Monday, September 30, 2019

Effectiveness of learning in a group setting

Concerted acquisition is about larning in groups but there is more to effectual acquisition than working in groups ( Johnson and Johnson, 1994 ) . There are other factors that contribute to effectual acquisition in concerted activities. These are as follows: 1. Group members depend on each other for endurance of the squad or to make the set mark. That is members are reciprocally responsible for sharing a common set of rule. The success and failure of the group depends on the each member of the group. 2. Face-to-face interaction- Promoting success of group members by praising, promoting, back uping, or helping each other. 3. Individual accountability- Each group member is held accountable for his or her work. Individual answerability helps to avoid members from â€Å" thumbing † on other group members ‘ achievements. 4. Social skills- Cooperative acquisition groups set the phase for pupils to larn societal accomplishments. These accomplishments help to construct stronger cooperation among group members. Leadership, decision-making, trust-building, and communicating are different accomplishments that are developed in concerted acquisition. 5. Group processing- Group processing is an appraisal of how groups are working to accomplish their ends or undertakings. By reexamining group behaviour the pupils and the instructor acquire a opportunity to discourse particular demands or jobs within the group. Groups acquire a opportunity to show their feelings about good and unhelpful facets of the group larning procedure in order to rectify unwanted behavior and observe successful results in the group work. Concerted acquisition is about pupils developing their cognition and interacting with others. Researchs on larning suggest that an effectual manner of acquisition is when pupils look for information themselves and construct on such information. Knowledge can be tested and developed to a big extent by so making ( Ray, 2008 ) . Other academicians are besides of the impression that effectual acquisition can be achieved chiefly by interaction with people. During group larning pupils interact and learn from each other to accomplish their set end and construct a positive relationship. This manner of larning brings about increased academic success by pupils and besides improves their human dealingss. Harmonizing to Foyle and Lyman ( 1988 ) , for a concerted acquisition as a instruction scheme to be successful, the instructor should come out with the best technique to be used and the subject to be taught while seting pupils into groups with ideal size in a well organised schoolroom where there will be free interaction by pupils and besides assesses the methods to guarantee smooth running by the squad. Again the instructor explains the purpose and outlook of the acquisition and makes it clip edge. Group advancement is besides monitored by the instructor and offer aid suitably to hard undertakings if required. Besides group work is assessed with accent on single pupil ‘s learning constructs or public presentation and Markss awarded for their accomplishments or success. Teachers every bit good as scholars do bask a batch of benefits from concerted larning. Many of these benefits arise from the intrinsic motivational strengths of Cooperative Learning and the extent to which Cooperative Learning Fosters pupil involvement, behavioral and attitudinal alteration, and chances for success. As Keller ( 1983 ) demonstrates â€Å" this set of results consequences from the successful incorporation of motivational issues into direction. † Johnson & A ; Johnson ( 1989 ) in their survey found out that â€Å" a primary benefit of Cooperative Learning is that it enhances pupils ‘ ego regard which in bend motivates pupils to take part in the acquisition procedure. † Slavin ( 1987 ) is of the sentiment that â€Å" concerted attempts among pupils result in a higher grade of achievement by all participants. † Again harmonizing to Kagan ( 1986 ) , â€Å" Students help each other and in making so construct a supportive community which raises the public presentation degree of each member. † This brings approximately motive every bit good as increased ego regard in all pupils as noted by Webb ( 1982 ) . Johnson and Johnson ( 1990 ) once more noted that â€Å" cooperation enhances pupil satisfaction with the larning experience by actively affecting pupils in planing and finishing category processs and class content. † Besides Turnure and Zigler ( 1958 ) assert that â€Å" effectual squads or groups assume ownership of a procedure and its consequences when persons are encouraged to work together toward a common end, frequently defined by the group which is particularly helpful for persons who have a history or failure. † Harmonizing to Kessler et Al. ( 1985 ) , â€Å" concerted acquisition reduces schoolroom anxiousness created by new and unfamiliar state of affairss faced by pupils. † In a traditional schoolroom when a instructor calls upon a pupil, he/she becomes the focal point of attending of the full category. Any errors or wrong replies become capable to scrutiny by the whole category. Slavin and Karweit ( 1981 ) are of a contrasting position that â€Å" when pupils work in a group, the focal point of attending is diffused among the group. In add-on, the group produces a merchandise which its members can reexamine prior to showing it to the whole category, therefore decreasing chances that errors will happen at all. When a error is made, it becomes a learning tool alternatively of a public unfavorable judgment of an single pupil † . Featherstone ( 1986 ) noted that â€Å" Students show more assurance and show high degree of enthusiasm, wonder and engagement in being taught through concerted acquisition undertakings. Besides pupils are empowered to hold the sense of being successful at each phase of their instruction. † What makes it even more singular is that in concerted acquisition squads, low accomplishing pupils who have low degrees of public presentation and accomplishments have the chance to do parts to a group and therefore experience success. Nor is it all for pupils enjoy other benefits such as increasing their cognition and apprehension of thoughts by sharing and explicating them to others. Students working with spouses ask each other for aid and better their attitude towards work. Methodology The survey focuses on concerted acquisition as a instruction schemes used by instructors and its consequence on students ‘ acquisition. It will follow a combination of qualitative and quantitative methods. The primary research of the survey will be in the signifier of questionnaires and interviews. Qualitative research will be used because it allows the topic being studied to give much ‘richer ‘ replies to inquiries put to them by the research worker, and may give valuable penetrations which might hold been missed by any other method. It besides provides valuable information to certain research inquiries in its ain right. It besides helps to analyze things in their natural scene, trying to do sense of, or construe the significances people bring to them. Van Maneen ( 1983 ) defines qualitative method as an array of interpretative techniques method which seek to depict, decode, translate and otherwise come to footings with the significance, non the frequence, of certain more or less of course happening phenomena in the societal universe. The chief ground for sing qualitative interviews is to be able to understand and clear up all uncertainty and guarantee that the responses from staff are decently understood. Face-to-face interviews besides allow more ‘depth ‘ probe although it could besides take a long period of clip to set up and carry on ( www.marketresearcher.com ) . Burgess ( 1982 ) describes face-to-face interviews as the agencies and chance for the research worker to examine profoundly to bring out new hints, open up new dimensions of a job and to procure vivid, accurate inclusive histories that are based on personal experience. The strength of a quantitative method is that it produces quantifiable dependable informations that are normally generalised to some larger population. It focuses on Numberss and frequences instead than on significance and experience. It besides provides information which is easy to analyze statistically. Questionnaire study was chosen as the best quantitative tool for this survey. Sampling Procedure A sample is defined as a subset or some portion of a larger population ( Westen, 1996 ) . A population in this context can be classified as a group of people who portion or hold a common set of features and who can handily be used for the intent of this work. A sample size of 30 will be selected for this survey. This will consist 15 instructors, 5 caputs of section and 10 pupils. The principle for this sampling method is to bring forth the needed information for analysis and avoid the complexness of informations, biased and subjective sample choice. The inclusion of the caputs of sections and pupils in the survey is to supplement, balance and bring forth an nonsubjective information of the existent state of affairs. Data Collection Source Data will be obtained through questionnaires given to instructors and pupils. Few instructors and caputs of section will be interviewed to obtain information which will non be covered in the questionnaire. The survey will trust chiefly on primary informations as the chief beginning for analysis. The cardinal point here is that the informations collected is alone and until published, no 1 can hold entree to it. This will be gathered fundamentally through the usage of self-administered questionnaires, interviews of instructors, caputs of section and pupils. A dairy will be kept to enter relevant information. Questionnaires A questionnaire may be defined as a group or sequence of inquiries designed to arouse information on a topic or a group of topics from an source ( Casley and Lury, 1987 ) . The inquiries will be a upper limit of 12 to enable instructors, caputs of section and pupils complete within a short period of clip. Close ended inquiries will chiefly be used because they are easy and quicker to reply. Interviews The entire figure of interviewees will be 10 being 2 caputs of sections and 8 instructors. They will be given the chance to discourse their positions on concerted acquisition, its effects on acquisition and the benefits. The interview will last for approximately 10 to 15 proceedingss. The undermentioned countries will organize the topic of the interview inquiries: The importance of concerted acquisition. Using concerted acquisition in schools The benefits of concerted acquisition The impact of concerted acquisition on pupils larning. One of the advantages of questioning as a signifier of informations aggregation is that it enables the interviewer to examine and inquire follow up inquiries based on the response ( s ) of the interviewee. Second, there is the possibility of the interviewer being able to do intending out of non-verbal communicating medium such as facial looks and gestures made by the interviewee in the class of the interview. It besides eliminates the impersonal component of the questionnaire attack and allows for good resonance and personal interaction between the interviewer and the respondent. The interviews conducted will be used to complement the informations collected from the questionnaires. Data Handling and analysis Datas collected through procedures such as questionnaires and interviews are described as natural ( informations ) and can merely be utile when it is transformed into the needed information for which they were gathered, collected, analysed and reported. This is so checked for the necessary accommodations for skips, discernability and consistence and subjected to computing machine aided analysis. This research adopted a combination of descriptive, analytical, comparative and per centums derived from quantitative analysis. Descriptive statistics and analytical methods will be used to show detect tendencies and facts, utilizing tabular arraies and per centums. The public presentation of students thought utilizing concerted acquisition as a instruction scheme will be assessed and illations drawn from them. LIMITATION OF STUDY The survey will be limited to my 2nd instruction pattern school with more accent on the instructors, caputs of section and pupils. Another restriction could be the chosen sample size, which might non be a just representation of the entire population of staff in that school. Again some staff might non be willing to portion information, while other staff might non be able to finish the questionnaire or acquire the clip to be interviewed because of the nature of their work. CONCLUSIONS AND RECOMMENDATIONS Teachers are faced with a figure of issues that concern guaranting that pupils achieve their outmost best in footings of accomplishment and higher-level logical thinking. Concerted acquisition is considered to be among the most of import instruction schemes because of its effectivity. The popularity and broad spread usage of concerted acquisition is its footing on a theory validated by a great trade of research. Decisions would be made based on the findings which will be analysed in consistence with the reviewed literature. Decisions would besides be drawn based on the findings and analysis made as to how feedback from the instructors and students questionnaires can be transformed into actionable day-to-day tool for set uping the best instruction schemes that will convey approximately effectual acquisition on the portion of the pupils. Thereafter recommendations would be made sing the restraints of this survey for policy shapers and for future research work in this country. It is expected that the survey when completed successfully will hold a great impact on the professional development of instructors in footings of their instruction schemes and its consequence on students larning. It is besides expected that the result of this survey will function to edify instructors in their professionalism in fiting their instruction schemes to the acquisition manners of students for the maximal benefit . By and large it is expected that the undermentioned decisions can be drawn with mention to the reviewed literature. Students from different cultural background construct their assurance and do steady advancement when they work in a squad through the aid they get from their equals. Cooperative acquisition methods are used as a scheme of come oning pupils ‘ accomplishment to a greater degree and to assist keep a consistent growing in a planetary universe. Teachers who are keen on working with pupils from different cultural background usage this scheme to back up them to stand out academically. Concerted acquisition technique raises pupils ‘ attainment to a high criterion so far as they are designed to reflect the civilization and linguistic communication of the pupils Concerted acquisition promotes mastery while inactive credence of information from an outside expert frequently promotes a sense of weakness and trust upon others to achieve constructs. In a typical schoolroom stressing instruction, there is small clip for contemplation and treatment of pupils ‘ mistakes or misconceptions. With the Cooperative acquisition pupils are continuously discoursing, debating and clear uping their apprehension of the constructs. Students spend more clip working on a undertaking in concerted acquisition than when working separately. Most surveies have found that concerted acquisition pupils spend more clip on undertaking than control pupils ( Slavin, 1995 ) . Spending tonss of clip on a undertaking increases pupils motive and gives them assurance in themselves. Good assurance additions self-esteem. There is a relationship between self-pride and motive. Students who have positive self-prides are easy motivated in category. Concerted acquisition enables pupils to believe and ground good. As a consequence of this, pupils are able to maintain any information learnt for a long clip than pupils who work on their ain ( Johnson and Johnson 1986 ) . Thus the shared learning experience gives pupils an chance to prosecute in treatment, take duty for their ain acquisition ( Totten et al. , 1991 ) and as a consequence, go critical minds. Cooperative acquisition has an added advantage of assisting pupil non merely to interact academically but besides socially whereby they are extremely motivated and encouraged to work together as a group. The concerted acquisition as a instruction scheme has been found to be successful and effectual with older pupils in every bit much as with younger. Through concerted larning a kid in his or her early phases of larning develops a good and unquestioning attitudes for their couples, instructors and every bit good as school attending with increased involvement in school which leads to tonss of academic successes. It besides provides the platform where pupils in the group get and portion thoughts by larning each other ‘s job resolution accomplishments through the usage of different linguistic communications.

