .u6f7eabc2a02832dd8ce02fade2bd6709:hover , .u6f7eabc2a02832dd8ce02fade2bd6709:visited , .u6f7eabc2a02832dd8ce02fade2bd6709:active { border:0!important; } .u6f7eabc2a02832dd8ce02fade2bd6709 .clearfix:after { content: ""; display: table; clear: both; } .u6f7eabc2a02832dd8ce02fade2bd6709 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u6f7eabc2a02832dd8ce02fade2bd6709:active , .u6f7eabc2a02832dd8ce02fade2bd6709:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u6f7eabc2a02832dd8ce02fade2bd6709 .centered-text-area { width: 100%; position: relative ; } .u6f7eabc2a02832dd8ce02fade2bd6709 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u6f7eabc2a02832dd8ce02fade2bd6709 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u6f7eabc2a02832dd8ce02fade2bd6709 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u6f7eabc2a02832dd8ce02fade2bd6709:hover .ctaButton { background-color: #34495E!important; } .u6f7eabc2a02832dd8ce02fade2bd6709 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u6f7eabc2a02832dd8ce02fade2bd6709 .u6f7eabc2a02832dd8ce02fade2bd6709-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u6f7eabc2a02832dd8ce02fade2bd6709:after { content: ""; display: block; clear: both; } READ: Stem Cell Dilema Essay___ So. 2d., at ___ (slip. op., at 2223). Notingthe closeness of the election, the Court explained that onthis record, there can be no question that there are legalvotes within the 9,000 uncounted votes sufficient to placethe results of this election in doubt. Id., at ___ (slip. op.,at 35). A legal vote, as determined by the SupremeCourt, is one in which there is a clear indication of theintent of the voter.Id., at ____ (slip op., at 25). Thecourt therefore ordered a hand recount of the 9,000 ballotsin Miami-Dade County. Observing that the contest provi-sionsvest broad discretion in the circuit judge to provideany relief appropriate under such circums tances, Fla. Stat. 102.168(8) (2000), the Supreme Court further heldBibliography:

Saturday, November 30, 2019

Wireless Articles 1 Essay Example Essay Example

Wireless Articles 1 Essay Example Paper Wireless Articles 1 Essay Introduction There is no doubt that times have changed from the first time Alexander Graham Bell thought of inventing a telephone. Nowadays, telephones are not merely for voice calls because it has evolved to become one of the greatest communication tools in history with Internet, messaging, and music capabilities. More and more technological advances are being done in the telecommunication field every year.One of this advances is called 3G, which is â€Å"the third generation of mobile phone standards and technology that enables network operators to offer users a wider range of more advanced services while achieving greater network capacity through improved spectral efficiency.†[1] It was first launched in Japan in 2001 developed after 1G and 2G technologies to offer faster and better communication to consumers. Currently, even with the development of 4G technology, mobile phone companies like Apple, Nokia, and Sony Ericsson produce their phones with 3G capabilities since many of their co nsumers look for this service when choosing a phone. However, not all is positive with 3G. Concerns including the cost of licenses, cost of 3G mobile phones, lack of coverage, expense of the service and Internet fees, and high power usage are being debated by both providers and consumers.[2]The article does not include a specific author making it hard for the information to be trusted. Also, the fact that Wikipedia is an online group community that can be accessed by anyone and everyone decreases its reliability in terms of the information indicated. The same cannot be said with the topic, however, because 3G is known to be one of the best development in the mobile phone industry at this time. This is most helpful to businessmen and women who need the Internet access at any time of the day. This technology also affects those who have families and friends out of the country because communicating not just by voice calls can be done. Although 3G still has its own issues to deal with, i t is still one of the best advancements in technology during this time.Wireless Articles 2Communication is an essential part of the everyday lives of humans. It is not only through voice communication or through hand-written or typed documents because there are just those data that are too large or too long to be typed, written, or spoken. Fortunately, the Internet has been made available to everyone, which makes the exchange of large data much easier. However, some people still find computers and the Internet too time-consuming, which is why wireless devices such as Bluetooth were developed.â€Å"Bluetooth (BT) wireless technology provides an easy way for a wide range of devices to communicate with each other and connect to the Internet without the need for wires, cables, and connectors.†[3] Not only is it used in mobile phones, but several devices including laptops and cars are also being installed with Bluetooth services. It was first developed in 1994 by a team of researc hers and at this time, it is known to â€Å"allow two Bluetooth-enabled devices within 10 to 100 meters range to share data†[4] without the need of wires or Internet connection. Because this technology works by sharing data, it is very important to know proper security measures to avoid transmission of data to the wrong party or receiving malicious and harmful content. To address this concern, the developers had consumers the option to display or hide their devices from other devices. There is also the feature of requiring a passcode for the two devices to connect first before sending the data. Still, there are those applications that are made to hack these devices and gather private and important information. Manufacturers also do not take much time in specifying addresses for their Bluetooth-enabled products, which makes it easier for hackers to determine the addresses. The article also states that consumers who have little knowledge about Bluetooth are at risk of having th eir devices hacked or acquiring viruses.There is no doubt that Bluetooth is a helpful tool when it comes to sharing information, especially when time is of concern. However, the author is right when he stated that people, consumers most notably, should remember that they should always research and try to secure their devices because there are numerous individuals who have negative intentions and abuse their power and knowledge in technology.Wireless Articles 3The Internet is one of the most important technological developments in mankind’s history. It has paved way for more advanced communication, data exchange, and information access. Because of its great importance and use in people’s personal lives and the business world, more and more organizations offer the service through wireless connection.In 2007, Intel announced that it will â€Å"support WiMax and 802.11b/g/n on the same piece of silicon with the Montevina mobile platform, but will also offer a WiMax-only c ard.†[5] Contrary to the current WiFi service, â€Å"WiMax can provide broadband wireless access up to 30 miles for fixed stations, and 3 to 10 miles for mobile stations.†[6] This improvement in the hardware from WiFi to WiMax by Intel will surely attract consumers and providers especially those who greatly use the Internet to work, study, or get in touch with their loved ones. Intel is trusted by consumers and although WiMax is only getting started in the field, one can anticipate the impact it will bring once the hardware is made available in the market.WiMax-enabled computers and other devices will make studying, working, or communicating a much easier task for those concerned. It also contributes to the history of technology and marks as an evidence that through technology, distance is of no issue. It even contributes to faster and more efficient working since it allows â€Å"download speeds of 2 to 4 Mbps.†[7] To evaluate, the article seems to be providing a good news to those who depend on mobility in terms of using their devices, as well as in terms of being able to function whenever and wherever it is needed.Wireless Article 4With the vast amount of developments in technology today, it is important to know the best and economical applications, software, and hardware that exist in the market. Knowledge of such things makes it easier what to buy and what service to use because it suits one’s lifestyle and needs better. Not only will it provide a way to choose what is better but it also enhances a person’s knowledge regarding technology.Because mobile phones are very much popular and in demand these days, companies make sure that they keep up with what the consumers need and want. They enable their products with different kinds of capabilities and services so that users do not have to look somewhere else. Two of the features that mobile phone companies provide are the Global System for Mobile Communications (GSM) and CDMA (Code Division Multiple Access) network technologies. Both are excellent in providing what customers need, which is telecommunication capabilities, but they differ in terms of how the provide it. The GSM technology allows consumers to choose from a variety of mobile phones, use a SIM card from mobile network providers, and use a better international roaming service while CDMA technology makes its consumers buy an entire package from a service provider that contains the handset and the service.[8]In summary, both technologies are excellent in providing what the consumers need or else they would not be used by major network providers. A person just has to weigh what is more suitable for his lifestyle when choosing what kind of mobile phone service to avail. Flexibility is one of the major features of a GSM network while clarity and efficiency can be depended on with CDMA networks.Wireless Article 5With the numerous mobile phone manufacturers today, it cannot be helped that mobile pho ne service providers are also increasing. There is no country that offers only one service provider, which makes it hard for consumers to choose what kind of service they want. Fortunately for most people who are not contented with one service provider or for those who need more than just one, there are companies that can unlock mobile phones and make it possible for a user to use multiple SIM cards in one mobile phone. Of course, one has to have a GSM enabled phone to be able to do this since CDMA phones are locked to a specific network.There are many reasons why an individual want to have his or her phone unlocked: one is wanting to change the current wireless provider in the United States and still keep the phone; two is changing a provider with a new phone but still want to keep the other provider; and three traveling outside the country without having to pay for higher international roaming fees.[9] Whatever the reason is, it always comes down to not having to choose a certain service provider simply because every available provider can be used. Several companies and individuals offer users a way to unlock their mobile phones either by proving a code or by using an application.Unlocking phones are useful for those who need it and for those who require it. However, it should still be remembered that there are numerous malicious individuals who can try to abuse this kind of flexibility. SIM cards, in most countries, are readily available and does not require a person to register and provide security information thus making it hard for them to be tracked down when they use their SIM cards for illegal acts because they can simply throw the cards away without anyone tracing it back to them.BibliographyBangeman, Eric. â€Å"WiMax Coming to Intel Laptops in 2008.† ARS Technica, April 16, 2007. http://arstechnica.com/news.ars/post/20070416-wimax-coming-to-intel-laptops- in-2008.html (4 August 2008).Bialoglowy, Marek. â€Å"Bluetooth Security Review, Part 1.† Security Focus, April 25, 2005. http://www.securityfocus.com/infocus/1830 (4 August 2008).Hick, Matthew. â€Å"Cell Phone Unlocking – What Purpose Does It Have?† Articlebase, January 1, 2008. http://www.articlesbase.com/cell-phones-articles/cell-phone-unlocking- what-purpose-does-it-have-294032.html (4 August 2008).Sharma, Mohit. â€Å"GSM vs. CDMA Mobile Technology.† Articlesbase, January 5, 2008. http://www.articlesbase.com/cell-phones-articles/gsm-vs-cdma-mobile- technology-400824.html (4 August 2008).Wikipedia. â€Å"3G.† Wikipedia, August 3, 2008. http://en.wikipedia.org/wiki/3G (4 August 2008).[1] Wikipedia, â€Å"3G,† August 3, 2008. http://en.wikipedia.org/wiki/3G (4 August 2008).[2] Ibid.[3] Marek Bialoglowy, â€Å"Bluetooth Security Review, Part 1,† April 25, 2005. http://www.securityfocus.com/infocus/1830 (4 August 2008).[4] Ibid.[5] Eric Bangeman, â€Å"WiMax Coming to Intel Laptops in 2008,† April 16, 2007. http://arstechnica.com/news.ars/post/20070416-wimax-coming-to-intel-laptops-in-2008.html (4 August 2008).[6] WiMax.com, â€Å"What is WiMAX?† http://www.wimax.com/education (4 August 2008).[7] Eric Bangeman, â€Å"WiMax Coming to Intel Laptops in 2008,† April 16, 2007. http://arstechnica.com/news.ars/post/20070416-wimax-coming-to-intel-laptops-in-2008.html (4 August 2008).[8] Mohit Sharma, â€Å"GSM vs. CDMA Mobile Technology,† January 5, 2008. http://www.articlesbase.com/cell-phones-articles/gsm-vs-cdma-mobile-technology-400824.html (4 August 2008).[9] Matthew Hick, â€Å"Cell Phone Unlocking – What Purpose Does It Have?† January 1, 2008. http://www.articlesbase.com/cell-phones-articles/cell-phone-unlocking-what-purpose-does-it-have-294032.html (4 August 2008). Wireless Articles 1 Essay Thank you for reading this Sample!

