Monday, December 30, 2019

Is Fracking Our Energy Future - 838 Words

Four Colorado Front Range cities, Boulder, Longmont, Loveland, and Fort Collins voted to place restrictions on hydraulic fracturing, or fracking as it is sometimes referred to, in the November 2013 elections. Greeley, a neighboring community, has made a statement in the opposite direction. According to journalist Natalya Savka, â€Å"There is no talk of a fracking ban in this city of 427 wells, a number that is predicted to quadruple within the next few years† (45). Hydraulic fracturing is the future of clean energy production in the United States, according to the gas and oil industry experts. Alex Prud’homme, author of Hydrofracking: What Everyone Needs to Know, says that hydrofracking is defined in different ways by different people. Prud’homme states the following: To those in the energy industry, it refers purely to the process of injecting fluids-which consist of water and between three and twelve chemicals, including hydrochloric acid, sodium chloride, met hanol, and isopropyic ethanol, that serve various functions-underground at high pressure to crack open shale rock, release natural gas or oil trapped there, and allow the hydrocarbons to flow to the surface. (24) To most people, hydrofracking or fracking is just an easy way to describe the processes used to drill a well and extract oil and gas from the site. Weld County, where Greeley is the largest city, is home to â€Å"more than 20,000 active oil and gas wells,† the most in the United States (Savka 45). The city isShow MoreRelatedWhy Fracking Is Not Be The Most Exciting Process1450 Words   |  6 PagesFracking may not be the most exciting process to learn about nor is it something many people want to get involved in but it s much more important than any of those people think. Fracking is the process of extracting fossil fuels by shooting a liquid into the ground that contains known and unknown chemicals. Just reading the description of the process of fracking can be a little freaky for some people and rightfully so. If one major oil company such as Chevron Corporation made the decision to findRead MoreHow Do Energy Coursing Through The Twenty First Century?1156 Words   |  5 Pa geswondered how energy just†¦ happens? We used to burn wood in furnaces to warm our houses, but in recent years we have switched into a modern world of air conditioning and indoor heating. We plug our chargers into the wall when we sleep and our iPhones and laptops are fully charged the next morning. Oil lamps and stoves have become things of the past. We used to know exactly where warmth and light came from, but with all these new advances and inventions, we’re not so sure. So again, how does energy happenRead MoreFracking : The Gas Boom1352 Words   |  6 Pagescommonly known as â€Å"fracking†, is a term that many people may have heard about, but actually have very little knowledge on. Fracking is a topic that is highly controversial between people who work in the industry, scientists, and environmental professionals. Fracking has been around for a long time, but it’s only been in the past thirty years that it’s really taken off in what is know n as the shale gas boom. As our sources of energy dwindle down it becomes important to consider our future and look intoRead MoreFracking (Pro-Con)1159 Words   |  5 Pagesâ€Å"Everything is energy and that’s all there is to it†¦Ã¢â‚¬  -Albert Einstein. For some of us the innovative method of hydraulic fracturing in the energy sector is a dream come true. To others, it is a nightmare. Often the word ‘fracking’ itself raises a lot of concerns, protests, and controversies. Environmentalists and the general public who are not aware of the facts and statistics about fracking, what’s called the bigger picture, often tend to think that fracking is a major concern and its impact onRead MoreFracking, The Splitting Decision : An Analysis1726 Words   |  7 PagesFracking, The Splitting Decision: An Analysis of the Advantages and Disadvantages of Fracking Abstract Fracking, or hydraulic fracturing, is the process of drilling into the Earth and subsequently directly a high-pressure water, sand, and chemical mixture at shale rock to release the gas inside, out through the head of the well. Fracking allows firms to access previously inaccessible resources of oil and gas buried underneath the earth and hidden in the rocks. In the U.S., fracking has boostedRead MoreThe Infinite Beauty Of Our World1730 Words   |  7 PagesThe infinite beauty of our world is one that demands a delicate balance of respect. For centuries, all life has coexisted with these just principles. Each time man’s reach exceeds his grasp, nature’s fury unleashes itself relentlessly and without pause. These grave disasters reshape the face of our planet, leaving behind scarred remnants of its former self for future generations to inherit. How much ill-fated treatment must our world endure? How long before a reckoning, too great a price, is paidRead MoreThe Economic Report On Fracking, Is It Worth It?1465 Words   |  6 PagesWeekly Economic Report Fracking, is it Worth it? Ron Withall Business 630, Dr. Lynn Reaser SUBJECT Our dependence on foreign oil and natural gas has created a vulnerability affecting our national security and economic stability. Up until this past decade there was an appreciable decline in our oil and natural gas production in the US and we were tied to world market price fluctuations. Oil prices and natural gas prices rose and fell based on OPEC’s and other large oil and natural gas producers’Read MoreHow Fracking Ignited The American Energy Revolution And Changed The World1577 Words   |  7 PagesHow Fracking Ignited the American Energy Revolution and Changed the World Russell Gold, a reporter for The Wall Street Journal, wrote a book entitled, The Boom: How Fracking Ignited the American Energy Revolution and Changed the World. In his book he begins by telling a personal story of how he has been affected by the â€Å"energy revolution. His parents, along with their friends, owned about 102 acres of land in Pennsylvania that was thought to have oil beneath it. The story begins when his parentsRead MoreA Brief Note On The Impact Of Fracking1657 Words   |  7 PagesKyle Quintana Candace Craig English 121 6 May 2015 The Impact of Fracking When it comes to vast amounts of energy sources, natural gas in America is not something most people believe is plentiful. As resources are used up it then becomes time to look for a new supply elsewhere. America has always been dependent on foreign trade, including fuels, which in turn leaves us vulnerable to steep prices. Natural gas is one very important fossil fuel and from its various uses, its numbers have continuedRead MoreFracking Affect The Community On A Local Level1434 Words   |  6 Pagessources of energy in the US and are mined through the process of fracking. B.Hydraulic fracturing, more commonly known as fracking, is a method of oil and natural gas extraction used to release natural gas that can be converted into energy. A mixture of water, sand, and chemicals is injected into shale formations thousands of feet below the surface returning with an untapped flow either gas or oil. Essentially, it is a relatively inexpensive and increasingly common method of energy extraction