Sunday, September 29, 2019

Respiration System of Animal

1. Respiration System of animal: The respiration system is important to all animals, this system interacts others system in our body to provide energy and maintain life. Animals inbreathe oxygen, the body though metabolic process to produce ATP (energy source) and carbon dioxide, finally, carbon dioxide would be exhaled to animal body. Operation System in company: Company provides some resources such as place, money, human resource. Managers operate the activities in the company and make decisions. The output in this system is the profit or loss of the company. . A firm can survive and succeed in the long run if it successfully develops strategies to confront 5 competitive forces that shape the structure of competition in its industry. These include rivalry of competitors within its industry, threat of new entrants, threat of substitutes, bargaining power of customers and bargaining power of suppliers. Some competitive strategies can be used to minimize the competitive force: cost le adership strategy, differentiation strategy, innovation strategy, growth strategies and alliance strategies. . The more suitable hardware peripherals for input in a retail operation are touch screen and optical scanning. The touch screen can provide a more user friendly interface to the staffs, even though they have less computer knowledge. Also, optical scanning can provide the faster and easier usage. Liquid crystal displays (LCDs) and matrix printers are suitable for a retail operation, because LCD provide a thin, flat display to use less space. Furthermore, matrix printers can use less time to make some copies in the same time. In using the secondary storage for a retail operation, hard disk drives are more suitable. Hard disk drives allow higher speeds, greater data-recording densities, and closer tolerances within a sealed, more stable environment. Nowadays, the capacity of hard drives is up to many terabytes of storage, it can use less space to save more data in one hard disk drive.

Saturday, September 28, 2019

Roman Empire Annotated Bibliography Example | Topics and Well Written Essays - 250 words

Roman Empire - Annotated Bibliography Example He taught Ancient history as well as Latin at the University of Willamette since 2006 to 2007. He taught a quite popular course on the Ancient Magic as well as on Roman Africa, a well received course as well. The author’s main focus is the growth of Rome from scratch into a big empire. He looks at its positioning, technology, the government and strategies employed for growth. Points supporting the growth of Rome include its position which was steep. The author uses this point to show how easy it was to defend the city against the attacks from enemies hence facilitating growth. Rome was ruled by a series of Kings who got advised by the senate that constituted of leading family heads in Rome. This point shows the leadership that lead to the growth of Rome. The way of life in Rome involved trade with centers being Rome cities. Cities were carefully planned by Roman engineers. This point shows how the economy grew hence the growth of the empire (Nice,

Friday, September 27, 2019

G & P Trucking Company, Inc Assignment Example | Topics and Well Written Essays - 1000 words

G & P Trucking Company, Inc - Assignment Example Apart from these, G&P holds various service awards for deliveries to Eastman Chemical, Wal-Mart and W W Grainger etc. in addition to service awards for commendable service provided, G&P also holds more than 40 safety awards since the year 2000. Further strengths for G&P lay in their operations systems. They have a dense infrastructure system equipped with secured trailer storage, 24/7 central dispatch, repower capabilities, a dense terminal network, pioneering enterprise software, local dispatch at port terminals, mobile satellite communication capabilities, customized reporting and web tracking etc. ii. Weaknesses However, there are still weaknesses that G&P has to face as well. There is a driver shortage because drivers have moved to construction and warehousing jobs. This is because drivers that are employed are required to put in long hour which results in them spending more time on the job than they get to spend at home or otherwise in leisure activities. 14 hours of duty is req uired in a day’s work of which 11 are driving hours. iii. Opportunities G&P faces opportunities from the external environment in the form of the room for growth in the trucking and freight business. Since there is a lot of demand for reliable freight companies that actually provide the quality service that they claim to provide in this globalised world, G&P has great potential for further growth and success. iv. Threats Threats from the external environment include rising fuel costs. There is a base rate for fuel that is almost always non-negotiable. Trucks average 5 miles per gallon and there is no compensation for fuel costs for any empty miles driven or when the drivers stop to rest. There are also hurdles associated with government and agency regulations which sometimes make it difficult for a trucking company like G&P to operate by erecting bureaucratic barriers which slow operations down. (Trucking-How Hard Can It Be?). 2. Environmental Analysis i. External environmenta l Factors When conducting an analysis of the external environment we look at the competitors to G&P. There is Atlantic Trucking Co, Inc. and F & I Trucking Corp. Between the two of them Atlantic Trucking Co poses a bigger threat of competition to G&P Trucking because they have been operating for roughly the same number of years in the same industry, with experience and results almost at par with each other. However, ATC’s operations may be considered more expansive in terms of types of service provided. ii. Current State of Business Target Markets According to an article in USA Today, the trucking industry is facing some difficulties, mostly because of the driver shortage. The U.S government has predicted an increase of 31% in the amount of haulage sent by road from 2005 to 2117 and with a shortage of drivers, the trucking industry will find it hard for this increased workload to cope with. (Glen Creno and Dennis Wagner, 2008). iii. Evaluation of current Marketing Objectives and Performance The trucking industry should join the herd of business entities using the internet and social media to promote and market themselves. Websites and social media websites can be used to more effectively reach out to prospective customers and employees alike. Many trucking companies have improved their current performance by improving their operating costs. G&P trucking needs to further align this area to changes in

Thursday, September 26, 2019

International System of Justice Essay Example | Topics and Well Written Essays - 3000 words

International System of Justice - Essay Example Until recently, these atrocities and affronts to ideals of humanity went unpunished by national judicial systems and there was urgent need to put in place a system of justice that would protect the international human rights as enshrined in the United Nations’ Universal Declaration on Human Rights (Roht-Arriaza, 1995). The decade was marked by the creation of international criminal justice mechanisms and the application of a universal jurisdiction that would ensure that those who participate in crimes against humanity are held to account for their actions. Due to inherent obstacles in applying justice for such crimes, the mechanisms developed have continued to be marred with failure despite the numerous strides that have been experienced. After the Cold War period and the horrific acts that took place in the former Yugoslavia and the genocide in Rwanda coupled with the miserable failures of national courts of justice to bring perpetrators of crimes against humanity to account for their acts, major international actors including the United Nations (UN), a number of governments and international nongovernmental (NGOs) organizations came up to form international criminal courts. ... In1998, the United Nations adopted the Statute that would lead to the creation of a permanent International Criminal Court as a complementary to national courts of justice with the mandate to act in cases where the national courts are unable or unwilling to investigate and/or prosecute (Schabas, 2007; Schiff, 2008). It is important to note that the concept of international system of justice include standards governing rendering of justice to all on an international scale and the conduct of war and standards that define the fundamental human rights. Most of these requirements of have achieved a degree of recognition internationally over the past few decades in defining the types of criminal conduct by states against other states or against individuals or ethnic groups. In this regard, the varied definitions of violent crime between countries due to dissimilarities in both legal and statistics recording methods have made international comparisons problematic. The law of armed or violen t conflict has generally been applied to define conflict between states with little or no attention to internal armed conflict. However, there have been some developments in international law to especially through the Geneva Conventions to protect civilians during internal armed violence (Moir, 2002) International Criminal Court and Universal Jurisdiction With international criminal law infiltrating the legal systems of many states, the principle of complementarity, which stipulates the only subsidiary competence of the ICC vis-a-vis national jurisdictions, comes to be seen as one of the most important features of the ICC Statute (Schabas, 2007; Bellamy, 2009). The principle of