Monday, November 25, 2019

Pulse Code Modulation essays

Pulse Code Modulation essays Pulse code modulation (PCM) is the digital way to transmit analog data. The signals in PCM are binary; that is, there are only two possible states, represented by logic 1 (high) and logic 0 (low). This is true no matter how complex the waveform happens to be. Using PCM, it is possible to digitize all forms of analog data, including full-motion video, voices, music, telemetry, and virtual reality. The data is feed into an encoder that performs the following functions: sampling, quantizing, and encoding. Sampling is the process of reading the values of an analog signal in discrete time. This is done with the Nyquist Frequency, which states the analog wave must be sampled at a rate of at least twice its sampled rate. For example: if a analog signal contains a maximum frequency variation of 3000 Hz, the analog wave must be sampled at a rate of 6000Hz or more. The next function is the Quantizing process. Quantization is the process of assigning one of the possible discrete level s to each sample obtained. The total number of levels depends on the number of bits to used to represent each sample. This is done by either rounding (assigning the nearest level to the signal which may be greater than or less than the actual signal) or truncating (assigning the nearest level which is lower than the actual sample). This process gives a stepped waveform which resembled the original or sent signal. The difference between the actual sample and the value assigned to it is known as the quantization noise. The last function is the encoding process. In the encoder a binary number is assigned to the analog signal that was sampled. This is called the n-bit digital word, n is chosen as a power of 2 depending on the level of accuracy required. The output of a pulse code modulator is a series of binary numbers, each represented by the power of 2 bits. At the destination (receiver end) of the communications circuit, a pulse code ...

Friday, November 22, 2019

Be a Small Light in a Dark Room

Miep Gies said, â€Å"Everyone is capable of providing a small light in a dark room. † How is this true for me? Ever since a child is young, parents tend to instill in them high aspirations and goals for the future. The desire to make a difference in the world is the primary theme in doing well in school. When I was little, my grandfather used to say to me that â€Å"The world has too many problems that you, my dear, are meant to fix. At that time, I believed that it was his indirect way of saying that he wanted me to have a good job so I could be wealthy and live well. On the day of September 11, 2001, the terrorists attacked the United States and shook the world to it’s core. At that time I was living in Albania and I did not understand what was going on and how it could affect me. I kept thinking back to what my grandfather had told me and I could not see how one person alone could make a difference. I was not powerful enough to change the course of events or prevent tragedies from happening; I was one person who most people did not know existed. As I soon learned, the world was not a place of fairytales and dreams but in a way a dark room. Deception, sadness, emptiness, and greed were influential factors in the lives of many. In a materialistic society, everyone strove for their own ambitions ignoring those suffering. Miep Gies said, â€Å"Everyone is capable of providing a small light in a dark room† and I believe wholeheartedly in this concept. As I matured into an educated young lady, I understood that if one person had the courage to stand up to injustices, it would give voice to those who are afraid to do it themselves. Have I been â€Å"a small light in a dark room† in my life? I do not think I have been so far because I have not had that opportunity to make a difference in somebody’s life. In the future, I plan to study international affairs and make a powerful impact in the life of those people who live in fear and terror, or as Miep describes it â€Å"a dark room. By standing up to injustices and protecting people, I would be â€Å"the small light† that guides them to a life where their human dignity is respected. I will be their hope of a better future and I will try to make a positive impact in many lives. In Afghanistan, many young women are not allowed to leave their homes because of the fear that they might be killed. In Kosovo, young children are murdered by Serbian patriots and their rema ins are scattered throughout their villages. In Somalia, many people are kidnapped by the Somalian pirates and tortured until a ransom is paid. There are many other examples of â€Å"dark rooms† throughout the world and it takes just one person to start a revolution for a positive change. Anyone can be that â€Å"small light† if they have the passion and determination to make a difference in the world. Only God knows where the journey of life will take me but I know I am strong enough to overcome any obstacle in order to make a difference in the world. I will be that â€Å"small light in a dark room† and I will encourage others to follow their dreams because anything is possible.

