Saturday, November 30, 2019

Othello Character Essays - Othello, Iago, Michael Cassio, Emilia

Othello Character Othello's character during the play is first shown as a hero of war and a man of great pride and courage. The other main characters in the play all form their own opinions of him and as the play continues, his character begins to deteriorate and become less noble. Chronologically through the play Othello's character changes from a flawless military leader, to become a murderer. Also as the play progresses, the other characters in the play change their opinions of Othello which causes the plot to happen the way it did. Throughout the first act of the play, Othello was shown as many different characters depending on who was speaking. Iago complains of Othello's pride and "bombast circumstance" and is angered by the appointment of Cassio, and educated military theoretician of Florence to lieutenant, instead of himself. Although he knows Othello is a proud man, his open and trusting nature in the beginning of the play will be eroded by the conclusion of the plot. As Iago is speaking to Brabantio about Othello, he uses the term "white ewe" to represent Desdemona, and "black ram" when referring to Othello. By using these terms, it shows that he is trying to give a bad impression of Othello when he is speaking to the royal family in Venice, because Othello is a Moor or a Negro. Iago shows his black hatred for the Moor, and his jealousy of Cassio in his first soliloquy and also reveals his evil intentions. As the act continues and Othello is being searched for by a group of people, Iago attempts to incite Othello into anger against Brabantio, but Othello does not take the bait. He feels that he (Brabantio) may do his worst because Othello is assured that his military services to the government will outweigh Brabantio's complaints of him marrying Desdemona. These answers to Iago's persistence show that he is still a character of calmness and dignity, and he still has the self-assurance suitable to command armies of men. When Othello is found by Cassio, he seems to be relieved because he does not like personal conflict, which would have occurred if Brabantio had found him instead. After he is found, Othello is taken to Brabantio where he is interrogated on how he possessed Desdemona enough in order to make her run off with him. Brabantio damns Othello and calls him an enchanter, saying that the "tender, fair, and happy" Desdemona was too shy of marriage, which is why she shunned all of the suitors sent to her. This entire scene helps to establish Othello as an alert and composed leader. Later in this act, Othello offers to explain how he won Desdemona. He chooses not to contradict or deny that he has used "magic" but when the true meaning of the "magic" comes to light it is shown that he used the magic of love and not a conjured magic. Iago also suspects Othello of having some kind of relationship with his own wife, although he doesn't know or even seem to care whether or not his suspicions have any foundation at all. Again, according to Iago, Othello is an "ass" because he has a "free and open nature." This act works as an introduction to the Othello character and shows how other characters react to his presence in different ways. The remaining acts of the play continue to show how the characters react to Othello's lifestyle changes. Even though he must rid Cassio of his lieutenant responsibilities forever, Othello explains how he still loves him. If it were up to him Othello would have reinstated Cassio at the first opportunity, but this would be bad political practice. He wishes to appease Desdemona by doing this but he realizes that he can't. These practices show that he is a good governor and does not wish to arouse hostilities in the city, with an untimely pardon of Cassio. Desdemona tells Emilia that Othello is not the jealous type, which Othello believes to be true himself. However, as the play progresses through Act 3, Othello talks to Iago telling him that their prior conversation gave him reason to suspect Desdemona's motives. As a reader, you can see that Othello's capacity for judgement has deteriorated up to this point, not only is his state of mind changing due to Iago's constant prodding, but his morals have also deteriorated along with his character. As the play winds to a close, the characters continue to show their own opinions on Othello. Many of the characters have

Tuesday, November 26, 2019

Sensitivity essays

Sensitivity essays Each body part has different levels of sensitivity. Some places can sense things much better then other parts can. For instance your fingers would probably be more sensitive then the back of your elbow. This is because there are more nerves in one given area then another and therefore the area is more likely to differentiate between how many points that spot has been touched with. But whats the limit of which the part can tell the difference? 2 inches? 1 inch? This lab helps us all understand at what point our body parts cannot differentiate between one or two points of a compass. My hypothesis is that your fingers will be much more sensitive to the compass points then other parts like your arm. The very first thing you will need to do is gather the materials. Youll need a compass, a ruler, and something to draw a graph with. Youll have to pick out at least 3 or 4 different body parts of a group from a group of people. There will first have to be a test trail on each body part to find the measurement of about 50% accuracy. Take note of the measurement and make other measurements based on that number. Then select the parts of your body you will be experimenting with. In this case it was your fingertips, your fore arm, and your upper arm. Now take the compass and set the width of the two compass points to the largest measurement. Randomly pick how many points will touch the person who will be tested and record it onto the chart. Its recommended that you go through the procedure around 75 times. Once you have figured out when you will touch the person with one or two points, go through the process of gently touching the body part with the compass with the number of points t hat the chart says. The person will say whether he/she feels one or two points. Record that onto the chart, change the compass angle to another measurement, and repeat the procedure on the next body part. Once you have tested all the body pa...

Friday, November 22, 2019

100 Beautiful and Ugly Words

100 Beautiful and Ugly Words 100 Beautiful and Ugly Words 100 Beautiful and Ugly Words By Mark Nichol One of the many fascinating features of our language is how often words with pleasant associations are also quite pleasing on the tongue and even to the eye, and how many words, by contrast, acoustically and visually corroborate their disagreeable nature look no further than the heading for this post. Enrich the poetry of your prose by applying words that provide precise connotation while also evoking emotional responses. (Note the proportion of beautiful words to ugly ones in the compilation below; it’s easier to conjure the former than the latter, though I omitted words associated with bodily functions, as well as onomatopoeic terms.) Notice how often attractive words present themselves to define other beautiful ones, and note also how many of them are interrelated, and what kind of sensations, impressions, and emotions they have in common. Also, try enunciating beautiful words as if they were ugly, or vice versa. Are their sounds suggestive of their quality, or does their meaning wholly determine their effect on us? Beautiful Words Amorphous: indefinite, shapeless Beguile: deceive Caprice: impulse Cascade: steep waterfall Cashmere: fine, delicate wool Chrysalis: protective covering Cinnamon: an aromatic spice; its soft brown color Coalesce: unite, or fuse Crepuscular: dim, or twilit Crystalline: clear, or sparkling Desultory: half-hearted, meandering Diaphanous: gauzy Dulcet: sweet Ebullient: enthusiastic Effervescent: bubbly Elision: omission Enchanted: charmed Encompass: surround Enrapture: delighted Ephemeral: fleeting Epiphany: revelation Epitome: embodiment of the ideal Ethereal: celestial, unworldly, immaterial Etiquette: proper conduct Evanescent: fleeting Evocative: suggestive Exuberant: abundant, unrestrained, outsize Felicity: happiness, pleasantness Filament: thread, strand Halcyon: care-free Idyllic: contentedly pleasing Incorporeal: without form Incandescent: glowing, radiant, brilliant, zealous Ineffable: indescribable, unspeakable Inexorable: relentless Insouciance: nonchalance Iridescent: luster Languid: slow, listless Lassitude: fatigue Lilt: cheerful or buoyant song or movement Lithe: flexible, graceful Lullaby: soothing song Luminescence: dim chemical or organic light Mellifluous: smooth, sweet Mist: cloudy moisture, or similar literal or virtual obstacle Murmur: soothing sound Myriad: great number Nebulous: indistinct Opulent: ostentatious Penumbra: shade, shroud, fringe Plethora: abundance Quiescent: peaceful Quintessential: most purely representative or typical Radiant: glowing Redolent: aromatic, evocative Resonant: echoing, evocative Resplendent: shining Rhapsodic: intensely emotional Sapphire: rich, deep bluish purple Scintilla: trace Serendipitous: chance Serene: peaceful Somnolent: drowsy, sleep inducing Sonorous: loud, impressive, imposing Spherical: ball-like, globular Sublime: exalted, transcendent Succulent: juicy, tasty, rich Suffuse: flushed, full Susurration: whispering Symphony: harmonious assemblage Talisman: charm, magical device Tessellated: checkered in pattern Tranquility: peacefulness Vestige: trace Zenith: highest point Ugly Words Cacophony: confused noise Cataclysm: flood, catastrophe, upheaval Chafe: irritate, abrade Coarse: common, crude, rough, harsh Cynical: distrustful, self-interested Decrepit: worn-out, run-down Disgust: aversion, distaste Grimace: expression of disgust or pain Grotesque: distorted, bizarre Harangue: rant Hirsute: hairy Hoarse: harsh, grating Leech: parasite, Maladroit: clumsy Mediocre: ordinary, of low quality Obstreperous: noisy, unruly Rancid: offensive, smelly Repugnant: distasteful Repulsive: disgusting Shriek: sharp, screeching sound Shrill: high-pitched sound Shun: avoid, ostracize Slaughter: butcher, carnage Unctuous: smug, ingratiating Visceral: crude, anatomically graphic What did I miss? Add to these lists in a comment below. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:Masters Degree or Master's Degree?Best Websites to Learn EnglishInspiring vs. Inspirational

