Thursday, October 31, 2019

Financial Reporting and Analysis Essay Example | Topics and Well Written Essays - 1000 words - 2

Financial Reporting and Analysis - Essay Example n laid down by the IASB and the FASB together with the intension of providing a sound future for the accounting standards which have moved to becoming more principals based, internally consistent and internationally converged. This paper has also dealt with the pros and cons of this framework and the agreements are based around the ‘international’ conceptual framework. The IASB is a board which aims at developing and helping to improve the general purpose financial statements, to make sure that it meets to the public interest (Mill, et.al., 2003). The IASB is one of the single high qualities, simple to understand and also one of the only global accounting standards which needs complete information of the general purpose financial statements. The International Accounting Standard Board (IASB) has made various proposals to improve the conceptual framework for financial reporting. The International Accounting Standard Board has proposed to improvise the objectives of the General Purpose Financial Reports (Kitabjian, 2008). The International Accounting Standard Board has focused on improving the General Purpose Financial Reports for potential investors and lenders. They suggest that the report aims at these groups of individuals to help them make informed decisions regarding their capital investments (IASB, 2008). The IASB also works in cooperation wi th the national accounting standard setters which provides for a meeting point for all the accounting standards from across the world. The use of fair value as opposed to the historical cost accounting has always been quite a controversial choice. In this case the use of fair value would prove to be more beneficial when compared to the historical cost accounting as this would have reduced the impact of the credit crunch. In the time of a credit problem and a troubled economy, the use of fair value is one which is most beneficial. The use of fair value is beneficial majorly because the use of the fair value provides

Tuesday, October 29, 2019

Summary on India Country Report Essay Example | Topics and Well Written Essays - 1000 words

Summary on India Country Report - Essay Example The financial year for India is April to March, and during the first quarter of the current financial year (2007-08), real GDP growth was 9.3%, estimated growth rate for the full year being 8.4%. This is on the back of an average annual growth rate of 8.83% in the past four years since 2003 – 04. The above 8% GDP growth performance is not likely to be sustained in the coming two years, forecasts being still healthy at 7.9 % and 7.4% successively. The overall GDP is estimated to cross one trillion US dollars land mark during the current year itself, by a good margin. Sector-wise, industrial and services sectors continue to outperform while the agricultural sector growth will be anemic, as in the past few years. During 2006-07, industry and services sectors accounted for 27.9% and 54.6% of the GDP respectively, the balance 17.5% being for the primary sector in which more than 700 million people are engaged in India. Thus, the bleak outlook for the rural economy stares in the face of Trade in goods and services, with continued political support for liberalization, is showing good performance. Imports are rising due to strong domestic demand for industrial and consumer goods. However, exports which averaged 26.5% growth in the past three years are expected to slow down to 17.2% in the current year, the main culprit being the weakening of the US dollar vis-Ã  -vis the Rupee. Rupee appreciated by over 12.5% in the past 12 months and the export oriented segments of the economy like software services, textiles, leather goods etc are hit by the Rupee appreciation. Rising cost of increased imports and crude oil are balanced somewhat by the rising exports of services along with remittances from non-residents, thus keeping the current account deficit under control, estimated at less than 2% of the GDP for 2008-09. The policy laid emphasis on increased spending on primary