Wednesday, November 20, 2019

Experience in English 102 Class Essay Example | Topics and Well Written Essays - 250 words - 52

Experience in English 102 Class - Essay Example I am conversant with MLA, APA, Harvard, and Chicago writing styles and my fellow students could always ask me for assistance in these areas, a factor that helped me become even better. Through the various creative reading, writing and research assignments I have greatly sharpened my critical analysis skills, which involves a set of critical interrelated questions (Browne & Keeley, 2). I have learned to ask myself questions other than just follow what is written, this is translated to my researches where I write more analytically than I did before. This is a skill that I did not have at the beginning of this class; however, achieving it will be of great use not only in my academic work but also in work-related goals. One assignment that I did not enjoy was the group assignment, this is because some of the members in my group were not co-operative and we ended up wasting a lot of time and eventually doing the assignment in a rush. I believe this is what contributed to the low grade in the assignment. However, the individual assignment on creative literature was most meaningful to me because I was able to practice most of the skills that I had learned. The stories that I read for this assignment and many others helped me change my whole perception of humanity. I learned that people live in different conditions and may be going through other circumstances that affect their way of life. Therefore, we should never be quick to judge people’s actions. Generally, my experience in the English 102 class has been interesting as well as very educative. My teachers and fellow students have been very supportive in ensuring that all concepts being taught are well grasped. I have also made many friends hence improving my social life in addition to my academic

Tuesday, November 19, 2019

Discussion Boar 5-1 Assignment Example | Topics and Well Written Essays - 250 words

Discussion Boar 5-1 - Assignment Example However, group leaders need to demonstrate caution and avoid selecting exercises that can infringe on any member. Properly chosen exercises can make proper and appropriate techniques to help drive a counseling group work towards achieving its desired goals and objectives (Haley, Morina & Brown, 1998). Careless structuring of the exercises can turn be detrimental to the group’s efforts to achieve the set objectives and desired change. Corey’s counseling group is an example of group work that employed structured exercises selected in a careful manner and guided by easy laws. This means that the exercises were optional and members could engage or perform any exercise deemed to be in line with the members’ beliefs and diversity. Employing more exercises in the Corey’s counseling group could lead to particular challenges and inconveniences. Since the group included people from diverse backgrounds, it was easier for the group to appear as breaching beliefs and certain innate differences. More exercise could have worked to expose certain inefficient characters of the members, which they would want to conceal. This would mean underachievement and dissatisfaction of the members with the progress made by the group at the end if its session (Corey, Corey & Corey, 2006). Corey’s counseling seem to have avoided more exercises for fear of breaching principles of diversity that would happen if the exercises demanded exposure of secret information of the members. From the guideline, it is important for group leader to perform thorough screening during the recruitment and initial stage of the group. This can help identify and obtain adequate information on the likes and dislike of the members (Haley, Brown & Morina, 1998). Haley, L. Morina, B. & Brown, S. (1998). Association for Specialists in Group Work: Principles for Diversity-Competent Group Workers. retrieved September 21, 2013 from:

Saturday, November 16, 2019

Report Generator for Bayanan Barangay Hall Essay Example for Free

Report Generator for Bayanan Barangay Hall Essay Computer technology has been widely used in different fields, nowadays; computer is the main system that is being used from large and wide scale manufacturing up to small scale industries. The defining feature of modern computers which distinguishes them from all other machines is that they can be programmed. In recent times, the world has witnessed a rapid increase in technological innovations. This era ushered in the advent of the electronic computer system among other modern technologies. At present the computer technology has permeated nearly all aspects of human organizational roles and education. Computer encompasses almost all facets of human endeavors. So much has been written on it and its relatedness to all areas of human disciplines, which include computer/information technology, engineering, agriculture etc. However, in the field of case records their role is much less well defined, for here the organization of data as a preliminary to computer input is the real stumbling-block. Barangay Bayanan is one of the barangay in the City of Muntinlupa. It is bounded between Barangay Alabang and Barangay Putatan. With residents for about 35,865 the hall is strategically located along Bayanan Bay walk, Muntinlupa City. Transactions are currently done manually wherein, information about the citizens are being process by just simply writing the citizen’s name, age, location and other personal information. Producing report such as Barangay Clearance, various certificates etc. is done manually by ink and paper, which is very slow and consuming much efforts and time. Furthermore, the duplication of produced report to each citizen is often result to data management problem such as slow processing, inaccuracy of report and many others. These problems are typical of a manual or traditional system. This research aims to consider a computerized report generator is needed to avoid redundancy and to quicken the generation of reports from the replacement of the current manu al system. The general objective of the study is to design and develop a report generator that would serve as proposal to help Bayanan Barangay Hall to their operation and provides an easier, faster, more organized, secured, and accurate system.  The specific objective of the study is to identify the problems encountered by Bayanan Barangay Hall and also create a report generator that will improve the scope such as citizens, staff and administration. In general scope, the focus of this study is directed towards the design and development of a report generator for Bayanan Barangay Hall with its administration, staff, and citizens are selected. The report generator has a secure log-in for administration and staff. For its limitation, the study is limited only to citizen-data entry person transactions. The inventory report, payroll of the staff and the payment for the service rendered is not provided by the report generator because it will only focus in generating reports after the registration of the citizen’s information is being done by the authorized personnel.   This part describes the relationship between the dependent variables, independent variables and intervening variables of existing system and proposed report generator.

Thursday, November 14, 2019

The Life and Work of William Butler Yeats Essay -- Biography Biographi

The Life and Work of William Butler Yeats Born in Dublin in the year 1865, William Butler Yeats would go on to become universally recognized by his peers as the greatest poet of this century writing in the English language. This recognition would come as early as 1828, a decade before his death with the publication of arguably his finest volume, The Tower (Fraser, 207). The son of one time attorney and later well known painter John Butler Yeats, W.B. Yeats was of partially Cornish and Gaelic decent, born near Dublin and raised between both England and Ireland. Though born in Dublin and raised between England and Ireland, Yeats would develop, through his mother, a love for the west country of Ireland that would last all his life. Parts of his childhood and later vacations would be spent in County Sligo, the childhood home of both his parents. Yeats would later depict his beloved County Sligo in such works as "The Lake Isle of Innisfree". These works would serve as a symbol of his imaginative escape from the disappointments and unpleasant realities of life (Magill, 1957). Yeats's childhood would be broad in education and personal experiences. Yeats would become a youth full of internal contradictions, often spawned by his desire to question all that he was taught. Spiritually, educationally, and personally, Yeats seemed to himself pulled in different directions, unable to decide on a clear path. These internal contradictions would come to shape the writer and man that he would one day become. Much of childhood for Yeats was spent in London, where he attended the Godolphin School. At the age of fifteen, Yeats returned to Dublin and attended the Erasmus Smith School. In the tradition of his family, Yeats studied art... ...thors: A Twentieth Century Gallery. Freeport, NY: Books for Libraries Press, 1970. Kunitz, Stanley J. and Howard Haycraft, eds. Twentieth Century Authors: A Biographical Dictionary of Modern Literature. New York: The H. W. Wilson Company, 1942. Magill, Frank N, ed. Cyclopedia of World Authors: Revised Edition, Volume III. Englewood Cliffs, NJ: Salem Press, 1974. Rogers, Pat, ed. The Oxford Illustrated History of English Literature. New York : Oxford University Press, 1987. Scott-Kilvert, Ian, ed. British Writers. Volume VI. New York: Charles Scribner & Sons, 1983. Stock, A.G. W. B. Yeats: His Poetry and Thought. Cambridge: Cambridge University Press, 1964. Unterecker, John. A Reader's Guide to William Butler Yeats. New York: Octagon Books, 1959. Yeats, W.B. The Autobiography of William Butler Yeats. New York: The Macmillan Company, 1916.

