Monday, September 30, 2019

Immigration Senior Project

Senior Project Immigration Obama’s Immigration Reform Xihara Rosario Class 172 Mrs. Prysler Northeast High School Outline 1. Introduction What is my topic? Why I chose it? What do I already know about my topic? What I expect to learn? 2. Body Definition of Immigration Types of Immigration The first habitants in United State were Immigrants Immigration reform issues right now Implements that reform needs to happen Immigration outcome and implications for Americans and immigrants Dream Act . Conclusion Conclusion about Immigration reform What I learned Introduction Do you know that the number of illegal immigrants in the United States was estimated at 11. 5 million in 2011 and now there are approximately 6. 8 million more? Obama believes we must fix the dysfunctional immigration bureaucracy and increase the number of legal immigrants to keep families together and meet the demand for jobs that employers cannot fill. For that reason he is proposing this Immigration Reform.The reas ons I chose this topic is because there are a lot of illegal immigrants that came to this country because in their counties do not exist a political decision that make their stay on their countries living a decent life that’s why they make them economic refugees. I know like everyone that most immigrants in the United States become immigrant searching a better life for themselves and their families, because here you can find a better future and the percentage of opportunities are higher. And in the last years immigrants are who have increased the United States economy.For that why immigrants cant be citizen more easily. I expect to learn at the end of this project what incentive and reasons, which make Obama, wants this Immigration Reform. And under what conditions would be made this reform because there are many people involved in this event. Body Definition of Immigration Immigration  is the movement of people into a country or region to which they are not native in order to settle there. Immigration is made for many reasons but the most common reason is for a better life. Types of Immigration -Temporary Visitor for Business -Long-Term Employment Citizenship -Illegal Immigration The first habitants in United State were Immigrants The first habitants in America were England’s colonist that immigrate from England and they found a piece of land and they called America passing the time more England’s colonist went to America because the land was more and ship. So England’s colonists were those who formed America. Immigration reform issues right now One of the many problems is that American citizens exploit immigrants, he said, â€Å" for decades American citizens have been exploiting the illegal immigrants we don’t want that anymore†.That means those illegal immigrants that they have been exploiting are who are increasing the U. S economy everyday. Their make America stronger, not weaker by their jobs. They need fix th e dysfunctional immigration and enable legal immigration so that families can stay together. And they want to move quickly before the illegal immigration gets worse. Obama did a mistake breaking his promise on immigration, blaming it partially on obstructionism from Republicans. For that Obama is looking for the best way to resolve this immigration problem.Obama thinks that the best way will be offering a complete solution in which everyone gets benefits. Implements that reform needs to happen The president wants to do everything organized and with a strong security in any process, he said â€Å"there are going to be a bunch of components to it, but I think whatever process we have needs to make sure border security is strong, needs to deal with employers effectively, need to provide a pathway for the undocumented here, needs to deal the dreams act kids†.They will enforce the law by preventing employers from hiring undocumented worker in that way minimize illegally immigratio n, making a plan with a migration based in the immigrant economy, and those who are here illegally, they have a responsibility as well. So they broke the law, and that means they’ve got to pay their taxes, they’ve got to pay a fine, they’ve got to learn English. And they’ve got to undergo background checks and a lengthy process before they get in line for legalization.They think that’s not too much to ask. Immigration outcome and implications for Americans and immigrants He expect to stop deportations of illegal immigrants who were brought to the United States before they turned 16 and are younger than 30 who also met other requirements, including not having a criminal history the president said â€Å" In the face of a congress that refuses to do anything on immigration,†Ã¢â‚¬ ¦Ã¢â‚¬  I will take action where I can. †So he expect to stabilize they immigrant economy and their jobs, so in that way they can be legal immigrants and work i n what they like, work without hiding themselves and be exploited for other people. The immigration reform will be the top priority in 2013. One thing is that president Obama made a promise in 2008, which one was never delivered. For that he wants a chance to correct his failures and the people gave him that chance for that he was re-elected for 4 more years.He wants that those illegal families can life together, that everyone who came here to get a better life that sometimes left their families in their country without any hope can get that better life, that here they can find what they are looking but that does not mean that those people who came here with a criminal history can be here like they do nothing those who have that case will be punishment can be here or in their country.At the end he wants a better future for all the people who live in United States of America. And they hope that this immigration reform can be done in 2013 that’s will be the priority in 2013. Im migrant believes in our president Barack Obama. Dream Act The dreams act is an  American  legislative proposal first introduced in the  Senate  on August 1, 2001, by Dick Durbin  and  Orrin Hatch. This bill would provide conditional  permanent residency  to certain undocumented residents of  good moral character  who graduate from U.S. high schools, arrived in the United States as minors, and lived in the country continuously for at least five years prior to the bill's enactment. On June 15, 2012, Obama  announced that his administration would stop deporting young undocumented immigrants who match certain criteria previously proposed under the DREAM ACT  however; this change in policy does not cover most individuals who arrived in the Unite States legally.On August 15, 2012, the same day that  United States Citizenship and Immigration Services began accepting applications under the Obama administration’s new  Deferred Action for Childhood Arrivalsà ‚  program, Arizona Governor  Jan Brewer  issued an executive order preventing the state of Arizona from issuing driver’s licenses and public benefits to young undocumented immigrants who receive deferred status and work authorization under the new program.In addition to driving privileges, Governor Brewer’s order bars undocumented immigrants who qualify for deferred action from receiving state-subsidized childcare, health insurance, unemployment benefits, business and professional licenses, and government contracts. Conclusion In conclusion yes should be an immigration reform because those immigrants that came for a better life have the right to seek a better life.Citizens’ people should agree with this immigration reform because we all will be benefice in that case because most illegals immigrants are those who are increasing the United States economy. In my opinion those illegal immigrants should have the right to be legal but that does not means that the y will be do whatever they want they need follow the laws that United States have. They cannot live like their lived in their country doing whatever they want, they should know that U.S is a different country which is governed by different laws and they need accept that. What I learned is that there are people who do anything for the simple fact of having a better life and those who have a good life here and they do not appreciate their life and never give thanks to God for all the things that they have and that they need to allow the citizenship to those good immigrants who have never had problems with the law or have a criminal record because this country is made of immigrant. Works citedCNN, L. (2012, June 15). facts on immigration in the united states. Retrieved from http://news. blogs. cnn. com/2012/06/15/facts-on-immigration-in-the-united-states/ De los Santos, M. (2012, September 15). Immigration reform: Why president Obama must make it a top priority in 2013. Retrieved from http://www. policymic. com/ Immigration and emigration. (2012, September 12). Retrieved from http://topics. nytimes. com/ Obama immigration reform: President says ‘we need to seize the moment' at press conference. 2012, September 14). Retrieved from http://www. huffingtonpost. com/ Roach, T. (2012, august 09). Dream act. Retrieved from http://seattletimes. com/html/opinion/2018886755_guestdreamacttomroach10xml. ht ml U. s. immigration statistics. (n. d. ). Retrieved from (2012) http://www. gcir. org/immigration/facts/statistics Withe, D. (2012). Barack Obama’s courageous speech on immigration reform. Retrieved from http://usliberals. about. com/

Sunday, September 29, 2019

Legal Studies †Basic Legal Concepts Essay

Law – is a set of rules that is binding the community. A set of rules that can be enforced and is officially recognized. Law must be capable or reform and change as society’s values and ethics change. Relationship between customs, rules and laws- Customs and rules govern behavior but the courts do not enforce them on community members. The community may generally see a custom as right but it is not legally enforceable. Rules, however, may punish offenders but rules only apply in certain circumstances and areas. Laws are legally sanctioned and are enforced by the courts. Although the community generally accepts all three, rules and customs do not have the same legal sanction as laws. An example of this is smoking in public restaurants. It was a custom for shop owners to provide a smoking and non-smoking section in their restaurants. Once the dangers of smoking became known rules were put in to prevent smoking in restaurants. Laws were then passed in public interest to make sure that smoking was only allowed in outdoor sections of restaurants. * They are all types of rules  * They can all be made into laws * They all regulate human behaviour * They all carry consequences when they are breeched, sanctions Values- Principals or attitudes which society sees as important. The moral principles and beliefs which reflect society’s judgment about the importance of different things. a personal belief system Ethics- a set of moral beliefs governing behaviour. Ethics define what we consider to be the right and wrong way to behave. a code of conduct; moral principles Characteristics of Just Laws * It is enforceable * It is binding on the community * It is in the public’s interest * It is discoverable * It is accepted by the community * It reflects community morality Nature of Justice * Equality- equal treatment or equal opportunity. That all people are entitled to enjoy the same rights, responsibilities, opportunities and that no one should be privileged or disadvantaged. * Fairness- achieving equal outcomes for people. Achieving reasonable and equal outcomes according to generally accepted ideas about what is right and just. * Accessible  Procedural Fairness, Principles of Natural Justice * The right to be heard * The right to have a decision made by an unbiased decision maker * The right to a decision based on logically relevant evidence Justice- a concept about what is right and wrong and what is fair and unfair. A combination of elements such as, equality, fairness and reasonableness Rule of Law – Everyone is subject to the same laws, no one is above the law. Punished equally through sanctions (penalty) Anarchy- a state of chaos resulting from the absence of laws and/or government. Tyranny – rule by a single leader holding absolute power in a nation-state