Wednesday, November 20, 2019

Collaborative Learning Community Essay Example | Topics and Well Written Essays - 250 words

Collaborative Learning Community - Essay Example Through the process of fun, teamwork and engagement students can learn effortlessly. This process relates to the respective indicators in each of the module by using specific methodology that achieves the assessment goals. The methods used enable students to describe numerous items (parents, siblings, etch), able to express and identify their emotions as well as of others through games. For example, in the theme of Food and Taste, identification of foods and their taste were done through a ladder game where the class were formed into teams and recall as many adjectives they can about the object presented. In the same manner in the language and communication theme, the class is engaged in a bingo game where they identify facial expressions depending on the description used and concluded with a spinner game whereby they draw a word and express what they feel using that word. There is also a writing activity whereby students are form into teams and help each other use every word they know to describe the word on their

Tuesday, November 19, 2019

A Tricky Problem of Stagflation Assignment Example | Topics and Well Written Essays - 1000 words

A Tricky Problem of Stagflation - Assignment Example It was pathbreaking in several ways, in particular, because it introduced the notion of aggregate demand as the sum of consumption, investment, and government spending; and because it showed (or purported to show) that full employment could be maintained only with the help of government spending (Library of Economics and Liberty 2008.) By 1965, there was a backlash against Keynesian economic thought. â€Å"In 1965 Scott Gordon declared that, in Canada, throughout the 1940’s and 1950’s ‘Keynesian statements were confined to the abstract planes of discourse; they were not connected with actual policy’† (Neill 180). However, Gordon did not take into account that Keynesian economics assumed a closed, and mature economic system, and the Canadian economic climate at the time was open and small (Neill 173) Gordon was not alone, however, many economists shared his views, and this was the downturn of the popularity of Keynesian economics. NAFTA, or the North American Free Trade Agreement, opened up trade between Canada, the United States, and Mexico. Because of NAFTA, there are no longer any tariffs or trade restrictions between these countries. There is no question that the United States is economically the strongest of these nations, however, there are benefits to all of the countries involved. â€Å"Both Mexico and Canada see NAFTA as a way of securing access to the U.S. market and the trade benefits cannot be of the greatest significance for the United States, the United States looks at Canada and Mexico in terms of industrial and commercial location as much as trade† (Hoebing, Weintraub, and Baer 108). Those who oppose NAFTA argue that NAFTA should have environmental standards and minimum wages. This is because of the shift of work moving to Mexico from the United States, there are less environmental regulations in Mexico, and workers can be paid less than they can in the United States. The quiet revolution took place in the 1960’s in a spirit of Quebec nationalism.     Ã‚  

Saturday, November 16, 2019

Islamic, Ancient Egyptian, and Ancient Greek Art Essay Example for Free

Islamic, Ancient Egyptian, and Ancient Greek Art Essay Elisabeth Siddiqui has written: â€Å"Art is the mirror of a culture and its world view. There is no case to which this statement more directly applies than to the art of the Islamic world. † Seeing that Muslims are believers in only one true God of the universe, they have been advised by Prophet Muhammad not to make pictures of human beings, for these pictures may often turn out to become idols for people, thereby turning them away from the Lord of the universe. Hence, Islamic art has focused on anything other than the human form. Muslims have used Arabic calligraphy to express their creativity in countless art works. â€Å"Arabic script lends itself wonderfully to decorative use,† writes Siddiqui. It is the language of the Qur’an, even if it is used to write something other than the Qur’anic verse. The choices are limitless. Thus we find a beautiful piece of calligraphic art as an inscription on a carved wood panel from a door that was made in the late medieval Islamic period (See Appendix). The inscription on the panel consists of the signature of its maker. The script is monumental, with large and rounded proportions. The seven words of the inscription are deeply carved in three horizontal registers. These are set against a scrolling leaf background (Late Medieval Period, 2004). Contrary to the believers in the unseen God, the ancient Egyptians were Pharaoh worshippers. The king of ancient Egypt was the Pharaoh, who appeared larger than life in the art works of the period. Ti Hunting the Hippopotamus is a wonderful depiction of the subject (See Appendix). Carved on a surface of a stone, this is a relief using the typical ancient Egyptian style of frontalism, in which the head is drawn in profile while the body is seen from the front. In this ISLAMIC, ANCIENT EGYPTIAN, AND ANCIENT GREEK ART Page # 2 picture, Ti is enormous as compared to his slaves as well as the animals. He is the god of both slaves and animals, and is therefore shown as a higher being as compared to the lesser beings. The slaves in the picture are relaxed. So are the animals. Moreover, the animals shown are more realistic than all humans, perhaps because of the ambivalence felt by the artist toward both the â€Å"higher† and the â€Å"lower beings† within humans (Kremen, 1996). Lastly, the ancient Greeks, who also had plenty of gods and goddesses, downplayed the divine aspects of their gods, unlike the Egyptians, by giving their gods a typically human form. There did not have to be higher or lower beings in ancient Greek art. Instead, the most perfect of figures created were recognized as gods naturally. The ancient Greek civilization enjoyed the beauty of the human form, including the naked human form which was admired for its harmonious proportions. The Torso of Apollo is one of the most perfect examples of this art (See Appendix). Made in 2nd century AD, the torso of marble shows young Apollo, the Greek god of light, music, archery, healing, atonement, prophecy and flocks and herds. The figure was popular with both Greeks and ancient Romans. It is an unclothed manifestation of splendor and courage, only expected to be shown of Apollo, who wears a belt over one shoulder to which a quiver of arrows were attached at his back (Torso of Apollo). By showing the god as distinctly human, the artist inspires into viewers the spirit to take Apollo for a courageous model and turn into heroes themselves. Thus all art appears as a mirror of its culture and the worldview. References 1. Kremen, Lisa. (1996, December). â€Å"Understanding Egyptian Art. † Egyptian Art. Retrieved from http://www. bergen. org/AAST/Projects/Egypt/egyptian_art. html. (10 February 2007). 2. â€Å"Late Medieval Period. † (2004). Islamic Art. Los Angeles County Museum of Art. Retrieved from http://www. lacma. org/islamic_art/intro. htm. (10 February 2007). 3. Siddiqui, Elisabeth. â€Å"Islamic Art. † MSA. Retrieved from http://www.colostate. edu/orgs/MSA/index. html. (10 February 2007). 4. â€Å"Torso of Apollo. † DIA Galleries Ancient Art. Retrieved from http://www. dia. org/collections/Ancient/ancient. html. (10 February 2007). ISLAMIC, ANCIENT EGYPTIAN, AND ANCIENT GREEK ART Page # 4 Appendix Islamic Art Ancient Egyptian Art ISLAMIC, ANCIENT EGYPTIAN, AND ANCIENT GREEK ART Page # 5 Ancient Greek Art.