Monday, November 11, 2019

Programming and Commercial Effects on Children Essay

Many parents are not aware that commercial programming can have the same effect on child’s cognitive learning as the programming the children are watching. The Merriman-Webster (2012) dictionary defines cognitive as, â€Å"Of relating to, being, or involving conscious intellectual activity (as thinking, reasoning, or remembering). † Research has been done on children’s programming as well as commercial television to show the effects on today’s youth. Even though suggestive adult humor can be found in children’s programming, the impact commercials have toward children is just as important to watch. Television can provide opportunity for children to learn however it should not be a teacher or babysitter for today’s youth. Questions like, â€Å"If a program is scheduled at all hours of the day and into the night, does this make it appropriate for younger children to watch? † should be just one of the many parents should ask when allowing children to watch specific television programming. Intentional or not, programmers use television to influence today’s youth. With today’s ability to view children’s programming on a multitude of different stations and different channels for each station, it is amazing on how much of today’s programming for young children have hidden layers of adult humor. Television writers put subtle instances of adult humor in to children’s programming which allows for them to draw in ratings from a wider range of viewers. Rice (2009) conducted a study on popular children’s cartoon SpongeBob SquarePants in which it states the show is directed toward an age group of approximately 2 to 11 year olds, however research shows that it has a variety of audiences in all age groups. Nearly a quarter (22%) of the viewers ranged from ages 18 to 49. Along with this research, Rice also notes on the schedule of the show to emphasize how it is directed toward a large range of viewers. The show was slotted to air between early morning hours to even later hours, up until close to midnight which by then most of the targeted age group would ave been in bed for a few hours by the time of airing. Rice also recorded subject analysis data for several age groups. In information collected from high school students, the majority of them seem to identify with the shows side kick known as Patrick Star. â€Å"A large majority of respondents say they watch the show because it is â€Å"funny,† â€Å"entertaining,† and â€Å"hilarious† (Rice, 2009, paragraph, 46). On the other hand, when college students were polled they more or less chose to watch because it helped them unwind from a stressful day, possibly like a treat for their bran after a hard day of class work. If a show that is targeted for a much younger age group has a relaxing type of effect, it would be interesting to see how it influences the target age group. When children’s programming is actually aimed towards a large range of viewers how adults choose what their children should watch could have an important impact on how they develop. In recent, years television networks an writers have taken a more proactive approach in educating youth through television programming. Some of this can be seen by the creation of junior channels. Channels like Nick Jr. or Disney Jr. ave created programming geared toward preschoolers and toddlers that use colors and characters to peak their interests. One of the more influential television stations that support child develop has been the Public Broadcasting Service (PBS). PBS has had constant influence in child development with shows like Sesame Street and Barney & Friends and now offer new programming like Bob the Builder, Teletubbies and Thomas & Friends. These shows focus on learning in the early stages of a preschoolers development by reaching the alphabet, numbers, dancing, singing and even emotional responses. According to â€Å"The Journal of Media Literacy† (2012), â€Å"To capture and hold viewer attention, each Dora episode features a linear narrative shaped around a high-stakes adventure with serious consequences. It calls upon viewers to interact with the television to help Dora overcome a series of structured challenges. When children hear that they did a good job or a positive response, they tend to want to interact more and thus keeps them interested in the programming. Along with current programming on television, networks have started developing DVD’s to sell to parents when current programming might not peak a child’s interests. Big Companies like Disney, the Brainy Baby Company and Sesame Workshop have started developing age specific programming. When a large company starts to invest in developmental programming, it gives a better sense of satisfaction as the brand is well known. DVD series like Baby Einstein, Brainy Baby and Sesame Beginnings all have their own niche and targeted age range however all promote development and learning. Kikorian, Wartella, and Anderson (2008) state shows like Baby Einstein target viewers from as young as one month old and covers a wide range of topics such as music, art, language and poetry while Sesame Beginnings targets children starting at six months of age. This show features younger versions of the Muppets of Sesame Street and promote interaction between children and their caregivers. Kikoran et al. (2008) also discussed the unique effect of television on children under the age of two and suggests that some research shows that exposure to television during the first few years of life may be associated with poorer cognitive development. This question could be geared toward the overall television experience which includes commercials and the actual programming. With the importance of what is appropriate for children to watch in television, parents seem to be more concerned with actual programming then what is played in between. However, studies have shown that these commercials can be just as influential to our youth. With promotion of movie trailers, current television shows and video games violence is in pure view for children to see and it is less monitored then the actual program. In order to track this data, the authors in an article in the Journal of Advertising had to define how children and their parents viewed violence. For the children defining violence was much more broad as one child responded with, â€Å"Violent is fighting with weapons, with swords, blood, and gore† and another stated, â€Å"Violence is bleeding really bad. Sometimes it’s when somebody falls down and they’re scratched or bleeding really bad† (Brocato et al. 2010). Parents were more unified with defining violence with violence consisting of blood, gore and death. Children seem to think that it is the mother that stresses the importance of them not watching while the fathers feel it is alright as long as they are watching it with them. Both parents shared a common theme in that the commercials are not the issue but the actual programming. Parents also shared that by being present they could address sensitive issues like violence when it happens. Reading through the study it was surprising to see possible limitations that could have address more issues. Parents could have been asked while being present when the issue arose how did the child react to the situation. Another question that might have been asked is how did the child react to the actual discussion about the topic. Was the child more interested in the programming or on what the parents had to say. Ultimately the article had a good basis for what were the more glaring issues and how both the parents and children valued what was played in commercials. Intentional or not, programmers use television to influence today’s youth. This could be from how they act from watching their favorite television program, to desiring a new toy or video game that was currently seen on a commercial. Parents should take the time to watch what their children are watching. One way to see how a child’s favorite program can affect them is to watch the program without the child and then with the child. When watched alone write down instances that might be inappropriate or that draw questions. As the child sits through the program watch how they react to certain situation and then discuss with them on what is positive and what is negative. With correct supervision and discussions, parents have the ability to be a part of the education process with today’s youth.