Saturday, September 28, 2019

Descriptive Statistics and Clinical Significance Essay

Descriptive Statistics and Clinical Significance - Essay Example From the statistics reported, it is possible to get an idea of the composition of the group that was being studied. Since the participants were not randomly chosen, but had volunteered to be a part of the group; the demographic make-up of the group can tell us about the kind of individuals who would choose to experience such training in the use if research; and about the general demographic makeup of the population from which this group has come. From the mean scores on the subtests, it is possible to get an idea of the direction of the difference. The studied hoped that post-test scores would be higher in all areas; and looking at the means tells us that the data does follow the expected direction. Of course, it is not possible to extrapolate to the population of nurses just on the basis of mean scores; but the direction of difference is also a very important aspect. Descriptive statistics can be used to understand the trends in patient needs or in nurses' abilities as they reveal themselves. A nurse leader can use these trends to anticipate needs in the near future; and detect any anomalies. Such information can also be used in identifying training needs of staff; or any other resources that they may be able to use to enhance their functioning. While research –whether in the utility of therapeutic procedures or in the need for training – cannot be based on descriptive statistics alone; often the impetus for research does come through the observation of the trends displayed in descriptive statistics. It is possible to use percentages and means to understand the ups and downs in hospital work and to simplify information when presenting it to others. Mean scores are best when used in conjunction with the standard deviations; since they can be deceptive by themselves. References: Guilford J. P. and Fruchter B. (1985). Fundamental Stati stics in Psychology and Education (6th ed) McGraw – Hill Levin, J. & Fox, J. A. (2006). Elementary statistics in social research. Delhi: Pearson Education Confidence Intervals Explore these issues on the Internet and through other resources. Share what you find out on these topics: Confidence Intervals: Why are they useful in helping to determine clinical significance? There are many controversies surrounding the issue of clinical significance vs. statistical significance. Identify one of them and summarize it. Finish with your opinion about the controversy. Confidence intervals define the likelihood of the research findings being replicable in the population. Confidence intervals can also be used to distinguish the extent of benefit or harm that a particular therapeutic technique is likely to have given a set of conditions. Clinical significance is the extent to which the results of the study are truly applicable and not just statistically significant. Often, even statistica lly significant effects are quite small in magnitude. In medicine and related fields; a regularly occurring effect is not enough; it needs to be of the required magnitude consistently. Clinical significance helps us evaluate the possibility that the said effect is not only most likely to occur; but is most

Friday, September 27, 2019

Pacific Island Cultures Article Example | Topics and Well Written Essays - 2000 words

Pacific Island Cultures - Article Example In 1964, Dr John Cumpston had the foresight and the stamina to devise a now standard format for listing each and every shipping arrival and departure, vessel by vessel, visit by visit.1 This has proved to be a considerable legacy, as his pioneer work has sparked off research by many others who want to get beyond weak generalisations to look at the Pacific’s maritime past in real and quantitative terms. Comparable SADs have followed not only for all the main eastern Australian ports up to 1840, but also for the Bay of Islands, Akaroa and Port Otago.2 In 2000, the Pacific Manuscripts Bureau (PAMBU) at The Australian National University and the Hawaiian Historical Society published a comparable list for Honolulu.3 The publication of a comparable list for Tahiti is forthcoming, while the Samoas, Tuvalu, Solomon Islands, Marquesas and Pitcairn have already been covered in different ways.4 Indeed the stage is set to look afresh at all Pacific Islands and their ports to draw out new substantial facts about their contact and early post-contact histories. These new lists allow the track of a ship, previously unknown, to be followed across the Pacific from island to island and to see each ship’s trade, its impact on local health, and other consequences, in time and in space, in ways that were impossible before, because no comparable ethnographic and oral records have survived. Even though some of the lists read rather like a turgid telephone book, all names and no plot, a great deal of red-blooded life can be drawn from these listings. *An earlier version of this paper was read at Te Moana-Nui-a-Kiwa, the 17th biennial conference of the Pacific History Association at Otago University on 7 December 2006. 1 J. Cumpston, Shipping Arrivals and Departures, Sydney, 1788–1825 (Canberra 1964). 2 Rhys Richards with Jocelyn Chisholm, Bay of Islands Shipping Arrivals and Departures 1803 to 1840 (Wellington 1992); ‘The SAD truth about Bay of Islands shippi ng 1803–1840’, The Great Circle, 15:1 (Sydney 1993), 30–5; Ian N. Church, Opening the Manifest on Otago’s Infant Years: shipping arrivals and departures Otago Harbour and Coast 1770–1860, Southern Heritage 150 Series (Dunedin 2001). 3 Rhys Richards, Honolulu, Centre of Trans-Pacific Trade: shipping arrivals and departures, 1820 to 1840 (Canberra and Honolulu) 2000. 4 R. Richards and R. Langdon, Tahiti and the Society Islands: shipping arrivals and departures 1767 to 1852 (Canberra forthcoming), based on ‘Ships at the Society Islands 1800–1852’, lists compiled in the 1980s by R. Langdon, Pacific Manuscripts Bureau, Canberra; Robert Langdon, Where the Whalers Went: an index to the Pacific ports and islands visited by American whalers (and some other ships) in the 19th century (Canberra 1984); Rhys Richards, ‘Pacific whaling 1820–1840: port visits, shipping arrivals and departures, comparisons and sources’, The Great Circle, 24:1 (2002), 25–40. ISSN 0022-3344 print; 1469-9605 online/08/030375–8; Taylor and Francis _ 2008 The Journal of Pacific History Inc. DOI: 10.1080/00223340802499641 Article 2 First Page of the Journal Article International Journal of Qualitative Studies in Education Vol. 23, No. 6, November 2010, 671–690 ISSN 0951-8398 print/ISSN 1366-5898 online  © 2010 Taylor & Francis DOI: 10.1080/09518390903468339 http://www.informaworld.com Family obligations in

Thursday, September 26, 2019

AeroMedical Education Plan Essay Example | Topics and Well Written Essays - 1000 words

AeroMedical Education Plan - Essay Example As the research declares Bloom’s taxonomy of learning recognizes that there are three major domains that are fundamental in the promotion of higher forms of thinking in the learning process. According to Bloom, Engelhart, Furst, Hill and Krathwohl, the three domains of educational training are 1) cognitive domain that deals with mental skills, 2) affective domain that involves growth in feelings or emotional areas, and 3) psychomotor domain that deals with physical or manual skills. Atherton argues that each of the domains is sub-divided into various levels in a hierarchical model starting with the most basic process to the most complex one as shown below. According to the paper findings Bloom’s taxonomy helps education planners contextualize teaching programs that enable learners attain a holistic study and understanding of knowledge in terms of its foundations, scope and validity. This brings about the desired effectiveness in educational and training programs among learners. The Commission on Accreditation of Medical Transport System (CAMTS) is charged with the responsibility of developing standards for the aero-medical environment. According to CAMTS, the requirements for the orientation, training and continuing education programs for the aero-medical personnel are premised on the transport program’s the purpose of the service, mode(s) of transport provided and its constituents contained in the mission statement, scope of care and patient population.

Wednesday, September 25, 2019

Leadership Essay Example | Topics and Well Written Essays - 1500 words - 6

Leadership - Essay Example Motivation is another crucial aspect of a good leader because a motivated worker displays more enthusiasm to work along with superior performance and excellence. A motivated worker is more involved with the task (Mayer, 2008). A good leader must possess ideal character. It is significant that a leader is reliable for leading the employees to the right path. True leadership ability comes from esteem for the good personality and honesty of the individual who leads others (White, 2011). A good leader is passionate about the task and the part as a leader. People can only react frankly to an individual who has passion and enthusiasm. It is an essential characteristic of good leaders as they are regarded to be the basis of encouragement and be motivators toward the necessary achievement or cause (White, 2011). A good leader is always positive about his work and his position as a leader. In order to guide and set course, confidence is vital for a good leader. A confident person can motivate other subordinates and draws out the faith and greatest efforts from the team to perform any job well. A leader who successfully expresses confidence towards the planned objectives inspires the team members to put absolute effort for completing a task (White, 2011). A good leader always thinks logically by keeping the main organisational objectives in mind. He/she views a condition as a whole, but also is competent to split it down into sub-elements for faster assessment. Leader divides the controllable measures and steps forward towards the organisational goals (White, 2011). A good leader is committed to excellence. He /she not only uphold high standards, but also are positive in elevating the bar for accomplishing excellence in every field. A leader requires acting in a logical and focused way in situations of ambiguity. Subordinates always search for guidance of leader throughout the period of doubt and unfamiliarity and find encouragement and safety when the

Tuesday, September 24, 2019

Advise Goldcorp Ltd Essay Example | Topics and Well Written Essays - 1250 words

Advise Goldcorp Ltd - Essay Example The RoT clause is an agreement that allows the seller of goods to hold ownership/retain title, of the goods until the occurrence of a specified/agreed event; that event being either the payment of supplied goods, or payment of all money owed1. By agreeing to the RoT clause the buyer of the product agrees that until payment of the purchased goods is made the company that is selling the goods holds ownership claim to the goods, and hence can exert that claim anytime it wants. This allows the selling company to protect its investment. During the insolvency proceedings, a RoT ensures return of owed money which otherwise is highly unlikely under the circumstances2. Goldcorp Ltd. has been in regular business with GT Jewelers. Both entered into doing business with each other by signing an agreement that also included a RoT clause, of which both parties were aware. After the GT Jewelers failed to remit payment for the months of September and October while Delivery had been made, Gold Corp Lt d. enforced a RoT to the GT Jewelers. Under the RoT, Gold Corp Ltd have claimed the ownership of: 1 kilo of gold in their vault, stamped with Goldcorp Ltd’s seals, A tank containing 2 kilos of melted gold bullion, 150 gold and diamond engagement rings worth ?5,000 each, and ?25,000 representing proceeds of sale of gold by GT Jewellers Ltd to another jewellery manufacturer. Gold Corp cannot rely heavily and positively on their RoT to claim their goods/money. The absence of certain clauses makes Gold Corp an unsecured creditor thus making the chances of receiving owed payment meak. The Rot fulfills the first most condition of being a valid contract since it was agreed upon by both parties before the business. There are scenarios which can either render the RoT ineffective or simply lead to its termination, the RoT does not consist of any clause signifying the conditions under which the RoT will be void or terminated, thus the RoT holds valid between the two companies3. Gold Cor p Ltd has demanded 1 Kilo of gold, stamped with Gold Corp seal. The company can claim the gold under the clause (i-a) of the RoT. This is a separate goods storage clause which states that until full payment has been received by Gold Corp for all gold supplied to GT Jewellers by Gold Corp Ltd. to GT Jewellers and at whatever time: property in the goods shall remain in the Company and such goods must be marked as belonging to the company and stored separately. This clause allows the Gold Corp Ltd. to reclaim 1 Kilo of gold as they are still unsold and in the possession of the buyer, who under the RoT was obligated to store the goods separately from goods of other parties and in an identifiable position4 till payment had been made by GT Jewelers. Although since the RoT did not consists of an extended clause of ‘allowing the seller to have the right to access the premises of the buyer in order to determine whether the obligation is being complied with’5, there is no assuret y that GT Jewelers actually complied with having stored the unsold good in an identifiable position. Gold Corp Ltd. has ascertained that they claim ownership of ‘a tank containing 2 kilos of melted gold bullion’. Under i-b of the RoT, which states that, if GT Jewellers converted the supplied gold into any new product either by including some other product in the mixture and in whatever proportions such conversion will be considered under the rights of Gold Corp and beneficially and legally ownership will reside in Gold Corp, Gold Corp has legal rights to claim the 2 kilos of melted

