Wednesday, July 31, 2019

Content And Process Theories Of Motivation Essay

Motivation is a big influencer of productivity. Many supervisors know that what motivates employees to reach their peak performance is not easy. This is because employees respond in many ways to their jobs and their organization’s practices. Thus, a behavior that is motivated is one which is voluntarily chosen by each employee. The content approach to motivation is one that is of the assumption that individuals are motivated by the desire to fulfill inner needs. Content theories are something that is on the needs that motivate people. On the other hand, process approach to motivation is on how and why people choose particular behavior in order to meet their personal goals. Process theories are on the outside influences or behaviors that people choose to meet their needs. These external or outside influences are usually available to supervisors. An example of the content approach to motivation is Maslow’s Hierarchy of Needs which has five level of needs. People go up these levels as their needs are answered. As the lower needs are satisfied, then the higher needs are activated. The most powerful employee need is that one which has not be yet satisfied. Abraham Maslow presented his needs theory in 1942 and then was published in 1954 in Motivation and Personality. This can be advantageous because the employees’ needs are answered as the person is satisfied. But it has its weakness too because it is rigid and does not cover the other small details that need to be taken into consideration when discussing motivations of people. Another content need is the Alderfer’s ERG which identified three categories of needs and its advantage is that there is the addition of the frustration-regression hypothesis that when people are not able to meet their higher level of needs, then, the next lower level needs come out. Meanwhile, another one of the content theory is McClelland’s Learned Needs which divides motivation into the needs for power, affiliation and achievement. This is the theory that is more on people pursuing their goals. People like to control their situations so they take risks and get feedback on their progress. This is mainly what this content theory means. There is also the motivation for power and for affiliation all under McClelland’s Learned Needs. Content needs has advantages especially if the person is motivated internally. But if he is not motivated at all, then these content theories are of not much benefit. (McClelland). Examples of the process theory Vroom’s Expectancy Model which suggests that people must choose among the alternative behaviors because they will be expecting that these behaviors will also lead to one or more desired outcomes and that the other behaviors will also bring undesirable outcomes.   Expectancy states that effort will also lead to first-order outcomes. Equity is the thinking of fairness which is involved in rewards given. Another process theory is the Attention, Relevance, Confidence and Satisfaction (ARCS) Model of Motivational Design or Keller’s ARCS Model of Motivation was conceived in the early 1980s by John Keller. This was derived from his theory of motivation, performance and instructional influence developed in the late 1970s. This is a macro theory that explains a network of relationships of personal and environmental characteristics with focus on the effort, performance and consequences. This is where the idea of reinforcement comes in. It confirms or denies expectations. Several views suggest that internal motivational drives control the lives of peak performers. When one sees a change that lasts, one can be almost be certain that it took roots within the individuals it affects, at the level of their own talents and motives. (Keller). By contrast, many of the quick fixes treat motivation as if it were a fuel one injects into one’s system to make one run, and propose solutions that are external to the individual. Peak performers usually claim that external motivators produce the shortest-lived results. In effect, this theory is based upon the coordinated ideas of many researches that involve human motivation.   It will sustain learner’s motivation to learn. In short, this theory aims at identifying major categories of variables of individual behavior and of instructional design related to individual effort and performance (Wongwiwatthananukit, Supakit)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The ARCS theory integrates several motivational concepts such as the expectancy-value theory, attribution theory, self-efficacy theory, social learning theory, and environmental theories. An effective way of getting attention, the first building block of the ARCS theory is through the collaborative projects and different methods of presentation. Relevance, the next building block of Keller’s model is achieved by letting students take ownership of the learning experience, making them have more responsibility and commitment to the learning experience. By allowing them to choose a relevant task, they are able to better match their motives and values (Fernandez, Jerry). The third building block is confidence and students’ learning is enhanced because of his achievements. Confidence is ego building and can thus enhance the way they perceive and learn things. The final building block is satisfaction and learners must have the possibilities to apply new skills (Driscoll, 1993, p. 318 as qtd in Fernandez). These process theories are useful because there are many environmental factors that can influence a person in many ways since they are coming from outside the person. The only problem with this is when the person does not give attention to his external environment or when the external circumstances are not good for the individuals concerned. Indeed, motivation is why individuals behave the way they do. Two important dimensions of the â€Å"whys† of behavior are activation and direction. First, when people are motivated, they do something. Their behavior is activated or energized. Second, when people are motivated, their behavior also is directed. Motivation focuses on how adolescents direct their behavior, or put another way, the specific behaviors adolescents select in certain situations but not others. Thus, this is what defines motivation—it is why individuals behave, think, and feel the way they do, with special consideration of the activation and direction of their behavior (McClelland, David). WORKS CITED Keller’s ARC’s Model of Motivation. Retrieved May 6, 2008 at: http://www.ittheory.com/keller1.htm Fernandez, J. Attribution Theory and Keller’s ARCS Model of Motivation. Accessed Retrieved May 6, 2008 at:http://chd.gmu.edu/immersion/knowledgebase/strategies/cognitivism/keller_ARCS.htm Pitt, Douglas C. Leadership and Motivation: The Effective Application of Expectancy Theory. Journal of Managerial Issues. Retrieved May 6, 2008 at: http://www.allbusiness.com/human-resources/employee-development-leadership/801576-1.html Wongwiwatthananukit, Supakit, Applying the ARCS model of motivational design to pharmaceutical education. American Journal of Pharmaceutical Education. Retrieved May 6, 2008 at: http://www.findarticles.com/p/articles/mi_qa3833/is_200007/ai_n8910222/pg_8

John’s Case

Case Study John Stokes May 27, 2012 An overview of John’s case John Stokes is a manager of the Tri-Mart Corporation. He recently received an inappropriate email from an employee that showcased nude men in a calendar. He also noticed that the email was forwarded to 50 other people in the organization. Key Issues or Problems He recently received an inappropriate email from an employee that showcased nude men in a calendar. He also noticed that the email was forwarded to 50 other people in the organization. Alterative that John can considerThere are many companies that are currently marketing e-mail monitoring services. John needs these services range from a full e-mail monitoring application to a program that only records the time at which employees pick up their e-mail. The full e-mail application program will record all of the following information. The e-mail recipient ?The e-mail sender ?The number of words in the e-mail The time the employee spent reading e-mail ?The time t he employee spent composing e-mail ?The number of attachments ?The type of e-mail – business-related or non-business related.A potential solution to John’s dilemma Full E-mail monitoring application to a program that only records the time at which employees pick up their e-mail. The full e-mail application program will record all of the following information. The e-mail recipient ?The e-mail sender ?The number of words in the e-mail The time the employee spent reading e-mail ?The time the employee spent composing e-mail ?The number of attachments ?The type of e-mail business-related or non-business related My conclusion on the case studyEmployee’s privacy rights in the workplace depend on whether they work in the public sector or private sector. Because constitutional rights operate primarily to protect citizens from the government1 state action is required before a citizen can invoke a constitutional right. Therefore, since most Americans work in the private se ctor, the United States Constitution and its corresponding Fourth Amendment privacy protect provides little guidance in private sector e-mail monitoring situations.