Sunday, December 22, 2019

Substance Use Disorder Within Mental Health Patients

Substance use disorder in mental health patients poses a major concern to clinicians in psychiatry. The disorder generally is associated with an underlying mental health condition(s), however, there are multiple theories suggesting psychological to neurological and probably multifactorial etiological profile. Substance abuse and substance dependence which are the former terms that were used to define one with the disorder has been grouped into a set category of substance use disorder by the 2013 Diagnostic Statistical Manual of Mental Disorders, Fifth Edition (DSM-5) (APA, 2013). Furthermore, there is a certain number of diagnostic criteria as well as severity that must be met to best guide care services of the patient with a substance use or polysubstance use disorder. Identification of High-Risk Population Definition of Substance Use Disorder and Etiology The word substance can describe a drug of abuse, a medication or a toxin that produces psycho activation and alters cognitive, behavioral, and affective perception; furthermore, addiction has been conceptualized as a disease, yet little is known about the underlying pathophysiology (Johnson, Vanderhoef, 2013). Most common theories that have contributed to some understanding to the substance abuse and addiction are described by Johnson Vanderhoef (2013) as psychodynamic which within this theory is the oral stage fixation where a person seeks gratification through oral behaviors; maladaptive regressive behaviorsShow MoreRelatedMental Health Parity And Addiction Equity Act1293 Words   |  6 PagesThe Paul Wellstone and Pete Domenici Mental Health Parity and Addiction Equity Act (MHPAEA) was enacted on October 3, 2008 as sections 511 and 512 of the Tax Extenders and Alternative Minimum Tax Relief Act of 2008. MHPAEA amends the Employee Retirement Income Security Act of 1974 (ERIS A), the Public Health Service Act (PHS Act), and the Internal Revenue Code of 1986 (Federal Register, 2013). The MHPAEA is an extension of the Mental Health Parity Act of 1996, which prohibited annual or aggregateRead MoreDiagnostic And Statistical Manual ( Dsm V )829 Words   |  4 PagesWorld Health Organization (WHO) (1995) are two similar systems (though not identical) which clinicians use to offer dependence diagnosing criteria by objectively identifying substance misuse and mental health disorder. According to Cooper (2011) dual diagnosis, co-morbidity, co-existence or co-occurring are terms used to identify the combination of substance use and mental health problems. (SOURCE) states that dual diagnosis, co-morbidity, co-existence, co-occurring, mental ill health, mental distressRead MoreThe Prevalence of Co-Occurring Disorders Essay893 Words   |  4 PagesPREVALENCE OF CO-OCCURRING DISORDERS The Prevalence of Co-Occurring Disorders Launita D. Joseph Grand Canyon University August 15, 2012 The Prevalence of Co-Occurring Disorders When a counselor has a new client they are working with, the client has to be assessed. When being assessed the counselor has to determine what issues the client may have. Through being assessed, the counselor may come to realize the client has more than one issue which is called co-occurring disorders. At this point theRead MoreDrug Use And Substance Use Disorder Patients1291 Words   |  6 Pagesepidemic status with substance use disorder patients. There are many reasons to why we all should be concerned as a nation; however, this very problem is an essential topic globally. 230 million drug users are found worldwide and 19.9 million of those are Americans that have used illicit drugs in the year 2007 alone (as cited in Michael’s House, n.d); Furthermore, America makes up 4 percent of the global population and our nation manages to occupy two-third of the illegal drug use worldwide (as citedRead MoreThe Field Of Mental Health1275 Words   |  6 PagesThe field of mental he alth has evolved over the last century and a half due to medical advancements in the field. Mental illness is no longer seen as a hopeless situation for Americans to deal with. People with mental challenges can have productive lives with the proper treatment. Today, fewer stigmas are associated with having mental illness. A more humane approach occurs in psychiatric medicine than in the past decades. The practice of lobotomy was stopped in 1967 it was a controversial procedureRead MoreMental Illness Refers To A Wide Range Of Mental Health1742 Words   |  7 PagesMental illness refers to a wide range of mental health disorders that can affect mood, behavior, and cognition. Multiple factors such as genetics, environment and lifestyle can influence whether someone develops a mental health condition. â€Å"The four D’s† model is often used in psychiatry to distinguish normal from â€Å"abnormal† mental state. In other words, this model makes it easier to understan d characteristics of people who have a mental disorder. The four Ds stands for behaviors or thinking processesRead MoreMental Health And Substance Use Disorder1340 Words   |  6 PagesSerious mental illness (SMI) impacts a person’s thinking, mood, capability to maintain relationships, and overall ability to maintain normal activities of daily living. Treatment is necessary for all individuals with a serious mental illness. Along with family and friends, the community is impacted when supportive treatment options cannot be obtained by a person with a SMI. The Omaha/Council Bluffs metropolitan area, along with the state of Nebraska, have challenges to overcome to ensure thisRead MoreThe Mental Health Parity And Addiction Equity Act Of 20081410 Words   |  6 Pageskey part in mental health care services available to the public. They can determine what options and treatments are available and how much an individual will pay for them. Recent policies including the Mental He alth Parity and Addiction Equity Act of 2008, the Affordable Care Act, and the Children’s Health Insurance Program Reauthorization Act work to expand access to coverage. It is important to know how policies play a role in the health care that individuals receive. The Mental Health Parity andRead MoreI Am Writing About The Bill s Mental Health Care Access Act1248 Words   |  5 PagesDeepa Oja and I reside in your district 7. I am writing to support your bill H.R. 1604, Veteran’s Mental Health Care access Act, which you cosponsor. The bill calls for veterans to be eligible for mental health care at non Veterans Affairs (VA) facilities, regardless of when they enrolled in the VA health care system or seek care at a VA facility, or the location of the veteran s residence. Mental illness is very common among men and women who serve in our military. According to American PsychiatricRead MoreInterpersonal Theory Of Suicide And Suicide1275 Words   |  6 Pagespredictor of engaging in suicidal behaviour is depression. Furthermore, it was found that 15% of clinically depressed patients would take their own lives. (HOLT). Those are only statistics but they can in no way describe the misery in which people find themselves. There are many differing factors that contribute to a person engaging in suicidal behaviour such as loss, history of mental disorder and environmental factors. There are also many theories of suicide that integrate these established risk factors