Thursday, November 14, 2019

Key Escrowing: History and How it Affects You Essay -- Technology Encr

Key Escrowing: History and How it Affects You Keys and key escrowing are important topics in the world of business today. If they are important in business why should you be concerned with them? This paper will cover what are private and public keys and key escrowing. It will discuss the benefits, disadvantages, issues of the past concerning these topics, and why you should have an interest in them. Private & Public Keys Private keys are mostly a thing of the past. They are simple and easy to have intercepted. The way private keys work is this: a message is written and encrypted by the sender using a key; next the receiver of the message is given the key along with the message; they are then able to decode what was written (Baase, 88). The problem with this is that there is really no need to encode the message. If you have to give the key to the receiver, why not just give them the message not encrypted? Public keys provide much more security. In public key procedure, public and private keys are made. The public key is given to whoever would like to write an encrypted message. Once the message is encrypted and sent to the receiver, they use their private key to decode the message. Only the private key is able to decode. Not even the public key is able to decode what it just encoded (Baase, 95). If the encrypted document fell into the wrong hands, that person would have no way of deciphering it. Only the person possessing the private key has the ability to read the message. The government does not like this because illegal activities can be planned or talked about through this method without the government having any knowledge about it. That is why the government came up with the idea of key e... ...does key escrowing mean to the common person? First of all, information that you provide to banks, insurance agencies, hospitals, etc. is confidential information that is encrypted when it is sent electronically. If someone acquired a key that was not meant to, your information could be spread or sold. Your privacy would be breached. This is also an easy way for the government to store information on citizens. If they have keys to all encrypted documents, they would be able to access information at any time whether necessary or not. The idea of key escrowing is to protect the country. Its main intention is to raise the level of security. Terrorists or criminals could be caught before a serious incident occurred. Works Cited Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Prentice Hall, Inc. Upper Saddle River, NJ. 1997.

Monday, November 11, 2019

Letter / Apollo Shoes

First I would like to thank the board of director of Apollo Shores for their recent inquiry about Phoenix & Company’s services. Since our firm is small, we offer a wide range of personalized services to clients at a reasonable cost. Phoenix & Company is a CPA firm with more the 25 years in the business of providing client tax services, accounting booking, management consulting, quality control consulting, risk assessment, capital transaction assistance, and information systems functionality. The firm’s approach has been very successful because of our ability to comprehend our clients’ organization paradigm including risk assessment, control issues, and diagnostic. The benefits to our auditing approach would help the management team efficiency identify areas within the organization’s that needs to be address. This process could improve the company’s efficiency identifying that controls are in place. Overall this gives the management team a better understanding of the organization working including their financial systems. The role of Phoenix & Company is to obtaining sufficient audit evaluation and evidence in order to test the organizational controls. At this time I would like to define auditing and give some benefits of an audit. â€Å"Auditing is the accumulation and evaluation of evidence about information to determine and report on the degree of correspondence between the information and established criteria† (Arens, Elder & Beasley, 2006). The benefits to auditing are the ability for a company to improve the understanding of the financial records from the management and users stand points. Another benefit is the ability to identify areas within the organization that needs improvement. A company could reinforce, risk assessments, and improve internal controls. In conclusion the firm of Phoenix & Company is an excellent resource to provide Apollo Shores with effective analysis, and relevant information to meet the needs of your organization. The approach is to improve the organization safeguards in order to protect the financial operations of the company.