Tuesday, July 30, 2019

Internet Lingo Essay

Internet lingo or Internet slang (also known as ‘netspeak’) refers to a set of words, phrases, and acronyms used primarily in casual communication over the Internet. Its elements were created and made popular by Internet users themselves. Characteristic of netspeak are acronyms for phrases, like â€Å"LOL† (laughing out loud), â€Å"ROFL† (rolling on the floor laughing), and â€Å"OMG† (oh my god. Netspeak has expanded to include full words as well—words like â€Å"blog†, â€Å"flame†, â€Å"online†,   and â€Å"haxor† are only a few of the many words that the Internet has given birth to. A special set of Internet lingo, called â€Å"emoticons†, or â€Å"emotion icons†, also exists. These are the familiar â€Å"smileys† like â€Å":)† or â€Å"=)†, wherein the colon or the equals sign stand for the eyes, and the parenthesis symbol the mouth. The exact date of the first usage of Internet slang is somewhat difficult to determine, but its beginnings can be traced back to the 1980s, during the days of Usenet (Anderson 1996). They were perhaps meant to ease the load on users to type so much so they could say more in a smaller amount of time and effort, and was also perhaps a means to signify their statuses as Internet users. From there, it spread all across to what the Internet is today—from message boards, to chatrooms, to instant messaging—it has become a ubiquitous language in the World Wide Web, understood by any Internet user. One of the original purposes of Internet lingo (which it still serves well even today) it to save the user a few keystrokes. The reason why a large part of Netspeak consists of cryptic acronyms is exactly this. For instance, an Internet user in the middle of a chat, needs to leave abruptly, but is not disrespectful as to leave his friends without so much as saying a word. He would like to say that he will talk to them some other time, but â€Å"talk to you later† is such a long phrase that may take even longer to type if said user is not very good at typing. Instead, he will type â€Å"ttyl†, which stands for the original message in his mind, and saves himself a few more seconds. His friends, able to decipher his message, acknowledge, perhaps with a â€Å"k† (â€Å"okay†) or â€Å"cu† (â€Å"see you†). Most of Netspeak functions this way, and there are a great many acronyms which stand for equally numerous messages, all serving to save the user some time and effort.   Emoticons were invented to enable Net users to express emotions and feelings over the Internet. Since the users most likely do not see each other while communicating online, emoticons are important when words are no longer enough to express a feeling. The regular smiling face, â€Å":)†, is the most popular, and usually means that the other person is pleased or feels happy. It is difficult to list all of the existing emoticons as there are simply too many, at least one for almost every expression, and even for non-expressions. They, too, can also serve to save some time and a few keystrokes. For example, instead of saying â€Å"I am sad,† the user can simply use â€Å":(â€Å". Or, he can use them at the end of a sentence to more effectively convey what he feels: â€Å"I am mad at you! >:(â€Å" However, the latter purpose seems to have weakened nowadays—if someone sees the sentence in the previous example, he would not believe that the person is actually angry or displeased; rather, he would think that the person at the other end is using the smiley to achieve a comical effect. Like in any group or subculture, a means to indicate that one understands or one belongs is necessary in order for one to be truly part of that group. This is another purpose of Internet slang: it lets people identify themselves as part of the Internet culture. Like a secret handshake, knowledge of this language is more or less required for one to be a true â€Å"Netizen†Ã¢â‚¬â€an Internet denizen. In fact, one can observe that some groups in the Internet will even go as far as mocking those who has little knowledge about the words or phrases, or if he misuses them. In instances like these, the misinformed user will be referred to as a â€Å"n00b†, a derogatory term derived from the word â€Å"newbie†, which means a newcomer (Wikipedia 2007). With the rising availability, affordability, and popularity of computers and Internet access, Netspeak has found itself a wider user base than ever before. Indeed, this language has become so popular that it has begun to creep into people’s offline lives—popular acronyms like â€Å"LOL† and â€Å"WTF† (both of which can be typed in lowercase, as well as most other Internet acronyms), as well as many of the words can be found in mobile text messages, in television and movies, and even in the spoken language. However, teachers and other academic personnel and proponents are not too keen on this new language. Many people seem to regard this spread of Netspeak as nothing but harmful and degrading to intelligence, especially those of students. Jodi Schenck (Arditti  ¶;3), a high school teacher at the Rothberg Comprehensive High School in Israeli, recounts her students using Netspeak in academic writing: using the symbol â€Å"4† instead of â€Å"for†, using the letter â€Å"u† instead of spelling out â€Å"you†, and acronyms like â€Å"LOL†. It is also difficult, according to Schenck, to prevent the students from doing this (Arditti  ¶;3). To many teachers, like Schenck, Netspeak is corrupting the English language and is detrimental to a student’s intelligence. The problem is that it is so popular, and sometimes people might not be aware of the fact that they are already using them outside of the Internet, or that they are not acceptable in writing. Internet slang, much like regular slang, are only meant for use during casual conversations (or in the case of Netspeak, chatrooms and informal emails and messages). However, some people will disagree. As it resembles a new language on its own, linguists will give it due treatment, and defend it. Professor David Crystal, a linguist, in fact thinks that it is not a corruption but an enhancement to the English language (NPR 2007). He believes that it adds more variety and a wider choice for speakers and non-speakers alike of English by extending the range, expressiveness, and richness of the language. This is yet another purpose of Internet lingo. It may be necessary, however, to limit its use to casual conversations only. Students should still be required to differentiate between formal and informal speech, and when either should be used. Since Netspeak is considered a form of informal speech, it should stay away from formal and academic papers. The adoption of phrases and terms used in the Internet as a form of language is a fairly recent move. Due to its many purposes—as a time-saver, as a way to express feelings and emotions where it was otherwise impossible, as a symbol of belonging, and as an enrichment to the language—Internet slang, Netspeak, or Internet lingo deserves its place in the English language. It serves its purposes well, and are actually quite useful to know, especially now when almost everyone is using the Internet and this form of speech. It may still be confusing to some people, and may be misused at some places, but through proper education, the ubiquity of Internet slang should not pose a threat to corrupt the English language. Works Cited: Anderson, Andrew. â€Å"Usenet History.† The Network Administrator’s Guide.1996. 27 June 2007. . Arditti, Avi. â€Å"When Netspeak Enters Formal Writing, Teachers are Anything but LOL.†   NewsVOA.com. 2007. 25 June 2007.   . Ulaby, Neda. â€Å"OMG: IM Slang is Invading Everyday English.† National Public Radio. 2006. 25 June 2007. Wikipedia. â€Å"List of Internet Slang Phrases.† 2007. 27 June 2007. .

Monday, July 29, 2019

PPACA and its Impact on Medical Surgical Nursing Assignment

PPACA and its Impact on Medical Surgical Nursing - Assignment Example It has empowered the average US citizen, annulled some longstanding lawsuits, socialized medicine and changed the way that health insurance companies operate, preventing the USA from being dragged into further debt. It also has a number of repercussions for the medical and surgical profession in the USA. Key Elements of the Article The article specifically comments on five aspects that affect the medical and surgical area of the nursing profession: 1. Reauthorization of Title VIII Workforce Development Programs: The funding will be reduced for grants that were previously available for racial and ethnic minorities in the workforce, as part of workforce diversity for those having associate diplomas or degrees to enter bridge or degree completion programs. It will also reduce provision for grants to train nurses in primary care in nurse managed health clinics, federally qualified health centers and grants for State partnerships to reduce healthcare workforce issues. These have been redu ced to the levels available in 2004 or 2008. 2. Increased Funding for Nurse Managed Clinics: A significant part of the Law concerns itself with community care. This is usually administered in an acute setting. The new emphasis is on prevention and management of chronic disease. Funding is being debated. In this case, there will be a higher demand for advance practice nurses and many even induce some nurses to enter private practice, contingent on the AMA enhancing NP privileges. The AMA presently feels that extending NP privileges to staff will invade physician turf and 28 State legislatures are contemplating extending this role. It will give the Registered Nurse an excellent opportunity to get the additional education and licensing needed to become an NP. 3. Demonstration Provision for Graduate Nursing Education: This reform also helps graduate nursing students by increasing funding for clinical education. This is in line with the advice of the Institute of Medicine Report 2010 tha t the education, training, roles and responsibilities of nurses should meet the present requirements of increased health care in the USA and the current improvements in the system. Nurses should be engaged with senior professionals to increase their responsibility and role in redesigning healthcare in the USA. In fact it is recommended that nurses undertake a residency program that increases the value of transition from education to practice. Opportunities for additional learning should be sought out by attending annual conferences and participation in free continuing nursing education options such as some programs offered by the American Academy of Medical-Surgical Nurses (AMSN) as a benefit of membership with them (Hertel, 2011). 4. Creation of the National Healthcare Workforce Commission: Under the envisaged changes as a result of this legislation, the expansion of healthcare available to individuals will likely result in an expansion of the nursing workforce. Acute inpatient and outpatient care, home care, palliative care, preventive care, transitional and chronic care among other facets will require more nurses giving more nursing care. The National Healthcare Workforce Commission has been created to monitor the need as well as the growth of the base of nursing professionals and to make recommendations on funding. Hopefully the Commission itself will not be made a victim of budget cuts

Sunday, July 28, 2019

Employee Engagement Essay Example | Topics and Well Written Essays - 1500 words

Employee Engagement - Essay Example The findings in this paper show that if proper managerial techniques are applied, combined with trust and creating an environment that encourages the employee to engage positively in their daily work activities, then the outcome will be positive. Some of the benefits that the organization tends to gain are the financial outcome and the performance outcome of the organization since employees will be working towards the goals of the company. Introduction Employee or worker engagement is a managerial strategy aimed at empowering workers to act at interest that are related to the organizational’ missions visions and goals. The engagement of the employee can be analyzed according to the emotional attachment of the employee whether negatively or positively in relation to the manner in which they view their job, their fellow workmates or the company as a whole. Their engagement in work has a great impact on the willingness of the individual to perform their duties. If employees are e ngaged in their work, they will do anything in their power to satisfy the clients of the organization thus working in correspondence to the mission and vision of the organization. The engagement of an employee is usually based on the organizational culture, employee empowerment, the trust factor indulged, the managerial behaviors and the style used in management of the employees. ... The psychological possession in this case refers to the employee taking the job as his or her own and believing that they have been endorsed the responsibility of making critical decisions that comply with the organizations interest. If an employee feels that they are psychologically possessed with the job, then this is empowerment of the employees. If employees are not empowered, then they consider that the tasks that they are supposed to do are what the manager has ordered them to do. Anything else apart from the specified assignments is none of their business. It is up to the manager to perform those tasks. Employees who are not empowered come to job to follow their bosses’ orders. They do not know the goals of the company. They just wake up, come to job, do whatever the boss requires them to do and then when their work is finished they go home. They have no goals to neither worry about nor accomplish simply because the boss never told them of any. Any change that is to occ ur is the boss responsibility. They have nothing to lose. These kinds of employees are underpowered and the outcome of the company is low. On the other hand, empowered employees come to job knowing the goals of the company and have ways and means of accomplishing them. In fact, empowered employees work together as a team. They have a team spirit. They work together to achieve the set goals of a company and any challenging goals that are facing them. They acquire information through educational meetings, the press and any other available sources and bring fresh and new ideas to the company that will help in achieving the goals of the company. They are in a position to make decisions and

Saturday, July 27, 2019

Job Analysis and Rewards Essay Example | Topics and Well Written Essays - 750 words

Job Analysis and Rewards - Essay Example It could be performed through â€Å"Direct observation†, personal discussions, group sessions and use of expertise of technical or non- technical experts in the field. Besides this the use of subjective questionnaires and pre-prepared questionnaires may also be used, according to the needs of the situation (The worldatwork handbook of compensation, benefit & total rewards: A comprehensive guide for HR professionals 2007, p.181). One critical aspect that job analysis needs to consider is the evolving nature of corporate functioning, especially at an executive hierarchy.Thus, job descriptions may undergo major changes which need to be incorporated in the job analysis planning and in the determination of rewarding against job descriptions. There are, basically two aspects to be considered, firstly, nature of functions carried out by the employee and secondly, the level of performance. While nature could refer to job description and kind of work to be done, the level would determine what kinds of skill sets are required for the job, the level of responsibility and commitment to the job, and finally, what kind of compensation needs to be provided, in commensuration with the nature and level of the job carried out. Different job descriptions demand discrete requirements. In essence, the Human Resource Manager (HRM) needs to ensure that the skill sets, qualifications and experience of incumbents match with the demands and needs of the job and is a best fit. In some cases, work demands may require functioning at a higher level than the present one, and employers must thoroughly scan the potential of prospective employees in this regard. This could be in terms of length and intensity of work, its wider scope and the level of performance that is demanded at each hierarchy of organizational performance. Not only at an entry level, even along the career graph of any employee, at middle and top management levels, it is important that there is a proper matching between the