Monday, September 23, 2019

Clarity and Style in Writing Essay Example | Topics and Well Written Essays - 250 words

Clarity and Style in Writing - Essay Example How can we emphasize the written text? Following are the few ways to do so: One way of enlivening and emphasizing in written text is to use strong words that trigger emotional reactions, for example: "If you really love me then you will...† Bold is clearly visible when you first look at the whole page, for example, "Do not turn off the computer before shutting it down." Italics give light emphasis, used for subtle stressing of words, for example: â€Å"Before leaving the place, switch off all the electrical equipments.† Underline is more insistent as it works well for emphasis of a complete phrase, for example: â€Å"Remember to Save the Whales.† UPPERCASE, is the written equivalent of shouting. Avoid where possible, including use in headings, for example: â€Å"Why don’t you UNDERSTAND THIS?† Size, bigger fonts stand out more and small fonts recede. But beware of reducing readability by mixing font sizes too much, for example, â€Å"The interest ra te used is 11.5%.† Punctuation, in particular the exclamation mark, gives a strong emphasis. Use sparingly. Be very careful when using multiple marks, it can be interpreted as either enthusiasm or attempted manipulation. Color / Highlighting; there are many colors you can use. Brighter colors and those towards the red end of the spectrum stand out more.

Sunday, September 22, 2019

Assignment Dissertation Example | Topics and Well Written Essays - 1000 words

Assignment - Dissertation Example Evaluate its overall physical infrastructure, accompanied by its marketing and compatibility factor consideration with other technologies. The dissertation would further allow for clear understanding of the technology incorporated in VOIP, which will be done so through critical analysis and comparison with other technologies present. Abstract: Using the broadband to better services in form of telephone options define the core purpose of VOIP. Outlines: Understanding the working of VOIP, the technologies incorporated its strengths and weakness, potential advantages and possible areas of improvement would be investigated in the overall dissertation. The project will broadly consist of the introduction and abstract part, followed by the literature review part which would investigate the methodical and periodical work that has been conducted over period of time in the field of VOIP and other communication technologies. Work of different experts and technologists who have researched in th is field would be brought to light. This would be followed by the research methodology phase of the dissertation which would include the explanation and discussion of the ground level activities and facts related to VOIP. Finally the last part of the dissertation would constitute the findings and analysis portion which would allow for better implementation of the technology in the physical domain. Using the software is also part of the overall project for purpose of pilot test and evaluation. Software tool application would enable for practical demonstration of the VOIP features, its services and its compatibility with other underlying technologies and hardware applications. Software compatibility and designing a software manual according to the desired technological requirements is another core function contained in the overall project. Literature review: The concept of VOIP gained prominence in the early days of 21st century when the technology took a shift towards further enhance d means of communication in form of the video enabled services and remote connectivity. With focus on virtualization and making use of digital means to avoid the physical journeys VOIP was adopted. VOIP was the main demand of the business enterprises who sought online activities in order to avoid the physical travelling and other physical activities associated with dealing with the partners. The earlier traces of VOIP can be traced to the mid 1990s (Kelly 2011, 74) when a sound card set of headphones and internet connection would allow for connection establishment. With time, the overall domain got expanded and the business enterprises gained interest in this field and also the common users and thereby it started expanding and a new set of standard in form of VOIP. Evaluation Criteria: VOIP is a complete set of technology that incorporates various software packages and elements, along with hardware components. It has a complete infrastructure in its own which facilitates the service s that are being provided over the infrastructure of VOIP. Configuration: VOIP entails the use of adapters, routers, soft phones; dedicated VOIP phones are few of the elements that constitute the physical layer configuration requirements of VOIP. Criteria for determining the success: The success would be gauged in terms of its implementation, its overall affectivity and impact on the overall