Wednesday, September 25, 2019

Interview Analysis Essay Example | Topics and Well Written Essays - 2000 words

Interview Analysis - Essay Example Its curriculum gives students an education that is generally broad with in depth studies to support a student’s professional and personal growth. Its staff, including the interviewee, is highly qualified academics who are experienced in the US higher education style (American University of Kuwait 1). Â   Amer El-Assad Ali is an employee of the American University of Kuwait who was the interviewee for this interview. The interview was carried out at the university using a tape recorder. The interviewee was asked about his experiences before he joined the American University of Kuwait, where he used to work, and how his job was like. The interview was meant as part of a set of interviews that sought to get information on current and past employees at the American University of Kuwait with regards to their experiences, how working at AKU was of benefit to them, and how they benefited the University. The interview took place at the university and lasted for approximately one hour and twelve minutes. The interviewee was quite candid about his experiences at AKU and gave us deep insight into the formation of various administrative departments at the university. Â   Amer began by telling us about his experiences prior to joining the university where he worked at the Central Mall Plaza as an advertising agent. They were forced to close shop because of the Iraq War in 2003 due to reduced business, which left him looking for work. At around this time, he met Emal Hassan, who was the founding HR director of the new start up university, AUK. While his background was in marketing and advertising, this department was not at AUK yet, and Emal told him to apply and see what happened. His only experience working at a university at the time was in student affairs at his former university, which helped since they were looking for people with experience at university level. At this point, he applied for the position of HR coordinator, got an interview with Dr. Shaffie Kab ra, and got the job. After gaining experience at AUK for a year, he again applied for a job in the marketing department and got the job, which he still works in. His experience at Human Resources was almost pioneering at the university since the department was new. He contends that he learnt about HR working in this department, which was easy as most of the work here was about the administration with compilation of CVs and contacting personnel who are willing to work in the faculty positions. However, his best experiences at HR at the time had to do with the interview process, although the routine process like database management did not appeal to him, especially because of his marketing, design, and advertising base. At this point, his previous director recruited him at HR to work on a few designs at her advertising agency, for example, with the faculty fact book and how the faculty would be received into the campus in order for them to get a feel of Kuwait, especially since some w ere from outside Kuwait. By making Kuwait appealing to incoming staff, despite the Iraq war, this helped her to get the job in marketing, as well. While she was not very comfortable working in HR, he was proud that he left a mark on the department since the forms used still had some of her designs. Leaving

Tuesday, September 24, 2019

Thesis statement is The corporate model of management should not be Essay

Thesis statement is The corporate model of management should not be used for citywide hospital agencies to address its inefficiences - Essay Example thcare sector has massively invested resources in carrying out research on the possibility of developing cure/treatment for these infections that claim lives of many in the 21st century. However, both the states and local government have equally increased medical and clinical awareness campaigns aimed at increasing and improving the quality of healthcare provided to the public. This has been made possible through enacting legislation on healthcare provision to ensure universal access to services. This has resulted into improvement in the quality of life and hence the general productivity of the industry. The management and administration of hospital agencies remains an incredibly complicated and challenging task that calls for effective balancing of all aspects in a hospital setting. Therefore, hospital overseers must balance between pressure from all aspects including internal demands (public expectations, pattern of emerging diseases and demographics changes), demands from suppliers (health care workforce, clinical knowledge and technology), as well as social demands (global research and development market, internationalisation and financial pressures). The complexity of managing hospital agencies remains a concern to researchers who have questioned the wisdom of the application of the corporate model of management in the hospital settings. Presently, many hospitals agencies citywide are relying on a corporate model of management. This model has encouraging impacts on the hospitals productivity. However, overreliance on the model presents severe consequences on the quality and sus tainability of service delivery. It is notable that the theme for adopting corporate model of management in the citywide hospital agencies arose from the need to improve productivity and quality of service delivery (Debra et al.). The need to enhance the development of citywide hospital agencies necessitated the adoption of this model. The model has presented diverse discrepancies,

Monday, September 23, 2019

Project Finance (Project Management) Essay Example | Topics and Well Written Essays - 1000 words - 1

Project Finance (Project Management) - Essay Example â€Å"Project finance is the financing of long-term infrastructure, industrial projects and public services based upon a non-recourse or limited recourse financial structure where project debt and equity used to finance the project are paid back from the cashflow generated by the project† (Project Finance Definition). Simply speaking, project finance is the process of accumulation of money and its investment in some particular project. Usually, there are two types of project finance – equity financing and debt financing. The debts and an interest rate are paid from the cash flows, generated by a project. Generally, project finance can be called as a part of project management. Project finance is usually a long-term process. The reason for it is that the projects financed are long-term as a rule. This process begins from looking for the ways of a project’s financing and ends with paying dividends to stakeholders and investors. . â€Å"It takes a lot more than a good idea to develop a successful manufacturing venture. You need to know where to find the resources, both financial and technological, and you need to find the right people with the right skills to do the job. Knowing where to look for these resources can save you precious time and money, and earn you some valuable partners in the process† (Sudarkasa). Identification and development of a project – any project should be presented to potential investors in some formal way. They should be able to weigh up all the pros and cons for a project. This information is needed to make a final decision whether to invest or not in a project; Determination the feasibility of the project – the main factor for investors is whether a project is able to bring social and economic benefits or not. That is why a vivid plan how to earn money should be drawn and presented to all the stakeholders. These two stages are among the most important in the process of

Sunday, September 22, 2019

The Galapagos Islands Essay Example for Free

The Galapagos Islands Essay The Galapagos Islands were first inscribed as a World Heritage site in danger in 1978. This was extended in 2001 and they were again inscribed in June 2007. The islands are found on the Pacific Ocean, 1000 kilometer from the South American continent, they are in Ecuador. They are 19 islands which lie on equator so their seasons vary very little. They have been called a unique â€Å"living museum and showcase of evolution†. (www. whc. unesco/org/en/danger). The islands were formed by seismic and volcanic activities which are still ongoing processes. These together with the extreme isolation of the islands, led to the development of unusual animal life such as the land iguana, giant tortoise and many types of finch. The finch inspired Darwin’s theory of evolution following his visit in 1835. The islands are referred to as an archipelago as they are very isolated from the nearest continent and the islands themselves are separated from one another. This separation and differences in climates favors evolutionary change. As a result, populations that are related follow separate evolution tracks leading to emergence of various species and even further diversification. The species so formed become very susceptible to changes in the environment. ( www. darwinfoundation. org) The uniqueness of the island lies in its marine and land ecosystems, and presence of flora and fauna endemic to the islands and in most cases found nowhere else in the world. The marine ecosystem is composed of both cold and warm water current systems, marine landscapes â€Å"bajos†- these are underwater mountains formed by volcanic activity they rise almost to the oceans surface. Some of the coastal animals found in the Galapagos marine reserve are sea lions, fur seals, albatrosses, several species of booby, frigate bird species, sea turtles marine iguana, penguins and flightless cormorants. (www. darwin. foundation. org) The land habitats of the Galapagos are mainly determined by their vegetation which is in turn determined by the local climate. The vegetation of the area is strongly zoned by altitude. The land ecosystem has such animal species as land iguanas, land snails, rice rats among others. The Galapagos contain a total of 560 native species of flora,180 are endemic (www. darwinfoundation. org). Some of the plant species include scalesia, opuntia cacti and the Galapagos rock-pursane and other lesser known species. Human intrusions threatening the area Threats to this hub of diversity are mainly in the form of fishing and tourism by humans. In the 1990s, fishing led to a big decline in some of the marine species such as sea-cucumbers and sharks. Then, the fishermen would fish the sharks just for their fins and the remainder of the shark’s body would go to waste. Fishing is the second most important economic activity in the region and marine resources were overused by such practices as illegal fishing and over fishing. The dangers presented by the Galapagos fisheries are-: i) Large international vessels fishing around the Galapagos pelagic zones and inside the Galapagos Marine Reserve (GMR) which is illegal. Long-lining and use of large seines are modern high-technology methods with devastating effects of depleting marine species. (www. darwinfoundation. org) ii) There has also been a rapid influx of poor fishermen from the mainland of Ecuador who serve the interests of mainland fishing companies and middlemen buyers. The fishermen are provided with capital in the form of a loan by the fishing companies to buy boats and equipment. The fishermen then sell the catch to the companies; the catch is later sold in the international market especially the Asian market. The influx has led to the human explosion being experienced in the islands and also the immigration brings with it invasive species which compete with the natural species of the islands decreasing their survival chances. ( www-darwinsfoundation. org) Tourism is the leading economic activity in the Galapagos Islands. Tourism has grown economically at 14% per year and this has lead to the Galapagos experiencing drastic, social, economic, cultural and ecological changes. (www. galapagos. org) The dangers that immigration poses include increased pollution, overuse of resources and eventually a charge in climate and introduction of invasive species. A change in climate will lead to loss of some of the species in the island. Invasive species refers to alien plants, diseases, insects and other organisms that people bring inadvertently to the islands. There are now 1,321 introduced species, compared to 112 identified in 1990. These include 748 species of introduced plants compared to 500 species of native plants and at least 490 species of introduced insects. The risk of the arrival of pathogens such as the West Nile virus, insect pests, and new predators is now high-: Dengue-carrying mosquitoes and some avian diseases are new arrivals in the islands. (www. galapagos. org,2007) Existing protection areas The Galapagos Islands have several protection areas. The Galapagos National Park (GNP) is one of this. 97% of the area covered by islands was designated as a national park in 1959. The lands not included were the settlement areas. Later in 1967, a park service Galapagos National Park service (GNPS) was set up to oversee management and administration of the park. The GNP is made up of 13 large islands, 17 small islands and 40 rocks. (www. galapagos. org/). The park authorities educate the visitors and enforce the laws and regulations of the park. The GNPS also oversees the management and administration of the Galapagos Marine Reserve (GMR) which was set up in 1998, another protection area. The GMR’s function is to protect the waters surrounding the archipelago. 3000 species of marine plant and animals are found in the GMR. The necessity of the GMR became apparent when in the 1990s fishing activities around the archipelago increased and almost had devastating effects on the marine species due to the high demand of both sea cucumbers and sharks’ fins. The GNPS also approves itineraries. This ensures that no one place is too frequently visited. This serves to distribute tourism to all the islands, decreasing chances of harm to the environment. The GNPS works together with the Charles Darwin Foundation, now known as the Galapagos Conservancy. The foundation provides the scientific and technical know-how required in maintenance of the natural biodiversity and ecosystems of the islands. Other protected areas include Sangay National Park, Limoncocha Reserve, and Antisana Ecological Reserve which has the Antisana volcano that is 5758 meters high. The reserve was created in 1993. The Cuxabeno Forest Reserve is another protected area, for two thirds of the year the forest is submerged in water and when it is not, it is made up of dry futbol fields (www. ecuador. com/,2007). It was established in 1979. Part of the 6000 square Kilometer rain forest makes up part of the Amazon Rain forest. There are indigenous people found in this forest whose contribution to reservation is through jungle tours and eco-tourism. Existing efforts in Galapagos to protect and preserve the area include:- i) Registration of fishermen to fishermen’s cooperatives. This has enabled the monitoring of fishermen’s activities and from this an estimate of how much fishing is going on can be got. Also, it makes it easier to track illegal fishing. ii) Establishment of the Galapagos Marine Reserve in March 1998. In this area, all fishing is banned. The area covered by the GMR was expanded TO cover 40 miles around the whole archipelago. These are also zones of protection around the islands. All these are patrolled by GNPs park rangers. The sea shepherd conservation society assists with carrying out patrols in the service. iii) Approving the designation of the Galapagos Archipelago as Particularly Sensitive Sea Area (PSSA) by the Marine Environment Protection Committee(MEPC). PSSA is defined by the International Marine Organization (IMO) as â€Å"an area that needs special protection through action by IMO because of its significance for recognized ecological socio economic or scientific reasons and because it may be vulnerable to damage by international shipping activities†. ([IMO,2001]www. dorwinfoundation. org) iv) Introduction of residence controls which decrease immigration and in turn lower the flow of alien species. The aim is to curb population growth. The controls are however difficult to implement because it is difficult to determine genuine residents and those who come and go but have permanent residence elsewhere. (www. law. emory. edu/ ) v) Education of residents, tourists and Galapagos policy makers on how beneficial sound conservation, practices, polity and sustainable economic activities are for example finding alternative viable economic activities for the local fishermen. vi) The success of Project Isabela. This project has seen a large area being freed of feral goats and pigs. Subsequently there has been an increase in Galapagos’s rails. Areas that had been previously degraded have now become resting areas for petrels and re-establishment of vegetation like tree-terns and endemic scalesia has occurred. Also native invertebrates thought to be extinct are now being identified (www. darwinfoundation. org, 2007) vii) Successful breeding programs for tortoise run by the Charles Darwin Foundation and GPNS has led to repopulation of some islands with their native reptile species. The giant tortoise was becoming extinct due to hunting by humans and other animals. (www. galapagos. org) viii) Inclusion of various sectors in the management board of the Galapagos National Park service has been instrumental in bringing about an attitude of conservation and preservation. At first the local people felt that the government was only concerned about plant and animal life. The multisectoral approach involves key players in fishing, tourism and conservation sectors and also the local person. (www. galapagos. online/) Including the local people has helped to enhance the concept of conversation because the local people no longer feel neglected. Should human intrusion go unchecked, the loss will be great. Maintenance of the rich biodiversity of the islands is achievable of the ecosystem can support sustainable economic use where the local people, conservationist and players in tourism and fishing industry feel their needs have been put into consideration. An example of how the biodiversity can lost is seen in the fact that the present tortoise population is very small. Poaching, destruction of habitats and the presence of invasive species are the main dangers to the tortoise population. (www. galapagos. org, 2007). Though the near extinction of the giant tortoise caught the attention of people and the process was reversed the giant tortoise is not out of the woods yet, and the work of repatriation needs support. In the process of poaching the tortoise, various invasive species which trampled on the tortoise’s habitat were limited and multiplied faster than the tortoise would, leading to destruction of the tortoise habit. The mangrove finch is another species being driven towards extinction. Again the greatest threat to be mangrove forests and the finches is the exploding human presence in the Galapagos. (http://www. galapagos. org/about. html). Increased activity among humans increases the risk of disease further especially avian pox, black rats, cats, fire ants the parasitic fly philornis. All threaten the mangrove finch as well as vulnerable species in Galapagos (http://www. galapagos. org/about. html. ) For the mangrove finch to be saved there has to be study of the mangrove finch and its habitat. Activities that would require support in the mangrove finch conservation project include: ? Creating potential captive breeding facilities for the mangrove finch. ? Resting degraded mangrove finch ecosystem, including establishment of new mangrove forest plots. ? Releasing the captive-bred birds to sites on Isabela and Fernandina islands where the mangrove finch once thrived. For the future generations to be able to see and be part of the abundant biodiversity in the Galapagos islands the necessary funds and a coalition of leadership are needed to successfully conserve and preserve the world heritage site. Otherwise, we risk losing not just an area rich in natural biodiversity but a site of origin of human philosophy and in the process part of the human race. Because of ecological interdependence, there can be no climate changes that will affect animals and plants only, whatever adverse effects will affect flora and fauna will also affect the human race. This means that no part of the ecosystem will be spared the price of not doing all that is necessary to protect and preserve the balance of nature. Conclusion Islands are generally smaller than continental areas but are basically more or less the same with similar social, economic and ecologic changes happening. This then means that islands can and should serve as a model to the rest of the world for these changes (www. darwinsoundation. org). In coming up with solutions to the Galapagos problems we are more or less coming up with a prototype to solve problems that will occur in other continents of the world, but if we cannot resolve the issues then it means that we will also fail in achieving a society where there is a balance of nature and social economic sustainability in the rest of the world. References Charles Darwin foundation, Galapagos Risk; Ground Breaking Analysis Produced retrieved July 6 from http://www. org/en/library/pubs/2007/galapagos Galapagos Conservancy, ‘Breaking News: Galapagos in â€Å"Danger† Retrieved July 6 from http://www. galapagos. org/about. html. ‘Protected areas’ Retrieved July 7 from http:www. ecuador. com/protected-areas UNESCO, Galapagos islands, Retrieved July 7 from http://whc. unesco. org/en/danger UNESCO World Heritage in Danger List July 7 from http://whc. unesco. org/en/danger/ .