Saturday, November 9, 2019

Internalization theory best explains CEMEX’s FDI Essay

1.Which theoretical explanation (or explanations) of FDI best explains CEMEX’s FDI? 1.Internalization theory best explains CEMEX’s FDI because CEMEX entered into many countries and bought domestic cement businesses instead of licensing. CEMEX has a great system and needs to protect it from competitors. 2.What value does CEMEX bring to a host economy? Can you see any potential drawbacks of inward investment by CEMEX in an economy? 1.The value is that CEMEX has a â€Å"Midas touch† that transforms a cement business into a thriving business. This brings great stimulation to the host economy and also helps in the construction field, which in turn helps to build cities and civilization. No, CEMEX would do well to invest inwardly, yet, CEMEX is better at acquisitioning businesses. 3.CEMEX has a strong preference for acquisitions over greenfield ventures as an entry mode. Why? 1.Acquisitions are solid because the business in the host economy already knows the demographics and the market. CEMEX just has to make the business better with little research. A greenfield venture would prove risky and not cost effective. 4.Why do you think CEMEX decided to exit Indonesia after failing to gain majority control of Semen Gresik? Why is majority control so important to CEMEX? 1.A licensing is very dangerous. CEMEX only have a 25% push with Semen Gresik. It did not have full control and the methods of CEMEX would be exposed and vulnerable to be stolen. CEMEX has a great system and does not want anyone interfering. 5.Why do you think politicians in Indonesia tried to block CEMEX’s attempt to gain majority control over Semen Gresik? Do you think Indonesia’s best interests were served by limiting CEMEX’s FDI in the country? 1.Indonesian politicians did not like the possibility of CEMEX taking over the cement market. Their interests were in domestic businesses and protecting the â€Å"purity† of their economy. No, Indonesia would have benefitted greatly if CEMEX was allowed an in. 6.What is CEMEX doing today? Do they still engage in FDI? 1.â€Å"MONTERREY, MEXICO- OCTOBER 8, 2010 – CEMEX (NYSE: CX), announced today that pursuant to the exercise of a put option by Ready Mix USA it will acquire its partner’s interests in the two joint ventures between CEMEX and Ready Mix USA which hav

Thursday, November 7, 2019

King Hammurabis Code of Law essays

King Hammurabi's Code of Law essays King Hammurabi envisioned his code of laws to govern the people of Babylonia. Hammurabi's code is said to be a reflection of ancient society. He cared about making a name for himself; he wanted his laws to be carried down through generations and his reign to be talked about long after he was gone. Hammurabi started a civilization based on social structure and economics. In order to build a successful empire, he wanted to have a society that had structure and social order. He knew that he had to have a unified law that everyone could abide by and needed social structure so that he could create equality among the people. He wanted all of his citizens to live under the same set of laws so that they could work towards a common goal and have the same rights as one another. Hammurabi was the first to organize the world's first written set of laws that characterized political and military structures, social structure based on economic power, and social welfare. It was important to him to have the citizens trust the laws and one another so there was no chaos amongst them. However, he did organize the citizens into classes that were impossible for them to get out of and I feel this was ultimately ineffective at accomplishing his Hammurabi's code fulfilled most of the needs of his citizens. He gave them what they needed at that time to prosper: structure. In order to have a great nation you first must start with the people. They are the building blocks of a great nation. But in order to get the maximum productivity out of them, you need to set some ground rules. I feel the code was harsh with some of the punishments, but it was exactly what they needed at that time. These laws set up the structure and framework by which the king or government operated, became a tool for them to interact with each other, and created a justice system to help the people if they were wronged by another person....

Monday, November 4, 2019

Questions on Law Assignment Example | Topics and Well Written Essays - 1250 words

Questions on Law - Assignment Example The police officer who witnessed their act together with his back up team issued citation for the suspects. The gang moved a motion for dismissal of their cases on the ground that their citations were issued by officers who lacked probable cause. Legal principle: Prosecution’s reasoning The case is based on the principle of probable cause for making an arrest. Under the principle, a police officer can make a warrantless arrest, and citation, if there is a sufficient probable cause. A police officer can justify the move under probable cause in two circumstances. The officer must be able to explain the information that led to the assumption that the suspect was involved in a criminal act and the officer’s move must have been based on the suspected cause (Bergman and Berman, 2011). The likely ruling In the cases of Maryland vs. Pringe, Ybarra v Illinois and the case of State v. Sokolow, it was held that the presence of an incriminating evidence and reasonable suspicion for m ground for sufficient probable cause to arrest a suspect. It was further held, in the case of Alabama v. White, existence of probable cause is sufficient. The judge is therefore likely to uphold the case due to sufficiency of probable cause that the officers had (Bergman and Berman, 2011), (Carmen, 2009), (Meeker, 2004).... The gang can use this principal to suppress the paper (Meeker, 2004). Prosecution’s likely argument The law exempts the need for warrant before a search in cases where the searches are immediately related to an arrest. In the case of Colorado v. Bertine, the courts held that searches of a person’s possession are admissible if the search is done within the immediate scope of the arrest. The prosecution can thus argue that the retrieval of the paper was incident to the issuing of citations and therefore admissible (Carmen, 2009). The judge’s likely decision The judge is likely to uphold the evidence. This is because the suspects were under the authority of the police and the case of Colorado v. Bertine would be more applicable (Carmen, 2009). Question 3 Search of Ma’s car Tony accepts citation and gets into Ma’s car. A police officer then asked to search Ma’s car and she sped off. Legal status of the search Ma was obliged to let the police offi cer search her car. Reason Search on motor vehicles are governed by the Fourth amendment. Under warrantless search and frisk, a motorist can be searched on two grounds. The motorist must have been reasonably suspected of association with a criminal act. A search is also called for if the police officer feels threatened. The basis of a motorist’s association with a criminal act was established in the case of Pennsylvania vs. Mimms in which it was held that there must be a legal ground for stopping the car (Carmen, 2009). Persuading the court that the search was invalid A search, considered as a breach of a person’s privacy, is valid if it is done legally. The general rule for warrantless searches is that they have to be done with free consent of the suspect

Saturday, November 2, 2019

Islamic finance and conventional finance Research Paper

Islamic finance and conventional finance - Research Paper Example There is a growing global concern of the inequity in the allocation of wealth and income in the modern world, between and within countries, than has been witnessed before, with little hope of bridging the disparity. In this perspective, this essay will discuss ways in which Islamic finance can be seen as an innovative way that could substantively redefine finance and why it is different from conventional finance. Islamic finance is distinguished from conventional finance by the key attribute of adding moral and ethical aspects to fiscal transactions, hence providing a practical alternative to promoting responsibility in a free-market economy (Warner 301). Unlike the conventional financial and banking system, Islamic finance prohibits the opportunities for gambling-like speculation (or maysir), exchanging money for money (or riba) and making profit maximization the only endeavor for investment managers while disregarding other human perspectives of wealth. Instead, Islamic finance has innovatively introduced financial products based on Islamic law and also regulated and reciprocated by conventional monetary rules and regulations. Islamic Finance Products From the below examples, one can see that Islamic finance is geared towards reducing financial exploitation, especially among the less privileged. All rates of return are determined by the asset transaction, unlike conventional finance systems that base the returns on the interest accrued from loaned money (Warde 124). This is why it is increasingly appealing not only to non-Muslim countries, but also non-Muslim individuals, by redefining the way they perceive financial transactions. Istinaa: Also known as Commissioned Manufacture, Istinaa is a contract for the manufacture of goods under the perspective that speculation avoids the sale of a product that a person does not own yet. A promise under agreed specifications is arrived at, and a bank commissions the manufacture, hence undertaking the risk, and later sel ls to the buyer at agreed profit (Timur 799). Ijara: This is a leasing contract in which a party obtains an asset under lease for a specified cost and time from another, often a bank. All the risk is borne by the bank while a portion of the installments pay towards completion of the purchase at the time the asset will be transferred. Mudaraba: This is a trustee-type partnership financing whereby one party offers capital and another labor. Musharakha: This is equity participation whereby the involved parties contribute capital in terms of technical expertise or assets and set an agreed percentage of the risk and returns. If a bank is involved, it purchases property alongside the customers, and repayments are partly constituted of payback and rent. Differences between Islamic Finance and Conventional Finance In Islamic finance, there is the notion of a captive market, where products are based on Islamic principles and the market comprises of customers willing to adhere to the concepts of their religion. All transactions are based on the principle of sharing profit and loss, with returns varying depending on a bank’s performance. Customers can take part in profit sharing in more equitable ways than getting predetermined returns. On the other hand, in conventional finance and banking, customer returns are irrespective of a bank’s profitability or performance (Kadri 53). The banks only treat customers as depositors who do not receive any compensation apart from interest. Unlike conventional