Saturday, September 21, 2019

The various methods of dealing Essay Example for Free

The various methods of dealing Essay Legally, a working Monopoly is defined as a firm which controls 25% of their market. This immediately raises problems, within the measurement of market share, and the definition of their market. Microsoft is a considerably well known monopoly (as a whole), but is this the case for all areas of business? This would be the initial problem: determining their market. Microsoft spans a vast spectrum of business, however, virtually breaking into distinct main markets Desktop and Server. It is clear that Microsoft dominate the Desktop market, far outselling any near threats, but is this the case for the server market? I have broken down the server market into two main areas the Operating System itself, and the web based server. Operating System Percentage Share Linux 31.3% Microsoft Family 24.3% Server Software Percentage Share Apache Foundation 56% IIS (Microsoft) 24% According to the definition, Microsoft is not technically a monopoly in both markets. However, as Microsoft can be accepted to live within a single market (computing), they would have a clear monopoly. Consequentially, problems of dominance begin to occur. It has been discovered that they have been abusing their market power by forcing small firms into signing contracts that require them to purchase their software, should they be using their hardware. There are numerous ways to reduce or reclaim the power of monopolies, some controversial, and some are economic theory, therefore unrealistic. I will be discussing these within my essay. Monopolies tend to play as the dominant firm within their market, and as a result, tend to me price makers rather than takers. However, they can only control the price, or output, but not both. Generally, monopolies can be bad for the market mechanism as they are neither productively nor allocatively efficient. Like most firms, they would choose to profit maximise (at the point MC=MR). As you can see from the diagram on the left, if they choose to output the profit maximising level Q1, they will receive the price displayed by the demand curve P1. Fortunately, there are several remedies for monopoly. The first that I am going to discuss is: regulation. An excellent remedy for pure monopolies (where a single firm dominates 100% of a market) is regulation. Regulation involves the government appointing an independent body to monitor the activities of the firms. Ofcom (merged, previously Oftel) are a working example of this. They are the regulating body for the communications industry, covering telecommunications. Previously, before deregulation occurred, there were two main dominant firms: Telewest/NTL (Now Virgin Media), and British Telecommunications. If there was no regulatory body in place, it would have been too easy for this duopoly (where two main firms dominate the market) to price fix (tactically through the use of informal signals to indicate their future and current pricing structures) and therefore take advantage of the consumers, at they would have little choice other than to remove their fixed line telephones completely. One of the methods that can be used is RPI-X (RPI minus X) regulation. The value of X is defined by the regulatory body, and limits the pricing that firms may change based on the RPI (retail price index) less the value of X. As a result, if RPI-X0 then the firms will be forced to reduce their prices by the resultant value. The kind of price barrier will motivate firms to lower costs (as they cannot increase their prices) in order to generate greater profit for themselves. This kind of regulation has been using against British Gas, which expired on the 31st March 2000. Expanding on my telecommunications example: NTL has had agreements put in place by Oftel of RPI-1, so they were permitted to raise prices by no more than the value of RPI, less 1%, per year. However, this particular agreement expired on 31st December 1996. However, actual regulation has (in my opinion) proven to be inefficient and adequate, and possibly deemed to be failing the industry. A typical example of this lack of regulation is demonstrated by the unstoppable, but inevitable, profits of British Gas. They announced profits of à ¯Ã‚ ¿Ã‚ ½992 million for the first 6 months of this year, less than 24 hours after raising household prices by 35. This raises the question of whether or not these price rises are justified. They, along with the rest of the market, justify their actions on the elevation of wholesale gas and electricity prices (costs which they cannot absorb), but is this form of a tacit agreement (where firms informally signal price decision to other firms, to suggest they copy)? While it is proven that the barrel of oil did rise to approximately $150 per barrel, the firms were quick to act, raising their prices in quick succession of each other. However, now that the prices have fallen by half, have the firms taken the same quick action in reducing prices? I think not. This is an example of asymmetric information between the firms and the regulator, where the regulator is only dropping suggestions to the firms; they are not forcing any actions upon them. Despite preaches by Fuel Poverty organisations and EnergyWatch (the regulator), prices are still not falling at the rate that they should be. However, one of the most significant problems lie within determining the correct value of X for RPI-X price capping, as the regulator has few resources (as this example has demonstrated), therefore they cannot correctly evaluate costs. Setting a value too low may lead to under investment within the industry, causing undesired adverse effects. Having said this, the regulatory body has the power to split up a monopoly into multiple, smaller, firms if it deems this as necessary. This can be good for the market, as this will open up it to more competition, and possibly lower barriers to entry for other firms. This is the case of British Gas, where the regulator (Ofgas) had split it up into two major firms: Centrica and Transco. The idea was to open the market up to greater competition, as then British Gas (a trading name of Centrica) who sells the gas to business and domestic users would be separated from Transco who manage the actual gas pipelines. This would lower the barriers to entry (sunk costs) for new firms, as they would not have to produce the gas, nor have it routed to their customers homes. They can simply purchase it at a wholesale rate, and sell that on with a margin for profit. Other countries have adopted a different method for regulating monopolies, called Rate of return regulation. This is where companies are taxed a percentage of their profits, however this has similar problems. As there is no price ceiling introduced by this method, the monopolistic firm(s) may choose to simply increase their prices in order to cover the additional tax. This actually solves no problems, and leaves the consumer worse off, as they would be faced with paying higher prices. As the market is dominated by the few single firms, it may leave the consumer no choice but to purchase their goods from those single or sole suppliers at the higher cost. The competition commission also has a strong say on mergers, whether or not they are permitted to go ahead, if there is a threat to the market of a monopoly. An example of this was the Halifax Bank of Scotland and Lloyds TSB merger which resulted in a monopoly for the merged company of the mortgage market over 30% market share. However, these rules were brushed aside due to the nature of the merger, and the apparent confidence that the bank would collapse, and the government being unable to use more public money, therefore being unable to resort to nationalisation without public backlash. The reverse of regulation, de-regulation, can also help to remedy the problems of monopoly. De-regulation is when remove or simplify restrictions on a market in order to increase competition, or the threat within. While the thread of competition may keep push prices down (limit pricing where firms sell at just above their average costs, therefore diminishing the threat of new firms entering the market, forcing any new entrants not to take the chance as the barriers to entry and exit may be too high), it may not been enough in the long term. An example of this is the postal industry. In 2006, the market was fully deregulated, meaning that any new entrant had the ability to complete a range of functions, ranging from collecting and deliver door-to-door mail, to bulk mailing. While this does open the market up to some serious competition, the barriers to entry are still too high. The initial cost of dropping door-to-door mail to 99% of the country is very labour intensive, and explains why the state owned Royal Mail have a monopoly on this. Additionally, there needs to be a way for new firms to pick-up the mail locally from their clients. All this has to be profitably fairly quickly, as if they firm does not have enough finance behind them, they will quickly go bankrupt. However, there have been several new entrants to the marketplace for courier services, and this has become more apparent over the past few years. Such an example is www.Parcel2Go.com (who are a reseller of such companies such as DHL), but pickup large items from your home (as this cheaper service is domestic) and deliver it to another place of a domestic nature for a extraordinary low fee in comparison to the pricing that Royal Mail would change for the same service. Monopolies can also be dealt with by challenge of new firms. However, when a monopoly exists, this is sometimes less likely due to barriers to entry and exit. The new entrants have to assess these barriers, and judge whether or not it would be wise for them to compete; this then encompasses the theory of contestable markets. There are several factors involved, such as the reputation (pricing predictions) of the current (incumbent) firm. The existing monopoly may employ (legal) limit pricing to keep the threat of competition low, or apply predatory pricing. Illegal in the UK, predatory pricing involves setting the price below cost, with the intent to drive out their rivals, and then raise prices again. Another such formal form of collusion is cartels, however they are also forbidden by law. Fortunately, such anti-competitive practices are removable, however unfortunately, as I have discussed above: tacit collusion is the most likely and the hardest to prove and stop. Furthermore, there is resale price maintenance where the manufacturer will fix the price that the retailer must sell their goods at (they will generally apply this), and if they did not they would refuse to supply, which is again, illegal. Additionally, the incumbent firm can compete with non-pricing strategies, such as brand loyalty schemes or certain kinds of special offers so that their customers naturally do not buy from their competitors. There are also considerable sunk costs that are involved, and the more irrevocable they are, the less tempting for the new entrant. Depreciation is common, and when technology is fast-moving, a production system thats 6 months old can lose considerable value, quickly. An almost totally irrevocable cost is advertising such as branding and gaining that brand awareness and loyalty. While its average cost can be kept low by spreading the budget over large volumes of output, however the only realistic way this cost can be recovered, is if the firm was to sell their entire brand to the monopolist. Unfortunately, the incumbent firm can easy rival any advertising that the new entrant makes, making their efforts redundant. There may also be legal barriers, but these are more uncommon than not. Such barriers will include Patents, where the incumbent firm is rewarded for the research and inventions that they have created, so have a legal barrier to prevent any other firms from coping their idea, design or otherwise. Such patents stand for around 2 decades, so this can be a considerable amount of time for the incumbent firm to gain a monopoly on their product (regardless of the fact they will be the sole supplier). Natural monopolies act at as a barrier to entry for new firms, and within industries such as Water (Thames Water have a monopoly on this), it would be too costly and inefficient to lay down two pipes to consumers homes. However, should the market be deregulated for example, if Thames Water sell the water a wholesale price (such as British Gas does with Gas) then additional firms can afford to enter the market with lower barriers to entry. Finally, there is information asymmetry, where the existing firm has the experience and the knowledge about the industry that allows them to be more productive and drive down their costs. If the information is not known to the new entrants, this can be a sunk cost for them, acting as yet another deterrent for entering the market. However, having discussed the problems that monopolies may bring, the reverse can be true. Monopolies can be beneficial to a market because they achieve greater economies of scale, and tend to have a lower market price than smaller firms as they are more able to pass on cost reduction. A typical example of this would be the comparison of a monopolistic firm such as Tesco against Jays News. A typical product, one pint of milk will cost around 49 pence in a small firms shop, or 26 pence in Tesco. At a 53% saving, it seems clear that monopolies can benefit the greater economy. Sources: NTL Price Capping: http://www.ofcom.org.uk/static/archive/oftel/ind_info/broadcasting/ntlprice/section2.htm