Saturday, November 9, 2019

Parental Decisions Impact Childhood Obesity Essay

Society, in general, has drastically changed over the past century. Growth and expansion have paved the way for new technological advances, but not with some downfalls to go along with it. One such downfall of new technology would be the â€Å"convenience factor† (convenient stores for junk food, convenient to watch television, play video games, watch a movie, talk or text on a cellular phone as opposed to physical exercise, convenient for parents to stop by fast food as opposed to healthy meals). Lack of parental controls in these areas in conjunction with the â€Å"convenience factor† has lead to childhood obesity. This is an increasingly growing disease and will continue to be so if society does not stop being so convenient. The American Society today has become â€Å"obesogenic’, characterized by environments that promote increased food intake, unhealthy foods, and physical inactivity (Centers for Disease Control and Prevention, 2010). People (children and adults) spend more time in front of televisions or computers and less time exercising. We drive a car everywhere we go as opposed to walking or riding a bicycle. Children play more video games instead of playing hide and seek, which requires them to run around, being active and getting exercise. We lead busier lives so time does not allow for spending it in the kitchen preparing healthy meals. Parents live such hectic lifestyles which often lead to dining or getting take out at a fast food restaurant, making them guilty of contributing to childhood obesity. Children with obese parents are likely to follow in their parents footsteps and become obese themselves. Overweight and obesity result from an energy deficiency. This incorporates taking in too much food (too many calories) and lack of exercise; thus defining obesity. The imbalance between calories consumed and calories used can result from the influences and interactions of a number of factors, including genetic, behavioral, and environmental factors. Studies indicate that certain genetic characteristics may increase an individual’s susceptibility to excess body weight. However, this genetic susceptibility may need to exist in conjunction with contributing environmental and behavioral factors (such as a high-calorie food supply and minimal physical activity) to have a significant effect on weight. Genetic factors alone can play a role in specific cases of obesity. The genetic characteristics of the human population have not changed in the last three decades, but the prevalence of obesity has tripled among school-aged children during that time. Because the factors that contribute to childhood obesity interact with each other, it is not possible to specify one behavior as the â€Å"cause† of obesity. Behaviors include energy intake, physical activity, and sedentary behavior. Home, child care, school, and community environments can influence children’s behaviors related to food intake and physical activity (Centers for Disease Control and Prevention, 2009). Parents in the workplace often lead demanding, hectic lifestyles that have a direct reflection on home life activities. Activities, such as eating habits for their children, are a casualty of their fast-paced environment. Such lifestyles lead to quick unhealthy meals, such as stopping at a fast-food establishment and consuming a high caloric meal. These types of meals are historically unhealthy with no nutritional value. Nutritional items, such as fruits and vegetables, are limited at these types of establishments. Healthy, home cooked meals are not the â€Å"normal† routine for parents to provide their children of this era. Time does not allow for parents to prepare healthy, home cooked meals. â€Å"The evidence is compelling that the obesity epidemic is largely caused by people’s eating unhealthy food and consuming bigger portion sizes. These unhealthy behaviors are not just a matter of poor decisions individuals make; rather, the environment in which people live determines behavioral choice† (Isaacs & Swarts, 2010). Parents’ workplace habits can directly affect their children’s daily eating routines. Children are relying on parents to provide them with healthy meals. There are many things parents can do to assist children in developing healthy eating habits. Offering fruits and vegetables, dairy products or whole grain items as nutritious snacks, as opposed to allowing them to submerge themselves in chips or sugar filled snacks, is a viable alternative to an unhealthy diet. The obesity rate for children would decrease if parents would make time to plan a healthy weekly menu. By doing so, parents are ensuring that their children get the daily recommended amount of fruits and vegetables in their diet, thus making for a healthier child. Parents should lead by example. Children need to see parents eating different things, to encourage the child to want to try new food items. â€Å"Children and adolescents are dependent on their parents for both economically and emotionally during much of this period of rapid growth† (Davies & Fitzgerald, 2008, pg. 25). One of the best ways to decrease obesity in children is to increase physical activity levels throughout the entire family. Parents, at home or at the workplace, are faced daily with busy schedules, long hours and time management issues (i. e. nsuring all required daily activities, such as household responsibilities, errands are completed). These tasks are direct contributors for the lack of time set aside for physical activity with their children. Also, parents’ daily work schedules do not allow much, if any, time to incorporate a daily physical exercise routine for their children, let alone to monitor such activities. Parents should act as role models by setting examples for their children, such as allowing their children to see them exercise and being active themselves. By â€Å"leading by example†, this should encourage children to emulate them. According to the American Heart Association and the National Association for Sport and Physical Education (Payne, 2010), children should get at least 20 minutes of regular vigorous exercise that makes them sweat and breathe hard. With the apparent lack of physical activity, parents need to create an environment that is conducive to building a daily regime of physical activities that slowly grow over time. â€Å"Minutes spent playing kickball with friends during recess count toward the hour-long daily goal, as does climbing trees in the backyard after school. It doesn’t have to be all at once,’ says Nancy Brown, CEO of the AHA. ‘Kids should be doing things appropriate for their age, so that [exercise] becomes a behavior and a natural part of what they do’† (Payne, 2010). Providing just small increments of daily activity that is geared towards the child’s age category can foster a lifetime of behavioral changes that could prevent the onset of obesity at a later age. Another factor in the saga of fighting childhood obesity is the issue of safety and having a safe environment in which to add physical activity. Advocate for well-maintained, safe sidewalks and bike paths in your neighborhood, and volunteer to supervise the use of school facilities after hours. Children are more likely to want to play outside—and you’ll feel more comfortable with them doing it—if it’s safe, so attend neighborhood association or city council meetings to request proper upkeep of nearby sidewalks and paths. Also, consider gyms and tracks at local schools as options for physical activity after hours and on weekends. Often, schools are willing to make gyms and equipment available on the weekends but simply need parents to volunteer to supervise, Brown says† (Payne, 2010). This avenue of taking facilities that already exist and adding in a safety factor so that they may be used more often could reach into a vast majority of neighborhoods and schools that are currently excluding physical education programs. This seemingly mundane action by a few sets of determined parents could catch on and create new and exciting ways in which physical activities could be introduced to children. In today’s day and age of electronics, technological advances in this area continue to rise at record numbers. Features and upgrades to many electronic devices are geared toward a more convenient, user friendly target market. Such markets, unfortunately from a health perspective, are focused on our children. Convenient and satisfying methods of entertainment, such as television, movies, video games, talking/texting on cellular phones, computers, etc. far outweigh pure physical activity and exercise. Parents’ lack of control in these areas, as opposed to physical exercise, is a factor in childhood obesity. Children would rather be sedentary playing electronic games on a television, cellular phone or computer, as opposed to playing games requiring physical exercise, such as hide and seek or kickball . â€Å"The media may shape children’s food choices and caloric intake, including exposing children to persuasive messages about food, cuing them to eat, and depressing satiety cues of eating while viewing. According to estimates by the Federal Trade Commission (FTC), children between 2 and 11 years are exposed to 25,600 advertisements per year, of which 5,500 (or 15 per day) are for food or beverages. A 2009 content analysis of foods advertised during children’s television programming revealed that most foods marketed to children are high in salt, sugar, and fat and low in nutritional value, and that healthy food are virtually invisible† (Jordan, 2010). This barrage of brain-altering subliminal messaging towards newly forming minds lends credence to how other areas of technology are creating pathways to enter impressionable youths. We live in a world that is technology driven in which new devices are created frequently to make life more convenient. The American Academy of Pediatrics (AAP) recommends that television viewing by children older than two years be limited to two hours per day or less avoided altogether for children younger than two years. Surveys of United States parents found that most families do not adhere to these recommendations† (Jordan, 2010). These families that provide this amount of television viewing for their children use it as a virtual nanny to keep the child entertained and distracted throughout the day. In today’s health conscious society, there are many reasonable alternatives to just keeping a child zoned out in front of various electronic devices. One such alternative that is catching on with many families is the Nintendo Wii. â€Å"The AHA and Nintendo recently teamed up to promote the use of the Wii Fit to help Americans meet recommended physical activity guidelines. The goal of the partnership is to teach people how so-called ‘active-play’ video games encourage regular exercise. If you’re having a tough time getting your child to play outside, consider buying a video game that requires the child to get moving, Brown suggests† (Payne, 2010). The use of this new video game device has provided many families with not only an opportunity to exercise, but to also interact as a family unit. Interacting together provides an environment that can create future positive habits that might help in the obesity battle. Following recent studies on childhood obesity, it has been found that â€Å"In the United States, childhood obesity is on the rise; the percentage of obese children aged 6 to 11 more than doubled in the past two decades, while the percentage of obese adolescents aged 12 to 19 more than tripled, during the same period as well† (Li & Hooker, 2010). Medical contributors to childhood obesity, such as genetics and/or heredity, are considered uncontrollable and unchangeable to the health and well-being of a child. The imbalance between calories consumed and calories used can result from the influences and interactions of a number of factors, including genetic, behavioral, and environmental factors. Studies indicate that certain genetic characteristics may increase an individual’s susceptibility to excess body weight. However, this genetic susceptibility may need to exist in conjunction with contributing environmental and behavioral factors (such as a high-calorie food supply and minimal physical activity) to have a significant effect on weight. Genetic factors alone can play a role in specific cases of obesity† (CDC, 2009). Battling all these convenience issues will prove to be a lengthy social problem to be solved, but for the sake of future generations of children that will probably be the first to not outlive their parents, it is one that should have the highest priority. Parents establishing controls over guidelines set forth and constant monitoring of such to decrease childhood obesity is not a â€Å"sprint†, but more comparable to a â€Å"marathon†. This requires lifestyle changes both for the parent and the child. Constant monitoring on the parent’s part, along with both parent and child â€Å"staying the course† now will produce dividends for the future of a healthy America. We are all creatures of habit. In the end, the goal should always be for these changes to become second nature. We live in a society driven by a constant; change. Growth and expansion will continue to generate new technological advances, with downfalls associated. One such downfall, the â€Å"convenience factor† (convenient stores for junk food, convenient to watch television, play video games, watch a movie, talk or text on a cellular phone as opposed to physical exercise, convenient for parents to stop by fast food as opposed to healthy meals) will have a direct correlation between parental decisions and the health of children for future generations. Lack of parental controls in these areas in conjunction with the â€Å"convenience factor† will produce childhood obesity cases at record numbers. This increasingly growing disease will continue to be so if society does not stop being so convenient.