Thursday, October 31, 2019

Marketing-Defining a Communication Plan Essay Example | Topics and Well Written Essays - 500 words

Marketing-Defining a Communication Plan - Essay Example Graves Enterprises is doing well in its business activities in the market while it has been focusing attention on business expansion and develop a new customer base for their for their consumer products. However its business operations in particular require the company to adopt far reaching changes to the existing communication strategy and its orientation. Any communication strategy must have a customer retention focus that will ultimately produce the desired results. While this would effectively address the concerns raised by the consumer marketing director, there would be a greater degree of structural changes in communication within and without the organization (Zambardino, 2003). 47% of customers being retained would have a positive impact on revenue and profit related outcomes of the company. However $ 2 per unit in gross profit means nothing in the absence of the breakeven figures. The company may have lot of financial commitments by way of sales cost and therefore the net profit margin can be considerably reduce if the 47% customer retention plan fails. Thus the advertising campaign must be not only focused on the core customer base but also be extended to include the peripheral customer whose retention matters in the long term. As the Marketing Director commercial products suggests the current cash cows of the company would be compelled a carry a greater burden if the slow growth market tend to cash unexpectedly. The company might have a lot of problem children and dogs and as a result there might be a few cash cows and stars. Assuming the communication strategy as based on advertising works out successfully, the net return on the investment must be proportionately higher (Percy, 2008). In other words per unit advertising cost must be much less to support cash cows to move in to sustainable long term profitable stars. Thus the marketing communication plan of the company must be based on a proper alignment of the Boston Matrix with the

Tuesday, October 29, 2019

Nursing Decision Making Essay Example | Topics and Well Written Essays - 1750 words

Nursing Decision Making - Essay Example The advancement of technology has fueled various practices even in the nursing profession that has in turn caused a revolution in the way that nurses make decisions. Nursing embraces technology especially since there has been tremendous revamp as a consequence of its incorporation in the nursing profession (Hardy, Garbett, Titchen, Manley, 2002, p.200). There are conditions where nurses have to make sober and most feasible decisions when it comes to patients suffering acute conditions. These patients have to be accorded precise care in order to ensure their comfortable recovery in health institutions. Many patients have faced situations where they do not recover out of their illnesses since nurses do not have ample reasoning skills (Del Bueno, 2005, p.202). This is a result of nurses not making correct assessment of the patients they have in their centers, where they are supposed to evaluate the most ill patients and offer them the help they need. This papers purports to evaluate the importance of critical thinking for nurses in their provision of healthcare to patients. The situation in health facilities is that ‘at risk’ patients are fitted with a device that notices complex fatal situations such as cardiac arrests and warns the health administration in order to offer them quick response (Ebright, Urden, Patterson, Chalko, 2003, p.635). Quite often though, the nurses in all over the world do not possess the right planning skills when offering administration of health care to patients. While the degree of complexity in diseases is increasing indefinitely, nursing profession has adopted the information and technology empowerment to offer their patients the best kind of healthcare. However, this has not been totally comprehensive in offering healthcare and it calls for additional endeavors to coach nurses. The profession management found it fit to complement nurses with teaching in critical thinking skills in an effort to reduce poor clinical reason ing. Research conducted by an Australian institution for instance, showed that the level of ‘unsafe’ nurses in the United States stands at 70%. This translates to the high number of fatalities of patients under healthcare and in retaliation critical thinking education scheme has been boosted to allow for better service provision. Critical Reasoning It is defined as the clinical way that nurses and other healthcare providers perceive the situations that face them in providing their services to patients. It may also be called problem solving, critical thinking, clinical judgment or decision making. Clinical judgment is assessing the problem a patient is facing. Nurses therefore need to be well equipped to make a distinction between symptoms, collecting evidence of illness, understanding them, evaluating the possible solutions to ease illness and implement the best possible solution. The process of clinical reasoning is the ability of a nurse to assess the situation of the patients in terms of their symptoms, understand them, evaluate possible solutions, implement the best solution, know the outcomes possible for the patient and to internalize the processes (Thompson & Dowding, 2002, p.50). There is not really a certain way that nurses have to make sober clinical reasoning solutions. The basic process however involves ?collection, description and understanding’. The reason why nurses should learn from these situations is because precedence is also a form of clinical reasoning. When for instance, a nurse encounters a problem in a patient they are best placed to make a decision if they had encountered identical problems in other patients and therefore make decisions based on