Sunday, October 27, 2019

Packet Scheduling Algorithms Literature

Packet Scheduling Algorithms Literature Abstract- This paper discusses two selected research papers that proposes two different packet scheduling algorithms that focuses on promoting higher throughput and fairness. The two algorithms are Modified Packet Prediction Mechanism algorithm which is a revised version of the current packet prediction mechanism algorithm and the second is prioritized fairness packet Scheduling algorithm. Chapter 1 Introduction Mobile communication has come a long way and has been through multiple generations. Starting from a mere mobile radio telephone used in the old ages to sending text based messages and now fourth generation long term evolution supporting devices which are capable of streaming high bitrate videos, providing us with richer content and more connections at faster rates just from our handy mobile devices. Long term evolution structure adequately utilizes the assets by dynamically scheduling the frequency and the time space of users. And that is possible through long term evolution downlink scheduling which is accountable for the allotment of radio resources mutually throughout mobile devices. Implementing packet scheduling is crucial as it effects the performance by assigning radio resources suitably. 1.1 Problem Statement As the usage of mobile data, online mobile gaming, video streaming and other online applications started to grow, the delivery of packets, data transmission and speed has to be improved. While this is possible through the introduction of long term evolution, the quality and capability to has to be improvised by achieving high throughput connectivity which equates to successful data transmission and also fairness, for improving the distribution of the signal. Implementing a downlink scheduling algorithm is sensitive as if takes into effect the throughput, fairness, rate conditioning and so on. Among them, each has its own perks and features but newly or modified algorithm are being proposed and implemented periodically. As such, the modified packet prediction mechanism algorithm is proposed in order that through simulation has proved to perform better in terms of throughput and fairness. Also submitted is the prioritized fairness packet scheduling algorithm with the improvements in. Chapter 2 Literature Review 2.1 Mobile Network During the earlier decades, facilitating limited services like voice call is the main focus in developing mobile networks. Additional services like short message service was introduced by Global System for Mobile Communication. The craving of user in using mobile internet is the main motivation in development of Universal Mobile Telecommunication System, Enhanced Data rates for Global System for Mobile Communication Evolution known as EDGE and finally, General Packet Radio Services. In 1980, the first-generation analog cellular technology Advanced Mobile Phone Service in short form known as AMPS were introduced. Advanced Mobile Phone Service uses distinct channels or frequencies for every Frequency Division Multiple Access. Therefore, it cause Advanced Mobile Phone Service required huge bandwidth for a higher number of consumer. Second Generation offers digitally encrypted voice data and effective usage of available bandwidth. Short message service was introduced in this generation as a form of data services. Global System for Mobile Communication cellular technology is the foundation for other basis cellular networks. Base Transceiver station controls the cells in Global System for Mobile communication. Mobile Station is being served by each Global System for Mobile Communication cell while Base Station Controller monitors a number of Base Transceiver station. Global System for Mobile Communication network is categorized into four basic sub system which is Mobile Station, Base Station Subsystem, Core Network and External Network. Mobile Station consist of Security Information Management and terminal equipment. Base Station Subsystem consist Base Transceiver station, and Base Station Controller. Providing radio access and Core Network connection to Mobile Station is the main function of Base Station Subsystem. Core Network consist of Mobile Switching Station, Visitor Location Register, Home Location Register, Authentication Center and Operation and Maintenance Center. Main role of core network is to provide billing, transport functions, mobility management, user database such as user location and information about user and so on. External Network is where user can connect such as Public Switched Telephone Network or any other Global System for Mobile communication network. Circuit switching is used for communication in Global System for Mobile Communication networks. User start to demand for high data rates when mobile evolves. Therefore, General Packet Radio Services was introduced. General Packet Radio Services offers new services like web browsing provides packet switching hence increase data rates up to 114 kilobits per second. Enhanced Data rates for Global System for Mobile Communication Evolution is evolution of Global System for Mobile Communication after General Packet Radio Services where provides data rate up to 384 kilobits per second. Shifting the modulation of Global System for Mobile Communication from GPSK to 8PSK is the reason of this achievement. Technology Modulation Switching Method Access Scheme Data Rate (kbps) Services Global System for Mobile Communication GMSK Circuit Switching TDMA/FDD 9.6 to 14.4 Voice, short message service. General Packet Radio Services GMSK Packet Switching TDMA/FDD 115 Voice, short message service, Web Browsing Enhanced Data rates for Global System for Mobile Communication Evolution GMSK, 8PSK Packet Switching TDMA.FDD 384 Voice, short message service, web Browsing Global System for Mobile Communication overview Third Generation Partnership Project develop and maintain Universal Mobile Telecommunication System. Providing new services with better quality of services, better spectral efficiency and increasing data rates was the main aim in the Universal Mobile Telecommunication System development. Wideband Code Division Multiple Access is used as an access in Universal Mobile Telecommunication System. Bandwidth of 5 megahertz is used for downlink and uplink traffic. Universal Mobile Telecommunication System Terrestrial Radio Access Network (UTRAN) is the radio access in Universal Mobile Telecommunication System which consist Radio Network Controller (RNC) and many base stations which known as NodeB. Both circuit and packet switching method is supported in Universal Mobile Telecommunication System. Packet switching is mainly for data services like file transfer, web services while circuit switching is for voice traffic. High Speed Downlink Packet Access known as HSDPA and High Speed Uplink Pack et Access in short form known as HSUPA is the evolution of Universal Mobile Telecommunication System. This Evolution focused in reducing latency, increasing system capacity and data rates. High Speed Downlink Packet Access increases downlink data rates up to 14 Mbps while High Speed Uplink Packet Access increases uplink data rates up to 5.76 Mbps. Technology Modulation Data Rates TTI Time Latency ms Advancements Universal Mobile Telecommunication System BPSK 384 kilobits per second downlink 128 kilobits per second uplink 10 ms 150 Scheduling performed by Radio Network Controller High Speed Downlink Packet Access High Speed Uplink Packet Access QPSK,16 QAM, 64 QAM QPSK 14.4 megabits per second in downlink 5.76 megabits per second in uplink 2 ms 2 ms, 10 ms 100 100 AMC,HARQ, Scheduling at NodeB, MIMO HARQ, Scheduling at NodeB Third Generation overview 2.2 Long Term Evolution Introduction The idea of Long Term Evolution was originally developed due to the need of a technology which is possible to support IP based mobile technology hence, through this, providing features same as broadband connection. The difference between third generation and Long Term Evolution is that third generation is supports both packet and circuit switched while long term evolution supports packet switched and IP based services. Long Term Evolution need to have certain requirements in order to fulfill its goals such as able to provide data rates up to 50 megabits per second for uplink and 100 megabits per second for downlink, higher capacity of need to be provided compare to High Speed Downlink Packet Access, supporting multiple frequency bands, operation need to be cost effective and so on. 2.3 Architecture of Long Term Evolution Four main domains are being used in the architecture of Long Term Evolution which is UE (User Equipment), E-UTRAN (Evolved Utran), EPC (Evolved Packet Core Network) and finally, services. A diagram is illustrated below to show how this four domains are being used in LTE architecture. LTEArchitecture 2.3.1 UE (User Equipment) Device that are being used for communication purpose by end user are called user equipment. Each device has a unique identity module called Universal Subscriber Identity Module. The module being used for identification process, authorization and security for radio transmission. Moreover, the user equipment has other functions as well, such as for an instance mobility management, UI (User Interface) between end users, but mainly it provides communication platform and communication link which can be set up, maintained or removed depending on the user need. 2.3.2 E-UTRAN (Evolved Utran) Evolved NodeB also known as eNodeB is the only existing node in Evolved UTRAN. Radio related activities in the LTE system are being performed through a radio base station located within the network through this evolved NodeB. Besides that, a path is created from the User Equipment to Evolved Packet Core Network with the help of evolved NodeB. Through this, data passing can be done within the ratio connection and IP based Evolved Packet Core Network network connections and evolved NodeB becomes a transmission point to various radio protocols pointing towards the User Equipment. After the data is relayed, Evolve Packet Core Network then performs functions such as ciphering and deciphering to the UP data. In details, activities related to managing radio resource including allocation of the resources based upon on prioritization and traffic scheduling depending on the Quality of Service requirements are also one of the responsibility held by evolved NodeB. Besides that, evolved NodeB is also held responsible for the management of mobility which includes activities such as analyzing radio signal measurements performed by the User Equipment and comes up with same measurements as well. Furthermore, evolve NodeB also handles a new users request for a new connection, the evolved NodeB will route the request to mobility management entity using the previous User Equipment that was connected earlier and if there isnt any information regarding the routing then a new mobility management entity will be selected. The User Equipment can only be connected to one evolved NodeB where else the evolved NodeB is expected to support multiple users. The handover process can be only done if an evolved NodeB is connected to its neighbor, which is another evolved NodeB. A User Equipment can be only assigned with one mobility management entity and serving gateway but multiple mobility management entity and serving gateway can be connected a certain evolved Nod eB. 2.3.3 EPC (Evolved Packet Core) Evolved Packet Core uses different kinds of elements to operate. The elements are Mobility Management Entity (MME), Packet Data Network Gateway (P-GW), Serving Gateway (S-GW) and Policy and Charging Resource Function (PCRF). Mobility management entity is the core of evolved packet core. A direct connection is established with user equipment through mobility management entity and this connection will become the main control channel for the user equipment and network. There are many activities conducted by the mobility management entity such as, authentication of the user equipment. Authorization is provided by the mobility management entity as the user equipment is being newly registered to a network. Other activities such as tracking the available user equipment in a certain area is considered to be the main function for mobility management entity and so on. Responsibility of a serving gateway is resources management and provide resource requested from mobile management entity and so on. In details, the request comes from user equipment due to modification of bearers and so on. Besides that, information passing is also done through the serving gateway which occurs among packet data network gateway and evolved NodeB. Another element that is being used is packet data network gateway. This element is being used mainly for IP allocation to the user equipment. Moreover, bearer switching is done at this element when the user equipment transferred at one serving gateway to another serving gateway at different area. Lastly, the policy and charging resource function takes the decision regarding service handling according to the quality of service. 2.3.4 Services A variation of services can be done such as operator services and so on. In order to run the services smoothly many sub systems are needed, plus logical nodes as well. 2.4 Long Term Evolution Access Scheme The access schemes are used in long term evolution can be divided into three different types which is orthogonal frequency division multiple access, single carrier frequency division multiple access and finally, multiple input and output. Each of these scheme has a certain functions and responsibility to follow. 2.4.1 OFDMA (Orthogonal Frequency Division Multiple Accesses) This scheme is used in downlink in the long term evolution. This scheme was originally modified from Orthogonal Frequency Division Multiplexing. The difference between the modified version and original version is that, orthogonal frequency division multiple accesses allows multiple users by allocating subcarriers dynamically to a variety of users while in the original version, a signal will be divided into a number of band channels which are orthogonal to one and another and consist of different frequencies. Orthogonal frequency division multiple access is used for many reasons, one of it is compatibility. This scheme is compatible with many kind of recently developed antennas and receivers. Moreover, efficiency is another reason this scheme is chosen. Efficiency in handling many bandwidths, performance including spectral can be achieved through this scheme. Originally, Orthogonal Frequency Division Multiplexing was created in the 1950s but was not popular back then due to greatest number of systems were running on analog technology during that time which made the implementation of this scheme hard and less effective. As the era grew, the use of these scheme has increased as it was much more affordable and implementable as well for the end user due to growth of digital technologies. 