Friday, September 20, 2019

Bluetooth Remote Access to PC Using Mobile Devices

Bluetooth Remote Access to PC Using Mobile Devices CHAPTER 1 INTRODUCTION TO RESEARCH 1.1 INTRODUCTION: Bluetooth is a wireless technology of the last decade, there has been a lot of research going on this technology all over the world. The Bluetooth was named after the 10th century Danish King Harald Blatand or Harold Bluetooth. King Blatand was influential in uniting militaristic factions in parts of what are now Norway, Sweden and Denmark just as Bluetooth technology is designed to allow collaboration between differing industries such as computing, mobile phone and automotive markets. Bluetooth technology was the internal project of Ericssion, which was intended for providing short distance multiple links. Then it was collaborate with Intel in 1997, later the association with Nokia, IBM, Toshiba, Microsoft, Motorola, 3com etc to form a non profitable trade association Bluetooth Special Interest Group (SIG). The formed consortium adopted common code name to Bluetooth for their open source specification. Bluetooth uses 2.4 GHz frequency for transmitting the data at band rate of 1Mbps . In taking account of users point of view, there are three important features to Bluetooth. (Ali M Aljuaied 2001) It is wireless. When you got to client place, you need not have to worry about keeping track of cables to attach all of your components and you can design your application without wondering where all the wires will go. It is economical. You do not have to think about it. Bluetooth does not require any extraordinary skills to make it work. The devices find one way or another and pairs up a conversation without any user input at all. Bluetooth technology is a standard and communications protocol which is designed for low power consumption, with a short range (power-class-dependent: 1 meter, 10 meters, 100 meters) based on low-cost transceiver microchips in each device. Bluetooth enabled devices tend to communicate with each other when they are in range. These devices use radio wave communications system, so that they do not have to be in line of sight with other and can even be in other rooms, as long as the received transmission is powerful enough. During the discovery process Bluetooth device transmits class type of device and the supported services of that class Class Max permitted power Range(approx) Class1 100mW 100meters Class2 2.5mW 10meters Class3 1Mw 1 meter Table reference [www.bluetooth.com] The popular Bluetooth applications are: Mobile phone and hands free headset. File transfer between Bluetooth enable devices using Obex application The places where traditionally used by IrDA in control equipment. In gaming equipments like play station. Used to connect the Dial up internet for PC. 1.2 AIMS AND OBJECTIVES OF RESEARCH: The main research aim of the project is to develop Remote PC manager from mobile through Bluetooth and make it more efficient and reliable for future applications. The following are the research objectives: Developing user friendly software for remote management of PC through mobile using Bluetooth. Improvement of response time in the existing application. To solve the problem occurred in application during the connection and disconnection Process. 1.3 PAST WORKS: There has been a vast amount of research carried out in Bluetooth related applications all over world of which is this PC remote mobile phone using Bluetooth application, but most of the applications that are made have been having problems related to response time, compatibility with specific mobile such as Nokia and Sony Ericsson, connection and disconnection. Hence, the next few lines will discuss about the background for developing PC remote. Based on Blueshareware.com Development done Deployment year The first beta type control 1.0 version using Nokia 6600 23 Feb. 2005 Then added applications related to audio and video player 7 march 2005 Then started to test the code on Sony Ericsson 6 Nov 2005 New GUI for phone has been developed with special soft keys 29 Jan 2006 After then they started to have better GUI by correct early problems and adding new applications releasing higher version Bluetooth remote control 2.0 The Open java script that allowed others to be modified They have added new PowerPoint application. It had some drawback such as application could not run in some mobiles and screen turn blank some times. There has been a lot of modification and re-releases by solving problems like increasing the range of compactable mobile and correcting minor problems. Bluetooth remote control 3.0 Win AMP player has been added Till this version the power point and any applications was not given importance. The development of latest version of the GUI was available in J2me, which decreased the application size. Bluetooth remote control 4.0 Though they added, Win AMP could not be launched from it. The phone could not be compactable with other stacks. Response was improved for some functions. The application had problems with the connection and disconnection. Less application size than compare to the above version was achieved by better versions of MIDP and CLDC. Some individuals have been working on this software like Jerome Laban. The project related to two PC remotes, the software developer who is working on compatibility for different types of mobiles such as Orange E200/QTEK 8080 and some are Motorola based mobiles with Blue Soleil third party stack in .NET FRAMEWORK 2.0 where he using different programming languages and client softwares. There has been lot of development going on PC remote using Mobile phone Bluetooth many of them are developing many applications based on different softwares .The improvement in MIDP, CLDC in the new mobile have increased the applications, and the application code size started to decrease with improvements in them. 1.4 RATIONALE FOR RESEARCH: After my under graduation I started working in an embedded system based company in India. Lampex electronics Ltd which deals with providing embedded solution to local firm, we had an Electrical billing handheld machine, which we supplied to state of Andhra Pradesh (India) Electricity board, they requested for a short distance wireless technology to upload the data from handheld machine to PC. We have selected IrDA as wireless technology because of low power consumption and less memory application .We have done the work successfully but as a developer, I was not convinced for two reasons: The handheld machine and PC transceivers have to be placed face to face. We had problem with time slots management, went slaves (handheld machine) are more than two at the same time. This made me to select Bluetooth technology as my research topic, and then I came across different research topics on Bluetooth related to security, pairing, remote PC manager etc. Then I started working on a Remote PC manager. Remote PC manager is an application developed using Bluetooth available in your mobile phone to manage a PC. The application had problem related to response time in certain areas of application. The response time is the time an application takes to react to a give input. In this application, we define response time as the time taken to respond when an instruction have been sent from mobile phone to remote pc manager. CHAPTER 2 LITERATURE REVIEW AND RESEARCH METHODOLOGY 2.1 RESEARCH APPROACHES: The following are the approaches towards my research, which have eventually done in stages: To study about Bluetooth behaviour and comments related to the application from the users. In the course of research, reading has been done from books, journals and websites regarding Bluetooth and related software is used in the project. Developing Program and data flow diagrams An IT related program was developed which had all the modern approaches to the project development and deployment and as well as the data flow diagrams were drawn for the clear view of the data in the program Implementation After the development of the programs, implementation has carried out to check its success and working Testing The programmable code is tested, verified and made sure that its bug free. 2.2 Justification of Research Approaches: Mixed research methods have been used for projects as it deals with collecting information about the product and implementation to the product. Using Qualitative research, more data is gathered from journals and textbooks, which showed about the Bluetooth applications. There was also chance to know, to what are hurdles in the existing Bluetooth technology. I have registered in Bluetooth groups and started to ask experts in this field about their feedback regarding the application. I went through some of the existing technologies available in the market and where I could study the functioning of the Bluetooth PC remote. Knowing about the application, I could estimate that projects with modern approach will be needed, in enhancing the application throughput. Online journals also helped me out a lot. Research books also helped me in how to carry out my research and which method would more suit my needs. Quantitative research is also a very important criterion in my research .I could plan my whole project on Gantt chart and proceed further. So, I had opted with mixed approach, i.e. qualitative and quantitative which made my research easier. 2.3 LITERATURE REVIEW: A lot of research is done on Bluetooth related application by Special Interest Groups (SIG) and developer all over the world because of its futuristic nature. From the past most of the developers have been developing applications on Bluetooth and WLAN. We can see degradation on Wi-Fi when a Bluetooth is close to the Wi-Fi station; the impact of interference is significant. However, the relocation of Bluetooth from the Wi-Fi by 10m will not have great impact on the throughput. So both can coexist but we should be sensible in our expectations and attempts to combine these technologies. [Brent A. Miller, Chatschik Bisdikian 2000]. We present an AFH that modifies it in order to mitigate interference. Frequency hopping in Bluetooth is achieved as follows. Frequencies are listed as even and odd frequencies in the range of 2.402-2.480 GHz. The main idea in BIAS is to wait for association of slot with a â€Å"good† frequency in order to transmit a packet. The basic idea of response times has been about the same for thirty years [Brent A. Miller, Chatschik Bisdikian 2000]: If the response time is about 0.1 second user feels that the system is reacting instantaneously, means that no feedback is necessary except to display the result. If the response time is about 1.0 second user feels to stay uninterrupted, even though the user will notice the delay. Normally, no feedback is necessary during delays of more than 0.1 but less than 1.0 second, but if its 1 second the user feels that he can directly on the data. If the response time is about 10 seconds users attention is focused on the dialogue. For longer delay such as scanning whole system by anti virus will take long time and user knows about it. Feedback is required especially important if the response time is likely to be highly variable, since users will not know what to expect. Normally, response time of an application should be as fast as possible [Myers, B., H. Stiel R. Gargiulo (1998)], but it is also possible for the computer to react so fast that the user cannot keep up with the feedback. For example, a scrolling down in word document application move so fast that the user cannot stop it in time for the desired pages or section within the available window. The fact is that computers with modern processor can go work in few milliseconds can be too fast for the user which indicates the need for user-interface changes, user interface is set according to real-time clock rather than being set to indirect effect of the computers execution speed. These applications take advantage in varying degree of Bluetooth capabilities such as to be always on, always connected, mobile and easy to use. Throughout all of this, of course it is important not to lose sight of the requirements to get basic application to operate properly. However most of developers have found the specification of 1.1 to be stable, so future Bluetooth enabled products for general consumer would confine to this specification [Robert Morrow, 2002]. In an indoor environment, multipath is almost present because of furniture and other equipment in building along with the building material themselves, are prone to reflections when they are illuminated from radio source. Unlike the large fading which is seen in radio frequency where distance travel by the wave is in terms of 10 times the wavelength. According to Morrow the Bluetooth, channel fading could be analysed based on Doppler spread, delay spread and out probability. If a Bluetooth Piconet is an indoor environment where an object can move at speed up to a fast walk, then minimum Doppler shift will be about 10 Hz and coherence time is about 40 ms. So, the coherence time will be 1 microsecond smaller than coherence time which leads to slow fading and this could really slow down when 40000 bytes transfer is done. Suppose if we take a large room where the delay speed is 50ns and gives coherence bandwidth of 2 MHz, but maximum bandwidth between each hop is only 1MHz, so this leads to flat fading. As the Bluetooth channel is flat fading this will effect the Bit Error Rate BER (Rayliegh equation). According to Morrow the enhancement has done related to lower level protocol. Bluetooth data rate should be increased at the rate of 10 to the present specification. Proper implementation of Adaptive frequency hopping should be done. The range of Bluetooth has to be increase by Store and forward capability. Use of Smart antenna. The ACL link is based on polling scheme mechanism between master and up to seven active slaves in a Pico net. It can provide both symmetric and asymmetric bandwidth, which is determine by the packet type and frequency with which the device is polled. The ACL payload is protected by CRC check, which is used for retransmission scheme, the value seems to be small about 1.25ms [David, 2002], but it is important when we are dealing with IP streaming because it may lead to retransmission delay. This could be limited by setting the flush timeout setting. If Bluetooth transmit constantly on same frequency, the maximum raw date rate would be 1 mbps. However [David, 2002], this is not the data rate we will obtain over air interface. Bandwidth required for a 72 bit access code to identify the piconet and 54 bit header to indentify the slave will be about 405microseconds and guard time of 220 microseconds for next frequency hop. So, one slot packet requires a bandwidth of about 1/3 for pay load data and 7/9 and 13/15 for 3 and 5 slots of data respectively. So these counts have at least guard time of 1250 micro second as slot size increases. User friendly can be defined as easy to learn, easy to use, easy to remember and they increase the user ability to perform the desired task. According to Barrie Shermann, 1985 User friendly means adapting parts of the system to the operator rather than the operator having to adjust to the system. Donald Norman explains user friendly software design with respect to relationship between visibility, mapping and feedback to the design of usable objects. [The Design of Every day Things,1990] Visibility means how easy user can find the function in the software. Poor visibility can cause too many problems to the users. Mapping means the relationship between controls, the thing it affects, outcome. Good mapping is one which has buttons which is clearly marked and simply indicates their function. Feedback to the design of usable objects means every function on operation must give feedback to the user. When passenger press train door button he gets feedback in terms of voice message saying that â€Å"door opening† .Such feedback makes user feel good. The creation of user friendly software is equal to part of science and art .The science is referred to as usability. The International Organisation for standardization (ISO) defines usability as the effectiveness, efficiency and satisfaction with which the user achieve specified targets. Effectiveness is the accuracy and completeness with which specified user can achieve goal in an environment. Efficiency is the resource expended in relation to the accuracy and completeness of goal achieved. Satisfaction is the comfort and acceptability of work system to its users and other people affected by its use. The second part is the Art of design, which inspires and often take long time .We are not speaking about art in terms of graphic art, although it plays an important role in development of user friendly software. We are speaking of the designer ability to create a vision of how software can and should be. 2.4 CRITICAL ANALYSIS: Since this Bluetooth application is an indoor application, its associated with reflection, diffraction, scattering, and refraction of radio waves. Quality of service means predefined and negotiated data rate, delay and error rate. Since the delay and the error rate are strongly related to the data rate, we focus our present investigations on the data rate. A signal passed over a wireless channel is affected by path loss, narrow, wideband fading and co-channel interference. In the present application the response time is dependent on, the performance metrics include the path loss, the mean access delay and the channel response time. When a receiver is placed some distance from the transmitter antenna it is logical to say that there will be some loss in signal. As we know that there is high probability of multipath effects in this application, as it plays a significant role in path loss values, thus high path loss of signal will lead to retransmission of signal. So we need to perform multipath mitigation, so we have selected compensate for multipath through diversity combinations. So normal Bluetooth antenna will be replaced by smarter antenna with diversity combinations .The packets that are transferred consecutive to time do not use the same frequency, which in turn avoids the drawbacks of the narrowband transmission. As we know that the link performance obeys the rules for narrow band systems and additionally depends on fading of the individual channels occupied. Therefore, all these methods of improving the physical layer have to be frequency agile. The access delay measures the time taken to transmit a packet from the time it is passed to the MAC layer until it is successfully received at the destination. The delay is measured at the L2CAP layer. The access layer delays which are caused due to improper management of the Bluetooth instruction. Management of ACL links can decrease this and by keeping slot numbers at a low value as possible, but as file length increases the number of slot tends to increase so we cannot do much to that, but by decreasing the path loss we can definitely resend ACL link commands. The channel estimation response time measures the time to track changes in the channel state. It is the time to avoid using a bad frequency to the time to start reusing a frequency that is good. The channel response time depends upon the bit error rate (BER), which depends on the frequency hopping rate (good frequency and bad frequency), since the methods used to perform the classification depend on BER measurements per frequency visited. So, proper implementation of adaptive frequency hopping must be done to improve response time. User friendliness is a thin gap between failure and success of the end product. According to usability studies done by Andy Smith Overall it would seem that roughly only 30 percent of IT systems are fully successful and that too 70 percent either fail or some marginal gain even after providing same function. These successful one have marginal difference with the other such as easy to handle, light weight, high visibility of screen, little more advance feature in hardware and software, robust etc. Natural and efficient products can make users task seem a lot easier. CHAPTER 3 BLUETOOTH PC REMOTE TECHNICAL CONCEPTS 3.1 INTRODUCTION: Bluetooth was projected to allow low bandwidth wireless connections to become so simple to use such that they flawlessly work into your daily life. A simple example of a Bluetooth application is to update the phone directory of your mobile phone. You would either normally enter the names and phone numbers of all your contacts or use a cable or IR link between your phone and your PC and start an application to synchronize the contact information. With Bluetooth, this can be done automatically and without any user involvement as soon as the phone comes within range of the PC. You can easily see this is expanded to include your calendar, to do list, memos, email, etc. This is just one of many exciting applications for this new technology! The Bluetooth PC remote using Mobile phone also comes into these list of applications that is been developed in using Bluetooth 3.2 SYSTEM ARCHITECTURE: Bluetooth communications occur in the unlicensed ISM band at 2.4GHz. The transceivers utilize frequency hopping to reduce interference and fading. A classic Bluetooth device has a range of about 10 meters, with a total bandwidth of 1 Mb/sec. This technology supports two types of communication modes [Robert Morrow, 2002]. Synchronous communication (voice traffic): The synchronous voice communication is provided using circuit switching with a slot reservation at fixed intervals. A synchronous link in Bluetooth technology is referred to as an SCO (synchronous connection-oriented) link. Asynchronous communications (data traffic): The asynchronous data communication is provided using packet switching, utilizing a polling access scheme. An asynchronous link in Bluetooth technology referred to as an ACL (asynchronous connection-less) link. Configuration Max. Data Rate Upstream Max. Data Rate Downstream 3 Simultaneous Voice Channels 64 kb/sec X 3 channels 64 kb/sec X 3 channels Symmetric Data 433.9 kb/sec 433.9 kb/sec Asymmetric Data 723.2 kb/sec or 57.6 kb/sec 57.6 kb/sec or 723.2 kb/sec Reference [www.bluetooth.com ] A combined data-voice SCO packet is defined, which can give 64 kb/sec voice and 64 kb/sec data in each direction. 3.3 THE PICONET: Bluetooth devices can pair up with one or more other Bluetooth devices in several different ways. The simplest way of connecting two Bluetooth devices, is by connecting point-to-point when there are two Bluetooth devices is known as Pico net. One of the devices acts as the salve and the other as a master. This ad-hoc network is a good example for a Pico net. A simple Pico net network needs to have one master and one or more slave, the Bluetooth can have maximum of seven slaves in a Pico net network. In the case of multiple slaves, the communication topology is known as point-to-multipoint. In this case, the bandwidth is shared among all the devices in the Pico net. They can communicate up to seven active slaves in a Pico net. In the case of multiple slaves concept the slaves need to have specific address. So each of the active slaves has been assigned 3-bit Active Member address (AM_ADDR). There can be extra slaves who remain synchronized to the master, but these will not have an Active Member address. The slaves are not active and are referred to as parked. In case of both active and parked units, the complete bandwidth is synchronized by the master. A parked device will have an 8-bit Parked Member Address (PM_ADDR), thus we can have maximum number of parked members to 256. A parked device remains synchronized to the master clock and can vary quickly, become active and communicate with other devices in the Pico net. 3.4 THE SCATTERNET: The process in which two adjacent Pico nets have an overlapping of coverage area is known as scatter net. Slaves in one Pico net can take part in another Pico net as either a master or slave; it can be done through time division multiplexing. In a scatter net, the two (or more) Pico nets are not synchronized in either time or frequency. Each of the Pico nets operates in its own frequency hopping channel while other devices in multiple Pico nets participate at the appropriate time via time division multiplexing. Let us assume two different Pico nets one consisting of mobile phone and PC, while the adjacent Pico net person consisting of a cell phone, headset and business card scanner. Dig Ref : www.wirelessadvent .com/channel/blutooth/feartutre/bluetooth .html The cubicle 1 may set up cubicle 2 business card scanner also transmit the information that is scanned to your PC so that you will have access to his business contacts information. 3.5 AUTHENTICATION AND PRIVACY: Authentication and privacy are handled at the software protocol layer and it is also provided in the Bluetooth physical layer. A particular connection can be specific to need either one-way, two-way, or no authentication. The authentication is generally done using a challenge or response to the system. The system supports both 40 and 64 bit keys. The authentication of the user is done at application layers. This security mechanism and the related software allow the user to set up his or her devices only to communicate with each other. All Bluetooth devices employ this physical layer security in the same way. Of course, for highly aware applications, it is also recommended that you use more advanced algorithms in the network transport or application layer. 3.6 HARDWARE FOR BLUETOOTH: Bluetooth hardware can be divided into two modules, they are. Radio Module Link Module. The Radio Module: Bluetooth devices operate in 2.4GHz Industrial Scientific Medicine (ISM) band. The frequency is an unlicensed one because of international standards and a few exceptions in certain countries like France (2446.5 to 2483.5 MHz) and Spain (2445 to 2475 MHz .So range of frequency is defined with unlicensed version from 2400 to 2483.5 MHz. These local versions have a reduced frequency band and a different hopping algorithm, the Bluetooth SIG is working with authorities in different countries to open compact ability. The RF channels used in Bluetooth technology are from 2402 to 2480 MHz with a channel spacing of one MHz. Frequency hopping has been implemented in order to reduce interference and fading effects. So we have 625 microseconds the channel will hop to another frequency within the 2402 to 2480 MHz range, so we get 1600 hops every second. Every Pico net has a unique hopping sequence which is determined by using an algorithm; the uses of Bluetooth device address the master device. All Bluetooth units in the Pico net are then synchronized to this hopping sequence. All packets are transmitted at the beginning in one of the 625 microsecond time slots, a packet may take 5 time slots. A time division duplex method is used to facilitate full duplex transmission. It is normally done this way, during even numbered slots the master transmits data and odd numbered slots are for a slave to transmits data. In voice data, these time slots can be reserved for synchronous applications. Bluetooth technology use Gaussian Frequency Shift Keying (GFSK) for modulation. A binary system is used where logical one is represented by a positive frequency deviation and a logical zero is represented by a negative frequency deviation. The data is transmitted at a sign rate of 1 Ms/sec. The Link Module The Link Module and Link Manager Software are responsible for the baseband protocols and some other low level link functions. This are related to sending/receiving data, setting up connections, error detection and correction, data whitening, power management and authentication. The link module in the Bluetooth is responsible for deriving the hop sequence. This can be done by using the BD_ADDR (Bluetooth Device Address) of the master device. All Bluetooth devices are assigned with a 48-bit IEEE 802 address. This 48-bit master device address is used by all other devices in the Pico net to derive the hop sequence. The Link Module is also responsible for performing three error correction schemes that are defined for Bluetooth: 1/3 rate FEC 2/3 rate FEC ARQ scheme for the data The purpose of having two FEC (forward error correction) schemes is to reduce the number of retransmissions. The ARQ scheme (automatic retransmission request) is responsible for the data to be retransmitted until an acknowledgement is received indicating a successful transmission (or until a pre-defined time-out occurs). A CRC (cyclic redundancy check) code of 2 bytes is added to each packet and used by the receiver to decide whether the packet arrived is error free or not. Note that the ARQ scheme is only used for data packets, but not for synchronous payloads such as voice. Bluetooth provides necessities for three low power saving modes to conserve battery life. These states in decreasing order of power are Sniff Mode, Hold Mode, and Park Mode. While in the Sniff mode, a device listens to the Pico net at a reduced rate. The Sniff intervals provide flexibility for different applications and are programmable. The Hold mode is same as the Park mode, except that the AM_ADDR (Active Member address) is retained. In Park mode, the slave clock continues to run and remains synchronized to the master, but whereas the device does not participate at all in the Pico net. CHAPTER 4 SYSTEM DESIGN 4.1 INTRODUCTION TO SYSTEM DESIGN: The Basic structure of software has been developed as an application based on Bluetooth technology, using the host controller interface concept. This is one of the most common physical implementation in which external cards are plugged into the host computer .when cond in this manner we need to have some ways to send the data and commands to module to obtain the results. The Bluetooth specification has such provision to have host controller interface. The Bluetooth protocol stack consists of the radio, link controller, link manager and the rest of the protocol stack from the L2CAP and above resides on the Host controller interface (HCI) .Hence the HCI provides the communication between the application at the top layer to the link manager, two ways audio packet transportation and transfer the data packet between module (USB dongle) and host computer. HCI interface does not require great knowledge or certification, but it is a good idea when you want to implement any software so that it has wide range of compatibility and also provides us in operating the third party protocol also. The Host cont