Sunday, October 27, 2019

Step by step design of a lock

Step by step design of a lock Introduction This paper outlines the step by step design of a lock in amplifier based micro-ohmmeter. This is very useful in measuring small resistances without applying large currents. And find its usefulness in tracing short circuits on printed boards containing sensitive components. The Audio Micro Ohm Meter uses synchronous detection to measure low value resistances. The circuit provides a variable frequency audio tone to indicate the resistance under test. Such a tone is invaluable when troubleshooting shorted tracks on multi-layer circuit boards because it is easier and quicker to observe 1. The source generates a 1KHz, 250mV peak square wave carrier signal that is injected into the unknown resistance, the resulting voltage across the resistor is amplified by the instrumentation amplifier. The phase reversing switch then rectifies the complementary square wave input, the rectified output is not all smooth so a low pass filter is needed. A Voltage controlled is then used to measure and indicate low value resistances such as track resistances on printed circuit boards. To provide a convenient indication, we want a ‘display that has high resolution (like a digital display) but is easy to read (like analogue meter) and that preferably doesnt even need to be looked at, so we can concentrate on the probes. To trace short circuits, the one thing we dont really need is high accuracy, since we are generally moving the probes 1. A muting detector then comes in to compare the control voltage with reference voltage. The Proteus ISIS software is used for the simulation of the circuit while a printed circuit board was used for the verification of the circuit. Resistor selection, analysis of waveforms , sensitivity and linearity of the device to supply voltage and possible improvements of the device were discussed. Excitation Oscillator One of the most useful ICs ever made is the 8-pin 555 timer and it is used in many projects. It can be used to build many circuits by just adding a few external components. NE555 is a popular version and it is suitable in most cases where a 555 timer is specified. Some low power types of the 555 are made, for instance the ICM7555, but can only be used when specified (to increase battery life) because their maximum output current of about 20mA (with a 9V supply) is too low for many standard 555 circuits. The ICM7555 has the same pin arrangement as a standard 555. The circuit symbol for a 555 is a box with the pins arranged to suit the circuit diagram: for example 555 pin 8 at the top for the +Vs supply, 555 pin 3 output on the right. Usually just the pin numbers are used and they are not labeled with their function. Standard 555 ICs create a significant glitch on the supply when their output changes state. This is not a problem in small circuits with no other ICs, but in a complex circuit a smoothing capacitor can be connected across the +Vs and 0V supply near the 555 . The 555 timer operates in different modes. The astable mode suits our design criteria. An astable circuit produces a square wave, this is a digital waveform with sharp transitions between low (0V) and high (+5Vs). It is possible that the durations of the low and high states may be different. The circuit is called an astable because it is not stable in any state: the output is continually changing between low and high. Our circuit needs a square waveform output of 4KHz, for this to be obtained an appropriate resistor value can be estimated by calculation to obtain the needed signal to drive the circuit Duty cycle The duty cycle of an astable circuit is the proportion of the complete cycle for which the output is high (the mark time). It is usually given as a percentage. The duty cycle of our circuit can be determined using Time period. The timeperiod (T) of the square wave is the time for one complete cycle, but it is usually better to consider frequency (f) which is the number of cycles per second 2. The time period can be split into two parts: T = Tm + Ts 5 Mark time (output high): Tm = 0.7 Ãâ€" (R1 + R2) Ãâ€" C1 Space time (output low): Ts = 0.7 Ãâ€" R2 Ãâ€" C1 we can determine our R2 using C3= 10nF, R1=1k and f= 4kHz we calculate our R2 as Tm = 0.7 X (1K + 33K) X 10 X 10^-9 = 238 ÃŽ ¼s While Space-time represents low output, Ts= 0.7 Ãâ€" R2 Ãâ€" C1 Ts = 0.7 X (1K) X 10 X 10^-9 = 0.7 ÃŽ ¼s T = Tm + Ts = 238 + 0.7 = 238.7 ÃŽ ¼s Duty cycle = = 99.7% The Quadrature Divider A quadrature divider, comprises a plurality of flip-flops, it includes at least two flip-flop, the flip-flops are interoperably coupled in series to produce a set dividing ratio 7. Each of the flip-flops includes two differential inputs I, two differential outputs O, and two differential clock inputs C, the outputs O, of one flip-flop is connected to the inputs I, of the next flip-flop, the outputs O, of the last flip-flop is connected inversely to the inputs I, of the first flip-flop, the flip-flops are clocked at their clock inputs C with differential clock signals in a consecutive manner which, for each flip-flop, are individually selected from quadrature clock input signals, 0, 90, 180, and 270, the quadrature divider is an even number divide-by-n circuit comprising a number of 2n flip-flops and providing a number of 4n output signals having 4n equidistant phases. 9 In our case the quadrature divider receives the square waveform signal from excitation oscillator as its clock signal . Figure 4 and 5 of the appendix show the pictorial representation of the quadrature divider as obtained from the circuit simulation and the oscilloscope graphic display. There are four output signals from the quadrature divider and they each have amplitude of about 5V but frequency of 1 KHz. This shows that the quadrature divider effectively divides the clock frequency into four amongst the equidistant phases. Attenuator An attenuator is a circuit that allows a known source of power to be reduced by a known factor usually expressed in decibels. The main advantage of an attenuator is that it is made from non-inductive resistors and therefore able to change a source or load, which might be reactive, into a resistive one that is know. The power reduction is achieved by the attenuator without introducing distortion. The attenuator used in our circuit is a pi type It is used to attenuate the 0 and 180 degrees antiphase 5V signal form the quadrature divider to 250mV at 1KHz. In order to get this value we need to select R5 in this attenuator circuit. Using Thevenins theorem. RTH = R5// (R3 + R4) where RTH = 100 ohms, R3 = 1K1ohms and R4 = 1K1 ohms. R5 = = 104.76 ohms. The best resistor to this to this value is a110 ohms resistor. So R5 = 110 ohms. figure 6 of the Appendix shows the graphical output of the attenuator with amplitude of about 250mV and frequency of 1 KHz. The attenuators gain in decibels is obtained by finding the ratio of the voltage corresponding to a known factor. Using the formula: , where R1 = 1100 ohms and the Z = 100, K = = 1.2 The value of attenuation, A in dB is obtained using K = 10 (A / 20) 1.2 = 10 (A / 20) A = 20 log 1.2 = 1.584 dB Instrumentation Amplifier An instrumentation amplifier is a variation of differential amplifier with input buffers that eliminates the need for input impedance matching making the amplifier suitable for use in measurement 5. It is a differential op-amp circuit providing high input impedances with the pleasure of gain adjustment through the adjustment of a single resistor. Instrumentation amplifier has very low DC offset, low drift, low noise, very high open-loop gain, very high common-mode rejection ratio, and very high input impedances. The instrumentation amplifier used in this circuit affected its accuracy and stability. The attenuated signal is applied across a resistor with very small resistance. The voltage drop across the resistor is small and needs to be amplified. The instrumentation amplifier does this, it composes of three op-amps arranged so that there is one op-amp to buffer each input signal and one to produce the desired output with adequate impedance matching for the function.3 The gain of the instrumentation amplifier circuit used for this micro-ohmmeter design is known to be 60 dB. Using the formula below then, Av =where AV = 60 dB, R = 10 k, 60 =, R9 = = 338.98 ÃŽ © The best resistor to this value is 340 ÃŽ © and it controls the gain of the instrumentation amplifier. The negative feedback of U3:A makes the voltage at pin 2 of U3:A to be equal to Voltage across R8. while, the voltage at pin 6 of U3:B is held to a value equal to Voltage across R14. This establishes a voltage drop across R9 equivalent to the voltage difference between V1 and V2 and subsequently a current through R9 and since no current is drawn by the feedback loops of the two input op-amps , the same amount of current through R9 must be going through R10 and R12 resistors above and below it. This produces a voltage drop between points A and B equal to V The ordinary differential amplifier part of the circuit then amplifies this voltage drop by a gain of 1. The post- differential amplifier circuit, with gain = R19 / R15 and differential input resistance = 2*R15. The two amplifiers on the left are the buffers. With R9 = Rgain removed (open circuited), they are simple unity gain buffers; the circuit will work in that state, with gain simply equal to R19 / R15 and high input impedance because of the buffers. The buffer gain is increased by putting resistors between the buffer inverting inputs and ground to shunt away some of the negative feedback; however, the single resistor Rgain between the two inverting inputs is a much more elegant method: it increases the differential-mode gain of the buffer pair while leaving the common-mode gain equal to 1. This increases the common-mode rejection ratio (CMRR) of the circuit and enables the buffers to handle much larger common-mode signals without clipping than would be the case if they were sep arate and had the same gain. Another benefit of the method is that it boosts the gain using a single resistor rather than a pair, thus