Friday, July 26, 2019

Gender Inequality on Women in the Workplace Thesis

Gender Inequality on Women in the Workplace - Thesis Example Studies have revealed that such gender inequality have grave effects on women’s perceptions of their efficiency and motivation. Some women fall into the trap of giving in to bleak self-fulfilling prophecies that they are not as good as their male co-workers and eventually prove the expectations to be right. This research paper explores the perceptions of women workers of the realities in the workplace regarding gender equality. It will attempt to investigate the grievances and fulfillments of women regarding their current jobs, pay and career advancement and probe the psychological and emotional effects these have on their job performance and motivation. It is hypothesized that gender inequality exists in workplaces, especially in bigger companies. This is exhibited by a large pay discrepancy between men and women who hold the same position and job descriptions. This study will investigate the workers’ perception of gender inequality across the board. The hypothesis will be: Due to the significance of equal opportunities to citizens the world over, laws have been passed to ensure that they are available to everyone. These laws have been designed protect anyone from being discriminated against by reason of sex, marital status, ethnic or national origin, color, race, nationality, age, disability, religion, and differing terms of employment, including pay for jobs of equal value. 1 In the United Kingdom, the Sex Discrimination Act 1975 (amended 1986 and in the Employment Act 1989) makes it unlawful to discriminate in terms of gender who is offered the job; opportunities for promotion, transfer and training. (Equal Opportunities Management Guidelines) Â  

Thursday, July 25, 2019

Gone With The Wind Research Paper Example | Topics and Well Written Essays - 1250 words

Gone With The Wind - Research Paper Example As such, parody on its own or with the inclusion of satire does not attract infringement while a satire that stands alone attracts infringement of the copyright law. This brings the issue of fair use as demonstrated by several infringement battles such as in the case of Colting’s 60 Years Later novel and Suntrust Bank v Houghton Mifflin. Fair use sets a legal ground that permits commercial and creative decisions regarding rewrites. This leads to more cultural products making our culture richer, but also poses the big challenge of determining what qualifies as fair use and what does not. Thampapillai, Dilan. The Novel as a Social Satire: 60 Years Later, the Wind Done Gone and the Limitations of Fair Use. Deakin Law Review (2012): 427-452.Print. In The Novel as a Social Satire: 60 Years Later, The Wind Done Gone and the Limitations of Fair Use, the author, Dilan Thampapillai, evaluate the doctrine of fair use and its application in the society. He also explores the difference be tween fair use in Australian Copyright law and the American Copyright law in order to give an insight into the distinction between satire and parody. Furthermore, Dilan evaluates application of fair use with reference to the case of 60 Years Later and the rewrite of Gone With The Wind. Dilan Thampapillai currently works as a lecturer at the Deakin University School of Law. Prior to this, Dilan worked at the Australian Government Solicitor and Attorney-General’s Department as a lawyer. Evidently, he has a good background in the area of law giving credibility to his work. In addition, Dilan specializes in topics such as free speech, intellectual property, and public law. Dilan currently studies PhD at Melbourne University, holds a Master in Laws and a Bachelor of Laws from Cornell University and Australian National University respectively. Furthermore, the article is recent, published in 2012, thus, has up to date information about fair use. I will use the information in this a rticle to get an insight into the issue of fair use and infringement of Copyright issues. I will use the information from this article to evaluate the circumstances that a rewrite qualifies as fair use, and the circumstances under which it does not, that is, qualifies as infringement. Thus, this article will help me to understand better the concepts of parody and satire, and how they apply in Copyright issues. Dilan Thampapillai writes, â€Å"What must be accepted then is that both parody and satire are exercises in free speech and the fact that they warrant a free use exception in copyright law suggests that the statutory monopoly that is copyright needs to be reconciled with democratic values† (429). Beebe, Barton. An Empirical Study of US Copyright Fair Use Opinions, 1978-2005. University of Philadelphia Law Review (2008): 582-586. Print. In An Empirical Study of US Copyright Fair Use Opinions, the author, Beebe Barton discusses several opinions that argue for fair use. Ba rton refers to the four conditions in the US Copyright Act that fair use is dependent on. These are character and purpose of use, nature of the work copyrighted, sustainability and amount, and effect on the market. Beebe Barton is an intellectual law expert and a lecturer of the same at the New York University of Law. Beebe has J.D. from Yale school of Law attained in 2001, PhD from Princeton University and B.A. in Masters from the University of Chicago. In addition, Beebe is well vast in the topic of intellectual law, infringement, and

Operations Management Issues at ABC Manufacturers Term Paper

Operations Management Issues at ABC Manufacturers - Term Paper Example The ROI is at 30% after taxes, based on the asking price. It is expected that these numbers could be even higher, based on preliminary marketing projections. However, ABC has several operational issues that need to be addressed prior to the purchase. The following will discuss these operational issues and will outline a plan for rectifying them. Understanding Solar Water Heaters. In order to perform a proper assessment of the market and opportunities that lie in the Solar Hot Water Heater market, it is important to gain an understanding of how they work and the various types that are available on the market. Solar hot water heating systems include storage tanks and solar collectors. Compared to other types of hot water heating systems, they pay for themselves overtime as the customer saves money by not purchasing an alternate fuel source. Solar systems use solar energy from the sun, which is free. The initial cost is paid back over time, after which the cost for the unit is free, oth er than for repairs. The decision to install a solar hot water heater has a high initial cost that represents a longer-term investment in which its payback is sometime in the future. There are three different types of collector systems for solar water heating units. The first type is the flat-plate collector, which consists of a weatherproofed, insulated box. Inside the box is a dark absorber plat that is under one or more glass or plexiglass panels. The absorber plate itself can be either metal or polymer. The integral collector-storage system has one or more black tanks or tubes in and insulated glazed box. In this system, the solar hot water heater acts as a pre-heater, warming the water before it passes through a conventional system. The third type of solar water heater is the evacuated-tube solar collector. This type of system uses parallel rows of glass tubes. These tubes contain a glass outer tube and a metal absorber tube attached to a fin. The fin absorbs solar energy, but prevents radiant heat loss. The evacuated-tube system is used in a commercial setting. Most residential systems are either the flat-plate collector type, or the integral collector-storage system. Circulation systems can be either direct or indirect systems. The direct system pumps water through the collectors and into the house. They are used in climates that do not experience freezing temperatures. The indirect heating system circulates non-freezing heat-transfer fluid through the colle

Wednesday, July 24, 2019

Sniffing Research Paper Example | Topics and Well Written Essays - 250 words

Sniffing - Research Paper Example To Orebaugh, et al (2004), Sniffing fall into the category of wiretapping as it is a form of wiretap installed to computer networks as an alternative of phone networks. The device records the content conversation without the other party consent. Many organizations use this device to fix remote sniffing programs on routers and servers, which in turn, assists in traffic flows. In my opinion, it is illegal for organizations to use sniffer to secret monitor employee activities without their approval. Although it may be done to increase productivity, it is paramount for the other party to approve the activities carried out by the organization. My feeling about sniffer use both by insiders of organizations as well as outsiders is that, it should not occur unless a court order has been issued. It should only be carried when there is parties consent. However, when issued by the court it can be done to access employees input to the organization, and this may be helpful in enhancing productivity and company’s growth. If I would craft a law about packet sniffing, it would ensure that it only done to the parties consent. It would include rules and regulation to follow before using it. A court order would be issued before the devices are attached to the phone or any device. In turn, this would protect employees and clients from harassment and protection against theft. Stevens, G. M., Doyle, C., & Library of Congress. (2009).  Privacy: An overview of federal statutes governing wiretapping and electronic eavesdropping. Washington, D.C.: Congressional Research

Tuesday, July 23, 2019

Consumer Decision-Making Process Essay Example | Topics and Well Written Essays - 1750 words

Consumer Decision-Making Process - Essay Example This necessity or want could be triggered by wanting to satisfy a need which arises due to internal stimuli, such as thirst, hunger, etc. (Anonymous). This need can also be sparked by external stimuli such as advertisements, or when your friend buys a new car or a new pair of shoes. At this stage, online marketers should make effective use of the internet to stimulate recognition of this need (Philip Kotler, 2009). They generally start off by collecting information from consumers, about their lifestyles, the products they use, important events in their lives, through online surveys and questionnaires. In the internet world, customers tend to search for pages that they want to browse through. Marketers use the traditional method of using banners and ads to attract customers. Some even use pop-up sites to get the consumer’s attention. A study conducted by IIfeld and Winer showed that about 88 internet companies got frequent hits online due to banner advertising (Limbada, 2006). Online Companies such as amazon.com and easyjet.com use this technique effectively. Not only does it use animated banners and images, Amazon displays links such as â€Å"what customers are looking for† and â€Å"best-sellers†, which could arouse a certain need in the customer. Another need recognition technique could include responding to keywords on search engines. When a customer types a keyword such as ‘airline’ on google.com, Emirates or Air Canada are usually the first two options that appear on the search list. This search list order could be a vital technique for marketing. If the customer initially wanted to travel via Qatar Airways, but the search list brought Emirates on the top, the customer could decide to Emirates instead. Discussion blogs in newsgroups etc. could also help catch the eye of the consumer. Information Search begins once a consumer has identified his need. There are various ways to search for information regarding the product tha t the consumer wants to purchase. By searching, he can find out all his options, the various brands that are available, the different prices, design, etc. (Krishnamurthy, 2006).The extensiveness of this search depends upon how valuable this product is. If, for example, the customer wants a camera, he will research more rigorously about the various alternatives that are available. This way the customer gathers a whole bank of information and companies such as auto trader help direct the customer towards the choice the suits him the most.