2.4.2 SC-FDMA (Single Carrier Frequency Division Multiple Access) As mentioned above, the Orthogonal Frequency Division Multiplexing is only being used for downlink in long term evolution where else for uplink the Single Carrier Frequency Division Multiple Access will be used. This is because of multiple carrier which is being utilized in Orthogonal Frequency Division Multiplexing leading it to be less efficient especially when it comes to power consumption as power will be a serious issue in mobile devices. This problem can be avoided by the use of Single Carrier Frequency Division Multiple Access for the uplink process. Advantages of this scheme is that it will be much more robust in contrast to multi path and hence, a low peak ranging to average is being provided. 2.4.3 MIMO (Multiple Input Multiple Out) The Multiple Input Multiple Out scheme can be implemented in both downlink and uplink in long term evolution. A high data rate can be accomplished by using both Orthogonal Frequency Division Multiple Access and Multiple Input Multiple Out as diverse subcarriers will be cast-off. Furthermore, spatial multiplexing meaning that the use of many antennas for transferring diverse data streams and signal processing on the data streams leading to an increase in the data rate is also being done in this scheme. Besides that, even additional functionality such as transmit diversity meaning that relaying the equal signals but originated from different antennas and finally, beam forming as well can be performed in this scheme. 2.5 PRB (Physical Resource Block) According to the base station scheduler, a resource block will be dispersed to the user equipment. This portion is to be considered as the smallest allocation. Moreover, depending on the bandwidth and number of Orthogonal Frequency Division Multiple Access symbols, resource grid will be created in the downlink transmission. A sole subcarrier will be symbolized in each box of the grid and called as resource element and hence automatically representing a symbol. Not only will the user data be stored in the resource grid but also reference signal as well. Resource Block Resource block which is subtypes of a resource element in Long Term Evolution network. A resource block consists many channels and different types of data flows are transferred in Long Term Evolution network. The Long Term Evolution network does not have any standard scheduling method. There are different types of method is exists in scheduling but it based on the researcher. One of the command method that been used in scheduling mechanism in Long Term Evaluation is Dynamic scheduling that used for providing Quality of service and efficiency. Dynamic scheduling is used in downlink scheduling. The purpose of the dynamic scheduling is to control the channel of some of the sign indicated. Evolved NodeB is taken the main role in downlink scheduling. As mention earlier the function has been explaining in additionally Evolved NodeB is one of the import factor for performing scheduling. Evolved NodeB is performing scheduling mechanism in Long Term Evolution network for downlink scheduling mechanism and it managed resource block in the resource elements. Nowadays many users are forwarded toward to the technology so that there were required Quality of Service to the specific application its main reason why scheduling is needed. In Long Term Evolution network have a combination of multiple single cells is connected. The user interaction is connected to the Evolved NodeB with single cell but user equipment is contained N number of members. During the process of uplink scheduling, some packet or data may be lost, one of the reason is a delay in the parameter. The delay queue packet is grouped into a single logical channel and downlink scheduling of evolved NodeB is also holding buffer. In the downlink scheduling, each buffer is related to the user equipment and the user equipment is connected to the evolved NodeB. The evolved NodeB has broadcast the specific data traffic of loaded queue. The main reason of scheduling is to increase the performance of throughput and fairness. And reduce packet loss. Scheduling algorithms for evolved NodeB is not standardized but it based on the used Quality of Service of a user; network provider or service provider is analysis the problem and identify new algorithms and solve the user problem. There different type of scheduling method exists in downlink scheduling. Although there are many algorithms had been discovered in the past yet fair scheduling and opportunistic scheduling is widely been used. Firstly, the Fair Scheduling scheme is one of the algorithm that been used for downlink scheduling it can give least data rate to every user and reduced the inertness. Fair Scheduling scheme is used in real time application for example video conference and voice over IP. Fair Scheduling scheme is functioned as least required information rate all the more successfully. Most of the scheduling algorithms are based on these key factor. Secondly Opportunistic Scheduling schema is another scheduling scheme is commonly been used in LTE networks. The Opportunistic Scheduling schema is explained that due to multiple users multiple users scattered around different location number of channel each user gets may vary. Users can experiences better productivity to correct setting of frequency and time. Multi-user can cause the problem to mobile radio channel because different user come from the various environment and they connected with each other. By utilizing multi-client differing qualities system, this radio channel trademark can be used for giving better information rates. The network provider must choose better dynamic scheduling which is included in downlink scheduling. By using the best dynamic scheduling the user can experience better performance in throughput based on the channel it can be done based on the specific spectrum. Therefore, Opportunistic Scheduling schema also have some drawbacks. The Opportunistic Scheduling scheme is not able to provide the better quality of service to the user and subsequently providing poor performance on fairness to the client. This is the reason why the multiple users are cannot transmit the data to their specific client and also another reason is their channels is not good enough. 2.6 Quality of Services in LTE As years pass by the demand for mobile usage has grown exponentially the people now are capable doing a wonderful thing through their smartphone. The advancement of technology has opened up many new applications and uses. This is the reason why people is demanding quality of service to the network provider. The Quality of Service two also deals with real time application such as voice over IP. Then it also deals with the large scale of the networks. In the long term Evaluation network channel is the mediator for the user equipment and evolved NodeB. In the Long Term Evolution network, there has logical barrier connection between two endpoints. During the data transmission between the user equipment and packet data network gateway has virtual have Transmission Control Protocol connection-oriented connection. During the data transmission between the two endpoint data link layer is involved in transporting the Quality of Services to the user. The Quality of Services can be divided into multiple traits which are bit rate, delay, and reliability. Different type of barrier is producing different kind of result for Quality of Services such as these two types of radio channel, for an example using Lee and Ali, where Lee is capable of enduring a larger packet loss and very low latency but Ali do not care regarding the low latency and hence, he is willing to receive the low latency. This example requires the two radio channel and each radio channel is configured with some packet loss and low latency based on the Quality of Service as requested by the user. There are two types of barrier in the Quality of Services in Long Term Evolution network. What is the minimum guaranteed bit rate barrier and non-guaranteed bit rate barrier? Minimum guaranteed bit rate barrier is real time application and it uses least number of information rate that should be ensured. An example of minimum guaranteed bit rate barrier is that the voice over IP, videoconference, stream gaming, streaming video and video call. Non-guaranteed bit rate barrier are used in application but it does not require specific type of bit rate. For the non-guaranteed bit rate is not specific so the bandwidth has to be set for the networks. An example for the non-guaranteed bit rate is file transfer, games and web searching, which is also known as a non-real-time application. The Quality of Services of a class identifier is represented each of the mobile network barriers which analysis by a Quality of Service characteristics. The Quality of Service of Class Identifier is possible to be divided into a standardized factor which is delay, loss rate and priority. The Quality of Service of the Channel Quality Indicator is divided into 9 Quality of Service of Class Identifier characteristics. Below the table shows the Quality of Service of Class Identifier characteristic with the attributes shown. 2.7 Radio Resource Management Therefore, in the Long Term Evolution network, architecture consist of only one node that is evolved NodeB which is intermediate between the user and the main network. Radio resource management is performing is the function on evolved NodeB. Radio resource management performing First In First Out queue method for packet scheduling. Radio resource management also interacts with downlink scheduling for packet delivery. However, the radio resource management is work with Channel Quality Indicator, transmission time travel and media access control address. 2.8 Scheduling mechanism in LTE In the Long Term Evolution network, multiple user interactions are the main function. Then, Long Term Evolution network data and packet are transferred among multiple users based on the user requirement and Quality of Service. In additionally, downlink scheduling is used metric for transmitting the data and packet. Metric is the method of calculation which priority for the resource block. The calculation is based on the data flow and the resource allocation. 2.8.1 Round robin scheduling Round Robin scheduling is mainly based on time quota. Each process is handled and entertained fairly. Round robin algorithm does not rely on the priority of each task. Round Robin algorithm is easier to implement, simpler to handler and starvation free. Each task is given a time quantum. Each process or task is terminated once the allocated time quantum expires. Round robin produces maximum minimum fairness. If the size of each packet of data equally distributes, then packet that queued longer in the waiting queue is given priority. This is not applicable for data in different sizes. Implementation of round robin algorithm results in poor throughput. This is because round robin algorithm do not consider the Channel Quality Indicator. This causes the performance of throughput drop significantly as its the quantity of bits need to be delivered is not rely with the instantaneous downlink signal to noise ratio. Round Robin is one of the mostly used algorithm in packet scheduling in most systems. Round Robin Scheduling Flow Chart 2.8.2 Best Channel Quality Indicator From the name itself we knew that this algorithm chooses the Best Channel Quality Indicator. This algorithm is primarily used to allocate resource blocks with the good radio link environments to the user. Resource block that been appointed by the algorithm comes with the highest Channel Quality Indicator in the resource block compared to other blocks. The Channel Quality Indicator will be transmitted to base station. Base station will perform the Best channel Quality Indicator. Base station will transmits the reference downlink pilot (signal) to the terminal. These downlink pilot will be utilized by the user equipment for the calculation of the Channel Quality Indicator. The higher the value of Channel Quality Indicator, the Best Channel Quality Indicator it is. The Channel Quality Indicator is a 5 bit information which ranges from 0 to 30. Terminals that located far off from the base station most unlikely will be scheduled. The Channel Quality Indicator depends on the terminals distance. The nearer it is, the higher the Channel Quality Indicator. Since this Best Channel Quality Indicator chooses the nearest terminals, it causes starvation for the other users. When comes to the throughput, the Best Channel Quality algorithm performs well. Its performance in term of fairness is really poor. Best Channel Quality Indicators Flow Chart 2.8.3 Proportional Fair Scheduling Proportional Fair is one of the famous algorithm used in scheduling mechanism. Proportional fair scheduling produces high fairness and throughput. User with the maximum priority is given the resources after the calculation of channel condition. User with fewer priority is followed then after the first one. The main focus of the Proportional Fair scheduling algorithm is to support the non-real time services in Code Division Multiple Access High Data Rate. If the scheduler allocates higher number of resources for a particular user rather than channel quality, then the Proportional Fair scheduling mechanism will be affected. Each data flow is given scheduling priority which is indirectly proportional with the estimated resource allocation. This results in maximum cell throughput and satisfactory fairness. When come to freeness, Proportional Fairness scheduling works better than Best Channel Quality Indicator and Round Robin. Although Proportional Fairness is better, yet it still not abl e to complete due to some expectations. For example, if the user become nearer to the evolve NodeB from a long distance, the sound to noise ratio will be increasing gradually (signal shadowing is ignored). Thus, the users original sound to noise ratio will always will be above the average rate. There is possibilities where user can be frequently scheduled. If the user moves farther than the evolve NodeB, then the sound to noise ratio will be lesser than average. It may causes the user to starve. 2.8.4 Modified Largest Weighted Delay First Largest Weighted Delay First algorithm is proposed packets with error rate and different delays Largest Weighted Delay First algorithm