Saturday, September 21, 2019

If I Was Given a Gift as Money Essay Example for Free

If I Was Given a Gift as Money Essay If I were given money as a gift and had a choice between buying a piece of jewelry that I like or tickets to a concert that I want to attend, I would most likely choose the concert tickets. It actually depends on what kind of concert it is but if it was about music, for example a live performance of a famous musician, I would probably choose the concert tickets. This is because the jewelry can be bought any time when you can afford it but attending a concert has a much more rare chance. Eventually I would probably choose to attend the concert I wanted. Most of all, a piece of jewelry can be pretty and you might feel good when you wear it, but music is a lifelong interest that I will continue to have throughout my life. Going to a live concert can be a wonderful experience that I will remember for a long time, but when I buy a piece of jewelry, the good feeling I get from buying it will last only a short time. The gift of going to a concert can keep on giving even after the concert is over. If I enjoy the concert, I can buy the music that I saw live on a CD and listen to it many times over or record it by video tape and relive the experience. Each time I listen to the music, I might find a new detail that I did not notice before, but a piece of jewelry will be always the same. In addition, having a jewelry will not be able to share the feeling; your friends will be jealous of you instead, where as you might be able to attend the concert with your friends. It is always nice to listen to music, but it is made even more enjoyable when it is seen live with friends. By going to a concert together we would be able to strengthen our relationship. Over all I would prefer to attend a concert using the gift of money. In conclusion, even though having a new piece of jewelry is nice, I would prefer to buy tickets for a concert if I were given money as a gift. The reasons why I would choose the concert tickets over a piece of jewelry are that going to a concert can be a wonderful and lifelong experience, and that I can improve relations with my friends by attending a concert.