Saturday, December 14, 2019

Communication Barriers in an Organisation Free Essays

string(70) " need arise to consult them if the changes have already been decided\." Question 1. Identify and critically discuss the communication problems and barriers in the communication scenario depicted in the video clip. (563 Words) According to Dr Robbins’s book on Organizational Behavior 2003, effective communication is summarized as the means of encoding a message from the sender, clearly to the receiver through a channel without the actual message being negatively fragmented in the process. We will write a custom essay sample on Communication Barriers in an Organisation or any similar topic only for you Order Now Communication problems and barriers occur when the information is distorted before reaching the receiver, creating conflicting assumptions and perceptions than what was intended (Deborah J. Barrett, (2002) Diagram 1 below illustrates an example of a communication model. Decoding Decoding Receiver Receiver Channel Channel Encoding Encoding Source Source Diagram 1: MESSAGE MESSAGE MESSAGE MESSAGE FEEDBACK. Sourced from: Stephen P. Robbin (2003), Organizational Behavior, 10th Ed, Prentice Hall, pp 285. Jack demonstrated poor communication skills when addressing the news. His approach is erroneous, failing to ascertain their reaction and sensitivity when he addressed changes. Jack failed capture the forthcomings of the group’s â€Å"openness to change† (Anuradha Chawla and E. Kevin Kelloway 2003) The employees in the scenario feels uncertain regarding the â€Å"security of their position, their future roles and responsibilities† (J. Allen et al. , 2007 pp. 359 – 364) and how these changes might bring significant impact to them. In effect of Jack’s misreading body language, tone, and other non-verbal forms of communication exhibiting nervousness and guilt, the group is showing signs of disappointing acknowledgement, It could be from rumours they have heard and relied due to the lack of proper information received. Gray Laidlaw, 2002) Jack’s inability to create the sense of trust in the management’s decision and effective selling of the benefits of change, (Philip. A, 2005) has made matters worse. Claudia Peus et al, 2009 supported Oreg’s research of co-relations in pointing that affective, cognitive and behavioral resistance towards change exist when trust in the management is nonexistent. Jack’s communique method was antagonistic, choosing bad choice of words in his communique’ which prompted the group to ask about their future state. Reeta Raina, 2010 quoted Harris Nelson’s work in 2008 that key towards quality leadership is conceivably the effective communication flow of a story. The method of Jack’s communication somersaulted the group into a defensive mode, causing them to respond negatively on the received information, prompting the concerned about the enormity of the changes and its impact on their job. The group is portraying emotional interferences by interrupting Jake’s conversation, persistently asking about their job security. Jake has unintentionally sparked fear in the group, threatening their physiological contracts (Job securities, job commitments, personal commitments, future planning) (Clutterbuck, 2005) The group is adamant to know what the changes are and Jack refused to provide them with reasonable information and to try and counter the negative perception that was piling up. Lack of information is also known as one of the most influential factor of employee’s decision making in the events of change. Empirical investigation conducted by Allen et al. 2007) also suggests that employees who receives judicious, precise, and â€Å"useful communication (termed as â€Å"quality change communication†) more often than not revealed lower levels of uncertainty and a higher level of openness to certain degree of change. Entering the critical analysis of the video clip, the communication barriers and problems between Jake and the group could best be summarized using the table below. Table 1: The encoded message from Jake, the barriers and problems of communication and the message decoded by the receivers. Information addressed by Jack. Barriers Communication Problems| Message Received by group. | Jack spoke about â€Å"a lot of changes† that is going to take place in an alerting manner rather than an evocative manner, implying that the changes is irreversible. | Lack of Sensitivity to Receiver. Failure to identify the emotional state of the group and the openness in digesting change management. Failed to find the right setting to address the news more effectively. | These changes might imply drastic alteration to their working style, job roles and responsibilities. The fact that the changes are imminent, they feel like being pushed to the edge, emotions of anger, anxiety, stress and confusion builds up. | Jake announced the news in a provocative, informal manner instead of a suggestive, tolerable and informal approach. He mentioned, â€Å"for those of us who’s still around† and â€Å"some of y’all wouldn’t agree with† in the video suggesting that these changes might affect the end outcome of the group’s physical and emotional contributions to the company. | Lack of Basic Communication Skills. Bad choice of words, incepting negative thoughts and perceptions about the looming changes. Speaking in gaps creating the opportunity to negative assumptions and perceptions. Heavy physical movement, misreading of body language, tone of voice, heavy denials. Sending out conflicting messages. | These changes are going to affect their job security in the company. Their contributions towards the company is not appreciated, having not consulted them before changes is being decided. Injustice. Jake’s contradicting speech suggests there are some information that is being withheld from them, creating uncertainties and doubts of the real truth. | Jake stated and suggested that if the group does not like the changes; they could source for a job elsewhere, giving them no choice but to accept the changes even if it affects them adversely. | Lack of freedom of choiceAntagonistic approach towards addressing the outcome of the changes. Assumptions that these changes have already been decided and it will create a negative impact. Lack of empathetic values| The group believes that hey have no say and their opinions are deemed non- valuable by the management in the implementation of the changes. They feel that they’ve been squeezed to a tight corner without choices or opportunity to fend for themselves if these changes are to have an undesirable effect on them. | Jake addressed that there have been changes which already have been decided by the management prior to him co mmunicating with the group. | Emotional Interference. Failed to protect the rights of the employees| One of the group members asked why the need arise to consult them if the changes have already been decided. You read "Communication Barriers in an Organisation" in category "Essay examples" Jake gave an excuse of the entailing details of the changes that he wouldn’t want to pre-amp the management in addressing the news. | Lack of informationUnreliable source of informationDistrustful| Jake did not answer the question that was raising heavy uncertainties and negative perceptions of the change. The group is exhibiting signs of disappointment from their faces, and their tone of voice has changed from query to cynical. | Jake informed that there is going to be a formal meeting coming up and most of the decisions that might affect the group will be decided then. Defensiveness| The group is no longer interested in what Jake is explaining. feels that their rights as an employee to kn ow more information about their job security is violated resulting in a defensive mode of action, bringing the matter up with the union | The group is disappointed that their opinions are not appreciated in the changes that is going to take place resulting further confrontational suggestions such as the worker’s union. â€Å"Lacking freedom of choice about change usually provokes more resistance than change itself† (W. Warner Burke et al. , 1996 pp. 25 – 30) Question 2: Critically discuss the impact the communication problems and barriers you have identified in question 1, may have on the perceptions and attitudes of employees in the communication scenario. (528 words) Perceptions and attitudes are behavioral components of individuals’ perceived notions, reactions and sensing of information and how it’s interpreted. (Robbins, 2003) Three main communication barriers and problems identified of how the information was disseminated to the group is the lack of ommunication skills, lack of freedom of choice, and lack of information which co-relates significantly towards the attitudes and perceptions of the employees. Jack inability to deliver the message clearly instigated negative perceptions, signifying signs of adversity. This constructed gaps in which ‘gives room’ to openness of rumors (G. David, 2011) and negative attitudes to cultivate. The employees displayed unfa vorable facial expressions, emotional reactions and body language upon their self-perceived evaluations of the information, thus manifesting into defensive and retaliating attitude. Rupert Eales-White 2004 pp. 235 suggests in his research that there are two gaps in perceptions which are the conscious intent of the leader (Gap1) and the manifestation of that intent (Gap2) This determines the affect of an attitude is adapted when poor communication is at place, referring to the diagram below. Diagram 2 Conscious Intent Subconscious Intent Stress Poor Communication Manifestation Words Tone of voice Body Language Environment Poor Listening Mindset Impact Gap1 (Leader) Gap1 (Followers) Conscious Intent Subconscious Intent Stress Poor Communication Manifestation Words Tone of voice Body Language Environment Poor Listening Mindset Impact Gap1 (Leader) Gap1 (Followers) Source: Industrial and Commercial Training Volume: 36 Issue: 6 2004, pp. 235, Figure 1. Based from the video clip, the employees are portraying signs of anxiety and fear in losing their jobs. Their psychological contract (Job commitments, personal commitments, organizational commitments and job satisfaction) is threatened. This is supported by Charissa Freese et al. , in her research of 2011, in which she concurred with the research of Turnley and Feldman, 1998; Pate et al. 2000 (longitudinal); Kickul et al. , 2002 on the threats to psychological contracts due to fear and anxiety of â€Å"losing the known and tried†(W. Burke et al. ,1996) Lacking freedom of choice in voicing their opinions, the employees feel that Jack and the company has failed to keep their end of the bargain in their relationship that arises from the â€Å"mutual obligations between them and the compa ny†, which also have shaped and govern their job attitude, well, normally in the perception of the employees. (Charissa Freese et al. , 2011- pp. 05, quoting Rousseau’s 1995 opinions) Unable to influence the change process from taking place, the employees may also experience frustration, a downward slump such as lower productivity, higher absenteeism and work stress, which are; according to Maria Vakola and Ioannis Nikolaou’s 2005 research, agrees with previous research of Schabracq and Cooper, 2000; Murphy, 1995; McHugh, 1993 that it also contributes to lower motivation and morale, decline in work performance, elevating turnover rates, sick-leave, lower job satisfaction and commitments, poor internal ommunication as well as conflicts. According to Maria Vakola and Ioannis Nikolaou’s 2005 research which elaborated on British Industrial Society Survey 2001, shown that 91 per cent of the 492 human resource and personnel professionals questioned believed stre ss to be a problem in their organization’s effectiveness. Furthermore, lack of consistent information is a determinant of organization members to be exposed to rumors – reckoned as â€Å"one of the greatest dangers during crises – as well as to spreading defeatist declarations†,( G. David, 2011) George also quoted Czarnecki (2007, 93) in his work, whom believes that essential justifications of internal communication is â€Å"avoiding the gap between the unusually high interest of staff members eager to find out what is going on and the small amount of information being disseminated by the organization†. Question 3: (Make Recommendations). Draw up a table and summarize how the problems and barriers you have identified in question 1 could have been prevented. Table 2: Recommendations| Rationale| Reflect positive, clarity, and congruent verbal and body language cues emphasizing on good communication skills when addressing change or any topic that might trigger selective perception or behavioral resistance. | In communicating, the speakers will subconsciously send body language and verbal cues. Being consistent with verbal cues and body language portrays convincing and truthfulness. In Deborah’s work on change communication 2002, she quoted Roberts, 1954 pp. 388 who stated; â€Å"therefore, the orator must not only try to make the argument of his speech demonstrative and worthy of belief; he must also make his own character look right and put his hearers, who are to decide into the right frame of mind†| Openness for Change and presentation of information. | The degrees of which the employees may accept the news positively from Jack depends on how open are they towards the idea of changes. The approach should be made progressively rather than antagonistically. In Richa Awasty’s et al. , research in 2011, she quoted Dent and Goldberg’s suggestion that â€Å"employees may not be necessarily resisting the change itself, but rather perceived undesirable outcomes of change or the process of implementing the change† therefore the changes are not necessarily of adverse outcome, but perceived to be due to the mindset of the employees at that particular period and the way the information is presented. Identifying Psychological traits, emotions and feelings, avoiding sensitive words that may ignite negativity. | Although professional relationships entail some boundaries when it comes to interaction with colleagues, it is important to demonstrate sensitivity, and to really care about the people you work with. If you don’t care about them, it will be difficult for them to care about you when it comes to working together. | Provide useable, practical inf ormation to avoid lack of information to the employees involved in the change. If employees are not given adequate information nor allowed to contribute to the solution of problems, they may revert to being the cause of them, resulting in increased absenteeism, lower productivity and grievances and so on (Hubbards1999, Hargie et al. 1999, Armour 1998). Raina Reeta,2010. | Give opportunity for the employee’s leader to attend and discuss to ensure they don’t feel like they’re lacking freedom of choice in facilitating the changes. | A relative lack of employee participation in such change is likely to lead to more negative attitudes about the change (Reichers et al. 1997). Liz Jones(2008) | Uncertainties. | | * Dysfunctional responses. Ignoring or not responding to a comment or question quickly undermines effective communication. Likewise, responding with an irrelevant comment — one that isn’t connected to the topic at hand — will quash genuine communication. Interrupting others while they are speaking also creates a poor environment for communication. * Lacking Confidence. Lacking confidence can be a major barrier to effective communication. Shyness, difficulty being assertive, or lack of self-worth can hinder your ability to make your needs and opinions known. Also, a lack of awareness of your own rights and opportunities in a given situation can prevent you from expressing your needs openly. Strategies for Effective Verbal Communication * Focus on the issue, not the person. Try not to take everything personally, and similarly, express your own needs and opinions in terms of the job at hand. Solve problems rather than attempt to control others. For example, rather than criticizing a co-worker’s personality, express your concerns in terms of how to get the job done more smoothly in the future. * Be genuine rather than manipulative. Be yourself, honestly and openly. Be honest with yourself, and focus on working well with the people around you, and acting with integrity. * Empathize rather than remain detached. Although professional relationships entail some boundaries when it comes to interaction with colleagues, it is important to demonstrate sensitivity, and to really care about the people you work with. If you don’t care about them, it will be difficult for them to care about you when it comes to working together. * Be flexible towards others. Allow for other points of view, and be open to other ways of doing things. Diversity brings creativity and innovation. * Value yourself and your own experiences. Be firm about your own rights and needs. Undervaluing yourself encourages others to undervalue you, too. Offer your ideas and expect to be treated well. * Present yourself as an equal rather than a superior. Even when you are in a position of authority, focus on what you and the other person each have to offer and contribute to the job or issue. * Use affirming responses. Respond to other in ways that acknowledge their experiences. Thank them for their input. Affirm their right to their feelings, even if you disagree. Ask questions, express positive feeling; and provide positive feedback when you can. Resources * Beebe et al. Interpersonal Communication: Relating to Others 2nd Canadian Edition. (Scarborough, Ontario: Allyn and Bacon, 2000). Some additional ideas have been added. How to cite Communication Barriers in an Organisation, Essay examples