Thursday, November 7, 2019

buy custom Bluetooth Modelling essay

buy custom Bluetooth Modelling essay With the introduction of wireless communication, it has change the entire world; Bluetooth is such technology which has the ability to transmit both data and voice transmissions at same time. Bluetooth consists of a small microchip, and the technology behind it is short-range link to exchange information between two devices such as a computer to mobile device or mobile to mobile device. When two devices having Bluetooth come within short distance (10 meters) of each other, those two devices will detect each other and connections will be automatically. Since the technology was introduced, it has eliminated the need of connecting many wired devices; Bluetooth devices will connect instantly even if the device does not have a clear line of sight, and connection distance can be increased to 100 meters with the uses of an amplifier. The usage of this new technology is huge; when you are in the house PDA (Personal Digital Assistant) synchronizes with your house and the front door unlocks, w hen you approach your car; with a touch of a button the door unlocks, as you arrive near the reception of an hotel the door open itself automatically. Introduction Handheld devices are increasing becoming part of people daily lives, and the mobile usage in the world is increasing exponentially; already people are using mobile phones, palmtop and laptop computers . Majority of these devices dont have a compatible data communication interfaces, or, if they do, their interface will require cumbersome connections and configuration procedures, when you connect it with another device. A solution was created that was able to get rid of cumbersome connecting cables, and short-range wireless links was used to facilitate on-demand connectivity among different devices. The ideal technology was Bluetooth since it was inexpensive, enabling of compelling applications, and it has been universally adopted by device vendors. In 1998, a group of five major electronics companies- Nokia, Ericsson, IBM, Intel and Toshiba- created an open network technology that is used throughout the world to connect handheld devices. At the moment almost all the electronics manuf acturing companies in the world have joined the Bluetooth Special Interest Group (SIG). This new technology has been named after a tenth century King of Denmark, Blatand Bluetooth who was able to unite his warring Viking tribes under a common rule in Denmark, while Bluetooth logo is based on Runes surrounding the King ruled. Bluetooth technology uses a radio frequency (RF) communication interface and other associated communication protocols and usage profiles which will be discussed later in this paper. The technology behind Bluetooth can operate in the 2.4 GHz ISM (industrial, scientific, and medical) radio frequency (RF) band, also this new technology can support low cost, its power efficient, and it is also a single-chip technology. Scatternet proposed here is based on a tree structure by designating a node leader to initialize the protocol and generate a centralized algorithm which will assign the roles of the network nodes. A tree topology network results to form a scatternet and develop coordinates devices. A device called the leader will start the piconet by acquiring all slaves in its range, a maximum of seven slaves. A master and its slaves form a piconet whose clock is synchronized with the clock of the master. Slaves and their master communicate through a piconet. During scatternet formation, the main issues that affect it are; how nodes will make discovery, how piconet sizes are balanced and how masters and gateways are chosen. What is a Bluetooth? This is a wireless technology that will allow connectivity between two or more devices that are Bluetooth enabled, for example a mobile phone and a computer. This technology is utilizing a 2.4 GHz radio spectrum and the devices must be at a range of 10 meters or more when an amplifier is used. But, due to variations among the mobile service providers, not all the Bluetooth technology will offer the same of functionality in devices. Bluetooth technology uses short- range communications technique which is intended to replace cable connecting portable at same time maintain a high levels of security. The advantages of this technology are that, it consumes low power and the cost is also low, while its specifications will define a uniform structure that will be used for a wide range of devices to connect and communicate with other devices. This new technology has achieve a global acceptance, this because Bluetooth device can connect to other Bluetooth enabled devices almost anywhere in th e world, and at same time Bluetooth device can communicate at same time up to seven other Bluetooth enabled devices within a single piconet-ad hoc networks. The strength of this new technology is its ability to handle both data and voice transmissions at same time, and this has enable people to enjoy various innovations that come with this new technology, such as hands-free headset for voice calls, mobile phone applications printing and fax capabilities. History of Bluetooth In 1994, Ericsson company started developing a device that will connect mobile phones to other devices without a cable interface, but in 1998, a special group of companies going by the name Bluetooth Special Interest Group (SIG) was formed by five major mobile manufacturing companies: IBM, Intel, Nokia, Toshiba and Ericsson, with the aim of promoting widespread commercial acceptance of this new technology. Within six months, Bluetooth Special Interest Group (SIG) started inviting other telecommunication companies globally, and as a result of that they initiated a free access to Bluetooth technology, at same time these companies pledged to support any new specification of Bluetooth. Years later, with dollar signs gleaming in their eyes, the rest of telecommunication manufacturing companies quickly jumped on the bandwagon, In no time, almost 2,000 Bluetooth "adopters" to their ranks and the number continues to grow. The initial aim of Ericsson Company to start developing Bluetooth was to unite computer devices and other telecommunication devices, such as mobile phones without the use of a cable. Thus, the Bluetooth Special Interest Group (SIG) thought it quite fitting to name this new technology after the Danish King Harald "Bluetooth" Bltand; the Danish king was given that nick name Bluetooth because he used to love eating blueberries and that his teeth were stained blue due to the habit of eating blueberries; However, this is mere speculation. There are some IEEE standards which are found in Bluetooth technology, but the main difference about this new technology is that specifications or platform which Bluetooth operate is for a complete system; from physical layer to application layers found in other devices. Bluetooth specification Since its inception, Bluetooth technology has maintained a global standard with known specifications. Bluetooth has heralded itself as a universal communicator and the technology can be used in any country in the world. The following are the standard specifications of Bluetooth technology: Frequency Range Bluetooth technology operates under the frequency of 2.4 GHz, globally, this band used by this technology is free and unregulated, except in countries such as Japan, France and Spain, this bandwidth has been reduced, but these restrictions have been eliminated in both Japan and Spain. In France, its military have rights over the 2.4 GHz frequency band, but the authority over 2.4 GHz band was relinquished in January, 2001. Most countries in the world are beginning to regulate 2.4 GHz frequency band, thus ensuring the band will be available for Bluetooth appliances. Physical Layer The Bluetooth hardware has been made with a single 9*9mm chip, this hardware is found in all the electronics that are Bluetooth enabled, and can communicate with any Bluetooth device that is found within a radius of ten meters or this distance can be increases to 100 meters only if an amplifier has been used. The maximum data rate that can be used to transmit data is 1Mbps for 1st generation technology, and at same time Bluetooth technology uses Gaussian Frequency Shift Keying (GSSK) for radio frequency modulation. In the near future, this technology should allow achievement of between 2- 12 Mbps transfer rate. Noise Immunity Bluetooth technology is designed to work in a noisy environment, there are two powerful techniques that has enable this Bluetooth technology to achieve this purpose of operating under a noisy environment. These techniques are as follows: a. Frequency Hop (FH) spread spectrum; this is a technology which divides the frequency band into smaller channels. The technology will hop channels and in return it will minimize potential interference in Bluetooth technology operations. Bluetooth device after transmitting packet of data, the device will hop to another frequency and this is determined by the master. The goodness of this technology will provide a low level transmission security that cannot be cracked; in fact this technique will prevent the E0 encryption scheme from being cracked. b.Error control; this technique will enable Bluetooth receiver not only to detect error received, but it will correct the same transmitted error. The technique has the capability of limiting any noise that is being transmitted over a long distance links. There are 3 errors which have been well defined in Bluetooth technology specifications: 1/3 Rate FEC, 2/3 Rate FEC, and Automatic Repeat Request (ARQ). Although this technology has reduced the number of re-transmitted data, FEC has slow down transmissions, and therefore is not suitable to be used in a noise free environment. But, packet headers are exception for this technology because it can work well regardless of environmental factors. Automatic Repeat Request (ARQ) incurs less overhead than Forward Error Correction (FEC), but it is less effective in term of ability to correct errors. But if the transmitter will not receive an ACK the data will be resent after a predefined period of time. Data Transmission Bluetooth technology will allow data to be transmitted in a synchronously way or asynchronously way. In voice transmission, The Synchronous Connection Oriented (SCO) method is widely used, since voice transmission need a smooth transmission and voice is transmitted via reserved intervals, in other words, packets of voice will be sent in groups without interruptions. Bluetooth technology is compatible to TCP/IP protocols and therefore can be well suited to traditional networking with other devices. I Bluetooth hardware; within a piconet, master-slave pair will have a different transmission mode and this transmission mode can change dynamically [3]. The