Friday, September 20, 2019

Wireless Sensor Networks: Applications and Forms

Wireless Sensor Networks: Applications and Forms 1 Wireless Sensor Network In this chapter, wireless sensor network (WSN) principles are being shortly introduced and discussed. In order to increase the level of understanding for analyzing Wireless Sensor Network (WSN) systems it is useful to study the technology behind them the technologies which are presented in this section. Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations [5]. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion [5]. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, first we need to consider about WSN technology, components and communication topology and protocols. Therefore, first, in this chapter, basic information about WSN components, the communication devices and process unit of WSN will be described. Then, the chapter will be followed by a description of the WSN topologies and protocols emphasizing on mesh WSN technology with ZigBee Protocol. 1.1 Wireless Sensor Network component To provide comprehensive view of WSN hardware, understanding of WSN components structure is required. Wireless sensors are small microcontrollers equipped with wireless communication device and an energy supplier. The architecture of WSNs is illustrated in Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 . As Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 shows the components of WSNs are sensing unit, processing unit, power supplier and communication device. The sensing unit consists of sensors and Analog to Digital Converters (ADCs). ADCs are responsible for gathering the signals and converting them into digital signals data and transfer them through each other using network topology to the processor unit. In the sensing unit, each sensor is called an ‘end node and varies in size and cost. The mission of these multifunction sensor nodes are to sense, process data and collaborate with other nodes [8]. Wireless sensor network can be positioned in two ways, either using a complex technique with the large sensors far from the object or using several sensors with an engineered design on position and topology [5]. In addition, each node provided with a wireless communication transceiver as a communication component. In the process unit, the controller and small memory storage are responsible for managing the collaboration within the sensors to achieve the assigning task. In addition, the communication device with a transceiver makes the network connection. Above all, the essential component of WSN is the power unit, which supports the power for all units [5]. One of the unique characteristics of sensor networks is that they are equipped with an on-board processor. This feature enables them to locally process some simple computations and broadcast only necessary processed data [5]. Network communication is really complicated and needs years of study [8], but to be able to implement WSN, we need to know some basic primary concepts of communication technology such as; network topologies, network protocol and their standards and specifications. 1.2 Communication technology To cover technical aspects of WSN, network topology and network protocol studying is needed. This study will help to provide information about reliability, robustness, security and stability and of WSNs software aspect to answer the research questions RQ. 1 ,RQ. 2 and RQ. 3 . 1.2.1 Topologies in WSN Communication In network communication, the big issue is how data transfers through nodes and nodes interconnect with each other. Several basic network topologies may be used for transmitting to and receiving from a node. The Alliance for Telecommunications Industry Solutions (ATIS) the standards organization of telecommunication industry explained the network topology as â€Å"The physical, real, logical or virtual arrangement of the nods/elements of a network† [9]. The topology shows the diameter and the number of nodes between any two nodes. Moreover how a data process and the data routing complexities are relied on the chosen topology. Consequently, some characteristics of a sensor networks such as latency, robustness and capacity are changed by their topology [10]. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 is a graphic mapping of networks topology which shows the links of one or more nodes and explains the physical topology of the network. Despite having the same topology, two networks can differ in transmission rates because of their physical interaction, signal types and distance between nodes [9]. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 describes the different types of network topology. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 Topology TYPES [9]. Since Mesh topology is a main topic in the thesis, it is studied more in-depth in this section 1.2.1.1 Mesh Wireless Network Wireless mesh network is a term used when all wireless nodes are connected to each other within an ad-hoc multi-hob and mesh topology. In this network, any pair of nodes is able to communicate between each other within more than one path. In this network each node is used as a router to forward packets to the neighbor nodes which they have linked to. That means all nodes communicate directly or through other midway nodes without any manual configuration. Therefore, this network also called a self-configuration and self-organized network [11; 12]. As described in Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1, there are two types of mesh topology ‘Partially connected and ‘Fully connected (See Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ3). In a fully connected topology each node has the ability to communicate with all other nodes in the network and creates an interconnection links. By increasing the number of nodes in a mesh network, the number of links increases as well. On the other hand, in a partially connected topology, instead of direct interconnection between nodes, each node has two or more links to others to provide alternate routing and traffic balancing. Due to more links and indirect connections between nodes, traffic can flow through one or more router nodes to the destination [7] and create more reliable interconnections between nodes. Moreover, in partial network, the nodes are connected to either the node with higher rate of data transaction or the nearest neighbor node while in fully connected network all nodes have a direct links with each other. This multiple link path conducts a reliable communication. Therefore, whenever a connection fails or a node breaks down, the packages can automatically change their path by ‘jumping from a disconnected node. This is often called the self-healing of the network. This means that the networks connection stability and reliability are not essentially affected by node failures [11]. Due to the characteristics of wireless sensor network mesh, this network is self-configuring and self-organizing network in which each end-node is also used as a router (dual role- data originator /data router) to forward the signal packages all the way back of the main gateway. Therefore, due to the characteristics of mesh networks, this network is becoming one of the most implemented networks which able to have the flexible architecture for the network, easy self-configuration and robust fault tolerance connectivity [11; 12]. Additionally, the self-configuring characteristic of mesh WSN, bring the ability for the network to connect or disconnect nodes from the network. This brings the ability to grow/decrease the network by adding/removing nodes of a system. Mesh WSN has reliable self-healing and robust fault tolerance. This means if ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­ a node fails or breaks down the signal packages jump from the disconnected node and automatically conducts a new path through the nearest node. However, the new path imposes re-routing and re-organizing to the network [5], which consumes too much power from the system. Therefore, having a power-aware protocol and algorithm is necessary for mesh network. ZigBee protocol is one of the protocols which provides this ability for WSN. 1.2.2 Protocols in WSN Communication WSN systems include variety of protocols for communication. Protocols need to program in different architectural layers. One of these architectural standard is OSI (Open System Interconnection) framework. In this session a brief introduction of each protocol and OSI are delineated. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ4 shows the graphic overview of all wireless network technologies. This figure illustrated IEEE PAN/LAN/MAN technologies and clearly shows how these standards and protocols can be used in different conditions. For instance, 3G protocol is used to cover a long range of audio information in a wide area network (WAN) while for the same information in a short range and personal area network (PAN), Bluetooth is better. The standard conceptual rules set for data representation, data communication and error detection across two ends in telecommunication, are called communication protocols. These abstract rules represent in different layers of communication. There are different protocol stacks introducing different architectures for these layers such as AppleTalk, Distributed Systems Architecture (DSA), Internet protocol suite (TCP/IP) and Open Systems Interconnect (ISO/OSI). Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 (a) illustrates the different layers of an OSI Model and their functionalities. The OSI model has seven layers and each layer provides services for the upper layer and requests services from the lower layer. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 (b) shows the typical communication protocols layers. Each of these layers has to deal with different issues regarding the communication procedure. As the typical protocol stack model shows in Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 the communication protocols should implement all layers from bottom to top. In addition, a management protocol needs to be applied in each layer to manage power efficiency, robust connectivity and connection reliability (see: Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 b). Below, rules and functionality for each layer are described: * Physical layer: is responsible for signal processing and physical interface connectivity between a device and physical medium and used bit stream in its data unit. It acted as communication channel for sensing and actuation in cost-efficient and reliable manner. Some examples of this layer are: IEEE 802.11b/g Wi-Fi, IEEE 802.15.1 Bluetooth, IEEE 802.15.4 ZigBee, etc. [7] * Data link layer: provides functionality toward channel sharing, Medium Access Control (MAC-Layer), timing (e.g. data time arrival), local link and capacity. It is responsible for detecting and correcting the data errors in physical layer and control the locality data comparison. It follows the protocols such as point-to-point protocol (PPP) and IEEE 802 Local Link Control (LLC). [7] * Network layer: is responsible for network routing functionality, network security, energy and power efficiency and reliability of the communication. It includes the network topology management and manages the information and detects errors in data transfer from router to router. A number of protocols is address in this layer such as: Internet protocol (IP), Threshold Sensitive Energy Efficient Sensor Network Protocol and etc. [7]. * Transport layer: provides end-to-end transportation (distributing and gathering) of data between end users. It includes storage and responds for caching and controlling the data to recover them back to the initial message that has been sent. Best-known protocols for this layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) [7]. * Upper layers: The Upper Layers are responsible for application processing, external query processing and etc. Upper layers include presentation layer session layer and application layer [7]. The summary of these standards and protocols are shown in Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ6 Among all the standard and protocols, IEEE PAN/LAN/MAN technologies are the ones applied in the majority of commercialWSNs to support physical layer and link-data layer signal transmission. As SOHRABY and ZNATI (2007) mentioned, the most common best-known protocols are:† (1) the IEEE 802.15.1 (also known as Bluetooth); (2) the IEEE 802.11a/b/g/n series of wireless LANs; (3) the IEEE 802.15.4 (ZigBee); (4) the MAN-scope IEEE 802.16 (also known as WiMax); and (5) radio-frequency identification (RFID) tagging† [7]. Each of these protocols has their own benefits and constraints. The comparisons between IEEE technologies are mentioned in Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2. As Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 shows the IEEE 802.15.4 standard provides data rate of 20 to 250 kbps and operates in the 2.4-GHz ISM band. This standard covers signals in range of 10 m and requires the lowest power among other IEEE class. While IEEE 802.11a/b/g/n transmits the data in the rate of 54 Mbps ideal for wi reless internet connections and operates in the 2.4-GHz ISM (Industrial, Scientific and Medical) radio band as well as the 5-GHz ISM / 5-GHz U-NII (Unlicensed National Information Infrastructure) radio band. However, it requires much higher power consumption than IEEE 802.15 [7]. Recently, researchers put much effort to develop â€Å"a cost-effective standards-based wireless networking solution that supports low-to medium data rates, has low power consumption, and guarantees security and reliability† [7]. ZigBee Alliance is an association of companies which aims to provide such a standard for WSN consumers. Their mission is to have a simple, reliable, low-cost, low-power and standards-based wireless platform 1.2.2.1 ZigBee standard The ZigBee standard builds on IEEE 802.15.4 and is suitable for remote monitoring and controlling applications. Although it has lower-data-rates than the other standards, its reliability, security, long life battery with less complexity mechanism make it ideal for building automation in industrial network applications. The architecture of the ZigBee stack is established on the Open System Interconnection (OSI) model. The IEEE 802.15.4 defines the physical layer (PHY) and medium access control (MAC) sub-layer and In addition, ZigBee Alliance defines other functionalities for upper layers [7]. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ7 is a graphic overview of ZigBee protocol stack and shows the responsibility areas of IEEE 802.15.4, ZigBee Alliance platform and users applications [7]. This picture also shows the basic functionality of each layer. The data transmission service is provided by PHY layer and the protocol in this layer enables the connection between data units and the physical radio channel. ZigBee provides three different frequency band options for PHY layer. First, the transmission data-rate of 250kbps in 16 channels at 2.45GHz (Global) frequency. Second, with 40Kbps in 10 channels at 915MHz (Americas). And the last one, with 20kbps in 1 channel at 868MHz (Europe). The higher data-rate causes a higher order in modulation design and the lower frequency cause a larger cover area and better sensitivity. Depending on the power output, the transmission distance rate can change from 1 to 100 meters. (For more detail information see: Table 7à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 in Appendix A) ZigBee WSN has the ability to have static or dynamic network/component with either star or mesh topology and it has three types of nodes: a ZigBee Coordinator (ZC), ZigBee Routers (ZR), and ZigBee End-Devices (ZED). In order to have a communication protocol and physical connection both PHY layer and MAC sub-layers of the architecture should be defined upon agreement between server and clients. These layers require manual administrative procedures setting for server/client gateway. The next three levels namely: the network layer, security protocol and transport layer are defined by ZigBee alliance platform automatically. The last layer, application layer, has to interact with the user-interface and other applications; it ought to be programmed with high-level language so that integration with any existing devices applications becomes more conveniently practical. The ZigBee stack in gateway is responsible for all the network functionality such as network process management, authentication of the joined nodes, binding nodes and routing the messages throughout the network. ZigBee stack as a standard protocol, has clusters and libraries for improving the implementation process, therefore, using ZigBee compare to other protocols makes the system (including both hardware and software) development process much faster and easier. On the other hand, such standardisation provides easiness of adopt with third party sensors regardless of manufacturer, which might be attached to the network later. 2 Software Aspects To address the research question regarding the reliability, robustness, and security of any WSN application, it is essential to investigate the software architecture of that network. For convenience in description of the architecture of a WSN application, it is divided into three segments: Physical devices (such as lamps, sensors, nodes), Communication Protocol (terminals and servers, bridge, switch, network topology and standard) and Carried Information (application, functions, etc.). Any attempts to retain a precise design on software architecture for each part will cause an effective data transmission, which ensures reliability and security of the system [7]. Hence achieving any desired data transmission precision level in a WSN, network management (NM) techniques are applicable. Such techniques assist in network status monitoring, reliability and security amendment, and cooperation supervision between components [7]. NM techniques could also detect and resolve network faults in addition to restoring the system respectively [7]. In practice, designing WSN application necessitates tailoring NM techniques for each architectural segment. Various NM techniques regarding each segment are summarized as follows [7; 12; 5]: a) Physical architecture: Sensing and processing management, operation and administration, fault tolerance, maintenance, energy efficiency management, configuration management, performance management, security management, network element management. b) Communication architecture: Network management, networking protocols, network topology, function management, monitoring functions, fault management, performance management, security management, service management and communication, maintenance management, network configuration and organization, network behavior, data delivery model, sensor mobility, naming and localization, sensing coverage area, communication coverage area energy efficiency management c) Information architecture: Real-time information management, mapping management, service management, analyze information, control application, business application management report management, sending and receiving commands or response, naming, localization, maintenance, fault tolerance Aforementioned NM techniques enhance quality of the system. According to ISO 9126-1 software quality model Table 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 [13; 14; 15], the quality characteristics of a system could be divided into six fundamental properties: functionality, reliability, usability, efficiency, maintainability, and portability. According to the same documentation, these characteristics are broken to sub-characteristics such as suitability, security, maturity, fault tolerance, adaptability, analyzability, stability, testability and so on [13]. However, focusing on all subcategories collectively exceeds the time horizon of this research, from this stance three dimensions namely reliability, robustness and security are brought into attention. This section will be divided to two subsections describing the architecture issues and NM techniques for (1) Reliability and Robustness, (2) Security, of WSN and other characteristics is relegated to future studies. 2.1 Reliability and Robustness In WSNs context, the probability that a network functions properly and aggregates trustworthy data without any interruption continuously, is usually referred to as reliability characteristic of the network [23; 20]. According to ISO 9126-1 software quality documentation, reliability characteristic shows the capability of a network to maintain or re-built (re-start) the service in certain period of time [13]. So, it is important that during long sensing, the network has to service up continuously. Reliable service of a network includes precise and proper sensing, delivering and sending acceptable data to the base station. In other words as Taherkordi et al. (2006) put: â€Å"The less loss of interested data, leads us to higher reliability of a system†. Systematic approach perceives reliability as probability of data delivery to the base station rather than point-to-point reliability [16]. Robustness defined by Sohraby et al. (2007) as: â€Å"a combination of reliability, availability, and dependability requirements†, reflects the degree of the protocol insensitivity to errors and misinformation†. Achieving system robustness in WSN, necessitates system capability to detect, tolerate and confine errors as well as reconfigure and restart the network respectively [7]. According to the given definition by Sohraby et al. (2007), it is apprehensible that reliability and robustness share commonalities with each other; this is the main rational behind discussing these two attributes together in this section [7]. Considering the nature of communication in WSN, a network is unpredictable and prone to fail caused by any physical damages in hardware devices, energy depletion, communication link error, information collapses in packages and etc. [17; 16]. Therefore, one of the critical issues in design phase of WSN is applying fault tolerance techniques to optimize the network so that reliability and robustness attained [17]. These techniques enable the network to withstand and recover any upcoming failure and restart operation [13]. Liu et al. (2009) categorized fault tolerance techniques into: node placement, topology control, target and event detection, data gathering and aggregation, and sensor surveillance. Reminding from the beginning of this chapter architecture design divided into three segments. Table 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 depicted a summary of the plausible related faults and their solutions in each segment. In the following, each aforementioned fault tolerance techniques are being discussed in each design segment. Table 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 The most probable fault and their fault tolerance solutions in WSN [17; 7; 18] 2.1.1 Reliability and Robustness of Physical Architecture: Fault: any physical interruption in sensor surveillance Solution: Node placement management and signal-effect management First item that should be considered in designing physical components architecture for reliability and Robustness is: physical placement and signal-effect management. As it is mentioned in section 3, although the mesh network communication is self-organize topology and does not need any manual configuration to bind the network for mobile sensors, the physical architecture and the location schema of the hardware components, sensors and gateways need to be designed carefully [7]. As a characteristic of mesh WSN, the sensors in network are free of any installation restrictions, even though, the placement should be far from any physical destruction or hostile locations. Inappropriate physical placement of sensor transmitters and gateway antenna can cause noise or significant lost in signals [7]. In addition, the signal coverage is decayed by surrounding objects and materials such as metal wall and the like. (E.g. exterior wooden, concrete, brick or gypsum frame, block or wall). Especially in the case of vehicles, the main body can impose such problem and henceforth installation of the sensors in this manner would be delicate. Moreover, the signal waves might be faded and affected during the transmission, due to various physical phenomena such as reflection, diffraction or scattering [7]. These effects would cause significant interruption in sensor surveillance. Therefore, it is important to manage these signal-effects in early stage of WSN physical architecture design. Reflection occurs when electromagnetic wave of signals is duplicated due to impinge of the wave on large object or surface such as walls, buildings and the Earth [7]. Therefore, all the reflection of the walls and also the Earth should be acknowledged in physical architecture design. Diffraction refers to any defection and obstruction in waves caused by irregular sharp edges during the data transmission between the transmitter and receiver [7]. In this case, designers have to be prudent in sensors placements in the proximity of sharp edges and corner angels. Scattering refers to any deviation from straight line. Environmental obstacles in the propagation path affect passing waves from their original structure. Even small irregular object such as street signs, and lampposts might encounter and scatter the wave. Hence WSN should be design to face with any irregular scattering during the wave transmission. Above all, the mobility of sensors and surrounding objects might fade the signals and add noises that should be considered in architecture design [7]. These issues are the basic physical factors, which cause major fault in data aggregation of WSN and cut down reliability and robustness. These destructive signals need to be subtracted from the received signal paths [7] before sending the data to gateway. Therefore, reflection, diffraction and scattering should be considered not only by designers in the physical components placements, but also by programmers in network development. Fault: Sensors failure Solution: Hardware replacement The next issue that needs to be considered in designing the physical architecture of a WSN is hardware failure. Sensors energy suppliers or any damages to the sensors and/or their transmitters are the sources of hardware failure. Regardless of source of failure, the WSN must be capable of functioning as well as replacing and switching sensors when necessary. Additionally, any changes in the physical components, on one hand, needs an explicit and well-defied consideration on security issue to prevent any potential threats, and on the other hand, needs an adaptable and configurable communication connection network [18]. 2.1.2 Reliability and Robustness of Communication Architecture Fault: communication link errors Solution:Topology control and event detection , Replicated services in communication model, Communication link error is an important concern in dealing with reliability and robustness of a network in communication architecture. The sensors in WSN are prone to fail and make link errors in point-to-point reliability of communication protocol. Therefore, it is the network topology responsibility to detect the errors and guarantee the overall reliability of the syste