Friday, December 6, 2019

Parle G free essay sample

Executive Summary: The bread and biscuits constitutes the largest segments of consumer foods in India. Both Biscuits and Bread are items of mass consumption in our Country. Almost 2 million tons of biscuits are produced in India each year and consumption is growing at 10-12 per cent annually. The per capita consumption of biscuits in the country is about 1. 52 kg annually.Contrary to popular belief that biscuits are consumed by the middle and high income groups, it is actually the only nutritious and hygienic food product for children, lower income groups and the rural population. Nearly 50 per cent of biscuits produced are consumed in rural areas and 30 per cent by income groups earning below Rs 750 per month. Every 100 gm of glucose biscuits roughly provides 20 per cent of energy, protein and calcium required by an average adult. So as to explore the opportunities in these sectors, a large no. f companies are trying to increase their consumer base in these areas. We will write a custom essay sample on Parle G or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page For this they are offering various promotional schemes in order to make their brand familiar to consumers and to have a Competitive edge. Parle G Industries has made a rapid progress in the variety, quality and quantity of biscuits and baked foods and has become India’s biggest brands and the preeminent food brand of the country. It is equally recognized for its innovative approach to products and marketing. The company’s offerings are spread across the spectrum with products ranging from the healthy and economical Tiger biscuits the more lifestyle-oriented recently launched  Ã¢â‚¬ËœMonaco Zabardast Zebra’‘’  Having succeeded in garnering the trust of almost one-third of Indias one Parle G lion population and a strong management at the helm means Parle G will continue to dream big on its path of innovation and quality. This project aims at studying the effect of the various Promotional schemes offered by Parle G during the period of May and June on its overall sale of the products offered in Promotions.The total increase in sales percentage was also tracked. Objectives: * To deliver right SKU ; Gift item to right place in right time. * To achieve internal customer satisfaction level to 95%. * And to increase the consumer base for newly launched product. * To penetrate market with greater share of business. * To leverage Parle G brand by having association with some other known brand. * To counterattack competitor’s strategy. The consumer promotional offers are based on the principle of elasticity of demand. Recommendations:As already discussed above, there are certain issues and flaws associated with Sales Promotion, so in order to implement it effectively and efficiently we would like to suggest certain recommendations to the company: Production department should make efforts to make available all of the product varieties in the depot norm wise. So that each and every variety should be available according to the generated order so as to meet the stock out problem. I recommend strong coordination between production and the sales department.So that a proper production forecast for each variety can be maintained by the production department. Proper allocation of the stock from the depot according to the Super stockiest contribution so that neither there is excess stock in one region nor stock outs in other. I also recommend increasing average number of lines so that all the SKUs are available in the market. Apart from setting overall target for all the SKUs, there should also be individual SKU wise target so that RPDs and UPDs are able to make sales of unfamiliar products also.