frequency bandwidth is usually controlled by master unit- the slave unit does not have capability of transmitting data unless it has polled by the master unit. The master unit usually broadcast messages to the slave unit and this is via the ACL link, while Time-Division Duplex (TDD) technology will allow transmission in both direction in SCO and ACL. Power Bluetooth technology has a way of limiting its transmitting power to exactly what is needed; the signal strength of the transmitting power is dynamically modified to suit the required distance which information is transmitted. Trading off response time against battery usage; device that are Bluetooth enabled are reluctant to use unnecessary power. In comparison to a mobile phone, a Bluetooth device usually uses 3 per cent less power typically used by mobile phones. Security Bluetooth technology offers security through authentication of the devices involved in the connection and data exchange [4]. This is usually done at the Link Management Protocol (LMP) layer. Normally, this authentication based security utilizes the identification of the devices in use. Other ways of security involve implementing confidentiality and key derivation. Bluetooth PIN is what is generally used in creation of the Bluetooth key whereby the key is entered into both devices to be paired. The E22 algorithm is the algorithm used to generate an initialization key also known as the master key whereas the encryption of packets and confidentiality granting is done with the E0 stream cipher. This cipher is supported by use of a cryptographic secret which is an earlier generated master key. Below is an image describing the Bluetooth encryption process between a master device and a slave by use of both keys? Bluetooth utilizes three different encryption modes that are used to support the technologys confidentiality security service [5]. The first mode commonly known as plainly Encryption Mode 1, allows no encoding of any data being exchanged or being transmitted. In other words, traffic between the devices involved is not encrypted. In this particular mode, a device does not initialize any security measure. Traffic moves to and fro in a raw state having no security procedure interfere with it. A device in this non-secure mode has its authentication and encryption functionalities totally disabled and traffic just bypasses them [2]. Encryption Mode 1 allows unrestricted access to the particular device, meaning that the device does not prompt another device to identify itself as it tries to connect to it nor does it encode the data it transmits to any device. This particular mode utilizes no key a slave Bluetooth device receives and as a result, no encryption whatsoever is performed on eith er individually addressed traffic or broadcast addressed traffic. This is the most non-confidential mode for Bluetooth devices and is not recommended by the authorities. This mode leaves all data packets in transmission accessible to any intruder or Bluetooth user within range of the master device [1]. Bluetooth Encryption Mode 2 performs encryption only on individually addressed traffic based on individual link keys [13]. However, these links have to be individual. This encryption mode does not perform encryption on broadcast traffic. In other words, encryption is only offered in the connection to only one device but when the devices to connect to are more than one, no encryption is performed. However, when the connection is point-to-multipoint, the traffic transmitted is not encrypted [12]. This mode as compared to the first mode, offers a little bit of confidentiality in that it allows encryption of data transfer. A security concern is however raised in that it only offers confidentiality when only two devices are involved in the data transfer[11]. This means that if more than two devices were in the same Bluetooth range and one of the devices (the master) wants to connect or transfer data to the rest of the devices (the slaves), the traffic would be open to intrusion even if au thentication is enabled and verified. Thus it would be in order to declare that Bluetooth encryption mode 2, though confidential unlike Bluetooth Encryption Mode 1 that offers no confidentiality whatsoever, is still not satisfactorily confidential enough. This mode offers a leeway to intruders once the number of slaves exceeds one, thus challenging the security of the Bluetooth technology. The mode creates restrictions to data exchange [6]. Bluetooth Inquiry When two devices that are Bluetooth enabled want to start communicating they will do so by using Inquiry Phases, in inquiry phase one of the Bluetooth enable is assumed to be in master mode while the other one is assumed to be in slave mode [7]. The master will then send the packages and listen to respond that will come from the slave, also the slave mode listen package that is coming from the master and then send a return package. During the process of inquiry the Bluetooth enabled devices will change (hop) their frequencies a lot, but at a certain time during the hopping process Bluetooth enable devices will use the same frequency in the same time interval during the process, but further synchronization can be achieved in the process. The frequencies which are used during the inquiry are a subset of 79 frequencies which are widely used by the piconet in an operation. These frequencies are usually generated by resident counter and a GIAC or DIAC address [7]. The 32 frequencies that are used GIAC hop pattern are usually being spread across the spectrum by the scattering stage and it is usually at the end of the generation of frequency process in the Bluetooth. The inquiry process that are used in scattering are 0-5 and 53-78, but 32 frequencies are further divided into two trains, A and B and each will have 16 frequencies. The frequencies in a train usually changes over time, but the trains will exchange one frequency after every 1.28 seconds and this is based on changes in the free-running counter. After this period has elapses[10], the Bluetooth device enable will re-enters the scan substate and it will scan again, it will use a scan of length 11.23ms rather than 10ms which will allow a scan device to receive at least one full inquiry train, which will allow for timing misalignment. Piconets and Scatternets The ad hoc network will consist of many wireless devices that are able to communicate to each other, without a central controlling device [11], and this is the method used by Bluetooth device. In Bluetooth there is no dedicated Access Point to control data transmissions, instead the first Bluetooth enabled device will initiates a transmission and thus becomes a temporary master of the network; master is not a dedicated device like an Access Point. In PANs, Bluetooth enable devices that are closer can discover each other and form a small network- piconet, and without the help of a user[11], and this will enable data to be transferred from one Bluetooth enable device to another, for example, between a mobile phone to a laptop; by coming near the user will instruct the mobile or computer what action to perform [11]. Piconet This network is usually formed when two or more Bluetooth enable devices discover each other and begin to communicate, this network can accommodate up to eight Bluetooth enable devices, this is because address is only 3 bits long; in binary only values upto 07 (slaves) can be stored in the address field [12], but the master will not have any address, but 0 will be reserved for broadcast messages. In this process one of the devices will act as a master and the rest of devices will act as slaves; this is usually the first device which start transmission will become the master. Scatternets A Bluetooth enabled device can be a master in one of piconet, but it can also be a slave in another piconet network that is within a reachable distance [2]. Also a slave device can also connect into two different piconets that are within its reachable distance. However, a Bluetooth enable device cannot be a master for more than one piconet; this is because master device determines the hopping pattern used for a piconet [2] If a Bluetooth enabled device connect to two piconets, it will keep track of both frequency-hopping patterns of both piconet so that it can stay in touch with both piconet [2]. A master will transmit packets to its slaves to maintain the link, and this is usually based on negotiations that are between the master and its slaves devices. Thus, a Bluetooth device which is a member of two piconets must at all the time listen for these transmission that is coming from the master [2]. Scatternet protocol formation Wang, 5, postulates that there are two protocols for forming connected scatternet protocols. The resulting topology in both cases is a Bluetree. Each node assumes two to three roles. The single node initiates a blueroot the first protocol which is the root of the bluetree. This is how a rooted span tree is built: the root is assigned the role of a master and one hop neighbor of the root will be its slave. The roots children are then assigned additional aster role while the neighbors not assigned specific roles will be slaves of the new masters. The procedure is repeated until all the nodes are assigned. This happens by assigning only one node for each master. The bluetree scatternet formation consists of three phases. In the first phase each node collects information about its neighbors and creates a visibility graph. Nodes randomly go into page scan states inviting a maximum of N nodes to join their piconets. Disconnected piconets are formed after the first case while the master collects slaves information and share it with the slaves. During the second phase, Bluetooth nodes collect a maximum N slaves from piconets formed during the first phase. These nodes are then turned to bridges. During the last phase, piconets connect to form scatternet. A scatternet is formed by joining tree roots whereby each tree is a collection of nodes. The nodes alternate between three modes namely Comm, Comm/Scan and Inquire. Every root in the tree selects a leaf as the coordinator and the modes Scan and Inquire search for coordinators while noncoordinators do Comm/Scan. When they find each other, coordinators inform roots which enter page and page scans modes. This results to two roots to communicate and the master code becomes a new root. If a tree gets disconnected, the algorithm changes roles depending on who left the tree. A Bluetooth sensor network is also called a Bluetooth node whose work is to collect sensed values from sensor. The formation process involves two processes; the first and second phases. During the first phase connections and information about neighboring nodes are made. Information sensed by each node is sent to the Super Master (the network node) which orchestrates