Friday, October 25, 2019

The Importance of Being Earnest :: English Literature

The Importance of Being Earnest A protagonist is described as the main character in the story. The story line revolves around this one character and the events in his/ her life. In the Importance of Being Earnest, Jack Worthing is the protagonist of the play because it is his character that dominates the narrative. His pursuit to marry Gwendolen, and the conflicts and struggles he goes up against to reach his ultimate goal, are traits which develop his character into being the protagonist. For a character to take on the role of protagonist, there always needs to be conflict. Jack Worthing’s first conflict is getting the approval to marry Gwendolen from her mother, Lady Bracknell. In the beginning of the story when Jack, also referred to as Ernest, proposes to Gwendolen, but is denied the ability to marry Gwendolen until he has passed Lady Bracknell’s series of tests; what she sees as a suitable husband for her daughter. This is shown through her statement of: â€Å"I fell bound to tell you that you are not on my list of eligible young men†¦however, I am quite ready to enter your name should your answers be what a really affectionate mother acquires† (Wilde,1438). Earnest informs her that he does not know anything from his childhood, including who his parents are, and why he became an orphan; and now is thought to be unacceptable suitor to marry her daughter, Gwendolen. Lady Bracknell reinforces to Jack that â€Å"to be born, or at any rate bred in a handbag, whether it had handles or not, seems to me to display a contempt for the ordinary decencies of family life that reminds one of the worst excesses of the French revolution†(Wilde, 1440), basically stating that having a hand bag for a parent is an unacceptable â€Å"notion about family life† (Parker), and needed to find out who his parents are before he can marry Gwendolen. It is this sort of conflict that must arise in order for the play to pursue any further. It is the role of the protagonist to ensure that he continues on his pursuit in order to get what one wants, that being the hand of Gwendolen. Jack lies and discoveries â€Å"of human freedom in protean identity† (Parker, 185) which he â€Å"adopt[ed] identities to suit the occasion† (parker, 185). All of these identities and secret lives eventually led to Gwendolen’s hand but also the truth of who Jack really was; the true importance of being Ernest, because being Ernest gets him what he wants. The title of the play â€Å"The Importance of being Earnest† shows significance because this creates conflict and comedy between the