Friday, November 29, 2019

Home Security System Essay Example

Home Security System Essay ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, house security system becomes the best solution to overcome house intrusion problem when user is not in house. As we know, there are many types of house security system which is too expensive and difficult to use. For that reason, an effective house security system at low cost is built where user can also program the security system by their own. This project is focusing on developing a house security system with an active infrared motion detector which is controlled by microcontroller Intel 8051. The overall project is divided into two parts. The first part is concern on the hardware development where all electronics component are connected via the circuit design using wrapping technique. An active infrared, the magnetic sensor, and keypad are the input components while buzzer, indicator, and LCD display are the output components where it’s all controlled by controller circuit. The second part is base on software programming to operate the hardware structure. Program for security system based on microcontroller Intel 8051 assembly language is assemble using ASM51 assembler to get the binary file thus, to load into external memory of the hardware structure via serial communication. The process of downloading and executing the program is done using HyperTerminal’s communication software to the microcontroller serial port. In order to achieve the best house security system, more detectors or sensors can be connected to the microcontroller output port where it can be reprogram by user using their personal computer at home. We will write a custom essay sample on Home Security System specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Home Security System specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Home Security System specifically for you FOR ONLY $16.38 $13.9/page Hire Writer As the result, the infrared motion detector is capable to detect motion while the microcontroller is capable to control the whole operation of the security system. CHAPTER 1 INTRODUCTION 1. 1 Background Motion detection is the action of sensing physical movement in a given area. Motion can be detected by measuring change in speed or vector of an object in the field of view. This can be achieved either by mechanical devices that physically interact with the field or by electronic devices that quantifies and measures changes in the given environment. There are two device of motion detection which is the mechanical device, and the other one is electronic device. In the mechanical device, a tripwire is a simple form of motion detection. If a moving objects steps into the tripwires field of view then a simple sound device like bells may alert the user. Mechanical motion detection devices can be simple to implement, but at the same time, it can be defeated easily by interrupting the devices mechanics like cutting the wire†. While in electronic device, the electronic motion sensing such as motion detectors, can prevent such mechanical intervention. The principal methods by which motion can be electronically identified are optical detection and acoustical detection. Infrared light or laser technology may be used for optical detection. Motion detection devices, such as motion detectors, have sensors that detect movement and send a signal to a sound device that produces an alarm or switch on an image recording device. There are motions detector which employ cameras connected to a computer which stores and manages captured images to be viewed over a computer network. The applications for such detection are detection of unauthorized entry, detection of cessation of occupancy of an area to extinguish lighting, and detection of a moving object which triggers a camera to record subsequent events. The motion detector is thus a basic idea of electronic security systems. 1. 2 Project objective The objective of this project is to build a house security system using microcontroller Intel 8051 based on active infrared motion detection. 1. 3 Project scope This project concentrates on a development of an active infrared motion detector for house security system. To develop the whole project, it consists of three methods which are the concept of security system, the electrical structure, and the software programming. The concept of security system is on the detection of movement using active sensor to trigger alarm controlled by the microcontroller Intel 8051. The electrical structure consist of two systems which are the active infrared circuit that used to detect or sense motion and the microcontroller Intel 8051 circuit, used to control the whole operation of the security system. While the software programming is base on the microcontroller Intel 8051 instruction sets. It contains a program designed for a security system as an interaction to operate the electrical structure. 1. 4 Literature review Motion detectors are mainly used in security systems [4]. It is typically positioned near exterior doorways or windows of a building to monitor the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the average homeowner as well as commercial organizations [4]. An electronic motion detector is a device used to detect any physical movement in a given area and transforms motion into an electric signal. It consist of sensor that electrically connected to other devices such as security system, lighting, audio alarms, and other applications. Motion sensors are used in a wide variety of applications and as a result, many different types of motion sensors are available including the infrared sensor. Infrared sensors are widely known in the arts of intrusion detection and in fire or smoke detection. It is a device that often used in automatic light switches and security systems to turn on a light or to activate some other form of alarm or warning indicator when a person enters a monitored area [4]. The infrared sensors have basically two forms: active and passive. [4] An active infrared detector includes a radiation source and an infrared sensor which is sensitive to interruptions in the radiation sensed from the source. [4] These detectors are used as intrusion detectors by providing a path of radiation from the source to the sensor in a place where the path is likely to be interrupted by an intruder. The proposed active infrared method of motion detection has the advantage of fast speed response of a relatively large sensor. This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents substantial problems in the passive infrared (PIR) sensors. Low production cost is another advantage of these active infrared detectors. [4] Passive infrared motion detection detects heat energy radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is generally use an optical ollection system and multiple sensing elements of alternating polarity to create a detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for producing a detection signal in response to the heat sensor detecting a change o f temperature caused by the body heat of a person entering the detection pattern. PIR motion detectors are perhaps the most frequently used home security device. 4] Passive IR motion detectors are usually designed to provide an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is responsive to receipt of the breach indication to cause an alarm condition to occur. The other motion detector used in security system is an ultrasonic motion detector. It is commonly used for automatic door openers and security alarms [4]. It is inexpensive and can operate with narrow beam-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector. It can be used to detect motion in an area where there are not supposed to be any moving objects. This type of motion detector is most commonly used in burglar alarm systems since they are very effective in this application [4]. In an ultrasonic motion detector, there are two transducers; one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the receiver in constant phase if none of the objects in the area are moving. If something moves, the received signal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm. Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a plane overhead. Besides, the installation options on this type of motion detector are limited because ultrasonic beams are easily blocked by thin materials, including paper. False triggering is easily caused by reflections from blowing curtains, pets, and flying insects. While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use two infrared sensors, which monitor different zones within a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area. For that reason, the purpose of using the active infrared as a sensor to detect motion for this project is surely on the advantage offers by the sensor. Its capability on detecting motion with a simple design at lowest cost is needed to build an effective house security system based on motion detection. 1. 5 Thesis outline Chapter 1 explains the background of motion detection, the project objective, the project scope, and the literature review of motion detector for security system. The concepts of motion detector are the major element as a guide for the development of the security system. Chapter 2 explains the systems involved for the development of the active infrared motion detector for house security system. The understanding of three systems which are the active infrared, motion detector, and house security system stated in this chapter needed for the development of the whole project. Chapter 3 focuses on the methodologies for the development of the electrical structure and the implementations of microcontroller programming. It gives a brief review on the concept of active infrared motion detector, the electrical structure for hardware development, and the programming for the operation of the security system. Chapter 4 discusses on the results obtained of the whole project. All discussions are concentrating on the result and performance of the security system. The discussion is valuable for future development of the security system. Chapter 5 discusses about the conclusion on development of the active infrared motion detector for house security system. The recommendations and modification required on this project is stated in this chapter for further development. CHAPTER 2 ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM 2. 1 Introduction There are two systems on a development of the active infrared motion detector for house security system. The first system is an active infrared motion detector and the other one is the controller system. The first system concentrates on a development of an active infrared motion detector. It is consists of three element, which are the active infrared, the motion detector, and the house security system. The motion detector circuit will be control by the second system which is the microcontroller Intel 8051 based system. The combination between this two systems will built a project called an active infrared motion detector for house security system. 2. 2 Active infrared (IR) Infrared is an electromagnetic spectrum at a wavelength that is longer than visible light. It cannot be seen but it can be detected. Objects that generate heat also generate infrared radiation and those objects include animals and the human body whose radiation is strongest at a wavelength of 9. 4 µ meter. Infrared in this range will not pass through many types of material that pass visible light such as ordinary window glass and plastic. However it can pass through, with some attenuation, material that is opaque to visible light such as germanium and silicon. The active infrared sensors use invisible light to scan a defined area. In active infrared systems, there are two-piece elements which are consisting of an infrared transmitter and an infrared receiver. There is a 3/8 inch infrared beam between the transmitter which is placed on one side of the trail and the receiver which is placed on the other side of the trail. The transmitter and the receiver can be separated by as much as 150 feet. The transmitter emits a beam of light into the scan zone. The light, which is reflected by the background returns to the receiver, which constantly monitors the scan zone. When a person or object enters the zone the infrared light is interrupted. It then sends a signal to the controller system, which is wired into the door controls. One variation of this operating mode is called ‘background suppression’. This is when the receiver only detects a change in the reflected light when a person or object enters the scan zone thus causing a reflectance variation of the light, sending a signal to the microcontroller thus trigger the alarm of the security system. 2. 3 Motion detector A motion detector is a device that contains a motion sensor and is either integrated with or connected to other devices that alert the user of the pre-sense of motion. An electronic motion detector contains a motion sensor that transforms the detection of motion into an electric signal. The electric signal can be connected to a burglar alarm system which is used to alert the home owner or security service after it detects motion. An example of sensor that used in security system is an active sensor. Active sensors in motion detectors system are commonly used inside homes for a security system. An active motion detector emits optics or sound waves and measures feedback to detect motion. The simplest type of active motion detector is commonly used in commercial doorways to trigger a doorbell. A device is fixed to one side of the doorway, an optical sensor to the other. A beam of light will passes from the device through the sensor. When someone enters the establishment, the beam is broken, triggering the doorbell thus warn user for the intrusion. For that reason, active motion detectors can be purchased for home improvement security system. It is inexpensive devices that can add for more security to a home and provide peace of mind for home owners. 2. 