Thursday, September 19, 2019

A Streetcar Named Desire Essay -- A Streetcar Named Desire Essays

Though the â€Å"primitive,† rituals described in Schechner’s article diverge from the realism found in Tennessee Williams’ A Streetcar Named Desire, the same â€Å"reactualization† process exists in his work. Williams’ Streetcar focuses on the â€Å"mock battle† or complete contest between the generational cultures symbolized by Blanche Dubois and Stanley Kowalski’s characters. Blanche, representative of the fallen southern aristocracy, searches for sensitivity and kindness in the new world of Stanley Kowalski, the modern labor class. In Blanche’s search for safety, the semiotic theatrical qualities of the play become a ritualistic â€Å"clash of the titans† as both Blanche and Stanley fight for domination and control over the future generations realized in Stella’s womb. Yet the tragic dethronement of previous generations - represented by Blanche’s exile from the community and her subsequent departure for the asylum – leaves the audience without an Aristotlean catharsis. Rather, the classically regenerative â€Å"sacrifice of the hero†¦is gone; what we have instead is a resignation to general guilt,† (Vlasopolos, 323), as Williams’ titanic â€Å"unmasking† dies away rather than resolving the conflict. With such little hope offered in Williams’ dà ©nouement audience members frequently question Streetcars’ resolution, finding no reactualizing forces in the death characters’ masks. However, the answer to this question lies in the mythological characterizations Williams creates in the battle between Stanley and Blanche. By examining the basic semiotic properties Williams foregrounds in both Blanche and Stanley’s titanic characters the audience may understand the moral force actualized in A Streetcar Named Desires as mythic ritual. Tennesse Williams’ ... ...colors of men† have already been established in earlier instances in the play. When Stanley first meets Blanche, he is returning from the bowling alley. Though the stage directions do not explicitly state whether or not Stanley wears his bowling shirt in this scene, the bowling alley evokes the images of Stanley’s bowling shirt, â€Å"his green and scarlet bowling shirt,† (717). In this case, Stanley’s appearance not only demonstrates his generations definition of masculinity, as an â€Å"aggressive, indulgent, powerful, and proud expression of sex,† (Falk, 95), but also as a bright splotch of color in the otherwise â€Å"physical grubbiness,† (Brown, 41) of his home. Thus, Stanley’s character, through both his physical gestus and colorful costumes, becomes symbolic of his generations masculine dominance, overwhelming and controlling the environment in which Blanche arrives.

Wednesday, September 18, 2019

Acid Rain Essay -- Geology

ACID RAIN - DEFINITION Scientists have discovered that air pollution from the burning of fossil fuels is the major cause of acid rain. The main chemicals in air pollution that create acid rain are sulfur dioxide (SO2) and nitrogen oxides (NOx). Acid rain usually forms high in the clouds where sulfur dioxide and nitrogen oxides react with water, oxygen, and oxidants. This mixture forms a mild solution of sulfuric acid and nitric acid. Sunlight increases the rate of most of these reactions. Rainwater, snow, fog, and other forms of precipitation containing those mild solutions of sulfuric and nitric acids fall to earth as acid rain. Acidity is measured using a pH scale, with the number 7 being neutral. Consequently, a substance with a pH value of less than 7 is acidic, while one of a value greater than 7 is basic. Generally, the pH of 5.6 has been used as the baseline in identifying acid rain, although there has been much debate over the acceptance of this value. Interestingly enough, a pH of 5.6 is the pH value of carbon dioxide in equilibrium with distilled water. That means, acid ran is defined as any rainfall that has an acidity level beyond what is expected in non-polluted rainfall. Any precipitation that has a pH value of less than 5.6 is considered to be acid precipitation. The three main sources of acid deposition are: 1. Coal in electricity 2. Base metal smelting 3. Fuel combustion in vehicles This is a small diagram that shows where some of the pollution comes from and where it goes to when it turns into acid rain. .. ...e EcoLogo. They minimize the use of environmentally hazardous substances and maximize energy efficiency and the use of recycled materials. Buy locally produced or grown items from local stores and businesses. They don’t require the transportation energy of imported products. Transportation Walk, ride your bike or take a bus to work. Share a ride with a friend or co-worker. Have your engine tuned at least once every six months. Check your car tire pressure regularly. Use alternative fuels, such as ethanol, propane or natural gas. Avoid unnecessary idling. In the winter, warm your car’s engine with a block heater for two to three hours prior to driving, rather than plugging in the battery overnight. Reduce the number of trips you make in your car. Drive at moderate speeds. Take the train or bus on long trips. Go CFC-Free.