Thursday, September 19, 2019

Smoking Essay -- Tobacco Cigarettes

Smoking Introduction Some governments have banned smoking in all public places. Smoking has been proven to be very dangerous to health. Nonetheless 40 % of the population smokes. Actually I am a non smoker, although I used to be a smoker. Most people try out smoking when they are young ; many youths think smoking is a good grown-up habit. Furthermore many young people begin smoking as an act of rebellion and independence. Young smokers start smoking at their age of 12 or 13 just to get a taste of , what it is like. Some of them find it disgusting and unhealthy and some of them find it cool. Fact’s and Figures Tobacco use kills about 420, 000 smokers each year. According to recent studies 53.000 nonsmokers die each year from second-hand smoking. It is not surprising. Despite having plenty of anti-tobacco commercials on Television, and on every single pack of cigarettes there being an important note, chainsmokers can’t kick their bad habit. In Hungary a packet of cigarettes costs around 2 Euros. The average smoker buys a packet a day which comes to 730 Euros per year. Could you imagine , what you could do with all that money? Government intervention in the workplace Last month while I was reading the newspaper, I came across this article: „Smoking is not allowed in any public places anymore.† I found this ministerial decree, a very good decision, due to there being many smokers in my workplace. There is no assigned smoking area for them. As a consequence I ...