4 House security system House security system is one of security that truly related to burglar or safety alarm system. Burglar and safety alarms are found in electronic form nowadays. Sensors are connected to a control unit via either a low-voltage hardwire which in turn connects to a means for announcing the alarm to elicit response. In a new construction systems are predominately hardwired for economy while in retrofits wireless systems may be more economical and certainly quicker to install. Some systems are dedicated to one mission; handle fire, intrusion, and safety alarms simultaneously. In common security system, the lights are triggered by motion gives the impression to user that someone is at home and able to see the burglar. Infrared motion detectors placed in house security system in crucial areas of the house can detect any burglars and alert the home owner or police. The first security system invented, house alarms were triggered by the release of a pressure button fitted into a door or window frame. This basic alarm was fundamentally flawed as the entire intruder needed to do to silence the alarm was to close the door or window. While various systems on the market ranging from inexpensive house security alarms to highly sophisticated systems requiring professional installation. All modern alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or closed depending on the security system designed. The alarm is triggered when the circuit is altered and will not be silenced until a code is punched into the control panel. The most expensive and complicated alarm systems might also involve a combination of motion sensors and pressure pads to ensure even the most cunning intruder doesn’t get his hands on treasures. 2. 5 Microcontroller Intel 8051 The microcontroller 8051 is an 8-bit machine. Its memory is organized in bytes and practically all its instruction deal with byte quantities. It uses an Accumulator as the primary register for instruction results. Other operands can be accessed using one of the four different addressing modes available: register implicit, direct, indirect or immediate. Operands reside in one of the five memory spaces of the 8051. The five memory spaces of the 8051 are the Program Memory, External Data Memory, Internal Data Memory, Special Function Registers and Bit Memory. The Program Memory space contains all the instructions, immediate data and constant tables and strings. It is principally addressed by the 16-bit Program Counter (PC), but it can also be accessed by a few instructions using the 16-bit Data Pointer (DPTR). The maximum size of the Program Memory space is 64K bytes. The External Data Memory space contains all the variables, buffers and data structures that can not fit on-chip. It is principally addressed by the 16-bit Data Pointer (DPTR), although the first two general purposes register R0 and R1 of the currently selected register bank can access a 256-byte bank of External Data Memory. The maximum size of the External Data Memory space is 64K bytes. The external data memory can only be accessed using the indirect addressing mode with the DPTR, R0 or R1. The Internal Data Memory space is functionally the most important data memory space. In it resides up to four banks of general purpose registers, the program stack, 128 bits of the 256-bit memory, and all the variables and data structures that are operated on directly by the program. The maximum size of the Internal Data Memory space is 256-bytes. The register, indirect and direct addressing modes can be used in different parts of the Internal Data Memory space. The Special Function Register space contains all the on-chip peripheral input and output registers as well as particular registers that need program access. The maximum number of Special Function Registers (SFRs) is 128, though the actual number on an 8051 family member depends on the number and type of peripheral functions integrated on. The SFRs can only be accessed using the direct addressing mode while the upper 128 bytes of the Internal Data Memory can only be accessed using the Indirect addressing mode. The Bit Memory space is used for storing bit variables and flags. There are specific instructions in the 8051 that operate only in the Bit Memory space. The maximum size of the Bit Memory space is 256-bits. Bits can only be accessed using the bit instructions and the direct addressing mode. 2. 6 Summary The understanding on the elements of the systems involved for this project which are the active infrared, the motion detector, and the house security system is needed before proceed for the design and development process. This is important to ensure the project done according to the main idea of each part discuss in this chapter. CHAPTER 3 METHODOLOGY 3. 1 Introduction There are several steps to be applied in designing an active infrared motion detector for house security system. The relevant information is gathered through literature review from previous chapter. Data on motion detection and security system projects has been collected where the theoretical design is studied based on the motion detector for security concept. The understanding on the electrical structure for the hardware development is needed for the design circuit process of the motion detector and the basic security circuit. The next is the hardware development according to the circuit designed. This process is just only being proceed if each part of the circuit being improved is valid, else, it will be repeated until it is valid as the theoretical. Once the hardware development circuits have the output as the expected, then, the comparison for both hardware and theoretical analysis will be done. Next is the step where software structure is developed for the security system to be interface with the hardware development. While the final step of this research is on applying the whole project to the real house entrance like doors and windows. 3. 2 The concept of motion detector for security system Figure 3. 1 Active infrared motion detectors Figure 3. 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consists of two housings. The first housing contains an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector. The other housing contains an infrared reflector to reflect the infrared signal. When positioned in front of an entrance to a protected area, the two housings establish an invisible beam. Figure 3. 2 The concept of infrared motion detector for security system A person who enters the area will interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the active infrared motion detector. An interruption in the signal modulated pulsating beam transmit by an infrared diode while receive by an infrared detector will set ‘on’ or ‘off’ the alarm of the security system. 3. 3 Hardware development Figure 3. 3 Block diagram for the house security system The hardware development is divided into three stages as shown in block diagram above. The inputs stage of the security system is the motion detector circuit, keypad, and magnetic sensor. The second stage is the controller unit which is the microcontroller Intel 8051. The purpose of using microcontroller is to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzers. 3. 3. 1 Motion detector circuit In designing the infrared motion detector circuit, it is based on two basic principle of active infrared motion detector which is the infrared transmitter and infrared receiver as shown in Figure 3. 4. Figure 3. 4 Basic principle of infrared operation 3. 3. 2 Infrared transmitter For the infrared transmitter which is also known as emitter circuit, it is on a basic design of timer 555 astable operation. The output of timer is connected to the infrared transmitter is used to produce pulse using an astable timer circuit. In astable circuit operation, pulse will continually generated until the power supplied through the circuit is removed. The astable circuit produces a continuous train of pulses at any frequency required. This means that the 555 timer can operate repeatedly; it will switch ‘on’ and ‘off’ continually to generate data for the infrared transmission. . 3. 3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high ‘1’ or low ‘0’ from the output termi nal thus activate or deactivate the controller system operation. The range of infrared detector components according to datasheet stated that the infrared detector can fully operates on detecting the infrared signal of 38 to 45 kHz. . 3. 4 4 ? 4 hexadecimal keypad The purpose of using 4 ? 4 hexadecimal keypad in the project is as an input where secure code entries to activate of deactivate the security system operation. The keypad provides eight interface pins, where one pin for each row and column of the keypad matrix. This 4 ? 4 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the keypad bouncing in the hardware development. 3. 3. 5 Keypad encoder (MM74C922) The MM74C922 key encoders provide all the necessary logic to fully encode an array of 4 ? hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller syst em. Figure 3. 5 Interaction between keypad, keypad encoder, and octal buffer The figure 3. 5 above shows the block diagram on the interaction between the 4 ? 4 hexadecimal keypad, keypad encoder (MM74C922), and the octal buffer (74LS244). The keypad is used as a switch to give logic configuration to the keypad encoder. While the encoder will encode the data configuration from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 3. 3. 6 Octal buffer (74LS244) A buffer is simply a unity-gain amplifier, usually with very high input impedance and very low output impedance. It allows a connection of heavily loaded to another load which requires a lot of current like capacitive load. The octal buffer is used to isolate one device from another by eliminating loading effects. It provides a ‘buffer’ between the two devices. The 74LS244 are octal buffers and line drivers designed to be employed as the memory address drivers, clock drivers, and bus-oriented transmitters/ receivers which provide improvement on the controller board density. 3. 3. 7 Microcontroller circuit (Intel 8051 – expended mode) The controller systems that use to control the motion detector system and other electronic devices are the microcontroller Intel 8051 – expended mode. In expended mode configuration, external ROM and RAM are used to add the data memory to be more than internal memory provided by the Intel manufacturer. The purpose of using an expended mode for the project is to expend more data available on developing and designing an excellent operation of the security system. Figure 3. 6 Intel 8051 block diagram The microcontroller Intel 8051 is a widely used on controlling devices and instruments due to its flexibility, existence of multiple producers. It consists of a simple architecture introduced by Intel in the year of 80’s. It produced with 128 bytes of RAM, 4K bytes of on-chip ROM, 2 timers, one serial port, and 8-bits wide of ports. This type of microcontroller become very popular after Intel allowed another manufacturer to make and market any flavor of the 8051, and still remains compatible with 8051. There are various versions of 8051 with different speeds and amount of the on-chip ROM which is valuable on controlling a system designed. 3. 4 Software development The software structure is using the assembly language where a set of program based on security system is assembled using ASM51 assembler. The 8051 Cross Assembler (ASM51) takes an assembly language source file created with a text editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the Cross Assembler builds a symbol table and labels that used in the source file. While the second pass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose. A security program as shown in flow chart below were written in notepad based on 8051 instruction set before assembling process to get the binary code. This binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 3. 7 is a basic designed for the security system operation. In this security system, the security code is set as ‘1985’ to activate or deactivate security system. When user closed the door, the system will activate where the magnetic switch and infrared is in active condition. To deactivate the system where opening door without alarm, user must enter the deactivation code. The chance to deactivate the system is once before keypad locked, where user can not enter the code anymore. If deactivation code was correct, green LED will ‘on’ while alarm will ‘off’ condition. System at this time is successfully deactivated and user can open the door without alarm. Figure 3. 7 Flow chart of software design for the security system If deactivation code enters was incorrect, system is still activate and for that, red LED and alarm will ‘on’ where the system is in a warning mode. The system will keep in this mode until the correct deactivation code entered. When the correct deactivation codes enter, the reconfirm code is needed where user need to reenter the correct deactivation code before the system successfully deactivate; the green LED will ‘on’ and the alarm will ‘off’ condition. The reconfirm code is designed in the system to make more security for the system developed. If intruder open the magnetic switch without entered the correct security code, thus the alarm will ‘on’. User must enter the correct deactivation code to turn ‘off’ the alarm system. The activation and deactivate code for this system are ‘1985’ and the ‘enter’ button codes are ‘A’ for every codes entered. 3. 5 Summary There are three elements discussed in this chapter which are the concept of motion detector for security system, the hardware development, and the software designed for the security system. Each part of these elements is related to each other. The understanding of the concepts and methods on developing the project is very important to achieve the main objective for the whole project. CHAPTER 4 RESULTS AND DISCUSSIONS 4. 1 Introduction This chapter will briefly discuss on the results and discussions of the hardware development. There are three major modules in developing the hardware structure which are the active infrared motion detector circuit, keypad module circuit, and the most important; the controller circuit 4. 2 Motion detector circuit The hardware development of the active infrared motion detector system is divided into two parts, which are the infrared emitter