Tuesday, September 17, 2019

Percy Bysshe Shelley’s “Mont Blanc” Essay

The Prelude is an auto-biographical, epic poem by William Wordsworth, ‘Mont Blanc’ by Percy Bysshe Shelley is a much shorter poem, however it correlates closely to a passage from Wordsworth’s epic where he describes a walking trip he took to Mont Blanc. There are some startling similarities between the two pieces, but at the same time there are sharp contrasts in the way that the scene is represented and the poets have conflicting views on what this beautiful landscape means to them. A key theme in romantic poetry is a connection with the natural world, if we look at the ways that Shelley and Wordsworth represent nature in their work then some interesting contrasts can be seen. The Prelude, subtitled ‘Growth of a Poet’s Mind’, is a narrative poem, showing us the events in Wordsworth’s life that have shaped his way of thinking and his views on nature and existence. The poem was written in blank verse, this form was reserved for epics and grand poems. Right away this unrhymed form, and the iambic pentameter which it follows, lend the poem a grand and sweeping feel, creating a sense of importance and gravitas. This passage is split into three sections; a broad description of the mountain and the vale below it, a strictly narrative passage where Wordsworth tells of how he and his friend were lost upon the mountain and crossed the Alps without realising, and finally a lyric interruption or ‘hymn’ (Romantic Writings p123 ) to ‘Imagination’ (The Prelude, Book Sixth l525). First the speaker describes the setting, the natural world around him and how it effects his emotions, then he returns to the narrative, telling us of the event that has caused him to relay us this tale and finally he conveys to us the moral implications of the event and how it has shaped his ‘poets mind’. In the first section the landscape is described as ‘wondrous’ (TP l456) the glacier as ‘a motionless display of mighty waves’ (l459) but the speaker is ‘grieved’ (l453) by what he sees, the ‘souless image’ (l454) of the mountain is not as beautiful or as wondrous as the ‘living thought'(l455) in the minds eye. The imagery used to personify the mountain and its natural beauty is epic and grand. Winter is like a ‘tamed lion’ (l466), ferocious,  dangerous, but sedate and controlled, creeping down the mountain with a stately pace. The pace of the poem quickens as the stretch of narrative begins’Descending by the beaten road that ledRight to a rivulet’s edge, and there broke off.’ (l503-4)The shorter words, repetition of plosive and hard sounds, internal partial rhymes (‘led’ ‘edge’) and the lack of imagery increase the tempo of this section. The tripping and jumpy sound of the lines, contrasts quite sharply with the earlier flowing sentences and sweeping descriptive passages. The metre helps to create the feeling of ascending the mountain, it also lends the setting a sense of desolation and emptiness; there are rocks and streams and tracks but little else. This creates a sharp comparison with the beauty of the valley below. Finally this change in style also helps to create a build-up of anticipation before the anti-climax of realising that they have ‘cross’d the Alps’ (l524) unknowingly. As they are told that all their remaining ‘course was downwards, with the current of the stream’ (l519) the young men’s spirits flow downwards with it, as nature mirrors the emotions of the individuals viewing it. ‘Imagination!'(l525)†¦ ‘ I recognise thy glory’ (l532). Underwhelmed by what the real world has to offer, the narrator can look back and see that imagination can usurp such disappointments. The ‘invisible world, doth Greatness make abode’ (l536), imagination can keep an individual in ‘hope that can never die’ (l540), and these lines seem to be saying that this transcends nature, that the human mind can imagine nature in all its perfection which can overcome the disappointments of the real world, and ‘Greatness’ capitalised along with ‘thy glory’ and the hymn-like nature of this passage suggest imagination gifted by a higher power. This point is where Shelley and Wordsworth’s treatments of Mont Blanc differ greatly. ‘Mont Blanc’ by Shelley is also written in Iambic Pentameter, lending it the same grand and solemn air as The Prelude. There is some rhyme throughout the poem although it is irregular, this helps to draw attention to certain lines, and phrases. Lines 25 – 28 form a rhyming couplet. Previous to this, the poem has spoken of ‘an old and solemn harmony’ (‘Mont Blanc’ l24), this  couplet is that ‘harmony’. The rhyme and prosaic language lends this passage a lilting quality, emphasising the beauty and majesty of the nature it describes, ‘earthly rainbows’ (l25) and ‘aethereal waterfall’ (l26). When the rhyme breaks on the next line a pause is created, changing the atmosphere. ‘Wraps all in its own deep eternity’ (l29). Shelley has created a dichotomy to describe nature, the savage, awful power against the serene, calm and solitude. Shelley said that the poem â€Å"rests its claim to approbation on an attempt to imitate the untamable wildness and inaccessible solemnity† (Oxford World’s Classics edition (2003), the Preface to History of a Six Weeks’ Tour by Mary and P. B. Shelley). The speaker finds the landscape beautiful, like Wordsworth, but also sees a much darker savagery in the mountain. Regal metaphors are littered throughout the poem the spring of the river is ‘a secret throne’ (l17), the mountains around Mont Blanc are its ‘subjects’ (l62) and the river is ‘majestic’ (l123). The imagery used here emphasises the power of the mountain and its splendour. In the third stanza where the speaker ponders on the creation of the mountain an unusual rhyming scheme is used. From lines 72 to 83 the scheme is ABCCADBDEFFE. While there is no distinct pattern the rhymes seem to gradually slot together, creating a feeling of increasing momentum, this places great emphasis on the final quatrain which directly addresses the mountain itself ‘Thou hast a voice, great Mountain'(l80). This random and unordered rhyme mirrors the unpredictability of the natural forces it describes, emphasising Shelley’s point that the ‘wilderness’ (l76) has no pre determined pattern or plan, asking the reader, like the mountain, to refute the ‘large codes of fraud’ (l81) that credit a greater design with its creation. The beginning of the fourth stanza from lines 84 to 95 are concerned not with Mont Blanc itself but the cyclic nature of life and death. This whole section is one long sentence, filled with lists ‘the fields, the lakes, the forests and the streams’ (l84), uses of the words ‘and’ ‘that, and an ever increasing intensity caused by the language. We move from ‘forests’ to ‘rain’ then ‘fiery flood and hurricane’ (l87). Strings of alliteration keep increasing the pace of this passage ‘future leaf and flower’ (l90), ‘that  detested trance’ (l91), ‘works and ways’ (l92) as finally it builds to a crescendo ‘Are born and die;’ (l95). Now the punctuation forces a pause and the following hard sounds and spondees of ‘revolve, subside’ put huge emphasis on this line as an ending point. Like the cycles of life and nature that this passage describes the momentum ke eps building with great fury and passion until eventually it stops and subsides. Similar imagery can be found to relate the two poems, both, for example, mention eagles in a setting of isolation, ‘A desert peopled by the storms alone, save when the eagle†¦Ã¢â‚¬â„¢ (MBl67-8), ‘The eagle soareth in the element’ (TPl463), this shows that both poets have taken things from the natural world to create a certain atmosphere. Shelley and Wordsworth have used a variety of metaphoric imagery to relay the aesthetic wonder of the mountain, interestingly both have used other images from nature to define it, ‘Winter like a tamed lion’ (TPl466), ‘brood of pines around thee clinging, children of elder time’ (MBl20-1), ‘glaciers creep like snakes that watch their prey’ (MBl100-1). While both seem to keep the scene completely natural, there is a much darker edge to the descriptions in ‘Mont Blanc’. The writing in The Prelude, while in the same form as ‘Mont Blanc’ is more stately and controlled; Shelley has tried to infuse his verse with more passion, to reflect his feelings on the wildness of the natural world. The tempo in ‘Mont Blanc’ seems to ebb and flow with the subjects that are touched upon, whereas in The Prelude, except for the narrative passage of the mountain climb, the progress is constant and measured. Nature is clearly awe-inspiring to the narrators in both poems but the way they feel about nature’s relationship with human thought seems to be intrinsically different. Two sections that stand out when comparing the poems are the ones which describe the infinite scope of the mountain when compared to the human mind. ‘Some say that gleams of a remoter world visit the soul in sleep’ (MBl48-9)’when the light of sense goes out in flashes that have shewn to us the invisible world’ (TPl535-6)Shelley believes that a remoter world is the  realm of imagination, that only those who are ‘wise, and great’ (MBl82) can reach while in a state of ‘trance sublime’ (MBl34). That nature has the power to help you understand the perceiving mind, you realise that the process of thought, like the water cycle of the mountain, or the circle of life, though invisible, is very real, and that this understanding can help us realise that any other ‘power dwells apart’, ‘inaccessible’ (MBl96-7). Wordsworth gleans quite a different feeling from his experiences in the mountain. Imagination can transcend nature; the natural world can never match the ‘infinitude’ (TPl539) of the human mind. Bibliography Asbee, Sue (2001) Approaching Poetry, The Open University’Mont Blanc’, P B Shelley (referred to as MB)The Prelude, W Wordsworth (referred to as TP)Bygrave, S (1996) Romantic Writings, RoutledgeOwens , W, R and Johnson, H (1998) Romantic Writings: An Anthology, The Open UniversityShelley, P, B and Mary (1817) History of a Six Weeks’ Tour, Oxford World’s Classics 2003 edition