avoiding a resistor-matching problem. The ideal common-mode gain of an instrumentation amplifier is zero. The common-mode gain of the instrumentation amplifier used in this design is near zero because of the equally numbered resistors and by the matched common-mode gains of the two buffer op-amps of the instrumentation amplifier. To obtain a closely matched resistors is difficult, as is optimizing the common mode performance of the input op-amps. All resistors are of equal value for this instrumentation amplifier except for R9. This method has the advantage of possessing extremely high input impedances on the input voltage across R=39 because they connect straight into the non-inverting inputs of their respective op-amps and adjustable gain that can be set by a single resistor. The lowest gain possible is obtained from the above circuit with R9 completely open (infinite resistance), and that gain value is 1. The output of the instrumentation amplifier is an anti-phase square wave signal from the that connects to the phase shift detector for further modification. Lock-In Amplifier A lock-inamplifier otherwise known as a phase-sensitive detector is a type of amplifier that can extract a signal with a known carrier wave from extremely noisy environment. It is a homodyne with a very low pass filter making it very narrow band. Lock-in amplifiers utilizes mixing, via a frequency mixer, to convert the signals amplitude and phase to a DC—in fact a time-varying low-frequency—voltage signal. It is often used to measure phase shift, even when the signals are of a high value and of high signal-to-noise ratio, and do not need any other improvement.To obtain signal at low signal-to-noise ratios, it is necessary that a strong, undiluted reference signal is made available at the same frequency as the signal to be measured. Phase Difference Two oscillators that have the same frequency and different phases that is, a phase difference, the oscillators are said to be out of phase with each other. The amount by which such oscillators are out of step with each other can be expressed in radians from 0 to 2Ï€ or in degrees from 0 ° to 360 °, If the phase difference is 180 degrees (Ï€ radians), then the two oscillators are said to be in antiphase. If two interacting waves meet at a point where they are in antiphase, then destructive interference will occur. It is common for waves of electromagnetic (light, RF), acoustic (sound) or other energy to become superposed in their transmission medium. When that happens, the phase difference determines whether they reinforce or weaken each other. Complete cancellation is possible for waves with equal amplitudes. Phase compensation This is the correction of phase error (i.e., the difference between the actually needed phase and the obtained phase). To obtain stability in an operational amplifier a phase compensation is required. To keep a phase margin in the phase compensation a capacitor/RC network is usually used . A phase compensator works by subtracting out an amount of phase shift from a signal which is equal to the amount of phase shift added by switching some additional amplifier stages into the amplification signal path. Low-Pass Filter A low-pass filter is a filter that passes low-frequency signals but attenuates (reduces the amplitude of) signals with frequencies higher than the cutoff frequency. An ideal low-pass filter completely eliminates all frequencies above the cutoff frequency while passing those below unchanged: its frequency response is a rectangular function, and is a brick-wall filter 8. If we need to get rid of an interfering signal in order to get a lot of attenuation, several RC filters can be cascaded. Unfortunately, the impedance of one RC section affects the next. What this means is that the transition between the pass and stop bands will not be sharp. A sharp transition helps reduce the interfering signal without causing degradation to the desired signals. In this case, the Sallen-Key active filter can do the job well. This circuit uses a 2-pole filter. Cascading a number of stages can give a steep attenuation transition with a very sharp knee. This cut-off frequency aids in selecting the R20 an d R22 resistor values to be used in the low pass filter design to average noise in the DC signal 6. The required Q for the butterworth filter = 1.414. The op-amp stage is a unity gain follower when R20 = R22. if C9 and C10 are equal, then the Q = 1.5858 for Butterworth response. Using convenient near values gain of 1.56 in the formula, R20 = R22 = Q / (4 ·Ãâ‚¬Ã‚ ·fo ·C9) where, fo = cut-off frequency = 4Hz, C9 = C10 = 0.1ÃŽ ¼F R20 = R20 = 310.31kÃŽ © The nearest standard resistor value to this calcualted resistor value is 330k Voltage Controlled Oscillator A voltage-controlled oscillator is an oscillator whose frequency is determined by a control voltage. As the control voltage causes the frequency to rise slowly until it hits a maximum and then falls back to the starting frequency. The first op-amp is an integrator(U7:A). A voltage divider puts the + input at half the control voltage. The op-amp attempts to keep its input at the same voltage, which requires a current flow across the 100k to ensure that its voltage drop is half the control voltage. When the MOSFET at the bottom is on, the current from the 200k goes through the MOSFET. Since the 100k resistor has the same voltage drop as the 100k but half the resistance, it must have twice as much current flowing through it. The additional current comes from the capacitor, charging it, so the first op-amp must provide a steadily rising output voltage to source this current. When the MOSFET at the bottom is off, the current from the 200k goes through the capacitor, discharging it, so a steadily falling output voltage is needed from the first op-amp. The result of the operation of this integrator circuit is a triangular waveform confirmed by figure 13 of the appendix. The capacitance of the capacitor in our circuit is determined thus: The second op-amp is a Schmitt trigger. It takes the triangle wave as input. When the input voltage rises above the threshold of 3.33 V, it outputs 5 V and the threshold voltage falls to 1.67 V. When the input voltage falls below that, the output goes to 0 V and the threshold moves back up. The output is a square wave. Its connected to the MOSFET, causing the integrator to raise or lower its output voltage as needed 4. Figure 14 shows the graphical representation of this circuit . The variation of the supply voltage from 3V to 9V while observing the output signal frequency obtains the sensitivity of the overall voltage- controlled oscillator circuit to supply voltage. From the test observation, the VCO produced no output signal at 3Vand beyond 6.2V. The below table shows the values obtained for the during the sensitivity test of the voltage-controlled oscillator. Using the power supply sensitivity formula Sensitivity Percentage change in frequency = Percentage change in power supply voltage = Between 5V to 6V, the percentage change in power supply voltage = = 20% While the percentage change in frequency is = 3.575% VCO sensitivity to this supply voltage variation = = 17.875 % Between 4V to 5V, the percentage change in power supply voltage = = 25% While the percentage change in frequency is = 12.21% VCO sensitivity to this supply voltage variation = = 48.84% The inference from the above calculation shows that the sensitivity of this lock-in amplifier based micro-ohmmeter to power supply voltage increases with reducing supply voltage. The tuning range of the VCO refers to the range of oscillation frequencies Two important parameters in VCO design are linearity and sweep range. Linearity correlates the change in frequency or the VCO output to the change in the control voltage. The sweep range is the range of possible frequencies produced by VCO control voltage. The linearity Muting Detector Circuit The filtered output from the phase sensitive detector is a control voltage which, with Zero input ( short circuited probes) is about Vg volts . It goes more positive with increasing signal level. With maximum input(open circuited probes) the voltage will saturate near the positive supply rail. This would result in a loud high pitched tone from the oscillator, which is not what we want. We want the it to be mute when the probes are disconnected and to do this another operational amplifier is brought in to compare the control voltage with a reference voltage. Whenever the control voltage goes higher than the reference, the output will go negative. This allows a small current to be drawn through D1 and R25, which will keep the oscillator transistor switched off, stopping oscillation. The output voltage of an AM synchronous detector is compared with a reference potential level by a voltage comparator. A muting device connected with the output of the detector is controlled by a control circuit connected with the comparator. Through this control circuit, the detector output is immediately muted when the detector output level falls below the reference potential level, and the muting of the detector output is removed after a predetermined retardation when the detector output level exceeds the reference potential level. References 1 Bateson, S. January 2010, Electronic Signal Conditioning Labs, Teesside University, Middlesbrough 2 Hewes, J, (17.02.2010), 555 Timer, http://www.kpsec.freeuk.com/555timer.htm#astable 3 Instrumentation amplifier, (14.02.2010) http://en.wikipedia.org/wiki/Instrumentation_amplifier 4 Java, (19.01.2001), Voltage controlled oscillator, http://www.falstad.com/circuit/e-vco.html 13022010 5 Kuphaldt, T, (12.02.2010), Differentiator and Integrator Circuits, http://www.allaboutcircuits.com/vol_3/chpt_8/10.html 6 Low pass filter, (14.02.2010) http://en.wikipedia.org/wiki/Low-pass_filter 7 Quadrature Divider, (17.02.2010), http://www.patentstorm.us/patents/7425850/claims.html 8 Sallen-key low-pass filter (13.02.2010), http://www.ecircuitcentezr.com/Circuits/opsalkey1/opsalkey1.htm 9 Widerin, P, (13.02.2010), Quadrature Divider, http://www.freshpatents.com/Quadrature-divider-dt20070111ptan20070009077.php