Monday, November 25, 2019

Comparing To his Coy Mistress and Sonnet 130 Essay Example

Comparing To his Coy Mistress and Sonnet 130 Essay Example Comparing To his Coy Mistress and Sonnet 130 Paper Comparing To his Coy Mistress and Sonnet 130 Paper Essay Topic: Literature Sonnet 130 is a love poem in sonnet form by William Shakespeare that controversially goes against the standard love clichi s of a traditional love poem by describing his love honestly and very realistically. The tone of the poem appears negative but in fact he is actually showing his realisation that love has imperfections but his love is enough to overcome any of them and the beauty of love is a fake sugar-coating of physical beauty. His love is expressed as the love that what lies beneath; the innermost feelings of each person. The poem (though controversial in its context) is traditionally structured in sonnet form with fourteen lines and ten syllables per line. The ABAB rhyming structure is carried out throughout the poem until the last two lines which are rhyming couplets. This typical structure, along with the obvious iambic pentameter, creates an easy-flowing read with a pleasant rhythm. At first glance, the context appears to be very insulting and even the very title my mistresss eyes are nothing like the sun imply an offence. Unlike the majority of the love poems of the period where the poets lovers were all described as goddesses that glide and having beautiful golden hair, Shakespeare describes his love as having black wires grow on her head and specifically mentions that he never saw a goddess go and when she walks, treads on the ground. This is quite a comparison to the dazzling goddess that one would expect to be described and seems as if Shakespeare is trying to offend his mistress. However, with a little thought, Shakespeare actually appears to be aiming to be realistic about his love though it may also be proven to simply be a mockery of the conservative love songs of the day. While traditional poets would use specific imagery to paint beautiful and attractive images of their love, Shakespeare takes these ideas and revises them, so that they portray unattractive, unpleasant but more honest depictions of his mistress. For example, where poets would describe their loves as having lips as red as coral, Shakespeare describes his mistresss lips as coral [being] far more red than her lips red. In addition, instead of describing her rosy cheeks as commonly read elsewhere, he says no such roses have I seen in her cheeks. The last two lines are different from the rest of the poem being rhyming couplets and consequently they stand out, giving an opportune chance to emphasize a point. Shakespeare uses this to emphasize his love for his mistress and therefore also to emphasize the positive aspect of the poem (genuine nature of his love) enough to balance out and even cancel out the negativity of the poem. Sonnet 130 appears to be a rather unkind description of Shakespeares mistress, however it could also be thought of as him describing her positive traits using negativity. He may not be describing her as unattractive, but simply not describing her as stunning, so to speak. He does in fact say that he love to hear her speak and it is only that it is undeniable that one would find more pleasure in listening to music than the sound of her voice. Shakespeare is merely being honest and realistic with his love, showing us that love is still beautiful, even when its honest. In contrast His Coy Mistress by Andrew Marvell uses more the conventional language of a love poem yet by challenging the thinking of the time (sex before marriage) also sets out to be controversial. His Coy Mistress is a persuasive poem in which a controlling and dominating Marvell attempts to convince his mistress to sleep with him. Unlike Shakespeares sonnet where language rather than structure (this remains in traditional sonnet form) is used to emphasis a point in the case of Marvells poem it is the other way round. Structure is very important in his poem. There are no stanzas but there are three very clear sections. Each section endeavours to persuade his Mistress using different manners and methods. Marvell also uses time in his quest of persuasion. The poems rhythm, stressing every other syllable, primarily creates the convincing sense of urgency but actually, each section portrays time in a different manner, enforcing his argument even more. In fact, the rhythm is the same as Shakespeares sonnet but each poet has used the rhythm to convey different atmospheres. The first section of the poem describes ideal time. Marvell appears to have unconditional love for his mistress and uses exaggerated times to express his love: thirty thousand to the rest [of her body parts]. He says he will love her till the conversion of the Jews even if she refuses. This line suggests his undying love for her as the conversion will never happen. Marvells first argument uses flattery. In contrast to Shakespeares sonnet where honest but unflattering descriptions are used, Marvell exaggerates his mistresss beauty in his attempt to sweet-talk her for example by describing the many years it would take to love and appreciate fully each part of her: two hundred [years] to adore each breast. The second section is created using fear as the main argument. Beginning with the word but, the reader is prepared for the following to be filled with negativity. Marvell talks of real time and what little there is. He creates striking images of a loveless death where she is in a grave where none [he] think do there embrace. He particularly emphasizes deserts of vast eternity by changing the rhythm so it stands out, making the reader pause to think about it. These are prime examples of the imagery created in this metaphysical poem. Time is rushing towards them as is suggested in the second line of this section: times winged chariot hurrying near. Another idea used to frighten her into sleeping with him, is the idea of worms taking her virginity and creates a mocking tone to the poem by describing her quaint honour which shed fought so long to preserve. Passion is his last attempt in this third and final section. It begins with now (also repeated four lines later for emphasis) enhancing the feeling of passion and urgency. The first four lines of this section enforce ideas of life and energy; youthful; willing soul; instant fires. He describes optimum time and finishes the poem with Thus, though we cannot make our sun// Stand still, yet we will make him run, as the poem reaches its conclusion, that of persuading her that they have no time to lose and should sleep together straight away. Whereas before he had centred the subject of the poem on him [I] or her [you], he now uses us (Now lets us sport us while we may) and we (in the final lines as previously quoted) creating a bond between them and putting the idea of them together into the readers head generating yet another argument: they would be good together. The endings of the two poems reveal important differences. For example, Marvells ending makes no apologies for the way he has expressed his love and his structure remains true to the poem right to the end. On the other hand Shakespeares last two lines stand out. They are not in sonnet form which could support the argument that he is mocking the traditional sonnet as well or that he feels the need to expel any doubts (which the reader may have! ) that he genuinely loves this woman. In each poem, the language is quite coarse and extreme but both use that effect in illustrating positive images of their love. For example, Shakespeare describes his mistress as the complete opposite of a goddess with breath that reeks and Marvell describes his mistress death but somehow, though the poets language throughout the poems is similar to this, the overall message depicted is good and not negative. Marvell and Shakespeares poems are both successful in what they aimed to achieve convincing their mistresses of their love in innovative manners. Both use their poems to escape conventional thinking; Shakespeare escapes the use of exaggerated and goddess-like depictions of women in love poems; while Marvell escapes the thinking that sex before marriage is a bad thing. Though both poems are centred on love, Shakespeares is more emotional whereas Marvells is more physical and sexual though both of them describe their love as being rare as quoted by Shakespeare and similarly, Marvells unique vegetable love. Both poems make enjoyable reading because of their irony and the challenge they make to conventional thinking of the time though Sonnet 130 probably more so because of the more humorous side Shakespeare brings to it.

Thursday, November 21, 2019

Electric Medical Records Essay Example | Topics and Well Written Essays - 750 words

Electric Medical Records - Essay Example In addition, the paper will highlight network infrastructure and the end user devices and other technology considerations. There are stimulus programs and government initiatives in the United States, the European Commission of eHealth Action Plan, Canada’s Health Inforway, and China’s Guidelines on deepening the reform of the Healthcare System; which accelerate the clinical applications adoption. EMR infrastructure provides portfolio to offer integrated and validated solutions in the healthcare industry. EMR transforms electronic care processes in the industry. With a well developed IT infrastructure, there will be a high level of performance, security, availability, integration, and virtualization of health records. The computer network and technology infrastructure that supports EMR in healthcare infrastructure is EMC EHR Infrastructure Solutions Suite. As a current technology, it can transform and change completely the healthcare infrastructure. It can do this throug h consolidating, managing and virtualization of clinical applications effectively and efficiently. It can also ensure the security of personally identified information and protected health information in the delivery of care. EMC HER Infrastructure Solutions Suite can also protect both past and future healthcare information technology investment. The EMC HER Infrastructure Solutions Suite also ensure improvement of clinical workflow and productivity for collaborative and safer care decisions. This cuts out the present EMR framework that is being used. Although NextGen KBM 5.6 framework is advantageous compared to manual recording systems, it is wise enough for the recent medical data recording and maintenance specifications set by the federal government calls for the deployment of a more complex but smoother EMR technology. It is of much importance that a more centralized and coherent data administration system should be adopted. Development of online collaboration and adoption of u niform terminology are the major areas of challenge, where improvements are highly desired in order to advance the current EMR (NextGen and NEON, 2011). On a daily basis, healthcare organizations process an increasing data amounts. Currently, it’s a challenge to share information and connect affiliated doctors in a health system. In most healthcare organizations, there is no current technology that offers an end to end electronic medical record solution that enhances standards for accessibility, accuracy, and security. There is a manual system of processing patient flows which is tiresome and complicated. In the current situation, workflow processes are analyzed and documented. There are various inefficiencies and bottlenecks even in the billing system. The current processes that require and efficient EMR infrastructure include: Billing, scheduling appointments, referral management, procedures of office visits, patient check-in and check-out, and e-prescribing and laboratorie s (NextGen and NEON, 2011). There are various gaps and issues in the healthcare environment concerning EMR. There is a huge lack of innovation in the health records thwarting the attempts of doctors to advance the process and workflow of healthcare. The vendors of EMR control the data and even resist functionality improvement as well, although they reap financial gains from it. The EMR vendors have always insisted on the uniqueness of healthcare

Wednesday, November 20, 2019

Financial Ratios Analysis and Comparison Paper Essay

Financial Ratios Analysis and Comparison Paper - Essay Example The financial ratios for Universal Health Services have been calculated for the last three years which helps to understand the performance trend of the health care organization. The current ratio and the quick ratio that has been calculated determine the liquidity of Universal Health Services. The return on assets and the return on equity determine the profitability of the organization. The debt equity ratio determines the level of debt incurred by the healthcare group as compared to the equity of the organization. The fixed asset turnover ratio determines the operating performance of the company. The level of liquidity of the group has decreased in a compounded fashion in the last three years and the level of inventory has also increased. The profitability of the healthcare group has increased in a compounded fashion in the last three years. Universal Health Services have been able to reduce the level of debt as compared to the level of equity (Yahoo finance, 2013). The operating performance of UHS has improved as the fixed assets of the organization have been able to generate more revenues. The financial ratios for Universal Health Services (UHS) have been compared with that of another health care organization namely Health Management Associates (HMA). The comparative ratio analysis for the two organizations has been provided for the last three years in order to compare the performance of the organization as compared to the national norms. UHS has maintained a steady level of liquidity over the last three years as compared to MHA. This is evident from the comparative figures of the current ratio. The quick ratio of the two organizations could be compared over the last three years to understand that UHS has been able to manage its inventory better than MHA. The quick ratio for MHA has declined over the years which mean that the inventory level has risen in the last three years. The