Sunday, July 21, 2019

Myanmar Ministry of Social Welfare

Myanmar Ministry of Social Welfare Uniqueness of Myanmar Social Welfare Model Chapter 1 Introduction Myanmar Ministry of Social Welfare, Relief and Resettlement was establish in the year 1953 and the government take the responsibilities of many social welfare activities and also keep expanding, in close collaboration with may United Nations agencies and international Non-governmental organization. Nowadays, United Nations agencies, Government Organizations and both local and international NGOs are carrying out the social welfare services in Myanmar in addition to the government social welfare departments. The department was formed 5 years during the parliamentary democratic government era soon after the country independent from the British colonial. After that as the Myanmar undergoes for many changing of the governments, such as democratic government, socialist government and military junta so the social welfare model of Myanmar is also changing from one government to another. It is of great interest for social work field to study what is the social welfare model that Myanmar is practicing. In this paper, I will try to discuss whether the Myanmar social welfare model can be explained by either Richard Titmuss models or Esping-Anderson models or combination or different from both. In chapter 2, I would like to do the literature review upon different definitions and models of social welfare in this chapter. In chapter 3, I would like to explain some information about the Social Welfare in Myanmar and try to identify which social welfare model can explain the practice. Chapter 4 will comprise the important of understanding Myanmar social welfare model and possible applicability of different models which might be best suited to country situation and culture so that the welfare services can provide the more efficiency towards the community. Chapter 2 Literature Review 2.1. Definitions of Social Welfare Social welfare includes those nonprofit functions of society, public or voluntary, which are clearly aimed at alleviating distress and poverty or at ameliorating the conditions of the casualties of society(R Dolgoff Feldstein, (2007). The another definition is all social interventions intended to enhance or maintain the social functioning of human beings(R. Dolgoff, Feldstein, Skolnik, 1997). The National Association of Social Work (NASW) defined Social Welfare as the full range of organized activities of voluntary and governmental agencies that seek to prevent, alleviate, or contribute to the solution of recognized social problems, or to improve the well-being of individuals, groups, or communities.(NASW, 1971) United Nations defined Social welfare as an organized function is regarded as a body of activities designed to enable individuals, families, groups and communities to cope with the social problems of changing conditions. In addition to and extending beyond the range of its responsibilities for specific services, social welfare has a further function within the broad area of a countrys social development. Social welfare should play a major role in contributing to the effective mobilization and deployment of human and material resources of the country to deal successfully with the social requirements of change, thereby participating in nation-building. (United Nations 1967) 2.2. Different models of social welfare Richard Titmuss (1970) introduced 3 models of social welfare which includes residual model, industrial-achievement model and institutional model. In residual model, it is charity and providing assistance in nature and the provision of social service is based upon selective either by mean testing or eligibility criteria. So, people can be socially stigmatized for the people who are receiving the social welfare services. The ideology of the residual model is based on the individual is responsible for trying to meet with the market economy and the welfare state is something to be avoided. In industrial achievement model, it mainly focuses on the individualist upon meritocratic and the provision is upon the individual merit. Hence, the nature of social welfare service is like workfare. In a meritocracy, society rewards (via wealth, position, and social status) those who show talent and competence as demonstrated by past actions or by competition. There is no social stigma and the welfare is upon the persons self-responsibility. In institutional model, Social welfare is seen as a normal and legitimate function of modern society (R. Dolgoff, et al., 1997). There is no stigma in this approach as it is regarded as a right of citizenship and most of the programs are universal and no more selective. Again, on the other hand, Esping-Anderson (1990) proposed that there is another three types of model namely conservative model, liberal model and social democratic model which are in fact equivalent to the Richard Titmuss (1970) 3 models of residual model, industrial-achievement model and institutional model respectively. The residual and industrial achievement models are similar in objecting excessive welfare. Table 1: Explanation of different models from different perspectives and the countries that are currently practices Richard Titmuss Model Residual Industrial Achievement Institutional Esping-Anderson Model Conservative Liberal Social Democratic Practising Country France, Germany, Austria UK, USA, Australia Sweden, Denmark, Norway Nature Charity, assistance Workfare Citizen right Basis of provision Selective (e.g. means test, eligibility) Individual merit Universal entitlement Social stigma May carry stigma Self-responsibility No stigma Ideology Free market, individual responsibility Individualist, Meritocratic Collectivist, State responsibility Government Role Non-intervention Non-intervention Intervention Chapter 3 Myanmar Social Welfare at a glance 3.1. Background of Myanmar Ministry of Social Welfare(YCDC, 2003) In Myanmar, the social welfare services are provided either from the government department, the department of social welfare or directly from UN, INGO and NGO services towards the community and vulnerable people. But still, as the government is military junta, every service either from the government or from the agencies need the government official approval in prior to any activities/services. When looking at the Ministry level, it has instituted three departments, the social welfare department, fire services department and relief and resettlement department. In addition to the three departments, the government has designated the Ministry of Social welfare, Relief and Resettlement as three national focal points Myanmar national Committee for womens affairs, National Committee on the Rights of the Childs Myanmar and National Committee on Social Development. Social Welfare in Myanmar claimed that they aim at helping towards a mutual adjustment of vulnerable and their social environment. The ministry has the following objectives of social welfare: 1. To assist the vulnerable groups so as to reintegrate into the society through social work methods. 2. To resettle and rehabilitate victims of disasters. 3. To make our country free from fire hazard. 4. To encourage the non-governmental organizations to participate in national movement for social development. 5. To train and form the fire service personnel and voluntary fire-men to become the reserve force to safeguard peace and stability of the state. In addition to the above objectives, the followings are the adopted policy of the Ministry. 1. Equalization of opportunities fore vulnerable group in Myanmar society. 2. The government attaches a high priority to the welfare of children, youth, women, national races residing in the disabled, the aged, socially handicapped and disadvantaged groups. 3. Responsible for rendering relief and resettlement services to victims of natural disasters such as earthquakes, storms, floods and fire disasters. The Union of Myanmar has also promulgated laws to ensure the rights and to protect the Citizen. Among the laws three are some basis laws which are directly concerned with Department of Social Welfare (DSW) to implement Social welfare programmes and for the protection of the socially handicapped citizens. These laws and regulation are Prostitution Suppression Act, 1949, Disabled Persons Employment Act, 1958 and The Child Law, 1993 under basic law. There are also 3 other related law present which are Registration of Kittima Adoption Ad, 1941. , Myanmar Maternal and Child Welfare Association Law (MMCWA), 1991 and Narcotic Drugs and Psychotropic Substance law, 1993. The DSW implements social welfare services in eight different areas of social needs by both direct and indirect means. The different types of social welfare services includes child welfare service, youth welfare service, women welfare service, care of the aged, rehabilitation of disabled, rehabilitation of ex-drug addicts, rehabilitation and socialization of Vagrants and grant-in-aid to voluntary Organization. According to local needs and situations, the contribution of social services has been made by the Non-governmental organization (NGOs) with the collaboration of community. At present, with the encouragement of the government there has been abundance of NGOs in Myanmar national as well as international NGOs. Myanmar National Committee for Womens Affairs (MNCWA) was formed on 3 July 1996, to implement activities for the advancement of women systematically. Subsequently, the Myanmar National Working Committee for Womens Affair (MNWCWA) was formed on 7 October 1996, to facilitate the activities. The government also designated the Ministry of Social welfare, Relief and Resettlement as the National Focal Point for Womens Affairs. Myanmar has acceded to the convention on the Rights of the Child in 1991 and the Child Law was enacted in 1993. The National Committee on the Rights of the Child (NCRC) was formed in October 1993, headed by the Minister of Social Welfare. The Department is implementing social development programmes in collaboration with the Asia and Pacific as well as ASEAN member countries. In addition to the above services provided by Ministry of Social Welfare, the department is also involved in conducting the Post Graduate Diploma in Social Work which was recently started in 2006. Previously there is no social work training in the country even though the objective number 1 of Ministry which includes providing the services with social work methods. This course is funded by UNICEF, joint with Department of Social Welfare and Department of Psychology (Yangon University). 3.2. Analysis of the Myanmar Social Welfare Model Even thought the ministry set up the objectives, we can found out that they did not have clear objective upon how to help and provide services towards the vulnerable and oppressed people. And also the policy and the objectives are only at the policy level and never reach to the implementation level. The staffs from the department of social welfare are civil servants and they are not motivated at all due to their low pay salary and no learning opportunities for their services. The nature of the Myanmar Social Welfare is mixed in nature as the government did not provide the direct services to the people. The services are coming mostly from the UN/INGO/NGO and some community based organizations with in terms of charity and humanitarian assistance. Even though the Government claimed that the services are universal to all but still far away from the actual coverage as there is no citizen rights at all in the country. The basis of provision of social welfare either universal or selective is also depend upon in the project agreement with the donor agencies and their funding policy. Compulsary education of up to 5th grade is funded by Unicef so it is universal to all the children of the country. Universal immunization programme (UCI) and expanded programme for immunization (EPI) are funded by Unicef, JICA, Japan Vaccines, AusAid so all the children under 5 years of age received the all the vaccinations under the health programme free. But on the other hand, in public housing, it is not provided to general public. The government provided only to the government civil servants but even not all the civil servants received the housing. Only the higher level officials received the public housing. But all the military servants receive the public housing. So, we can term it as highly selective with bias and might not term it as social welfare service. Social security is also received only the civil servants especially towards the military servants and the government did not take into account of the general public or community. The government health care is cost sharing in nature and all the patients need to provide the cost of the medicines and diagnostic and laboratory charges. The other charges such as doctors fees, nurses fees, room fees are free when they are admitted to the government hospitals. There is a department called Medical Social Work department in most of the big hospital but they are no more functioning at all now. They just present as a one of the required structure for the hospital. The staffs are also not trained by proper social work techniques but if the patient is too poor to buy the required medicines or something, they can contact to this medical social worker. If there is any money, donated by anybody, is present in this medical social work department, they provided to this poor patient. If not, they cannot provide any support and it is some form of charity based assistance. Family, children and youth services are based upon the residential care approach as the department of social welfare has many training schools for youth, children and even for women. In fact, these training schools are the same as the detention centre or care centre and not all the youth and children staying there are allowed to go out of this so called training school. There is no proper service setting providing towards family violence and child abuse even though there are high rate of such cases inside the country. As the government accede the UNCRC, and they formed National CRC, state and divisional CRC and even township CRC all over the country but all these are not functioning at all. There are some government owned NGO (GONGO) such as Myanmar maternal and child welfare association (MMCWA) and Myanmar Women Affairs Federation (MWAF) but they are also only the political figures and helping towards some cases of family violence, gender based violence (GBV) and child abuse but as they are also not trained social workers in their organization, the services that they provided are also like material supports based upon the charity and humanitarian assistance approach. There is no systematically helping towards the vulnerable. One of the important components of the social welfare services, the elderly services are also provided by INGO/NGO mainly. The government provide very small amount of money and official registration to these home for aged. The department of social welfare did not have any residential care facilities towards the aged. Social services provided towards disability peoples and rehabilitation service is also one of the weak areas in Myanmar. The rehabilitation is mainly towards the disable from the military servants who has lost their legs due to mine in the frontiers. INGO/NGO are now trying to work towards the community based rehabilitation programme with the permission of the government. Many of the community development are organized and implemented by the UN/INGO/NGO and government Ministry of Progress of Border Areas and National Races and Development Affairs. But this government ministry is mainly focused upon the material development such as road, bridges etc and not emphasize on the human and social capital development. There are no specialised services or agencies working for the ex-prisoner or offender. The government has correctional department under the ministry of Home Affairs which is also known as department of prisons. After the offender release from the prison, there is no follow up or social welfare services towards them. And also there is no agencies working upon these peoples. There is only one training school for the whole country where all the juvenile delinquent are detained and provided the correctional training. Still the staffs assigned in this training school are not trained social workers. There is no social stigma upon receiving the social welfare services and even the people are proud of receiving the social welfare service assistance because very few peoples received these services. Government ideology upon social welfare is to make the social control upon the community. The government did not implementing services or even not they implemented, they are not efficiently implemented. They did excess intervention towards policy upon the providing the services by the agencies. Chapter 4 Conclusion According to the situational analysis of the social welfare services present in the country Myanmar, the current model that the government implementing is not either residual or industrial achievement or institutional model. And also there is no specific model because the department does the services at ad hoc basic depending upon the project proposed by the UN/INGO/NGO. Due to the ruling by the military junta, the department of social welfare did not have budget for their welfare services and so the department stands only as a focal point/liaison between the agencies and the government. And most of the agencies need to provide the services under the name of the department of social welfare. On conclusion, it is difficult to identify what is the social welfare model of Myanmar currently. But the country is in the transition stage from military junta to the multi-party election in the year 2010. And the general constitution is already drawn but still specific policies and rules will set up in the next newly elected government. So, we all hope that there will be a proper model for Myanmar social welfare in the hand of new government. Dolgoff, R., Feldstein, D. ((2007). Understanding Social Welfare: A Search for Justice (7th ed.). Boston: Allyn Bacon. Dolgoff, R., Feldstein, D., Skolnik, L. (1997). Examining a social welfare program: Structural components, alternative program characteristics, and evaluation (4th ed.). New York: Longman. NASW. (1971). Encyclopedia of Social Work (Vol. II). YCDC. (2003). Ministry of Social Welfare, Relief and Resettlement.