Wednesday, September 18, 2019

Wherefore The Maintenance Of Liberty :: essays research papers fc

The tree of liberty must be refreshed from time to time with the blood of patriots and tyrants. It is its natural manure. -Thomas Jefferson On a cold, miserable day in the North Caucasus, the only one who does not look dismal is Russian General Mikhail Malofeyev. He is dead. His body is flag draped and on open display before a dark stand of pines. He is encircled by his mourning officers clad in hulking, camouflage coats. "Russia Admits Chechnya Losses Growing," says the news headline. Military body counts since the counting of them began bear little relationship between actual and reported casualties. Russians officially admit to 910 dead since the war restarted in October of 1999. The Russian Committee of Soldiers' Mothers, who gets its accounting from soldiers, their families, and military hospitals, thinks that 3,000 is a far more likely figure. Interestingly, NTV, which is a local Russian private investigating network and which reports on military news contradictions, has been kicked out of the military press reporting pool. This Chechan conflict is just another example of an ill equipped militia fighting one of the most powerful militaries in the world to a standstill. This is as it was with the Afghans who were even so primitive that they had to forge rifle barrels in their own backyard furnaces. The Afghani ultimately kicked the Soviet invaders out of their homeland. This was just like the Warsaw ghetto Jews, who kept the murderous Nazi's at bay for almost a month with only a handful of small arms before the Jew's valiant final defeat. History repeats with the citizen patriots of Lexington and Concord, who demonstrated with their blood the power and the purpose behind the Second Amendment to the Constitution of the then new United States of America. The Second Amendment confidently guarantees that We the People will ever remain free. Pro Second Amendment people always talk a good game. But what would happen should Americans ever needed to put this right to arms to the test. There are over 20,000 gun laws on the books. These "laws" include outright bans, registration, confiscation, waiting periods, quotas, and any other abhorrent violation that the ruling class imposes just to probe if Americans can be intimidated into servitude. For note, that test of submission happened a while back while the citizens slept. The citizens have already been graded, and by the criteria of their forefathers, they have failed miserably.

Tuesday, September 17, 2019

Childrens Books and Popular Myths about the First Wave of Feminism :: Essays Papers

Children's Books and Popular Myths about the First Wave of Feminism What is the First Wave (1) of Feminism? How is it portrayed as a â€Å"suffrage† movement? Does the average study of First Wave feminism look at issues outside of suffrage: consent laws, marital rape, education, women’s right to own property, divorce rights, and so on? I wanted to look at the portrayal of the â€Å"heroes† of the first wave – Elizabeth Cady Stanton and Susan B. Anthony – as well the movement itself, through books aimed at children. Children’s books seem like an obvious way to look at how the movement is popularly seen and understood. If we set aside condescending ideas of needing to â€Å"dumb down† ideas to introduce them to children, or needing figures to be purely heroic. Then, we assume that most people, who do not actively pursue it later in life, receive the bulk of their information on the First Wave of feminism from kindergarten through high school history education. The Book Choosing Process The sources cover a variety of age ranges and publishers. There was no science in the selection, they were simply the easiest to find at the downtown public library in Syracuse, New York (2), which to me indicates they are the most likely to be picked up by a student doing a report or reading for enjoyment. The sources are not supposed to represent the â€Å"worst† by any standards – they are children's history books, all of which do in depth studies of suffrage. These are not coloring books or propaganda, which, perhaps, is why the information is so dangerous. Brill, Marlene Targ. Let Women Vote! Brookfield: Millbrook, 1996. (aimed at ages 9-12), Davis, Lucille. Susan B. Anthony. Mankato: Bridgestone, 1998. (aimed at ages 4-8), Nash, Carol Rust. The Fight For Women’s Right To Vote in American History. Springfield: Enslow, 1998. (aimed at ages 9-12) Parker, Barbara Keevil. Susan B. Anthony: Daring to Vote. Brookfield: Millbrook, 1998. (aimed at ages 4-8) Five Major Questionable Facts About the First Wave in Children’s History Books 1. Women Asked For Rights. â€Å"This cartoon shows Elizabeth [Cady Stanton] speaking to the New York legislature. She asked [emphasis added] legislators to give women equal rights.† (Davis) 2. Susan B. Anthony Is the First Wave of Feminism. â€Å"Susan had prepared other women to work for women’s rights. They took up the fight. In 1920, the 19th amendment was passed. Many people called this law the Susan B.

Monday, September 16, 2019

Alcohol Laws

Three days ago, i attended the burial ceremony of my best friend. Not only do we do everything together, we have become family.Our parents were mates in college so the legacy continued with the children. We went to the same preschool, high school and as we planned it, we went to the same university. Jack did not die of any sickness neither was he murdered – he, like many Americans, lost his life in a highway accident as a result of drunk driving.In this essay, I will be making an exposition into alcohol abuse and the problems that come with it. I will also explain the extent to which this vice has eaten up into our lives as a nation.Furthermore, I will examine the major alcohol laws in America and probing into if these laws have actually helped in curbing the problems associated with alcohol use. I will also be making a comparison of the DUI laws in each state and how this directly or indirectly tells on the extent in which people abuse alcohol in these states. Finally, I will be using Las Vegas as a point of reference for alcohol abuse – the DUI laws that exist in the state, the people’s disposition towards alcohol use and the effect that this lifestyle has on the people of the state.For the purpose of clarity of this essay, it will suffice to make a conceptual definition of the major terms that will be used in this essay. Alcohol abuse can be defined as the act that involves the use of alcohol in an immoderate manner turning into an unhealthy habit. Alcohol abuse is not the intake of alcohol but the intake of alcohol everyday or excessively at a time.Many people confuse alcohol abuse to alcoholism. Alcohol abuse as an act is less severe to alcoholism. Although both of them are alcohol disorders, alcoholism is an extreme form of alcohol intake that leads a person to alcohol dependence – a state where an individual develops unusual cravings for alcohol, uncontrollable consumption of alcohol, physical dependence on alcohol to feel alr ight and tolerance.Alcohol abuse as an act is typified when an individual who is under the influence of alcohol is involved in some life threatening activities like driving and other activities that pose a threat on the life of the individual and people around him/her.The term DUI simply put is an acronym for Driving Under the Influence of Alcohol. In States in America, DUI is an alcohol laws that is set as a way of reducing casualties of highway accidents.This is determined by a test done on the blood of the person accused of the DUI offence. Although every state has a form of DUI laws that seek to keep alcohol consumers in check, the intensity of this law differ from one state to another. While some states have stricter and almost non-tolerant DUI laws, the DUI laws in other states are less strict and tolerant.â€Å"The 2001 survey shows 25 million (one in ten) Americans surveyed reported driving under the influence of alcohol. This report is nearly three million more than the pr evious year. Among young adults age 18 to 25 years, almost 23% drove under the influence of alcohol† (Drugs-rehabs.org, 2002).Alcohol abuse in America is not an individual problem but a national one. In America, alcohol remains the number 1 drug problem we face. According to statistics gotten from a study made in 2000, an average American consumes over 25 gallons of beer, 2 gallons of wine and 1.5 gallons of distilled spirits every year (Drugs-rehabs.org, 2002).Apart from this, it was discovered that The American government spends over $100 million in healthcare on alcohol and alcohol related problems. Perhaps the most appalling of these statistics is the fact that over 15 million people are dependent on alcohol and of these number, 500 000 fall between the ages of 9 and 12.Alcohol has made a nuisance of many families in America. As statistics have it that three out of four of cases of spouse violent victim incidents happened as a result of alcohol use/abuse by the offender. à ‚  Apart from this, it is reported that four in ten criminal offenders blame alcohol as reason for their violent behaviour. The younger generation are not excluded from this madness. In the same report, it is alleged that students in America spend over $5.5 billion on alcohol.This accounts for double of what they spend on beverages books and milk combined.   In addition to this, it was reported in a survey done in 200 that about 7 million persons between the ages of 12 to 20 was an excessive drinker (drug-rehab.org, 2002). With the death toll statistics by alcohol abuse rising each year, we are faced with a problem that we ourselves caused with our very own hands. We have become a prisoner of our own decisions and every day, someone somewhere in America has to pay the price.Alcohol has been woven into the fibres of our lives. Everyday, someone somewhere is being lured into the population of alcohol consumers. â€Å"Each year, a typical young person in the United States is inundat ed with more than 1,000 commercials for beer and wine coolers and several thousand fictional drinking incidents on television† (drug-rehab.org, 2002).  With the society being infused with this unhealthy habit, the family is the first contact of a victim to alcohol usage. According to drug-rehab.org, about 43% of Americans have been exposed to alcoholism in their families while growing up so they grow up consuming alcohol.