Thursday, October 24, 2019

Environmental policy Essay

â€Å"Environmental policy can’t be based solely on efficiency arguments. Issues of ethics are at least as important.† Discuss The above statement is true to a certain extent and in the course of this essay a balanced discussion will be presented in the hope that the outcomes will prove this to be true. To begin, the thoughts of some Russian intellectuals will be put forwards on the subject of Utilitarianism and why efficiency is self-destructive in the long run, thus supporting the statement â€Å"Environmental policy can’t be based solely on efficiency arguments.† To lead on from this there will be a dialogue as to the problems faced by old command and control (hence forth referred to as CAC) policies such as direct regulation and emissions fees from an efficiency and ethical viewpoint. Then, these methods of environmental policy and the ideas of Ronald Coase will be highlighted as an example of ethical influence in possible environmental policy as well as from an efficiency standpoint. Following this will be an outlining of the development of the U.S Tradable permits approach to air pollution control and the ethical influences therein. Taking the ethical issues point raised in the title statement one step further then leads onto the idea of ethical considerations. These have been based around an anthropocentric perspective, thus far and so at this point some views from an eco-centric stance will be considered. To do this, A. Leopold’s ‘The Land Ethic’ will be looked at. The rights of nature will be brought under the umbrella of Ethical issues and discussed from a policy perspective. What economists mean by â€Å"economic efficiency†, is that â€Å"in an ideal economic system, goods worth more than they cost to produce get produced, goods worth less than they cost to produce do not.† (D. Friedman. 2004) This holds firm throughout this discussion, along with the idea of efficiency as it is defined as both: â€Å"The production of the desired effects or results with minimum waste of time, effort or skill,† (dictionary.com 2004) and as â€Å"A measure of effectiveness; specifically, the useful work output divided by the energy input in any system† (dictionary.com 2004). In different aspects of environmental policy, these different definitions of efficiency hold true, though it is clear that they all have the same thing in mind when referring to efficiency. As it Stands, Utilitarianism (the theory of Jeremy Bentham) is an example of efficiency if it were to be applied to policy. Valdimir Odoevsky, â€Å"one of the most brilliant and influ ential representatives of progressive thought [in Russia]† (A. Frolova 1998) of his time, produced a development of the utilitarian theory of J. Bentham, which is illustrated in Alla Frolova’s article ‘Ecological reasoning: Ethical alternatives’. The utilitarian approach to life as put across by Odoevsky, who states that â€Å"utility is an essential driving force of all human actions,† (A. Frolova 1998) it is said to be the driving force for all laws, legislations, activities and morals. It is also suggested that under the notion of utilitarianism, utility should be allowed to take the place of all notions of so called consciousness, so called inborn feeling, all poetical dreams and fantasies. This is a very powerful tool for the representation of efficiency as the sole driver of any policy decisions, even environmental ones, however it is a valid viewpoint where ethics is not taken into consideration. Odoevsky talks of a civilization called Benthamia where under the concept of utility everything runs in a sustainable way. However it is when a new civilization is founded outside of Benthamia that the problems associated with a system void of ethics emerge. Through the use of political intrigues, deceit, and bribery, as well as organizing quarrels among any rival civilizations that emerge in order to weaken them for the benefit of Benthamia, the Benthamites extend their power. After they have sufficiently weakened a civilization to the point where that civilization is of no further use to Benthamia, the weakened civilization is taken into full possession either by the acquisition of it (at the cheapest efficient price) or by the use of force. All of these points are seen to be ethically wrong in today’s world where ethics is â€Å"A set of principles of right conduct† (A. Frolova 1998) and even when there is a call for utilization of â€Å"deserted islands† (A. Frolova 1998) rather than taking over the crushed neighbors of Benthamia, the suggestions are condemned and those who put them forwards are said to be â€Å"idle dreamers† (A. Frolova 1998). In Odoevsky’s vision of utilitarianism, Benthamia is torn apart from within due to different self interests associated with differing social situations throughout the growing civilization and as it is put by Odoevsky â€Å"One day glorious Benthamia ceased to exist.† (A. Frolova 1998) Odoevsky perceives nature as sensitive and responsive in regard to human morals and this representation of efficiency as the sole driver of decision making shows that ethics are important in every aspect of what we do. Less extreme examples of efficiency in environmental policy can be seen when looking at cases such as the policy relating to dealing with the inefficiencies associated with the production of steel. Classic approaches to the problem of the externalities of steel production include direct regulation by the government based on telling the steel industry how much they can pollute, as well as emission fees (called Pigouvian taxes). Emission fees are based around the concept of charging steel companies for the damage done by its pollution. The idea of direst regulation is seen to be an inefficient environmental policy whereas emission fees are said to produce an efficient amount of steel as well as an efficient amount of pollution control. In the real world however emission fees policy is not efficient as it is difficult to measure what the damage caused is as well as it being inefficient to spend time looking for the damage caused. These two policies are based around the idea of efficiency in the steel industry (as an example), though with the insight of R. Coase and the introduction of what many have dubbed â€Å"Coase Theorem† social cost can be associated with efficiency to create a better overall way of viewing the problem of externalities through the introduction of property rights. Rather than a system whereby the government defines the measures that need to be taken by industry or where it is left to the polluter to deal with the control methods as with the previously mentioned CAC policies, the idea of Coase’s theorem defines a policy where, â€Å"if transaction costs are zero – if, in other words, any agreement that is in the mutual benefit of the parties concerned gets made, then any initial definition of property rights leads to an efficient outcome† (D. Friedman. 2004) The way that his argument is put across in the article entitled ‘the Swedes get it right’ is based around the cost of abatement of pollution in a steel factory Vs. the cost of changing downwind land use from a resort to a timber forest. The article, written by D. Friedman, puts forwards a very efficient environmental policy whereby the distribution of property rights leads to the internalization of externalities and the most cost effective outcome on a social level. Under the notion of Coase theorem, if it is cheaper for the resort to pay the factory for the cost of pollution abatement rather than change his own land use then this should be done, producing a situation where everybody is happy and the overall conditions are more desirable. This efficiency based policy is seen to be an advancement of old efficiency based policy though there are still problems associated with it due to the fact that ethics are not considered. One of the largest problems noted by Coase is the idea of the â€Å"Public Good Problem† (D. Friedman. 2004). If there are many different people living downwind of a factory and they contribute to the abatement of the pollution, then if one person does not pay because doing so wont make a difference to whether the abatement is paid or not and the abatement does go through, then that person is seen to be a â€Å"free rider† (D. Friedman. 2004) getting abatement for free. This is why air pollution in Southern California still persists, as there are millions of people living in the area it is hard to get a situation where everyone pays for the abatement of pollution and it is not possible to re-locate this vast number of people. Coase argues that it is not the externalities that essential ly create the problem, but that it is the transaction costs. A policy approach to the environment that has taken ethical issues into consideration can be seen in the US formation of a tradable permit approach to air pollution control. In the discussion about the US system ethical consideration is defined in either of two contexts: â€Å"(1) when the decisions seem to reflect altruistic concerns which transcend self-interest and (2) when the decisions seem to provide special treatment to ‘rights’ which seem to have a special moral justification† (T. Tietenberg. 1998). The emissions trading program is set out as a straight forwards, flexible market based policy where the trading of permits is allowed and efficiency is increased due to the self interests of the participating industries. Through the acquisition of an â€Å"emission reduction credit (ERC)† (T. Tietenberg. 1998) this trading can take place and to acquire this ERC a company must lower its emissions to a point below the required level put forwards by the Cle an air act. Further efficiency is established by the way that the ERC system allows new firms to come into the market, thus, â€Å"by introducing the offset policy EPA [the Environmental protection agency] allowed economic growth to continue whilst insuring progress toward attainment.† (T. Tietenberg. 1998) The efficiency of the tradable permits system can be seen by analysis, which concluded that â€Å"the proposed 0.01 g per leaded gallon (gplg) standard would result in $36 billion ($1983) in benefits (from reduced adverse health effects) at an estimated cost to refining industry of $2.6 billion.† (T. Tietenberg. 1998) As well as being implemented at a national level. Tradable permit systems have also been applied at a regional scale, with air pollution in California being an example of this. RECLAIM (Regional Clean Air Incentives Market) shifts the burden of identifying the appropriate control strategies from the control authorities to the polluter (a point that made direct regulation an inefficient policy based solution, as previously mentioned), and thus the system again proves to be effective due to the fact that now, pollution prevention is given an economic underpinning. Along with these examples off efficiency, the tradable permits system, when compared to emissions char ges and emission standards comes out as a far more effective environmental policy. Ethics can be observed in the Tradable permits approach however, and evidence seen in the paper ‘Ethical influences on the evolution of the US tradable permit approach to air control’ suggests that ethical considerations have played a role in shaping the environmental objective, the choice of instruments, the definition of the tradable commodity, the treatment of shutdown credits, the relationship to traditional regulation and the rules governing permit trades. Thus it is the opinion of the author T. Tietenberg, that ethical influences on the evolution of the US tradable permit approach have been â€Å"blended with pragmatic and political concerns to forge a compromise approach† (T. Tietenberg. 1998). This means that even if ethical issues are considered they do not hold as much weight as efficiency arguments and result in efficiency bias compromises. This can be seen in the case of shut down credits. Among the various ways of creating credits this has been the most controversial point. It is controversial, ethically, because the economic incentive should be targeted at positive actions to reduce pollution through the investment of new control equipment and not through shut-down (which is where a factory is shut down to create a large number of tradable ERC’s). As a result the compromise has produced a situation whereby â€Å"all shut-down credits either revert to the control authority or they could be freely transferred to buyers† (T. Tietenberg. 1998). This is a result that doesn’t stop the process of shut-downs (as would be ethically acceptable) but allows the process to continue but with efficient outcomes rather than hoarding of ERC’s. The ethical issues that have been represented in the case study of Tradable permits in the US have been examples of human-centric ethics focusing on welfare. Some environmentalists, such as A. Leopold focus more on eco-centric ethics and present an argument that through social evolution the land itself should be considered as a member of the community which is taken into account in environmental policy. Leopold, in his article, ‘The Land Ethic’ explains his concept and the problems associated with achieving this goal. It is said to be the case that our educational and economic system is heading away from, rather than towards â€Å"an intense consciousness of land† (A. Leopold. 1949) . Leopold shows through the use of specific examples how there are essentially two different types of conversationalists, as Leopold puts it there are the â€Å"economic value grabbers† (A. Leopold. 1949) and those that see â€Å"land as biota† (A. Leopold. 1949) and worr y about the secondary functions of things such as forests. Leopold gives a good illustration of this through the use of sport and meat. Group A, the economic value grabbers, when presented with the idea, will think efficiently about the subject, being satisfied with the thought that these are things that ‘come from’ nature. Group B however, worries about biotic side issues, for example the cost in predators of producing a game crop. Whereas the ideas associated with Coase’s theorem are related to the health issues and other things that affect humans living downwind of the factory, it is the conclusion of Leopold that, â€Å"A land ethic, then, reflects the existence of an ecological conscience, and this in turn reflects a conviction of individual responsibility for the health of the land† (A. Leopold. 1949). This view holds that the land is to be conserved or protected as some sustainability policies are currently leading towards. It is the opinion of Leopold that sustainability policy should be based around ideas of eco-centric ethics rather than being based around the idea that it is a ne cessity to promote sustainable policies from a human centric point of view. To conclude it can be said that efficiency is still the main focus of environmental policy making however over time the emergence of ethics in policy has emerged, though ethical issues are not considered to be at least as important as efficiency arguments. It has been said that â€Å"without some kind of ethic (a theory of right and responsibility) and some kind of axiology (or value theory) we lack guidance and direction for tackling problems, whether global, environmental, or otherwise† (R. Attfield. 1999). The discussion in this essay has led towards an outcome that supports the statement to a certain degree. It has been shown through the use of the utilitarian argument and some CAC policy methods that efficiency is not the only thing that has to be considered in environmental policy making, and the US case-study supports the notion that a certain amount of ethics has to be involved. But the nature of the ethics that is applied is essentially Human-centric and to consider ethical issues in environmental policy to be as important as efficiency the idea of a land ethic is an important one. As Leopold says himself the idea of a land ethic is not yet public opinion and in fact is only being kept alive by a minority who has revolted against modern trends of efficiency and human-centric ethics. Ethical issues are not as important as efficiency arguments in environmental policy though if the land ethic were to become a popular opinion through re-education and a shift in social thinking then there is a hope that in time the statement will be completely justified. References A. Leopold (1949) The Land Ethic. In: A Second County Almanac. Oxford University Press. Oxford. Alla Frolova (1998) Ecological reasoning: Ethical alternatives. Ecological Economics, 24. p.169-182. Dictionary.com (2004) http://dictionary.reference.com/ David Friedman The Swedes get it right. http://www.daviddfriedman.com/Libertarian/The_Swedes.html (2004) Robin Attfield (1983) The Ethics of Environmental Concern. Basil Blackwell. Oxford. Robin Attfield (1998) Existence value and intrinsic value. Ecological Economics, 24. p. 163-168 Robin Attfield (1999) The Ethics of the Global Environment. Edinburgh University Press. Edinburgh. Robert Elliot (1995) Environmental Ethics. Oxford University Press. Oxford. Tom Tietenberg (1998) Ethical influences on the evolution of the US tradable permit approach to air pollution control. Ecological Economics, 24. p. 241-257. Student no. 00020854702E