Mobile Location Techniques

Mobile Location Techniques INTRODUCTION: With the rapid increase in number of mobile users, a massive number of calls originate from mobile subscribers, all over the world, everyday. With the increasing number of mobile users and originating calls, there is also an increase in emergency calls that originate from mobile stations. In many emergency cases the position is unknown to the caller, or he cannot explain properly. Thus there is a strong need to locate any mobile user in emergency situation. Hence the scope of mobile positioning is vital. Due to importance of mobile positioning, the need to locate any mobile user in emergency was also called by Federal Communications Commission (FCC) and European Countries. For instance, the Federal Communications Commission (FCC) made a proposal to include location in the 911 emergency service number, which resulted in the E911 ruling [2]. Currently, all the legacy handsets used in public cellular networks in the USA must provide the location of the customer whenever this number is dialled. The European Commission (EC) adopted a similar regulation to include location in emergency services on 112 [2]. The FCC in USA took the first step in this direction. Initially by 2001, the mobile operators are required to provide the accurate location of an emergency caller. The current requirement of FCC is to locate 67% of emergency callers must be located within 100 meters and 95% of the callers must be located with an error of no more than 300 meters. [3] Applications: Mobile location can be used for a number of services by mobile operators. Some of them are discussed here: An important application of mobile location is to provide emergency services. By knowing the location of a mobile user, emergency vehicle can be directed to that location. Hence there is an increase in public safety and services. Another interest in exploiting the mobile location is to apply location sensitive billing. By knowing the location of mobile subscribers an operator can offer competitive tariff e.g. users can be offered more calls from their mobile to home or office. Asset tracking and fleet management is another application of mobile location. Using the location of mobile travellers can be informed about location. Mobile location can be used to effectively manage fleet and traffic conditions. There are two main categories for mobile positioning,Handset Based positioning and Network based positioning. Handset Based techniques needs special type of handset hardware or the installation of specialized network software in existing handsets e.g. GPS and A-GPS. GPS receiver determines its own position by sending and receiving signals from at least four satellites. The time to reach satellite signal to GPS receiver is used as a parameter. The accuracy of GPS based systems is very high. And the coverage of satellite is very good in outdoor environment. However, drawback is inability of GPS to operate in indoor and heavily populated urban environment. GPS lacks positioning where signals of the satellite cannot be fully covered. Another problem is related to existing handsets in market. A large number of existing handsets lack the built in GPS receivers. Thus using this method a huge number of people can not get benefit or can not be located in case of emergency. Also Embedding a GP S receiver into mobile devices leads to increased cost, size, and battery consumption [1]. Thus hundreds of millions of handsets in market need to be replaced or modified. In contrast, Network Based Techniques determine the position of a mobile user by measuring its signal parameters when received at the network Base Station (BS). Here BS receives signal from Mobile Station (MS) and sends them to a central site where location estimation algorithms are used to estimate location. In this method there is no need to change or replace existing handsets. It would require change in a few thousands of network nodes (Base Stations) than to change hundred of thousands of mobile stations. Hence, it can be implemented easily, less costly using existing technology. And still can provide a very good estimate of position of a mobile user. The future technologies also support network based positioning. Infact many positioning techniques can not be implemented using existing GSM technology. Using advanced technologies their efficiency will greatly increase. The Network based positioning is also feasible for network operators as it would help them to implement location sensitive billing and location related services. Thus based on a certain location the operator can implement a specific price plan e.g. less price calls to home or office number. It will also help them to generate more revenue. Another advantage of network based techniques is the security of the subscribers. Using an algorithm at network side also ensures that the position of subscriber is known only to emergency service or mobile operator. Thus it also increases the safety and security of the subscribers. The network based techniques have several advantages like low cost, ease of implementation, implementation using existing technologies and methods, beneficial for a large number of people. However, the main issue with this technique is its accuracy. Despite a number of efforts to reduce error and increase accuracy there is still no unbiased estimation method present. All of the methods produce good results under certain conditions or circumstances. Thus there is no general prediction for result using an algorithm. The main problems in incorrect positioning are multipath propagation, fading and low SNR. The efforts are continuously being made to minimize these and hence increase accuracy and thus performance. The project will emphasize on comparing various existing network based location techniques. Some of the common techniques will be studied in detail. Base on these existing methods, a number of positioning algorithms are also studied in detail to implement major positioning techniques. The algorithms will then be implemented using MATLAB. The results of algorithms will be compared to actual position of mobile station so as to measure the performance of each of them. Final thing is to develop an online benchmarking tool to compare location evaluation estimates using different techniques. The tool should be able to run user uploaded measurements in to its own algorithms. The results will then be compared to user submitted results to perform a benchmark. Existing Literature Review A number of mobile location techniques are common nowadays. These techniques can be divided into three main types: Mobile Based Techniques Network Based Techniques Indirect Techniques These techniques are briefly explained below: Mobile Based Techniques: In this method, a number of geographically separated transmitters are used by the mobile station to exploit its own position. It is also known as Self Positioning. Thus mobile station (MS) locates itself by using signals from a number of transmitters or base stations (BS). Example of mobile based positioning is GPS and A-GPS. In GPS based positioning GPS receiver uses signals from geographically distributed satellites to exploit its own position. Network Based Techniques: This method uses a number of transmitters in a network to locate position of an unknown receiver. It uses resources of the network only. The signals from the MS are used by a number of BS to locate the MS. This technique can be implemented using different type of parameters e.g. Cell Global Identity (CGI), Cell Global Identity with Timing Advance (CGI-TA), Enhanced Cell Global Identity (E-CGI), Time of Arrival (TOA), Angle of Arrival (AOA), Time Difference of Arrival (TDOA). Indirect Techniques: In this technique mobile or network can be assisted to locate a mobile station. Thus base station can send positioning data to mobile station to locate itself. Similarly measurements can be uploaded from MS to BS to locate mobile station. It involves measurements sent from MS to BS for positioning at BS or vice versa. There are a number of network based mobile positioning techniques in use today. In such techniques a number of involved base stations (BS) use signal from mobile station (MS) to locate the position of MS. The common methods are Signal Strength, Time of Arrival, Time Difference of Arrival, Angle of Arrival, or hybrid techniques. Each of the existing method has its own advantages and disadvantages. A major problem with all methods is the accuracy. It depends on cell size, cell environment, number of cells, multipath propagations and distance between MS and serving base station. Some other common parameters for performance measurement include applicability, robustness, etc. The existing methods have been described in detail below: Cell Global Identity: The CGI method to locate a mobile user is most easy and straight forward. In this method, the position of mobile user is estimated by using the cell identity of serving base station. Thus the mobile can be located anywhere in a call coverage area. It is very simple to implement. However, the positioning error may range from a few meters to a few kilometres. The accuracy will be dependent on the size of serving base station. Another problem with this method is that mobile station is not always connected to nearest base station. In this case the location of mobile cannot be even estimated. Enhanced-CGI: To overcome errors in basic CGI technique another method is used. The basic idea was to split the coverage area of a base station into two or more areas, mostly three 120 degree areas. Each area within a base station can then be issued with a separate identity. Hence in this way the position of mobile can be narrow down to a small area. Although this method is easy to implement yet error is large enough from practical point of view. CGI with Timing Advance: The CGI technique can also be improved by using the timing advance feature of GSM. Timing advance is a value that corresponds to the time it takes for a signal to reach from MS to BS. In GSM timing advance is a feature used by the base station to synchronise with mobile station. On step timing advance is equal to a change in 1100 m of round-trip time (the time signal takes to reach from base station to mobile and then back to base station). The timing advance is assigned by base station for each mobile station. Using the timing advance feature a mobile user can be located within 550 meters approximately. Time of Arrival: Although CGI method provides a good estimation of mobile position, the error is still large enough from emergency view point. Another method to locate mobile is using the arrival time of signals at base stations involved. The distance of mobile can be estimated by using information about time of arrival i.e. D = t / c Where t is the time of arrival of signal at base station and c is the speed of light. The distance will be the estimated mobile position. However the mobile can be located anywhere on circular path centred at base station and radius equal to estimated distance D. The exact position of mobile can be estimated by using same type of measurements from two other neighbouring base stations. Ideally the positioning circles from all the three base stations must intersect at a point, which will be the position of mobile. However, practically, the circles dont intersect at a single point rather they make a small area in which the mobile is potentially located. This method is really better than CGI because it gives more accurate results. The time of arrival method requires accurate synchronization or reference between mobile and base station to correctly measure the arrival time. The results, however, depends on environment of cell clutter, atmospheric conditions, and multipath propagation. In worst atmospheric conditions the results may vary severely. Angle of Arrival: In this method the position of the mobile is located by using the direction of signal arriving from mobile station to the serving and, at least one other base station. The direction or angle of arrival is measured at base station by using arrays of antennas. Angle measurement at one base station will give the position of mobile to be located at a straight line at a certain angle with base station. Measurement from another involved base station will produce another positioning line. Ideally the mobile must be located at the intersection of two lines from involved base stations. In practice, however, they may not intersect at all at a single point. The angle of arrival is good because it can be implemented using a small number of base stations. Thus it is best when the number of base stations visible to mobile is very low. The angle of arrival method is very sensitive to measurement errors of angle. So a very small error in angle measurement results in a much larger error in position o f mobile. Time Difference of Arrival: The time of arrival method requires a strict synchronisation or reference between mobile and base station. To overcome this problem, the difference of arrival time at a pair of base station is used for measurements. A pair of base stations is used to record one time difference measurement. The result will be a circle on which mobile can be anywhere. Ideally the three circles will intersect at one point. This point will be the position of mobile. In actual practice the method will give a small area in which mobile must be located. The difference of arrival time eliminates the need of synchronisation as required by time of arrival. This method can be used as to run entirely