Sunday, September 15, 2019

Financial Management Questions

Q5. Putting yourself in the position of an existing shareholder(investor) of your company, using both the annual corporate report and the information about your company’s share price in the Financial Times, provide a recommendation (with reasons) whether you rate your company’s shares as Buy, Hold or Sell. There are a wide range of factors that affect share price. These include interest rates, inflation, the performance of the industry/sector the company is in, the performance of the company itself, and the market supply and demand for the companies’ shares.The following graph shows Marks and Spencer’s share price over the last 12 months. http://corporate. marksandspencer. com/investors/shareprice/chart Accessed: 05/12/11 By viewing the graph, we can see that there have been numerous fluctuations in share price over the last 12 months. At the start of the year share price was at around 370 pence per share and dropped down to around 330 pence per share afte r 3 months. There was then a surge in share price which reached over 400 pence per share at its peak in May.It then fell to its lowest point, just above 300 pence per share in September and there have since been small fluctuations in share price. Its current share price is at 329. 00 but we expect it to continue to fluctuate slightly before finally increasing again into the New Year, as share prices do generally remain low over the Christmas period. The following table is share information that was published in The Financial Times weekly update on Monday 5th December 2011. | |Price |Wks% Chg | Div |Div Cov |Mcap ? | Last xd | |Marks&Sp |330. 10 |+7. 3 |17 |2. 3 |5,233. 3 |16. 11 | Using the data available from this table and information published in the annual company report, we can work out dividend yield and dividend cover. â€Å"Dividend yield tells you the percentage cash return on the investment, and can be directly compared with interest rates and other investment opportuniti es. It expresses the dividend per share as a percentage of the current share price† (McKenzie, 2010:385).It is therefore worked out by dividing the dividend per share which is 17 pence, by the current price by share, which is 330. 10, and then multiplying the answer by 100. The dividend yield can then be worked out as 5. 17%. This would therefore be a worthwhile investment considering many interest rates for banks are less than 1%. The dividend cover â€Å"measures how many times the dividend could be paid from the available profits† (McKenzie, 2010:384). The financial times reveal that the dividend cover is 2. 3, and therefore the dividend could be paid 2. 3 times out of Marks and Spencer’s available profits.This shows that Marks and Spencer are using quite a substantial amount of profit to pay out dividends, nearly half. This may be rewarding for a shareholder looking for a quick return, however, shareholders who are looking to invest in Marks and Spencer in th e long run may find it more beneficial if Marks and Spencer’s reinvested their profits into the business. Taking everything into account, we would recommend a shareholder to hold their shares, as we believe that there will be a rise in share price in the coming months, so they will therefore make a better return if they do wish to sale in the future.The dividend yield shows that Marks and Spencer offer a good return on investment, compared with other alternatives such as bank interest rates. And also they use a considerable amount of their profits to pay shareholders dividends, so we believe it would be worthwhile holding onto the shares for the time being at least. Financial Times, Monday December 5 2011, p. 26 McKenzie, W. (2010) Using and Interpreting Company Accounts. FT Prentice Hall. p. 384-385

Nuclear Fusion Power Of The Hot Sun Environmental Sciences Essay

The procedure by which two or more atomic karyon articulation together, or â€Å" fuse † , to organize a individual heavier karyon. During this procedure, affair is non conserved because some of the mass of the fusing karyon is converted to energy, which is released. Fusion is the procedure that powers active stars. If light karyons are forced together, they will blend with a output of energy because the mass of the combination will be less than the amount of the multitudes of the single karyon. If the combined atomic mass is less than that of Fe at the extremum of the binding energy curve, so the atomic atoms will be more tightly bound than they were in the igniter karyon, and that lessening in mass comes off in the signifier of energy harmonizing to the Einstein relationship. For heavier elements than Fe, fission will give energy. For possible atomic energy beginnings for the Earth, the deuterium-tritium merger reaction contained by some sort of magnetic parturiency seems th e most likely way. However, for the fueling of the stars, other merger reactions will rule. Types of merger: Fusion reactions are of two basic types: ( 1 ) those that preserve the figure of protons and neutrons and ( 2 ) those that involve a transition between protons and neutrons. Chemical reactions of the first type are most of import for practical merger energy production, whereas those of the 2nd type are important to the induction of star combustion. The notation indicates an arbitrary component, AZX, where Z is the charge of the karyon and A is the atomic weight. An of import merger reaction for practical energy coevals is that between heavy hydrogen and tritium. Nuclear Fusion Reactors: There are two types of atomic merger reactor: Magnetic parturiency reactors and inertial parturiency reactors. Magnetic parturiency reactors have so many parts: Vacuum vas holds the plasma and keeps the reaction chamber in a vacuity, Neutral beam injector injects particle beams from the gas pedal into the plasma to assist heat the plasma to critical temperature ; Magnetic field spirals superconducting magnets that confine, form and incorporate the plasma utilizing magnetic Fieldss, Transformers transmit electricity to the magnetic field spirals, Cooling equipment cool the magnets, Blanket modules made of Li ; absorb heat and high-energy neutrons from the merger reaction and Diverters exhaust the He merchandises of the merger reaction. Here ‘s how the procedure will work: The merger reactor will heat a watercourse of heavy hydrogen and tritium fuel to organize high-temperature plasma. It will squash the plasma so that merger can take topographic point. The power needed to get down the merger reaction will be about 70 megawatts, but the power output from the reaction will be about 500 megawatts. The merger reaction will last from 300 to 500 seconds. The Li covers outside the plasma reaction chamber will absorb high-energy neutrons from the merger reaction to do more tritium fuel. The covers will acquire heated by the neutrons. 3.The heat will be transferred by a water-cooling cringle to a heat money changer to do steam. 4.The steam will drive electrical turbines to bring forth electricity. 5.The steam will be condensed back into H2O to absorb more heat from the reactor in the heat money changer. An inertial merger reactor consists of mark mill, mark injection and tracking systems, the optical maser, a merger chamber, and a power transition system. In inertial reactor atomic, fusion reactions are initiated by heating and compacting a fuel mark, typically in the signifier of a pellet that most frequently contains a mixture of heavy hydrogen and tritium. To compact and heat the fuel, energy is delivered to the outer bed of the mark utilizing high-energy beams of optical maser visible radiation, negatrons or ions, although for a assortment of grounds, about all ICF devices to day of the month hold used optical masers. The het outer bed explodes outward, bring forthing a reaction force against the balance of the mark, speed uping it inwards, compacting the mark. This procedure may besides make daze moving ridges that travel inward through the mark. A sufficiently powerful set of daze moving ridges can compact and heat the fuel at the centre so much that merger reactions occur. The energy released by these reactions will so heat the environing fuel, which may besides get down to undergo merger. The purpose of ICF ( Inertial parturiency merger ) is to bring forth a status known as â€Å" ignition † , where this warming procedure causes a concatenation reaction that burns a important part of the fuel. Typical fuel pellets are about the size of a dumbbell and contain about 10 mgs of fuel: in pattern, merely a little proportion of this fuel will undergo merger, but if all this fuel were consumed it would let go of the energy equivalent to firing a barrel of oil. How atomic merger work in the Sun: During merger, H signifiers a plasma ( the province of affair when heated to a really high temperature ) . The atomic karyon in the plasma shed their negatrons and the forces of repulsive force between these are really high. However, some fuse and alteration into He, let go ofing big sums of energy. On the Sun, the chance that two H karyons will blend is highly low but the immense Numberss of nuclei present beginnings this. aa‚ ¬A?aa‚ ¬A? Using atomic merger in industry: The newest country in which atomic chemists play an of import function is the field of atomic medical specialty. Nuclear medical specialty is a quickly spread outing subdivision of wellness attention that uses ephemeral radioactive isotopes to name unwellnesss and to handle specific diseases. Nuclear chemists synthesize drugs from radionuclides produced in atomic reactors or gas pedals that are injected into the patient and will so seek out specific variety meats or cancerous tumours. Diagnosis involves usage of the radiopharmaceutical to bring forth an image of the tumour or organ to place jobs that may be missed by x beams or physical scrutinies. Treatment involves utilizing radioactive compounds at carefully controlled doses to destruct tumours. These atomic medical specialty techniques hold much promise for the hereafter because they use biological chemical science to stipulate mark cells much more exactly than traditional radiation therapy, which uses radiation from external beg innings to kill tumour cells, killing no mark cells. Advantages of utilizing atomic merger: Nuclear merger releases tremendous sums of heat, which is used to turn H2O into steam to drive turbines and electrical generators with a individual atomic reactor bring forthing more energy per unit of weight than conventional fossil fuels. 2 ) The coevals of atomic energy does non necessitate the combustion of fossil fuels and so does non foul the ambiance with toxicant nursery gases such as C dioxide or S dioxide doing it a much cleaner fuel than other types of electrical energy production. 3 ) The sum of power a standard atomic power station can bring forth is so big that a individual power station can provide electrical power to many 10s of 1000s of places over a big country and limitless. 4 ) Nuclear power Stationss themselves do non take up much land country leting them to be placed near to industrial countries cut downing the demand to reassign power over long distances. 5 ) While atomic reactors and power Stationss are expensive to construct, their operating costs are low compared to an tantamount coal or gas fired station. Disadvantages of utilizing atomic merger: The radioactive waste can possess a menace to the environment and is unsafe for worlds. We all remember the Chernobyl accident, where the harmful effects of atomic radiation on worlds can even be witnessed today. Estimates conclude that someplace between 15 000 and 30 000 people lost their lifeaa‚ ¬a„?s in the Chernobyl wake and more than 2.5 million Ukrainians are still fighting with wellness jobs related to atomic waste. Merely last twelvemonth, on March 18, a major atomic crisis happened once more in Japan. While the casualties were non every bit high as with the Chernobyl accident, the environmental effects were black. By and large atomic merger is on of new phenomena that human detect it. Nuclear merger happened in the Sun by turning H to He ; still scientists have a long manner to travel. Nuclear merger power is advantages and disadvantages and so many restrictions as a power beginning. However fuels will complete so shortly so atomic merger possibly in future can be a suited and safe.AAArticle Beginning: hypertext transfer protocol: //EzineArticles.com/7155300 Article Beginning: hypertext transfer protocol: //EzineArticles.com/7155300 Article Beginning: hypertext transfer protocol: //EzineArticles.com/7155300 Article Beginning: hypertext transfer protocol: //EzineArticles.com/7155300 Article Beginning: hypertext transfer protocol: //EzineArticles.com/7155300