the network collected from the internet. Each node makes an inquiry during this phase one at a time during which other nodes make an inquiry scan. Inquiring nodes establish a network through SDAP and information collected during an inquiry is sent to the parent forming the matrix. As the node finishes an inquiry, then the next device starts its inquiry. When all nodes have taken their turn, the device gives the parent its turn to and shares all the information. Running this backs the algorithm traverses tree nodes and returns information to the super master. This helps to collect network information as the super master ch ooses K nodes and the selection is done on every ode through the tree and coordinated by the super master. Alternating bit protocol [14] Alternating bit protocol is a simple data layer protocol that is used in transmitting corrupted or lost messages in one direction between a pair of protocol entities. The messages sequences alternates between 0 and 1. M= messages sent from sender to receiver and A= acknowledgements sent from receiver to sender The protocol uses positive acknowledgment and other information of one bit to each message that is exchanged. Only one bit of message can be sent at a time; stop and wait. The model from this protocol is build from sender and receiver otherwise known as automata. The messages are exchanged between two fifo lossy channels, M and A. The sender will be able to read messages by the producer and send it through M. Acknowledgment for the message is then waited through A. the sender will be required to resend the message with the same bit if the acknowledgement does not arrive. If received, the sender will be able to send the next message from producer with an incremented bit. In this model, the A and M channels are unbounded because the resent data is not bounded as the figures below suggests in states s1, s3, r0, r2. The figures below give the automata of the receiver and sender. M!m0= sending of a message with bit 0 through channel M M?m0= reception of data with bit 0 through M nop= transition has no effect on channels Protocol validation Validation protocol is defined as a means of testing processes to ensure that they are valid and effective. Its main purpose is to help determine if certain rules or procedures are followed correctly. The protocol employs certain instructions that are followed to accomplish an end result. Computer networking protocol validation is done using some simulation and testing. To verify a protocol it has to be described in a structured way. There are usually two ways in doing this, use an implementation in a regular programming language and the use of a high level formalization language like PROMELA [15]. What is promela? This is a modeling language process which is used to verify the logic of parallel systems; the programming language is mostly used because it can be dynamically used to create a concurrent process in modeling, for example in distribution systems. In this Modeling, communication via message channels can defined to be synchronous or asynchronous, and this system can be analyzed by a spin model checker to find out if the modeled system has produced a desired behavior; the spin will perform a random or iterative simulations of the system execution or it can use a C programming that will perform a fast verification of the system for correctness. During the verification processes , the spin checkers will check if the deadlocks are there in the system, unspecified receptions and unexecutable code in the system. There are good reasons for an individual to use this programmable language, first, in designing and verification coordination structures in the distribution system software is regarded as harder in practice than the design of a non-interactive sequential computation, for example computation of compound interests. Second, system computation can be done more thoroughly and more reliably today than the verification of even the simplest computational procedure. Promela program contain many features that are not found in other mainstream programming languages, and these features will help a programmer to construct a high level models of distribution systems as you compare with other programs. For example, it will include specification of non-deterministic control structures; in other words, the program will have fairly rich set of primitives for inter-process communication. The limitation for this program is that it lacks some features that other programming languages have, for example f unctions that will return values, expressions with side effects and functions pointers; this is for the simple reasons that PROMELA is not a programming language but it is used to create a verification models. The model differs in two ways from a program written in programming language such as java or C++. A verification model will contain things that are not part of the implementation of the program, for example it can contain worst case assumptions about the characteristic of the environment that the verification model may interact with the system and this can either be implicitly or explicitly which will contain a specification of correctness properties of the program. Verification model will represent an abstract of original design that contains only those aspects that are found in the system. PROMELA is drives many characteristics from C program, for example syntax for Boolean and arithmetic operators, but POMELA has other differences that, is important to focus on the construction of high-level models of the interactions in distributed systems. The constructed model in PROMELA is made up of three basic types of objects: data objects, processes and message channels. Processes in PROMELA are proctypes and are mostly used to define behavior, in the program, there must be at least one proctype which must be declared in a model, and for the verification to be of much use there must be at least one process instantiation. The body of proctype is made up of zero or, one or many statements and the execution of the statement in the program is somewhat special because it will double as the primary for enforcing process synchronizations. Data or message channels can either be declared either globally, and this is found outside the process type declarations, or locally within a proce ss type declaration, these are the two types of levels of scope in PROMELA programming language: global and process local. It is not possible to restrict the scope of a local object to only part of a proctype body. Conclusion This paper has allowed me to go thoroughly into the new emerging technology; Bluetooth, with time this new technology applications will keep developing this is because of the need of mobility. Bluetooth technology is among the many proximity technologies being employed all over the world, such proximity technologies are: Infrared, RFID, and contact less Smart cards. Most of people using this new emerging technology are concern about the various issues such as: usefulness, acceptance, applications, security, usability, and reliability of technology. In order for these concerns to be taken care of, many specialists working with this new technology are continuously working to improve profiles into the emerging technology. Version two of Bluetooth technology can handle most of these concerns, SRFT Bluetooth technology has been created for financial transactions used in short range, and this has been a major step in the improvement towards Mobile Financial transactions. At the moment, Bl uetooth will provide auto connection between two devices that are Bluetooth enabled, with compromise to security. A recent article may seem to spell some trouble on the future of this new technology; Bluetooth. Recent Intel Development forum said the technology company was giving up on the deadlocked ultra-wideband IEEE task group, and the company has decided on going it alone with their new technology that will compete with Bluetooth technology, they are calling wireless USB. This new technology being initiated by Intel will do everything Bluetooth technology does and, but in term of Bluetooth found in PCs will be all dead. Ultra-wideband will able to provide a substantial performance benefits over Bluetooth technology, because it will be able to approach the speed of USB 2.0 and 1394. This means there will be faster connections, and at moment the faster connection is increasingly required by devices such as: apple iPod, digital cameras and removable hard drives. The lack of this throughput is what ended the Intel/Bluetooth technology honeymoon. If these new technologies were to be developed by Intel, they would give Bluetooth a run of its money. If the new technology will posses reliable compatibility, faster data transfer rate and the backing of a major player in the telecommunication industry- Intel, then surely Bluetooth will be in danger and may fall to the wayside in term of competition. However, at moment Bluetooth technology has already grabbed a large share of the market and it has a head start on whatever other new technologies that will come into being to compete. This also means, Bluetooth technology will have price advantage because research and design phase of Bluetooth technology has already been completed. Also, those special interest groups that advocate for the use of Ultra-wideband are at deadlock and as for now, no progress on the device has been made, so, as for now Bluetooth technology has the monopoly on the short range, low power wireless technology that are Bluetooth enabled. Bluetooth technology is also getting better on itself, the special interest group (SIG) is working on a new version of specifications that are found in Bluetooth technology. The group at the moment is working on the version 1.1, also, a group by the name Radio2 is working on the problems Bluetooth technology has with bandwidth technology, interference and problems with setup connection. If Radio2 can achieve their objectives of increasing the bandwidth, decreasing interference of Bluetooth with other technologies, and lastly correct the problems of connection setup, the future will be brighter for Bluetooth technology, and the technology will be able to compete well with the performance of new technology that will come into the market. Based on various evidences from all aspects of applications, this new technology is definitely a technology that has valuable uses in the world today. If Bluetooth technology continues to be unchallenged in the world, even though it has its drawbacks, it will grab a large share in wireless device technology. With the backing of major telecommunications companies which has put their money in research and development, it will be extremely difficult for other emerging technology to overcome Bluetooth technology. Buy custom Bluetooth Modelling essay