Wednesday, October 23, 2019

Importance of Animal Behavior Essay

Why do animals behave the way they do? The answer to this question depends on what the behavior is. A cat chases a mouse to catch it. A spider spins its sticky web to trap insects. A mother dog nurses her puppies to feed them. All of these behaviors have the same purpose: getting or providing food. All animals need food for energy. They need energy to move around. In fact, they need energy just to stay alive. Baby animals also need energy to grow and develop. Birds and wasps build nests to have a safe place to store their eggs and raise their young. Many other animals build nests for the same reason. Animals protect their young in other ways, as well. For example, a mother dog not only nurses her puppies. She also washes them with her tongue and protects them from strange people or other animals. All of these behaviors help the young survive and grow up to be adults. Rabbits run away from foxes and other predators to stay alive. Their speed is their best defense. Lizards sun themselves on rocks to get warm because they cannot produce their own body heat. When they are warmer, they can move faster and be more alert. This helps them escape from predators, as well as find food. All of these animal behaviors are important. They help the animals get food for energy, make sure their young survive, or ensure that they survive themselves. Behaviors that help animals or their young survive increase the animals’ fitness. You read about fitness in the Evolution chapter. Animals with higher fitness have a better chance of passing their genes to the next generation. If genes control behaviors that increase fitness, the behaviors become more common in the species. This is called evolution by natural selection. Innate Behavior All of the behaviors shown in the images above are ways that animals act naturally. They don’t have to learn how to behave in these ways. Cats are natural-born hunters. They don’t need to learn how to hunt. Spiders spin their complex webs without learning how to do it from other spiders. Birds and wasps know how to build nests without being taught. These behaviors are called innate. An innate behavior is any behavior that occurs naturally in all animals of a given species. An innate behavior is also called an instinct. The first time an animal performs an innate behavior, the animal does it well. The animal does not have to practice the behavior in order to  get it right or become better at it. Innate behaviors are also predictable. All members of a species perform an innate behavior in the same way. From the examples described above, you can probably tell that innate behaviors usually involve important actions, like eating and caring for the young. There are many oth er examples of innate behaviors. For example, did you know that honeybees dance? The honeybee in Figure below has found a source of food. When the bee returns to its hive, it will do a dance, called the waggle dance. The way the bee moves during its dance tells other bees in the hive where to find the food. Honeybees can do the waggle dance without learning it from other bees, so it is an innate behavior. When this honeybee goes back to its hive, it will do a dance to tell the other bees in the hive where it found food. Learned Behavior Just about all other human behaviors are learned. Learned behavior is behavior that occurs only after experience or practice. Learned behavior has an advantage over innate behavior. It is more flexible. Learned behavior can be changed if conditions change. For example, you probably know the route from your house to your school. Assume that you moved to a new house in a different place, so you had to take a different route to school. What if following the old route was an innate behavior? You would not be able to adapt. Fortunately, it is a learned behavior. You can learn the new route just as you learned the old one. Although most animals can learn, animals with greater intelligence are better at learning and have more learned behaviors. Humans are the most intelligent animals. They depend on learned behaviors more than any other species. Other highly intelligent species include apes, our closest relatives in the animal kingdom. They include chimpanzees and gorillas. Both are also very good at learning behaviors. You may have heard of a gorilla named Koko. The psychologist Dr. Francine Patterson raised Koko. Dr. Patterson wanted to find out if gorillas could learn human language. Starting when Koko was just one year old, Dr. Patterson taught her to use sign language. Koko learned to use and understand more than 1,000 signs. Koko showed how much gorillas can learn. See A Conversation with Koko at http://www.pbs.org/wnet/nature/koko/ for additional information. Think about some of the behaviors you have learned. They might include riding a bicycle, using a computer, and playing a musical  instrument or sport. You probably did not learn all of these behaviors in the same way. Perhaps you learned some behaviors on your own, just by practicing. Other behaviors you may have learned from other people. Humans and other animals can learn behaviors in several different ways. The following methods of learning will be explored below: 1. Habituation (forming a habit). 2. Observational learning. 3. Conditioning. 4. Play. 5. Insight learning. Habituation Habituation is learning to get used to something after being exposed to it for a while. Habituation usually involves getting used to something that is annoying or frightening, but not dangerous. Habituation is one of the simplest ways of learning. It occurs in just about every species of animal. You have probably learned through habituation many times. For example, maybe you were reading a book when someone turned on a television in the same room. At first, the sound of the television may have been annoying. After awhile, you may no longer have noticed it. If so, you had become habituated to the sound. Another example of habituation is shown in Figure below. Crows and most other birds are usually afraid of people. They avoid coming close to people, or they fly away when people come near them. The crows landing on this scarecrow have gotten used to a â€Å"human† in this place. They have learned that the scarecrow poses no danger. They are no longer afraid to come close. They h ave become habituated to the scarecrow. This scarecrow is no longer scary to these crows. They have become used to its being in this spot and learned that it is not dangerous. This is an example of habituation. Can you see why habituation is useful? It lets animals ignore things that will not harm them. Without habituation, animals might waste time and energy trying to escape from things that are not really dangerous. Observational Learning Observational learning is learning by watching and copying the behavior of  someone else. Human children learn many behaviors this way. When you were a young child, you may have learned how to tie your shoes by watching your dad tie his shoes. More recently, you may have learned how to dance by watching a pop star dancing on TV. Most likely you have learned how to do math problems by watching your teachers do problems on the board at school. Can you think of other behaviors you have learned by watching and copying other people? Other animals also learn through observational learning. For example, young wolves learn to be better hunters by watching and copying the skills of older wolves in their pack. Another example of observational learning is how some monkeys have learned how to wash their food. They learned by watching and copying the behavior of other monkeys. Conditioning Conditioning is a way of learning that involves a reward or punishment. Did you ever train a dog to fetch a ball or stick by rewarding it with treats? If you did, you were using conditioning. Another example of conditioning is shown in Figure below. This lab rat has been taught to â€Å"play basketball† by being rewarded with food pellets. Conditioning also occurs in wild animals. For example, bees learn to find nectar in certain types of flowers because they have found nectar in those flowers before. This rat has been taught to put the ball through the hoop by being rewarded with food for the behavior. This is an example of conditioning. What do you think would happen if the rat was no longer rewarded for the behavior? Humans learn behaviors through conditioning, as well. A young child might learn to put away his toys by being rewarded with a bedtime story. An older child might learn to study for tests in school by being rewarded with better grades. Can you think of behaviors you learned by being rewarded for them? Conditioning does not always involve a reward. It can involve a punishment instead. A toddler might be punished with a time-out each time he grabs a toy from his baby brother. After several time-outs, he may learn to stop taking his brother’s toys. A dog might be scolded each time she jumps up on the sofa. After repeated scolding, she may learn to stay off the sofa. A bird might become ill after eating a poisonous insect. The bird may learn from this â€Å"puni shment† to avoid eating the same kind of insect in the future. Learning by Playing Most young mammals, including humans, like to play. Play is one way they learn skills they will need as adults. Think about how kittens play. They pounce on toys and chase each other. This helps them learn how to be better predators when they are older. Big cats also play. The lion cubs in Figure below are playing and practicing their hunting skills at the same time. The dogs in Figure below are playing tug-of-war with a toy. What do you think they are learning by playing together this way? Other young animals play in different ways. For example, young deer play by running and kicking up their hooves. This helps them learn how to escape from predators. These two lion cubs are playing. They are not only having fun. They are also learning how to be better hunters. Insight Learning Insight learning is learning from past experiences and reasoning. It usually involves coming up with new ways to solve problems. Insight learning generally happens quickly. An animal has a sudden flash of insight. Insight learning requires relatively great intelligence. Human beings use insight learning more than any other species. They have used their intelligence to solve problems ranging from inventing the wheel to flying rockets into space. Think about problems you have solved. Maybe you figured out how to solve a new type of math problem or how to get to the next level of a video game. If you relied on your past experiences and reasoning to do it, then you were using insight learning. One type of insight learning is making tools to solve problems. Scientists used to think that humans were the only animals intelligent enough to make tools. In fact, tool-making was believed to set humans apart from all other animals. In 1960, primate expert Jane Goodall discovered that chimpanzees also make tools. She saw a chimpanzee strip leaves from a twig. Then he poked the twig into a hole in a termite mound. After termites climbed onto the twig, he pulled the twig out of the hole and ate the insects clinging to it. The chimpanzee had made a tool to â€Å"fish† for termites. He had used insight to solve a problem. Since then, chimpanzees have been seen making several different types of tools. For example, they sharpen sticks and use them as spears for hunting. They use stones as hammers to crack open nuts. Scientists have also observed other species of animals making tools to solve problems. A crow was seen bending a  piece of wire into a hook. Then the crow used the hook to pull food out of a tube. An example of a gorilla using a walking stick is shown in Figure below. Behaviors such as these show that other species of animals can use their experience and reasoning to solve problems. They can learn through insight. This gorilla is using a branch as a tool. She is leaning on it to keep her balance while she reaches down into swampy water to catch a fish. Social Behavior Why is animal communication important? Without it, animals would not be able to live together in groups. Animals that live in groups with other members of their species are called social animals. Social animals include many species of insects, birds, and mammals. Specific examples of social animals are ants, bees, crows, wolves, and humans. To live together with one another, these animals must be able to share information. Highly Social Animals Some species of animals are very social. In these species, members of the group depend completely on one another. Different animals within the group have different jobs. Therefore, group members must work together for the good of all. Most species of ants and bees are highly social animals. Ants, like those in Figure below, live together in large groups called colonies. A colony may have millions of ants. All of the ants in the colony work together as a single unit. Each ant has a specific job. Most of the ants are workers. Their job is to build and repair the colony’s nest. Worker ants also leave the nest to find food for themselves and other colony members. The workers care for the young as well. Other ants in the colony are soldiers. They defend the colony against predators. Each colony also has a queen. Her only job is to lay eggs. She may lay millions of eggs each month. A few ants in the colony are called drones. They are the only male ants in the colony. Their job is to mate with the queen. The ants in this picture belong to the same colony. They have left the colony Honeybees and bumblebees also live in colonies. A colony of honeybees is shown in Figure don’t purge me. Each bee in the colony has a particular job. Most of the bees are workers. Young worker bees clean the colony’s hive and feed the young. Older worker bees build the waxy honeycomb or guard the hive. The oldest workers leave the hive to find food. Each colony usually has one queen that lays eggs. The colony also has a small number of male drones. They mate with the queen. All the honeybees in this colony work together. Each bee has a certain job to perform. The bees are gathered together to fly to a new home. How do you think they knew it was time to gather together? Cooperation Ants, bees, and other social animals must cooperate. Cooperation means working together with others. Members of the group may cooperate by sharing food. They may also cooperate by defending each other. Look at the ants in Figure below. They show clearly why cooperation is important. A single ant would not be able to carry this large insect back to the nest to feed the other ants. With cooperation, the job is easy. These ants are cooperating. By working together, they are able to move this much larger insect prey back to their nest. At the nest, they will share the insect with other ants that do not leave the nest. Animals in many other species cooperate. For example, lions live in groups called prides. A lion pride is shown in Figure below. All the lions in the pride cooperate. Male lions work together to defend the other lions in the pride. Female lions work together to hunt. Then they share the meat with other pride members. Another example is meerkats. Meerkats are small mammals that live in Africa. They also live in groups and cooperate with one another. For example, young female meerkats act as babysitters. They take care of the baby meerkats while their parents are away looking for food. Members of this lion pride work together. Males cooperate by defending the pride. Females cooperate by hunting and sharing the food. Mating Behavior Some of the most important animal behaviors involve mating. Mating is the pairing of an adult male and female to produce young. Adults that are most successful at attracting a mate are most likely to have offspring. Traits  that help animals attract a mate and have offspring increase their fitness. As the genes that encode these traits are passed to the next generation, the traits will become more common in the population. Courtship Behaviors In many species, females choose the male they will mate with. For their part, males try to be chosen as mates. They show females that they would be a better mate than the other males. To be chosen as a mate, males may perform courtship behaviors. These are special behaviors that help attract a mate. Male courtship behaviors get the attention of females and show off a male’s traits. Different species have different courtship behaviors. Remember the peacock raising his tail feathers in Figure above? This is an example of courtship behavior. The peacock is trying to impress females of his species with his beautiful feathers. Another example of courtship behavior in birds is shown in Figure below. This bird is called a blue-footed booby. He is doing a dance to attract a female for mating. During the dance, he spreads out his wings and stamps his feet on the ground. . This blue-footed booby is a species of sea bird. The male pictured here is doing a courtship Courtship behaviors occur in many other species. For example, males in some species of whales have special mating songs to attract females as mates. Frogs croak for the same reason. Male deer clash antlers to court females. Male jumping spiders jump from side to side to attract mates. Courtship behaviors are one type of display behavior. A display behavior is a fixed set of actions that carries a specific message. Although many display behaviors are used to attract mates, some display behaviors have other purposes. For example, display behaviors may be used to warn other animals to stay away, as you will read below. Caring for the Young In most species of birds and mammals, one or both parents care for their offspring. Caring for the young may include making a nest or other shelter. It may also include feeding the young and protecting them from predators. Caring for offspring increases their chances of surviving. Birds called killdeers have an interesting way to protect their chicks. When a predator gets too close to her nest, a mother killdeer pretends to have a broken wing. The mother walks away from the nest holding her wing as though it is  injured. This is what the killdeer in Figure below is doing. The predator thinks she is injured and will be easy prey. The mother leads the predator away from the nest and then flies away. This mother killdeer is pretending she has a broken wing. She is trying to attract a predator In most species of mammals, parents also teach their offspring important skills. For example, meerkat parents teach their pups how to eat scorpions without being stung. A scorpion sting can be deadly, so this is a very important skill. Teaching the young important skills makes it more likely that they will survive. Defending Territory Some species of animals are territorial. This means that they defend their area. The area they defend usually contains their nest and enough food for themselves and their offspring. A species is more likely to be territorial if there is not very much food in their area. Animals generally do not defend their territory by fighting. Instead, they are more likely to use display behavior. The behavior tells other animals to stay away. It gets the message across without the need for fighting. Display behavior is generally safer and uses less energy than fighting. Male gorillas use display behavior to defend their territory. They pound on their chests and thump the ground with their hands to warn other male gorillas to keep away from their area. The robin in Figure below is also using display behavior to defend his territory. He is displaying his red breast to warn other robins to stay away. The red breast of this male robin is easy to see. The robin displays his bright red chest to defend his territory. It warns other robins to keep out of his area. Some animals deposit chemicals to mark the boundary of their territory. This is why dogs urinate on fire hydrants and other objects. Cats may also mark their territory by depositing chemicals. They have scent glands in their face. They deposit chemicals by rubbing their face against objects. Cycles of Behavior Many animal behaviors change in a regular way. They go through cycles. Some cycles of behavior repeat each year. Other cycles of behavior repeat every day. Yearly Cycles An example of a behavior with a yearly cycle is hibernation. Hibernation is a state in which an animal’s body processes are slower than usual and its body temperature falls. An animal uses less energy than usual during hibernation. This helps the animal survive during a time of year when food is scarce. Hibernation may last for weeks or months. Animals that hibernate include species of bats, squirrels, and snakes. Most people think that bears hibernate. In fact, bears do not go into true hibernation. In the winter, they go into a deep sleep. However, their body processes do not slow down very much. Their body temperature also remains about the same as usual. Bears can be awakened easily from their winter sleep. Instinctual behavior One type of instinctual behavior is fixed action patterns, which are behaviors the animal is compelled to engage in. For instance, some birds will raise the chicks of other birds if the eggs are put in their nests during nesting season, because caring for an egg is a fixed action pattern. Another instinctual behavior is imprinting, wherein a baby animal accepts a person, or even an item, as a surrogate mother. Sexual behavior is also instinctual, bolstered by play, which helps animals learn courtship and mating skills. Many of these behaviors are dictated by specific body systems, like the nervous system, which responds to stimuli in the environment. Learned behavior Learned behavior is important both for wild animals, who must learn specific and new ways to survive, and for domestic animals that we seek to train. Animals can learn to anticipate that an action will have a predictable outcome through trial and error, such as dog learning to sit for a treat. This is called operant conditioning. They can also learn that one event precedes another, such as the sound of a metal food bowl being moved signaling food being served, which is known as associative learning. Animals also learn a lot through watching others and mimicry. All of these behaviors allow an animal to adapt to new situations and problems. Abnormal behavior Identifying behavior patterns enables people to determine when animals are  behaving abnormally. These abnormal behaviors might simply be annoying to animal owners; however, in other instances they may also be dangerous for the animal and others or even threaten their very survival. For example, inappropriately aggressive dogs, which might be suffering from disease or trauma, are potentially dangerous to themselves and others. The behavior may be addressed if it is identified as abnormal and normal behavior is reestablished. More important to species survival are mating and raising offspring, and in these cases abnormal behavior that leads to failure to mate or care for offspring can present a threat to the animal’s long-term survival.