Monday, September 16, 2019

Problem of Evil Essay

The traditional problem of evil emerges when people believe in and argue for the existence of a God who is both omnipotent and wholly good. According to Mackie’s study (1955), few of the solutions to the problem of evil could stand up to criticism. Today, someone suggests an alternative: God is not perfectly good, but maximally cool. By cool he means to be free from tension or violence. Since God is maximally cool, he is not so much concerned about either eliminating evil or maximizing goodness than promoting coolness. This God appears to be logically valid, but this essay will show that the existence of such God is impossible. First, we should ask this: if God aims to promote coolness, why would he bother to create evil? It is clear that evil is not cool, given that evil creates tension and violence. It may be replied that God is maximally cool and therefore creates anything based on his will and is not concerned with what happens to his creation afterwards. This reply is arguing that God created some cool thing which later then turned into the uncool evil. Then, the fact that uncool evil exists implies that God cannot make this uncool evil to be cool again, which contradicts with the premise that God is omnipotent. Secondly, good is also uncool. According to most theists, good is defined to be opposite to evil and thus always fights to expel evil (Mackie, 1955), so that good is in constant tension and possible violence with evil. Though the God in argument is claimed to be not perfectly good, this God is still good to a certain degree. Then he will still fights against evil and therefore is not always cool. This leads us to conclude that this God cannot be maximum cool. This guy in defense of the existence of a maximally cool God might argue that uncool is necessary as a counterpart to cool. It seems natural and necessary to consider why there should be uncool things if God is maximum cool. He might argue that if there were no uncool, there could be no cool either, in that if there were no violence or tension to be created and involved in, there could be no violence or tension to be free from. It might be that out of randomness, God created evil that generates tension and good that engages in tension against evil. To detach from involvement in tension or to destroy tension might create another tension and may incur violence. If God were to eliminate uncool things that he created, he would enter a tension between cool and uncool. Then, it would be uncool to make uncool things cool. Because God is maximally cool, he will not enter such tension and therefore he leaves good and evil as uncool as they are. By claiming that cool cannot exist without uncool, this guy shows that God cannot create cool without simultaneously creating uncool. This sets a limit to what God can do, which involves two possibilities: either God is not omnipotent or that omnipotence has some limits. If it is the first case, then we can deny the existence of a God who is omnipotent and maximally cool. If it is the second case, one may argue that these limits are logically impossibility. However, according to Mackie (1955), some theists hold the view that God can do what is logically impossible, while many theists maintain that God created logic. This leads us to the paradox of omnipotence, where we consider whether an omnipotent being can bind himself. According to Mackie, although we can avoid the paradox of omnipotence by putting God outside time, we cannot prove that an omnipotent God binds himself by logical laws. Therefore, it is a fallacious approach to prove the existence of a maximally cool and omnipotent by claiming that cool and uncool are counterparts to each other. To summarize, if a God is omniscience, then he must know the existence of uncool. If he is omnipotent and maximum cool, he will promote coolness to the maximum. However, we observe that there are uncool things which are against God’s will to promote coolness and which God cannot make them cool. Therefore, a God that is omniscience, omnipotent and maximally cool cannot exist. Works Cited J. L. Mackie, â€Å"Evil and Omnipotence,† Mind, New Series, Vol. 64, No. 254. (Apr. , 1955), pp. 200-212. In Pascal’s Wager, Pascal concludes that rationality requires people to wager for god. He bases his argument on mainly three premises. The first premise is his construct of the decision matrix of rewards. The second premise suggests that we are required by rationality to assign positive and not infinitesimal probability to God existing. The third premise states that we are required by rationality to perform the act of possible maximum expected utility. This essay will argue that Pascal’s Wager does not demonstrate solid prudential reasons for us to believe in God, by showing the third premise is not necessarily true. We consider that it is not in all cases that we are required by rationality to maximize expected utility. In Pascal’s Wager, we pay ‘one life’ to wager for God and obtain infinite expected utility. Paying finite amount to play a game with infinite expectation appear to be at our interests and can therefore serve as a prudential reason for us to wager for God. However, in certain cases, this action could be regarded as absurd and alternatively, and to the contrary, taking intuitively sub-optimal actions would actually maximize the expected utility. For example, the St. Petersburg paradox could be representative of this kind of situations. In the St. Petersburg game (Martin, 2011), we keep flipping a coin until we get a coin. The total number of flips, n, yields the prize which equals $2n. There are infinite sum of flips possible, so we have infinite number of possible consequences. The expected payoff of each consequence is $1 and therefore the ‘expected value’ of the game, which equals the sum of the expected payoffs of all the consequences, will be an infinite number of dollars. Then, intuitively we will be willing to play the game as long as we only need to pay a finite number of dollars, given that the ‘expected value’ of the game is infinite. However, Hacking (1980) suggested that â€Å"few of us would pay even $25 to enter such a game. † If we were to pay $25 for the game, half of the time we receive $2 and one quarter of the time the game pays $4, so the probability to break-even is less than one in twenty five. Still, because of the very small possibility of the number of flips to be greater than $25, the expected payoff of the game is larger than the $25 payment. According to standard Bayesian decision theory (Martin, 2011), we should play this game. Then again, because of the very small possibility of getting high enough payment, it is very likely that we will need to flip a coin longer than our physical possibility. In that sense, it will be absurd to pay this finite amount and flip longer than physical constraints for the infinite expected payoff. Therefore, it is not always true that rationality will require us to perform the act that yields maximal expected utility. In the St. Petersburg game we experiment infinitely many trials which yield infinite expectation. In Pascal’s wager, we have a single-trial which also yields infinite expectation. It seems natural for Pascal to assume that expectation is a good guide to solve this decision problem. However, according to Hajek (2012), we need to take variance into consideration to make better decision, because in this one-time shot, a large variance could lead us to an outcome which is much worse than the expectation. When the variance is small, it is probable to get an outcome close to the expectation. However, the further the distribution of outcomes spreads out, the more likely it is to get a bad outcome, and the less compelling the third premise seems to be. Assuming that the expectation of wagering for God is infinite, we can calculate the variance of the outcomes of the wager. Given the infinitely good of the good outcome and the status quo of the bad outcome, the variance is infinite. In the case of an infinite variance, due to our risk-aversion, we might be better off choosing to minimize variance than maximizing our expected utility. Indeed, if f2 is made as low as possible, the variance of wagering for God would be much greater than wagering against God. If the probability of the probability of receiving infinite good, is made as low as possible, the resulted variance might make we deviate much further away from the expected utility in an undesirable direction. Both cases above could happen, and if they do, we would feel less compelled by our rationality to maximize our expected utility because the large variance could lead us to a situation that is much worse than expectation. To summarize, Pascal’s premise three is not necessarily true. This premise says that we are required by nationality to maximize expected utility where there is one available. However, the St. Petersburg paradox suggests that rationality does not always require us to maximize our expected utility. Furthermore, in consideration of large variance, expectation might not be a good measure of choiceworthiness (Hajek, 2012). Without the validity of premise three, we cannot draw the conclusion that rationality requires us to wager for God. Therefore, Pascal’s wager does not solidly demonstrate that we have prudential reasons to believe in God. Works Cited Hajek, Alan, â€Å"Pascal’s Wager†, The Stanford Encyclopedia of Philosophy (Winter 2012 Edition), Edward N. Zalta (ed. ), URL = http://plato. stanford. edu/archives/win2012/entries/pascal-wager/ Martin, Robert, â€Å"The St. Petersburg Paradox†, The Stanford Encyclopedia of Philosophy (Winter 2011 Edition), Edward N. Zalta (ed.), URL = . Hacking, Ian, 1980, â€Å"Strange Expectations†, Philosophy of Science 47: 562-567. According to Pollock (1986), you might be a brain floating in a vat filled with nutrient fluid. You do not realize that you are a brain in a vat because this brain is wired to a computer program that produces stimulation in brain to cause experiences that are qualitatively indistinguishable from normal experiences of being a human being. The problem lies exactly in that whether you are a brain in a vat or not, everything seems to be the same to you. Many philosophers have attempted to prove that you are not a brain in a vat and their approaches seem to be valid. Among those, Moore’s argument and Putnam’s argument are two influential but different approaches. This essay tries to show that you cannot use either of these arguments to prove that you are not a brain in a vat. While going through Moore’s argument seems to be an easy way to show that you are not a BIV (brain in a vat), it is not difficult to show how this approach is flawed either. By Moore’s argument, first you open your eyes and form perceptual knowledge that you have hands. Then you deduce that you are not a BIV which does not have hands and thereby you come to know that conclusion. However, it should be argued in the first place that your senses are not reliable. As Descartes argued in Meditations (1986), while you might form the perception that you are wearing a dress in the dream, you are actually undressed in your bed. The flaw in the logic of this approach can be demonstrated in the following analogous story. You see an empty glass on a table. The glass looks orange and in fact it is. You form perceptual knowledge that the glass is orange. You deduce that it is not colorless and filled with orange juice. You thereby come to know that the glass does not appear orange to you because it is colorless with orange juice filled in it. By assuming that there is orange juice in the glass, you establish that the glass does not appear orange to you because it is colorless with orange juice filled in it. Here the problem is that there is no orange juice and you are trying to prove there is orange juicy by assuming its existence. For the same token, if you are a BIV, then the hands that you perceive are hands* produced by one feature of the computer program. The premise asserting that you form a perception of hands is assuming that you are not a BIV and therefore can form a perceptual knowledge of hands. This is begging the question because we want to prove that we are not BIV. Therefore, you cannot prove that you are not a BIV by going through Moore’s argument. Another famous discussion is Putnam’s semantic arguments. One problem of this approach is the narrow scope of the arguments. Putnam started his arguments by drawing analogy between the mental image of a Martian and that of a BIV. Claiming that Mars does not have tree, Putnam established that BIV’s utterance of ‘tree’ has a different referent from the referent of a non-BIV speaking of a tree. While it is possible that you have always been a BIV since you come into being, so you have never seen a tree that a non-BIV sees. It is also possible that you have lived certain part of your life as a non-BIV and then at some point you are made into a BIV. For example, if you recall in The Problems of Knowledge (Pollock, 1986), by the time that Margot tells Mike that he is a brain in a vat, he has been a brain in a vat for three months. According to Margot, Henry, or the brain in a vat that Mike sees, receives a fictitious mental life that merges perfectly into Henry’s past life. To merge perfectly, the language and its referents that the computer generates for Henry must be indistinguishable from those before his envatment. Similarly, if Mike has been speaking English up until three months ago when he was envatted, his utterance of ‘Margot’ after envatment must have the same referent as the one he had before. It must be that now his words retain the same English referents to the same contents in order to achieve a perfect merge (Brueckner, 2012). This perfect merge makes brain* in a vat* the same as BIV, which means whether you are BIV or not, you always speak English rather than vat-English. Because there are no differences in the languages between BIV and non-BIV, the semantic arguments have nowhere to start in this case. Unless you know with certainty that all BIVs have been BIVs since they came into beings, you cannot use semantic arguments to prove that you are not a BIV. To summarize, Moore’s arguments appear to be an easy solution to the problem of knowledge, but these arguments are begging the question and therefore cannot refute the brain-in-a-vat hypotheses. It seems that Putnam’s arguments are more compelling, but still they fail to rule out all possible versions of the brain-in-a-vat hypotheses. Therefore, you cannot prove that you are a non-BIV by using either of these arguments. Works Cited Descartes, Rene. Meditations on First Philosophy. Indianapolis: Bobbs-Merrill, 1960. Print. Pollock, John L. Contemporary Theories of Knowledge. Totowa, NJ: Rowman & Littlefield, 1986. Print. Brueckner, Tony, â€Å"Skepticism and Content Externalism†, The Stanford Encyclopedia of Philosophy (Spring 2012 Edition), Edward N. Zalta (ed. ), URL = .