on network side or to run with mobile assistance. The performance of time difference method is greatly improved than time of arrival. The main advantage of this method is elimination of timing requirement. However, on the other hand, the number of involved base station must be at least four including primary base st ation. Thus only then three sets of measurements can be obtained. The time difference of arrival method is more frequently used due to ease of implementation. Data correlation method: The Database Correlation Method makes use of the signal information seen by mobile station. The signal information from all of the coverage area seen by mobile station is stored in a database at network side. The signal information may include signal strength, signal timing, signal delay etc. When position of the mobile is required, the stored data in database is used by a positioning server to do so. The signal measurements sent to the database depends on the environment. The resolution of such measurements must be set so as to achieve certain accuracy. In GSM a sub-band resolution is used by the Base Station Controller (BSC) to facilitate the handover process. Pilot Correlation Method: Algorithms Search: There are a number of positioning algorithms in present literature. These algorithms make use of the measurements done by the mobile station. The measurements required for each algorithm may vary. However, some common measurements may include Cell ID, LAC, Signal Strength, Timing Advance, Time of Arrival, and Direction (Angle) of Arrival. Also these measurements may be carried out only on network side i.e., by primary base station or they can be performed with assistance of mobile station. The algorithms for all of the major positioning methods are studied in detail. Although there is a large number of algorithms in literature yet each of them has own advantages and disadvantages. Each algorithm is based on some assumptions and limitations. For this reason we can not say which one is best. But the one which gives acceptable accuracy is thought to be the good one. Cell Global Identity (CGI): The Cell ID is the very basic method to locate mobile station. It is used to make a rough estimate of mobile position. With this method the mobile can be located anywhere within a cell. Thus the accuracy is very poor. The mobile station measures periodically the id of serving base station and up to 6 neighbouring base station. Thus no special algorithm is needed to locate Cell ID. By looking at mobile measurements the Cell ID can be located. Enhanced Cell ID: Due to very poor accuracy of basic Cell ID, a number of enhancements have been made to it. Thus measurements like signal strength, Timing Advance can be used in conjunction with Cell ID to improve accuracy. Two algorithms which show good results are Enhancement to CGI using Signal Strength and Positioning using Timing Advance. In the first algorithm the signal strength is taken as a parameter. The power received by mobile station from primary base station and up to six neighbouring cells is feedback to primary base station. The primary base station thus knows the power transmitted by it and power received by mobile station. Then the distance calculation is possible by using the known path loss. Using Okumura-Hata Path Loss model [4] the distance between mobile and base station is calculated. The mathematical form of this model is [4]; Urban areas: LdB = A + B log10 R E Suburban areas: LdB = A + B log10 R C Open areas: LdB = A + B log10 R D A = 69.55 + 26.16 log10 fc 13.82 log10 hb B = 44.9 6.55 log10 hb C = 2 (log10 (fc / 28))2 + 5.4 D = 4.78 ( log10 fc )2 + 18.33 log10 fc + 40.94 E = 3.2 ( log10 ( 11.7554 hm ))2 4.97 for large cities, fc = 300MHz E = 8.29 ( log10 ( 1.54 hm ))2 1.1 for large cities, fc E = ( 1.1 log10 fc 0.7 ) hm ( 1.56 log10 fc 0.8 ) for medium to small cities Definition of parameters: hm mobile station antenna height above local terrain height [m] dm distance between the mobile and the building h0 typically height of a building above local terrain height [m] lhbbase station antenna height above local terrain height [m] rgreat circle distance between base station and mobile [m] R=r x 10-3 great circle distance between base station and mobile [km] f carrier frequency [Hz] fc=f x 10-6 carrier frequency [MHz] ? free space wavelength [m] This model is fairly simple so it is used for a large number of situations. The distance calculation is easy from this model using known path loss in pre-defined environment. The mobile will be located anywhere on the circle of estimated distance with centre at base station. A minimum of three base stations are used for such measurements. Ideally the three circles will intersect at a single point. This point will be the position of mobile station. The triangulation technique is used to find the intersection coordinates of circles. Time of Arrival: Although CGI provides the position of mobile station yet the accuracy is not sufficient for many purposes. To improve accuracy the time of arrival method is used. It gives good results than CGI in most of the situations. A number of algorithms describing time of arrival method are in literature. Each of them has some advantages and some short comings. Also each algorithm works best under some specific conditions e.g. in line of sight (LOS) or non-line of sight (NLOS) conditions. A good algorithm which gives acceptable results in many situations is A Constrained Least Squares Approach to Mobile Positioning: Algorithms and Optimality. This algorithm uses a least square approach to estimate position of mobile station. The distance between mobile station and base station is estimated by using the fact that signals travel in free space at a speed equal to speed of light. Thus mathematically, Di =Ti / c i = 1, 2 N Where D is the estimated distance, T is the TOA measurement, i denote the number of base station and c is the speed of light. The mobile station will be located anywhere on the circle with radius D centered at base station i. Same TOA measurements are performed by at least three base stations. The position of mobile will be the intersection of three circles. Ideally this will be a single point. But in practice, due to multipath propagation and fading, it will give a small area. The mobile station will be located in this area. To reduce positioning error the algorithm uses a least square error approach. Thus the distance between every point in that area and each mobile station is calculated. The point where the sum of squares of distances is minimized will be the estimated position of mobile station. To get TOA measurements, base station and mobile station must be synchronized properly or there must be a reference point. Thus a strict timing requirement is necessary. Angle of Arrival: In LOS conditions this method is the best to use. A number of algorithms describing this method are in literature. All of these algorithms require a dominant LOS path to correctly perform angle of arrival measurements at base station. Thus this method is best in open areas and suburban areas. In dense urban environment this technique produces severe errors due to NLOS and multipath propagation. A number of algorithms are studied in detail. A good algorithm is A Constrained Least Squares Approach to Mobile Positioning: Algorithms and Optimality. It produces results with acceptable accuracy. According to this algorithm, to perform angle of arrival measurements, base station must be provided with multiple antenna arrays. A minimum of two base stations will be required to perform such measurements. The signal from mobile station will reach base station at a certain angle with horizontal axis. This angle can be measured by base station using antenna arrays. Mathematically, it is given by tan (fi) =(y yi / x xi) , i = 1, 2, . . . , M. The angle of arrival measurement from one base station will result in a straight line. This line is also called Line of Bearing (LOB). It will be at a certain angle between horizontal axis and base station. The mobile will be located any where on the LOB. A similar measurement will be done using another involved base station. It will result in producing another angle of arrival or LOB. The point where the two line of bearing intersects will be the position of mobile station. Ideally two lines will intersect at a unique point. However, practically they may not intersect at a point. In this situation the angle of arrival method need further measurements from other involved base station. This method produces very accurate results in LOS situation. However, the results depend critically on the measured angle. Thus a very small error in angle measurement may lead to positioning error of hundreds of meters. Another disadvantage is the cost of this method. It requires antenna arrays at each base station to measure AOA. Hence cost of implementation increases. Time Difference of Arrival: The time difference of arrival uses the difference in arrival times of signals at a pair of base stations. The time difference of arrival measurements are done with reference to primary base station. A good algorithm in literature is the Performance Comparison of TOA and TDOA Based Location Estimation Algorithms in LOS Environment. It explains the working of different types of TDOA approach. It also compares the performance of each of the type. However it uses a LOS approach. In open areas LOS assumption is valid but in heavily populated urban areas this assumption is invalid. Another good algorithm which explains the TDOA measurements is is A Constrained Least Squares Approach to Mobile Positioning: Algorithms and Optimality . In this algorithm, the primary (Serving) base station is the reference base station. The time of arrival measurements are performed using the reference base station. Thus the estimated distance between mobile station and reference base station is d1 and that of mobile station and a neighbouring base station is di. Thus the TDOA measurements are given by, d1 = t1 / c di = ti / c, i = 2,3 .. N Where d1 is the distance between mobile station and reference (primary) base station and di are the distances between mobile station and other three neighbouring base stations. The TDOA measurement between reference and second base station is given by TDOA= d1-di i = 2,3, .N This will be the error free TDOA measurement at a pair of base stations. The measurement including error is given by; TDOA= (d1 di) + error The error is modelled as a Gaussian distributed random variable with zero-mean. Such measurements are taken from at least three pairs of base stations. The triangulation technique is then employed to get the position of mobile station. The TDOA method is superior to time of arrival (TOA) in sense that it eliminates the need for timing reference. Thus it is easy to implement. Due to no timing requirement TDOA method is more frequently used than TOA method. Database correlation method: Despite of a number of algorithm which perform fairly well in urban areas there is still a need to further improve it. Due to severe multipath and fading effects LOS assumption is not valid in urban areas. The Database Correlation Method is a good method to counter effect multi path and fading. It can be implemented by utilizing the measurements performed in existing GSM systems. It can be implemented by making Signal Strength as a parameter. A ggod algorithm to implement Database Correlation Method is Database Correlation Method for GSM Location by Heikki Laitinen, Jaakko Lahteenmaki, Tero Nordstrom'. In this algorithm the DCM is implemented by using signal strength measurements performed by handset. The algorithm explains the way database correlation method can be implemented in GSM. The measurements performed in the coverage area are performed by mobile station and are stored in database. Thus the database will consists pre-measured samples of signal measurements in the coverage l ocation. When the need to locate mobile station arises, the primary base station asks mobile station to perform signal strength measurements and feedback to it. The BS sends these measurements to location server. The location server then calculates the difference between stored fingerprint and actual measurement. The point where the difference between fingerprint and actual measurement is minimum will be the estimated position of mobile station. The estimated position will also contain some error in it due to fading, NLOS path and multipath propagation. However this error will be drastically less than the error in other techniques applied under same conditions. The database correlation method has the advantage that it can be implemented in any type of system like GSM, CDMA,UMTS,etc. References: Network-Based Wireless Location IEEE SIGNAL PROCESSING MAGAZINE JULY 2005 A New Time-Based Algorithm for Positioning Mobile Terminals in Wireless NetworksIsrael Martin-Escalona and Francisco Barcelo-Arroyo, EURASIP Journal on Advances in Signal Processing Mobile Positioning Using Wireless NetworksIEEE SIGNAL PROCESSING MAGAZINE JULY 2005 Path loss models S-72.333 Physical layer methods in wireless communication systems Sylvain Ranvier / Radio Laboratory / TKK 23 November 2004 Performance Comparison of TOA and TDOA Based Location Estimation Algorithms in LOS Environment Guowei Shen, Rudolf Zetik, and Reiner S. Thoma A Constrained Least Squares Approach to Mobile Positioning: Algorithms and Optimality K.W. Cheung,1 H. C. So,1 W.-K.Ma,2 and Y. T. Chan3 Database Correlation Method for GSM Location Heikki Laitinen, Jaakko Lahteenmaki, Tero Nordstrom