Tuesday, October 22, 2019

Imaging Techniques essays

Imaging Techniques essays Discuss application of imaging technology for detection of abnormalities of musculoskeletal system. Today there are many different types of imaging technology for the detection of abnormalities in the musculoskeletal system. These include: The contents of this report will briefly discuss the application of all the aforementioned imaging techniques, and will touch on some of the musculoskeletal abnormalities they can be used to diagnose. The focus of this report, however, will be on Computed Tomography, Arthrography and Magnetic Resonance. Computer tomography (also called CT or CAT scans) was first made public in 1972 and was said to be the most significant development in clinical use of x-rays since their discovery by Roentgen (Oldendorf et al. 1988 **book*). CT uses specialised X-ray equipment, with the aid of a computer, to produce cross-sections of several types of tissue including lung, bone, and soft tissue. A great advantage of this technology is its ability to produce clear detailed images of blood vessels, very small bones and the surrounding tissue. Computed tomography has a vast array of uses including detection, sizing, and precisely locating tumours and cancers. It is also used in trauma cases as it can quickly identify damage to many of the internal organs. When it comes to the musculoskeletal area, CT has proven to be of great benefit. In trauma injuries, for instance, CT has been extremely important in both the axial and appendicular skeleton because of its ability to demonstrate cross-sectional anatomy and then display any additional plane with re-formations (Webb et al. 1998). CT can also show even the smallest of bones and muscle tissue in great detail and is therefore especially useful in complex joint abnormalities. For example, joints such as the hip or shoulder when viewed under plain film examination can hide multiple fractures or loose bodies. (Webb et al, 1998 ***book***) There are also so...

Monday, October 21, 2019

Strategy of Goggle

Strategy of Goggle Analysis of Goggle Larry and Brinn founded this entity in the 1990s. However, the entity had a different name, Back Rub. The founders of the entity were undergraduates at Stanford University. The two students developed a search engine that could rate website relevance via examination of back links.Advertising We will write a custom case study sample on Strategy of Goggle specifically for you for only $16.05 $11/page Learn More The above innovation would support the undertakings of countless entities in the Information technology (IT) sector. The founders later registered the entity in California. The entity generated its income only as search engines. Nonetheless, the entity currently has diversified its operations into an assortment of subsectors in the computer industry (Clay Esparza, 2012). What is going on? In the previous decade, Goggle has made some shrewd acquisitions. The acquisitions have entailed entities that would complement Goggle’s oper ations. Additionally, the acquired entities would enable diversification and creation of new products. Goggle’s income originates predominately from advertisements despite the entity dealing in mobile phone software and other merchandise. The entity also sells search appliances. In 2010, Goggle was the favourite search device. This denotes the entity’s domination of the market. In America, the entity serves over sixty percent of the search requests. The trend is similar internationally. Goggle also has an enormous workforce that executes its daily operations. The entity’s management of the work force has culminated in innovations like YouTube, a music search engine. Such a project has earned the entity enormous returns. The entity has developed numerous data centres. The data centres will facilitate penetration into lucrative markets in Asia. Additionally, they have revealed Goggle’s commitment towards a clean environment. Generally, innovations and produ ct creation have facilitated expansion in Goggle. SWOT Analysis Strengths The entity has managed its personnel in a shrewd manner allowing the entity to benefit from their expertise. Projects like You Tube have emanated from the creativity of its employees. However, the entity has earned phenomenal revenues from such innovations. Additionally, the global community is utilizing the internet greatly. Consequently, there is a sustainable demand for Goggle’s products globally. Google has diversified its products reducing its risk as an entity. Therefore, failure of a product would have minimal implication on the entities fortunes.Advertising Looking for case study on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Weaknesses The entity loses income through counterfeiting of its products. This is common practice especially in relation to application product. Therefore, Goggle should petition authorities to enf orce counterfeit legislation to minimize its losses. Opportunities Innovations are critical to the survival of this entity. Therefore, Goggle has to provide the clientele with better products always hence, winning more clientele. Additionally, there are lucrative markets in the emerging economies that the entity can harness. Threats The entity operates in an exceedingly competitive market. Therefore, Goggle has to ensure that it is at par with its rivals. It should ensure that it improves its products persistently. Google is predominantly dependent on proceeds emanating from advertising. Accordingly, fluctuation in such incomes would affect the firm considerably. PEST Analysis Strengths Advancement in technology will affect this entity positively. Technological progression will have considerable impacts in the emerging markets that are lagging behind technologically. Such advancements will create demand for Goggle’s products. Its personnel management strategy is unique hence, allowing the entity to utilize the creativity of its employees rather than issuing repetitive duties that do not support career growth. Weaknesses Google operates in an industry which changes rapidly. Consequently, the entity requires sustained research on product improvement. Failure to do so will allow its rival’s products to surpass its own. This would be detrimental since the clientele always opt for the best products. References Clay, B. Esparza, S. (2012). Search engine optimization all in one for dummies. California, CA: Wiley publication.

Sunday, October 20, 2019

2018 Hurricane Names

2018 Hurricane Names 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 Below you will find the listing of hurricane names for the Atlantic Ocean for the year 2018. For every year, there is a pre-approved list of tropical storm and hurricane names. These lists have been generated by the National Hurricane Center since 1953. At first, the lists consisted of only female names; however, since 1979, the lists alternate between male and female. Hurricanes are named alphabetically from the list in chronological order. Thus the first tropical storm or hurricane of the year has a name that begins with A and the second is given the name that begins with B. The lists contain hurricane names that begin from A to W, but exclude names that begin with a Q or U. There are six lists that continue to rotate. The lists only change when there is a hurricane that is so devastating, the name is retired and another hurricane name replaces it. The 2018 hurricane name list is almost the same as the 2012 hurricane name list.  Hurricane Sandy was a large and destructive storm in 2012 so the name was retired from the list and Sara took its place. 2018 Hurricane Names AlbertoBerylChrisDebbyErnestoFlorenceGordonHeleneIsaacJoyceKirkLeslieMichaelNadineOscarPattyRafaelSaraTonyValerieWilliam

Saturday, October 19, 2019

Using the IS-LM framework Essay Example | Topics and Well Written Essays - 1750 words

Using the IS-LM framework - Essay Example The model is represented in the form of a graph. The horizontal axis represents the national income or Gross Domestic Product (GDP) of an economy. The vertical axis represents the variable â€Å"i† which denotes the prevailing interest rates in the economy. The model achieves equilibrium at a point where â€Å"IS† curve intersects the LM curve. Inflation is considered as an exogenous factor in this model in the short run. This means that in the short-run real and nominal interest rates are same and any changes in the nominal interest rates affect the demand for money in the economy. (Lipsey & Chrystal 2003) IS curve is drawn just like a conventional demand curve. The independent variable of this curve is the interest rate and the dependent variable is the national income of the economy which is denoted by â€Å"Y†. The curve is a downward sloping line. The reason for the downward or negative slop of the curve is the fact that at lower interest rates demand for mo ney â€Å"Y† is high. At higher interest rate levels, the demand drops down. This is in line with the rational behavior of consumers, institutions, businesses and governments. Since interest rate is a cost of money, many people would demand more money when it is being offered at cheaper rates. Similarly businesses will demand more money when the interest rates are low which lowers down their cost of doing business. Governments and other institutions will also borrow when the interest rate is low because of the fact that they will have to give lower amount to the party lending the fund, for the use of funds. In other words opportunity cost of borrowing is low when interest rates are low and high when interest rates are higher. All the parties needing money borrow more at lower interest rates unless the demand for money is inelastic. (Brue & McConnell 2006) IS Curve can be mathematically explained by the following equation: In the above equation, C(Y-T(Y)) represents the consum er spending part of the function. I(r) represent the investment function which is affected by the interest rates. It must be remembered that the relationship between investment and interest rate is negatively proportional at all times. G represents the government spending part which is exogenous or given. No factor affects the government spending and since it is solely determined by the government’s own policy hence it is considered as an exogenous factor. The last part of the function is related to international trade. NX(Y) represents the net import minus exports and denotes the net international trade as a function of real income. It must be remembered that the relationship between the international trade and disposable income is positive all the times. This makes sense as it tells the readers that the more income the people have, more they will be willing to spend. (Anabtwi & Smith 1994) In the diagram â€Å"Figure 1†, it can be seen that the IS curve is downward s loping. In other words, the relationship between national income (GDP) and interest rate is negatively correlated. Any fall in interest rate increases the national income and any rise in interest rate decreases the national income (GDP). The relationship is more explicitly point out in numerical figures. The rise in interest rates from 4 percent to 5 percent has resulted in the fall in national income from $700 to $600. The relationship between these two variables is negative. The relationship makes sense because of the opportunity cost