Tuesday, November 5, 2019

Biochemical Processes of Oil Degradation

Biochemical Processes of Oil Degradation 1. INTRODUCTION Surfactants are surface active compound that reduce the interfacial tension between two liquids, or that between a liquid and a solid. Surfactants are organic compound that contain both hydrophobic (head part of the surfactant) and hydrophilic (tail part of the surfactant) moieties. Thus surfactant contains both water insoluble i.e. water repellent group as well as water soluble i.e. water loving group. Biosurfactants are also surface active compound like chemical surfactants but unlike the chemical surfactant, biosurfactant are synthesized by microbes like bacteria, fungi and yeast. Biosurfactants comprise the properties of dropping surface tension, stabilizing emulsions, promoting foaming and are usually non-toxic and biodegradable. Recently interest in biosurfactant has increased because of its diversity, flexibility in operation, and more eco-friendly then chemical surfactant (BS Saharan et al ., 2011; Eduardo J. gudiËÅ"na et al ., 2011). Biochemical process es of oil degradation carried out by microbes involves several type of enzymatic reactions driven by oxygenase, dehydrogenase and hydroxylase (Hamamura N et al., 2008). These enzymes cause aliphatic and aromatic hydroxidation, oxidative deamination, hydrolysis and other biochemical transformation of original oil substance leading to formation of large number of intermediate degradation products. However, a major limitation of microbial degradation of crude oil is its hyydrophobicity. Biosurfactant produced by oil degrading bacteria facilitate the uptake of crude oil hydrocarbons by bacterial cells and also have low toxicity and high biodegradability (Batista SB et al. , 2006). So, crude oil degrading bacteria with the ability to produce biosurfactant is widely recommended for fast degradation of crude oil. (Kumar M et al., 2006). Furthermore possibility of their production on large scale, selectivity, performance under intense conditions and their future applications in environ mental fortification also these have been increasingly attracting the attention of the scientific and industrial community. These molecules have a potential to be used in a variety of industries like cosmetics, pharmaceuticals, humectants, food preservative and detergents (BS Saharan et al. , 2011). But the production of biosurfactant on industry level is still challenge because of using high costly synthetic media for microbial growth. Biosurfactants are classified on the basis of diversity in their structure and their microbial origin. They contain a hydrophilic group, that contain an acid, peptide cations, or anions, mono-, di- or polysaccharides and a hydrophobic group of unsaturated or saturated hydrocarbon chains or fatty acids. Biosurfactants produced by a variety of microorganisms mainly bacteria, fungi and yeasts are diverse in chemical composition and their nature and the amount depend on the type of microbes producing a particular biosurfactant. 1.1 Classification of Bio surfactant: Biosurfactants are classified in to two major group one is low molecular weight surface active agent call biosurfactant and high molecular weight substance called bio-emulsifier that is especially used as enhancement of emulsification of hydrocarbon. Further these two major group is divided in to six major group known as glycolipids, lipopolysaccharides, lipoproteins-lipopeptides, phospholipids, hydroxylated and cross linked fatty acids. (a) Glycolipids: Mostly biosurfactants are glycolipds. They are lipids with a carbohydrate attached. The connection is by means of either an ether or ester group. Among the glycolipids, the best known are rhamnolipids sophorolipids and trehalolipids.

Saturday, November 2, 2019

How do practitioners in a child care centre encourage babies and young Research Paper

How do practitioners in a child care centre encourage babies and young children to learn to talk - Research Paper Example It is not very common to have a relative look over their children. This is when the role of child care centers comes into the spotlight. Over the time, women have come to realize the importance of child care centers in helping them look over their children while they are away; at the same time, working mothers are relieved of the tension of having their children unattended. There has been a surge in the demand for qualified and experienced people who can take responsibility and care for young children. Moreover, the demand for child care workers is also high because of the high turnover rate of the job; this is because the wages given to child care workers are low, making the turnover rate as much as 31 percent (Eberts & Gisler, 1999). It has become more of a rule, rather than a something arising out of necessity, for women to work outside their homes. There has been a shift from the parenting approach to child care to a market approach to child care (Lamanna & Riedmann, 2008). Therefore, a number of alternatives have surfaced over the years to facilitate working mothers while they are away. In America, the three main types of child care options that are preferred are in-home care, family child care and child care centers. Child care centers are also known as day care centers. Where in-home child care includes hiring a nanny or au-pairs, family child care is concerned with the caring of a child from the personal residence of the care giver. Both have advantages and disadvantages of their own. In-home care provides the child care in his or her own, and is very personalized for the child. However, the little exposure the child gets of the outside world, along with the lack of authentic proof of the character of the care giver, makes the in-home care option less preferable. On the other hand, family care centers are generally preferred for their small child to care giver ratio as well as the dependency on the