Monday, November 18, 2019

Preparing a Budget Request Assignment Example | Topics and Well Written Essays - 1000 words

Preparing a Budget Request - Assignment Example However, the rising population could make it hard for the police to carry out their duties as effectively as they should. There have been reports that the crime rate in the downtown area has gone up. I wish to request three to five additional police officers for the city. This will ensure that crime rate is at a minimal level and the officers are not overworked (Mikesell, 2010). Currently the town’s police department has 30 uniformed officers and 12 support staff. This translates to a ratio of 1 police officer for every 2,500 residents. Studies have shown that places with higher populations are likely to harbor more crime than less populated areas. In this town, the population is increasing at a steady rate, which means that the likelihood of increased crime is a reality that needs to be dealt with as early and as fast as possible (Reif-Lehrer, 2005). The town residents are well aware that the police department is currently understaffed. Individuals who are out to cause troubl e also know this. The downtown area is most vulnerable to crime due to the businesses situated in the area. Most of the economy of this town depend son the retail trade that is solely centered on the downtown area. If crime rate around this downtown area goes unchecked, the businesses will suffer, and so will the economy of the town. The other areas are relatively secure and regular police patrols do ensure that law and order are maintained at all times. An additional three or more police officers would ensure that business in the downtown area continues without people fearing that they might loose business due to crime. Currently the officers are overwhelmed with work, and this situation is not likely to become any better due to the increasing population. The town does need more officers on patrol, especially at night. Due to the shortage the police department is facing at the moment, most officers are forced to work over time past their designated shifts. The department has not ha d any extra officers for the last six years, despite the fact that the work load has been increasing during the same duration. Most of these officers are family men and women while others have other commitments. We have tried to reassign some of the duties performed by uniformed officers to other employees, but this strategy has failed to make the work of the officers any less. It would therefore be futile to continue in this line of action since it will not bear fruit (Reif-Lehrer, 2005). As chief of police, I was aware of the growing need for additional officers. I had tried to request for more officers last year, but my request was not granted. The manager has already been briefed of this growing workload situation. With three to five more police officer, the work load in the department will go down. Work will be distributed equitably among all the officers so that no one will have to spend more time at work than other officers. Failure to fund this request may have multiple nega tive effects on the department and the town’s residents. The officers available for duty will continue to suffer under too much pressure due to too much work. If the extra officers do not come within the year, we will have to disregard some duties and concentrate on the most pressing of the town’s security needs. This will bring on another problem: that of inefficiency (Kemp and Dunbar, 2003). The department will need to perform exemplarily in all its responsibilities for the greater good of the community. This is an urgent

Saturday, November 16, 2019

Social Construction Of Gender Cultural Studies Essay

Social Construction Of Gender Cultural Studies Essay Nortons anthology of Theory and Criticism is a collection of influential critical statements that are drawn from the classical era to the present times. These topic areas has been contributed by different scholars who have written on wide range of issues that covers different interest that touches on the history of poetics to post modernity. One of the topics that Norton looks at is criticism of Simone De Beauviors feminist argument and that of Judith Butlers on gender trouble. Judith book, Gender in trouble is a fictional account of womens issues in the modern societies. She borrows De beavouirs feminist theory to analyze some of the issue facing women today. Social construction of Gender Butler is a radical feminist who is trying to examine some of the foundational roots of gender identity that are culturally embedded within the fabrics of the society and is now characterized by political correctness. She was very much influenced by French writers such as Mitchell Foucault, Jean Sartre but above all Simone De Beauvoir. She draws much of her theoretical thinking on about feminism from De Beauviors concept on the Sex second. Simone de Beauvior was born and grew up in Paris in a wealthy and but very religious family background. He later the family lost their wealth after World War one. Her early childhood life was very much influence by her religious faith, but later turned atheist. Even during his formatting years, De beauvior displayed signs of intellectual prowess which hugely influenced his father. She managed to study mathematics, philosophy and literature, after which he ventured into the field of education. It is argued that beauvior engaged in a romantic relationship with both men and women. In her book, Sexuality, Existentialist feminism and the Second Sex, De beauvior talks about the whole use of feminist sexuality by referring to her own sexual experiences in the mandarins. She laments how womens sexuality has been social constructed by the patriarchal system and stereotypes to belong to the lower beds of the society. Unfortunately, mens perception of women is attributed by other factors such as race, class and religion. As a result, men refer to women as weaker vessel and used sex to confine them to the lower levels of the patriarchal system. In response, De beauvior comes up with the concept of feminist existentialism which contains ideological concepts and theoretical framework that underpins these moral changes. Gender as a choice In her book gender in trouble, Butler emphasizes on the performative nature of gender is constantly trying to free itself from cultural oppression, prejudice and sex perversions. Drawing from her role model, Butler argues along the lines of gender and sex in relation to women, lesbians and gay men. From this book, Butler argues that our understanding of femininity is actually based on cultural interpretation rather than scientific examinations. As a result our perceptions of gender and sex are socially constructed or dictated to by what our societies think, say or portray to us. She refers to the term gender as choice to criticize victimization of women as purported in classical literature. We cannot choose sex or our bodies but we can clothe it according to our cultural understanding. Thus, Beauvoirs theory has radicalized our cultural understanding of gender and gender roles. Beauvoir is one of the key feminist thinkers of the 19th century. She advocate for womens freedom in choosing what is right for them and not to be dictated to by nature or conventional social laws initiated by men. She further explains that women should not allow themselves to be defined by biological gender, rather on their personhood. Beavour argues that the societys reference to female becoming a woman is used to identify them with domestic chores and duties such as cooking, cleaning or being a wife or a mother. In addition, her concept of female becoming a woman encompasses the societys obsession with beauty that is being reinforced by male dominated media which also defines what is deemed to be appropriate modes of dressing. Butler explores the relationship between that exists between power and categories of sex and gender. Through this book, she attack some of the prevailing gender assumptions on womens social roles and sexuality as dictated to by male dominated society. Butler therefore reiterates that there is need to differentiate between biological make up of female body and cultural perception of gender. She uses her dominant theme concerning gender as normative to call upon the society to tackle the gender trouble head on in order to deal with some the existing subversive concepts of women. Conclusion Womens liberation thinking of the 19th century greatly influenced thinking of many scholars including academicians and literary writers. One of those literary writers who were not spared by feminist movement was Simone De Beavouir, French intellectual who found her feet in America. Her move to America enabled her to develop a free mind as she embarked on her literary journey. De beavour used her own sexual experience to develop her feminist theory. Today, her feminism theory is being used widely by other postmodern writers an tool for developing independent feminist thinking. One of those post modern feminist writers is Judith butlers who have drawn much of her ideas from De beavour thought of feminist liberation. Through, her book Butler argues that the society in general need to come up with new ways of dealing gender and sex, by tackling what she calls gender trouble.

Wednesday, November 13, 2019

Mark Twain :: Free Essays

Just as Huckleberry Finn found peril along the waters of the great Mississippi River, contemporary students often find themselves treading their own 'deep waters' trying to understand and interpret the works of author Samuel Clemens, a.k.a. Mark Twain. But what Huck Finn never had, today's literature students do: the answer to any dilemma of interpretation...a website entitled Mark-Twain-Essays.Com. Tired of crawling through web pages with scant information and little to go on? THIS site contains not one.... not ten... but dozens upon dozens of essays reviewing, analyzing, & critiquing the works of Mark Twain! Whether you're reading The Adventures Of Tom Sawyer for the first time or performing a comparison and contrast between Pudd'nhead Head Wilson and Connecticut Yankee In King Arthur's' Court.Biography: Twain was born in Florida, Missouri in 1835, moving to the city of Hannibal (in the same state) when he was four. His formal schooling ended at the age of twelve, when he became apprenticed to a printer. His natural flair for words took him from printing into journalism, and his wanderlust took him from journalism into the life of a Mississippi riverboat pilot (Ousby 946). Reflecting his own life: Twain depicts much of his early life in the book Life on the Mississippi. As Albert Bigelow Paine writes, "In Life on the Mississippi we have [Twain’s] story of how he met Horace Bixby and decided to become a pilot instead of a South American adventurer -- jauntily setting himself the stupendous task of learning the twelve hundred miles of the Mississippi River between St. Louis and New Orleans -- of knowing it as exactly and as unfailingly, even in the dark, as one knows the way to his own features. It seems incredible to those who knew Mark Twain in his later years -- dreamy, unpractical, and indifferent to details -- that he could have acquired so vast a store of minute facts as were required by that task.