Friday, October 18, 2019

Media and Privacy Assignment Example | Topics and Well Written Essays - 1000 words

Media and Privacy - Assignment Example It is not ethical to invade people’s privacy and it should always be paramount to protect their image (Karen 21). When dealing with cases where the person is in the public place, they expect to have their privacy protected from the public. However, they have to respect privacy but at the same time be robust about their investigation. Journalist should not disclose publicly any private, irrelevant and embarrassing facts about people. Misappropriating a person’s name and image for personal gain is also unethical. Intruding into a person’s solitude and exposing them to the public is against journalistic principles (Stephen 34). However, if an individual is considered to have been involved in any crime, they could have their rights to privacy waived as it mostly seen to be in the public’s interest to depict their behavior. The audience responds differently when it comes to nudity, coarse language, and violence. This should only be published when it is only nec essary for the public to be made aware. When shocking materials are considered important in a story, they usually arouse negative public reaction. The public should be warned of disturbing and explicit materials that they may be exposed to (Stephen 15). They should never be caught off guard and censor forms should be used so as to prevent children from watching such features which may leave them disturbed. Images of graphic scenes that show violence, shocking, bloody and tragic features are at times seen in the news. Reporters are accused of being indecent in the way they collect the news and showcase it to the public (Karen 43). However, as much as the journalists observe the code f ethics, there are some concerns that the content of journalism is being ignored. Modern reporting is seen as biased, especially on issues of politics. Sensationalism is also a major complaint as many people relate to this. The concerns are bigger as the media continues to change by the day to suite dive rsity. Selective reporting is seen to be practiced by many media houses and newspapers. These goes against the codes of ethics (Stephen 54). Question 2 Journalists are guided by a code of ethics and some of the elements included in the code include the principle that the materials they submit should be accurate, fair, truthful, and have an objective. Any material released to the public should be clearly scrutinized before its release and all the details written should be accurate and should have more things to support it. Fairness should be exercised and all journalists should be able to get both sides of the story (Stephen 58). They should get accurate information from their sources so as to steer clear of inadvertent error. The public has the right to know of the sources’ reliability and the sources should be questioned so as to clarify that there are no motives behind their information. Journalists should give the accused persons the opportunity to respond to the accusatio ns of wrongdoing (Karen 67). Distorting information that they have been given is against the rules of conducts. They should not mislead the public with the information that they publish. Gathering information via surreptitious methods should always be avoided. They should tell stories of diversity and magnitude regardless of its popularity. They should not stereotype by religion, race, age, sexual preference, disability, social status, and physical appearances.

The New Deal and the Great Society Essay Example | Topics and Well Written Essays - 750 words

The New Deal and the Great Society - Essay Example Roosevelt believed that other matters were far more important than racial discrimination. Never willing to lose the support of Southern Congressional Democrats, he declined to support legislation making lynching a crime, while denouncing lynching in his speeches. He declined to advocate banning the poll tax, used by southern whites to deny the vote to southern blacks. He refused to use the relief agencies to challenge local patterns of discrimination; the NRA tolerated widespread practices of paying blacks less than whites, blacks were largely excluded from employment in the TVA; the FHA refused to provide mortgages to blacks moving into white neighborhoods; and the AAA was ineffectual in protecting the interest of black share croppers and tenant farmers. Some liberal historians argue that the New Deal laid the groundwork for the â€Å"broker state† to be expanded a generation later, mostly through the work of the next wave of liberal reform – the civil rights movement and the Great Society – to embrace groups marginalized in the 1930’s – however, many African American historians insist that the civil rights movement owed everything to black activists and very little to the New Deal. Roosevelt was an idealist with a vision. He promised the American people a New Deal, but when he took office during his first term, he had no idea what that New Deal would consist of. He knew the American people were in dire need of relief, and this could only be brought about through recovery, and that all aspects of the American system were in need of reform. need of reform. As a consequence, his initial foundation was premised on what has become known as the three R's.The first effort which he embarked upon was the providing of relief. Taking the remnants of an old Hoover program; the federal Emergency Relief Administration, which was a work relief program, Roosevelt scrapped what he considered to be viable and to it he added the civilian conservation corps. He added auxiliary programs i.e., Works Progress Administration, and beginning in 1935, he introduced his most long standing and beneficial social security and unemployment insurance programs. It was obvious that rural America, albeit suffering from the same

Lateral Epicondylitis Article Example | Topics and Well Written Essays - 250 words

Lateral Epicondylitis - Article Example The therapists decided to use their common program for treating the condition, which entailed the use of US, wrist extensor muscle progressive resistance exercise, stretching and cross friction massage (Hoppenrath & Charles 136). Ultra sound was included because two studies in a systematic review with placebo comparison had shown that US had significant clinical improvements in treating lateral epicondylitis. Since the therapists would e using US, they also decided to find out whether they could use US to transdermally administer anti-inflammatory drugs through the process known as phonophoresis (Hoppenrath & Charles 138). The therapists were interested in determining whether phonophoresis is better than US or whether the addition of some other drug through US treatment (phonophoresis) may help reduce pain in lateral epicondylitis. The studies reviewed in the systematic review revealed that there was no enough evidence to support the alluded fact that adding anti-inflammatory drugs t o the coupling medium in phonophoresis would produce additional positive results in treating lateral epicondylitis (Hoppenrath & Charles 139). As such, the therapists decided to use their common program for treating the condition, which entailed the use of US, wrist extensor muscle progressive resistance exercise, stretching and cross friction massage. In view of this systematic review, I opine that since that there is no strong evidence to support the fact that adding anti-inflammatory drugs to US-phonophoresis-improves care outcomes there is no need to use it. Instead, further research should be conducted to determine whether phonophoresis can actually improve care outcomes in the treatment of lateral epicondylitis through controlled studies. Hoppenrath, T. and Charles, D.C. â€Å"Is there evidence that phonophoresis is more effective than ultrasound in treating pain associated with lateral

Thursday, October 17, 2019

Monetary Policy Essay Example | Topics and Well Written Essays - 1500 words

Monetary Policy - Essay Example Specifically, a core committee within the central bank is tasked to design and undertake monetary policies based on their assessment of economic conditions and objectives to be achieved. This paper compares the operations and mandates of the three most influential monetary policy-making bodies, namely the US-Federal Open Market Committee, Bank of England-Monetary Policy Committee and European Central Bank-Governing Council. The FOMC is considered as the foremost policy-making body of the US Federal Reserve. It primary function is to formulate monetary policies which serve to promote economic growth, full employment level, stable price level and sustainable pattern of international trade (Federal Reserve Bank of Minneapolis). This aim is achieved by making key decisions pertaining to the conduct of open market operations, i.e. the selling and purchasing of US Government and Federal Agency securities. Open market operations mainly affect the provision of reserves to banks and other depository institutions. In this regard, open market operations impact the cost and availability of money and credit in the economy of the US (Federal Reserve Bank of Minneapolis). As a background, the FOMC is composed of seven members of the Board of Governors and five Reserve Bank Presidents, who must meet at least four times a year in Washington D.C. as mandated by law. It is during these committee meetings that FOMC decides on the policies to be carried out through voting. In view of the monetary decisions it has to make, the FOMC takes into account vital economic factors such as trends in prices, wages, employment, production, consumption, investments, foreign exchange markets, interest rates, and fiscal policies among others. It should be noted that the monetary policies are implemented with primary focus on supplying level of reserves which is congruent with the economic objectives of the US, both in the short-run and long-run (Federal Reserve Bank of Minneapolis). This means that the control of open market operations is FOMC's major tool to directly influence the money supply in the economy. The movement in money supply will then affect the other economic factors based on the economic objectives of the nation. Bank of England-Monetary Policy Committee (MPC) The MPC's main function is to regulate prevailing interest rates at an appropriate level in order to attain the inflation target over a period of two years. This committee primarily considers the economic performance of the country and determines whether this is accompanied by the risk of acceleration in overall price levels ("Bank of England"). The MPC, which is chaired by the Governor of the Bank of England, consists of five members from the Bank of England and four external members appointed by the chancellor (Bank of England). The setting of interest rates is decided based on the conditions of domestic monetary market, foreign exchange market, production market and labor market ("Bank of England"). To curb inflation, the MPC's primary tool is the setting of interest rates. Should the MPC determine that aggregate demand is expanding and exerting upward pressure on prices, the committee will decide to raise the interest rates in order to control the growth of investment