Saturday, July 20, 2019

Computer Crimes of Today :: essays research papers fc

Computer Crimes on the Internet Thesis: Emerging with the Internet, a group of elite cyber-surfers have turned into todayà ­s computer hackers. Software piracy is a major crime on the Net. $7.5 billion of American Software is stolen each year. Industrial Espionage is gaining access to remote sites illegally. Stealing of information from corporate sites is extremely illegal. Password Sniffers are used to get someoneà ­s password. IP spoofers changes your identity. Many things can be stolen from companies. III. Email hacking is common. Mail bombs are thousands of messages send to a single address. Email forgery can cause people reputations to get ruined. Anonymous Email is illegal. Fraud is very common. Pyramid schemes are nothing but a scam. Credit card fraud is a half billion dollar a year scam. Computer viruses are destructive to computers. Computer viruses can be attached to Email messages. 99% of all computer viruses are detectable. Computer Crimes on the Internet Its the 90à ­s, the dawn of the computer age. With technology changing and evolving everyday, it may seem hard not to slip behind in this ever changing world. The Information Super-Highway has been following computers throughout the past few years. Along with the Internet, an emerging group of elite cyber-surfers have turned into todayà ­s computer hackers. Most people donà ­t know about them, most people donà ­t know they exist, but they are out there, lurking in the shadows, waiting for there next victim. It can be a scary world out there (Welcome to the Internet). In reality it is not nearly as bad as it sounds, and chances are it wonà ­t happen to you.   Ã‚  Ã‚  Ã‚  Ã‚  There are many fields of hacking on the Internet. The most popular type of hacking is software piracy. à ¬According to estimates by the US Software Piracy Association, as much as $7.5 billion of American software may be illegally copied and distributed annually worldwideà ®(Ferrell13). Hackers à ¬pirateà ® software merely by uploading software bought in a store to the Internet. Uploading is send information from point A(client) to point B(host); downloading is the opposite. Once it is uploaded to the Internet, people all over the world have access to it. From there, hackers trade and distribute the software, which in hacker jargon is warez.   Ã‚  Ã‚  Ã‚  Ã‚  Industrial Espionage is another main concern on the Internet. Most recently, the FBIà ­s World Wide Web page hacked and turned into a racial hate page. Anyone can access files from a WWW page, but changing them is very hard. That is why most hackers donà ­t even bother with it. CNET stated à ¬This Web site should have been among the safest and most secure in the world, yet late in 1996, it got hacked.

Friday, July 19, 2019

English Society in the Nineteenth Century in Conan Doyles Works :: Sir Arthur Conan Doyle Silver Band Essays

English Society in the Nineteenth Century in Conan Doyle's Works For my essay I have decided to study Sir Arthur Conan Doyle's "Speckled Band", "Silver Blaze" and "Final Problem". Sir Arthur Conan Doyle's Sherlock Holmes stories were first published in the London magazine "The Strand" in 1892. All the stories were kept relatively short because they had to be published in the magazine. When the Sherlock Holmes story "The Final Problem" there was a large public out cry of shock and horror to the death of the character they had got very attached to over the last 5 - 7 years. His stories were of a detective genre. The Victorian period was mainly built on a class system almost pyramid like. At the very bottom there was the people who could not support themselves, e.g. Beggars etc. Further up there was the lower class that worked in the factories and could just about support them. On the same level of the lower class were the servants. The next level up was the Labourers who worked for/with the working class and upper classes. The Working class were the next ones up they were the Doctors etc, e.g. Dr Watson. The next class up was the middle class; they lived off inheritance and owned factories. Upper class owned a lot of land and factories they lived in the country. Next up were the Aristocrats, lords, ladies etc these people did not need to work, they were the ones one step down from the King or queen. Women and children of higher classes did not have to work, the children received a good education and the women stayed at home. But the lower classed women and children had to work in factories to support their families. Industrial revolution gave the lower classes a source of money in the cities, most people left the country life to live in the cities and make more money. They lived in poor housing conditions called slums and made little money, some even resorted to crime. When Sir Arthur Conan Doyle wrote Sherlock Holmes a lot of people had lost faith in the London police, as there was a lot of corruption, Sherlock shows this by showing that he is a lot cleverer than the police force. He really does show the police up to no extent. The stories are written in first person by Dr.Watson who uses his notes and memory to write them. All the stories are based on detective genre with a very big twist in the end and clues that only Sherlock picks up on. Sherlock Holmes' character fits perfectly in his class as

Thursday, July 18, 2019

Compare and Contrast Remember and A Birthday by Christina Rossetti Essa

Compare and Contrast Remember and A Birthday by Christina Rossetti Christina Rossetti was born in Victorian England and grew up in the pre-Raphaelite era. Coming from a well educated family she drew influence for her poems from her surroundings and experiences. In ‘A Birthday’, she looks at the celebration of finding new love. She is overjoyed because her love is reciprocated and wants to make a new beginning with this man spending the rest of her life with him raising a family. A Birthday is filled with joy, happiness and anticipation of what life will be like with her new love. Whereas ‘Remember’ is very different; she must prepare her lifelong lover/husband for her death. The tone of joy is therefore replaced by a much sadder tone reflecting her struggle and unhappiness. Both poems are carefully structured. ‘A birthday’ is written in two verses. The first verse contains three similes and a comparative and the second uses three imperatives (raise me, carve it, work it) and in the final lines of both verses the reason for the joy and making of the room are given. Whereas ‘Remember’ is a petrarchan sonnet. It consists of many short phrases and gentle words which further illustrates the feeling of tiredness. The punctuation and lines mirror her difficulties to speak throughout the poem. In ‘A Birthday’ repletion of the phrase ‘my heart’ is used, this is to illustrate the feelings in her heart of joy, happiness and excitement that her love has been reciprocated by the one she loves. It gives the idea that her heart is the most important thing at this moment and it is affecting the actions of the rest of her body. In contrast in ‘Remember’ the word ‘remember’ is repeated to emphasise the idea that when... ...ws at first he will spend every moment thinking and grieving for her but with the gradual progression of time he may forget her from time to time; and for this he ma feel guilty. She is thinking ahead to the time when he won’t think of her in the natural flow of time which is imperceptible to him. The fact he has now accepted she is going to die she can give him instructions and talk about death and the grave in a real way. Such as the idea of darkness in the grave and how the body will decompose. She asks him to hold her in his heart and record her in his everlasting memories this compares with the idea of responsibility that comes with love which is described in ‘A Birthday’. She finally reassure him that if he does forget her he won’t be a traitor to her because she wants him to be happy and doesn’t want her death to be the end of his happiness forever. Compare and Contrast Remember and A Birthday by Christina Rossetti Essa Compare and Contrast Remember and A Birthday by Christina Rossetti Christina Rossetti was born in Victorian England and grew up in the pre-Raphaelite era. Coming from a well educated family she drew influence for her poems from her surroundings and experiences. In ‘A Birthday’, she looks at the celebration of finding new love. She is overjoyed because her love is reciprocated and wants to make a new beginning with this man spending the rest of her life with him raising a family. A Birthday is filled with joy, happiness and anticipation of what life will be like with her new love. Whereas ‘Remember’ is very different; she must prepare her lifelong lover/husband for her death. The tone of joy is therefore replaced by a much sadder tone reflecting her struggle and unhappiness. Both poems are carefully structured. ‘A birthday’ is written in two verses. The first verse contains three similes and a comparative and the second uses three imperatives (raise me, carve it, work it) and in the final lines of both verses the reason for the joy and making of the room are given. Whereas ‘Remember’ is a petrarchan sonnet. It consists of many short phrases and gentle words which further illustrates the feeling of tiredness. The punctuation and lines mirror her difficulties to speak throughout the poem. In ‘A Birthday’ repletion of the phrase ‘my heart’ is used, this is to illustrate the feelings in her heart of joy, happiness and excitement that her love has been reciprocated by the one she loves. It gives the idea that her heart is the most important thing at this moment and it is affecting the actions of the rest of her body. In contrast in ‘Remember’ the word ‘remember’ is repeated to emphasise the idea that when... ...ws at first he will spend every moment thinking and grieving for her but with the gradual progression of time he may forget her from time to time; and for this he ma feel guilty. She is thinking ahead to the time when he won’t think of her in the natural flow of time which is imperceptible to him. The fact he has now accepted she is going to die she can give him instructions and talk about death and the grave in a real way. Such as the idea of darkness in the grave and how the body will decompose. She asks him to hold her in his heart and record her in his everlasting memories this compares with the idea of responsibility that comes with love which is described in ‘A Birthday’. She finally reassure him that if he does forget her he won’t be a traitor to her because she wants him to be happy and doesn’t want her death to be the end of his happiness forever.

Health History Essay

Health assessment thus plays an important role to provide information about one’s health. Assessment is the first step in the nursing process and includes collection, verification, organization, interpretation and documentation of data. (Sue C. DeLaune and Patriciak . Ladner,2011) Almost every admitted patient the first time required the implementation of the health assessment to determine their health condition to enable healthcare plans and implementation what they need to do. On way of organizing the information that nurse need to collect is by using a nursing framework . A framework for assessment , the nurse systematically collecting the physical, psychological, socio cultural and different aspects of the activities of living. There are a number of organizing frameworks for collection of data. For example, the Gordon’s functional health patterns. Many health care agencies use an admission assessment format which assists the nurse in collecting data in specific categories of functioning. Richard Hogston and Penelope M. Simpson,2002) Most of the hospital and health care agencies have developed their own structured assessment tools. The following will be relatively compare by using Gordon’s Functional Health Patterns as framework between the assessment from health care setting is currently using about interview on an adult. Compare these two interviews in term of structure, comprehensiveness, and applicability. Structure  Gordon’s functional health patterns, which are consistent with the human need philosophy, can provide a framework for nursing education. The eleven functional health patterns identified by Gordon’s are as follow: Health Perception and Management, Activity and Exercise, Nutrition and Metabolism, Elimination, Sleep and Rest, Congnition and Perception, Self-Perception and Self-Concept, Roles and Relationships, Coping and stress Management, Sexuality and Reproduction, Values and Beliefs. Carol R. Taylor, Priscilla Lemone, Carol Lillis, Pamcla Lynn, 2008) These functional health patterns areas allow gathering and clustering of information about a patient’s usual patterns and any recent changes in order to decide if the patient’s response is functional or dysfunctional. If the assessment is effective or positive that will not have to deal. If the results of the assessment is invalid or negative that will have to deal with through nursing care plan. The assessment from health care setting which are consistent with Profile such as name, age, sex, religion, reason for seeking healthcare, family history, allergy history, health history, current health status, self-care ability, general condition, consciousness, communicative ability, language, nutritional state, skin state, limbs, special senses, emotional state, daily habits ,leisure, introduction of environment, use of facilities, religion and risk assessment . The assessment from health care setting as the same as Gordon’s functional assessment are including Health-Perception Health-Management, Elimination, Nutritional-Metabolic, Activity- exercise, Value-belief patterns and Sleep-rest. Not the same as Gordon’s functional assessment form, the assessment from health care did not mention of Congnitive- Perception, Self-Perception-Self Concept, Role-Relationship, Sexuality-Reproductive and Coping-Stress-Tolerance. The assessment form health care setting can be divided into seven section including Biographical data, Reason for seeking health care provider, History of present health concern, Rest health history, Family health history, review of body systems for current health problem, life-style and health practices profile. The Gordon’s functional pattern mainly is open-ended questions such as have you religions beliefs helped you to deal with problems in the past? How? Contrary, the assessment from health care setting mainly is closed-ended question such as what is your religion. The Gordon’s functional health patterns is more concentrated. Each type of health patterns divided into objective and subjective information. The assessment from health care setting structure is more untrammeled. The same types of problems can be classified into different types of items such as nutritional state it can be combine with diet of daily habits. Comprehensiveness Gordon’s functional health patterns is a method devised by Marjory Gordon to be used by the nurse in the nursing process to provide more comprehensive assessment of the patient. Gordon emphasizes that the eleven functional patterns artificially divided integrated human functioning. Eleven functional health patterns described as follows. Health Perception and Health Management. It’s focused on the person’s perceived level of health and well-being, and on practices for maintaining health. Nutritional Metabolic Pattern it’s focused on the pattern of food and fluid consumption relative to metabolic need. Elimination Pattern. It’s focused on excretory patterns (bowel, bladder, skin). Activity and Exercise Pattern. It’s focused on the activities of daily living requiring energy expenditure, including self-care activities, exercise, and leisure activities. Cognitive-Perceptual Pattern. It’s focused on the ability to comprehend and use information and on the sensory functions. Neurologic functions, Sensory experiences such as pain and altered sensory input. Sleep Rest Pattern. It’s focused on the person’s sleep, rest, and relaxation practices. Self-Perception-Self-Concept Pattern its focused on the person’s attitudes toward self, including identity, body image, and sense of self-worth. Role-Relationship Pattern. It’s focused on the person’s roles in the world and relationships with others. Sexuality and Reproduction. It’s focused on the person’s satisfaction or dissatisfaction with sexuality patterns and reproductive functions. Coping-Stress Tolerance Pattern. its focused on the person’s perception of stress and coping strategies Support systems, evaluated symptoms of stress, effectiveness of a person’s coping strategies. Value-Belief Pattern it’s focused on the person’s values and beliefs. (Janet Weber, Jane Kelly ,1998) Indeed, Gordon’s functional health pattern can reflect the potential of the patient health problem. The assessment from health care setting is less comprehensive than Gordon’s patterns. The assessment from health institution reflect the patient’s admission status, previous health status, daily habits and risk assessment. The form are lack of assess such as congnitive and percepyual, sexuality and reproductive, role and relationship, self-perception and self concept, coping and stress. It is not difficult to find Gordon functional assessment are more detailed than assessment form health care setting. For example, Gordon functional assessment including nutritional metabolic that it contain skin examination. Mucous membranes, edema status, thyroid status, gag reflex and assess jugular vein distention etc. On the contrary, the assessment from health institution about nutritional status can only choose normal or abnormal. It is lack of sufficient information than Gordon’s patterns. In addition, the case of infertility patient often leads to significant pressure for fear of failed surgery. After the embryo transfer, she have to face with the failure of implantation. Both physically and mentally cause to great pressure. According Gordon’s assessment, form coping –stress tolerance pattern, it is able to know patient was very unhappy because of infertility. Patient thought it is too much pressure if the embryo cannot implantation. Nurse can give psychological counseling to the patient that allows patient to reduce stress through assessment. In comparison of assessment from health institution, it is not mention about coping-stress tolerance patterns. So there is no assess of the infertility patient that need to take care of their psychologic problem. Compare with two different assessment form, Gordon’s patterns was more comprehensive than assessment from health institution, but it is not the most comprehensive assessment. If two new domains add to the assessment tool safety/protection and growth/development that the assessment will become more complete. Safety/Protection for a risk of injury as a result of the interaction of environmental conditions interacting with the individual’s adaptive and defensive resources. (Wilson Giddens,2001) Growth and Development for altered physical growth, typical of age group, inability to perform self –care or self control activities appropriate for age etc. (Wilson Giddens,2001) Through these two items that nurse can prevent some of risk environment and assess patient growth/development to let nurse understanding what problem patient have be exist. Applicability Gordon’s patterns can provide extensive and detailed information that can reflect patient’s health status but it is very time-consuming and may have to one hour or more. It is not difficult to imagine that nurse have to deal with numerous new patients in each day. The situation is difficult to use Gordon’s patterns to assess patient’s condition in the limited manpower especially at the night duty. Second, patient discharged from hospital earlier than before because based on cost-effectiveness and patient well-being. For example in-vitro fertilization(IVF), colonoscopy, inguinal hernia such as this operation usually encourage patients rest in the day care center replace of stay in the hospital for a few day. This situation need nurse faster and more efficient assess of the patient condition. Third, patient admitted to hospital in a critical situation simply can not conduct a detailed physical assessment. In this situation like cardiac arrest, choking, an immediate diagnosis is needed to provide prompt treatment. That why initial comprehensive assessment like Gordon’s assessment is not suitable for this condition. Fourth, the patient’s disease information may have already obtained by the attending doctor before patient admission. Therefore it is not meaningful for the nurse to collect the same health’s information. The nurse can more in-depth to assess patient base on the information obtained by doctors. For this IVF case, it suggest using a assessment from institution. Compare with Gordon’s assessment, it easy showed cause of admission and patient;s general condition. The Gordon’s assessment of many question is irrelevant. For example, general appearance is no need to assess for the IVF case. On the other hand ,embryo transfer just a minor surgery that patient are not request stay in hospital . Using simple assessment like assessment from institution for the sake of save more time and work more effectively. Gordon’s assessment is more complex than assessment from institution so assessment from institution it is more applicable than Gordon’s assessment form. Conclusion There are many nursing assessment frameworks have been developed. The most widely used organize frameworks for nursing diagnoses it based on functional health patterns described by Gordon. Using systematic guidelines specifically developed for a nursing assessment ensures that comprehensive, holistic data are collected for each patient. Health care institutions establish a minimum data set that specifies the information that must be collective from every patient and use a structured assessment form to organize or cluster this data. A nurse chooses a particular framework for a variety of reason. Choice may be based on what is used in the particular health care institution or nursing needs of a particular patient population.