Wednesday, November 27, 2019

Arab Woman to Gain Quotas

Arab Woman to Gain Quotas Free Online Research Papers Quotas are setting up a percentage of or number or the representation of a certain group, in this case it will be women, most frequently in the form of a minimum percentage, for example a 20, 30 or 40 percent. Quotas are used as a measure to boost the representation of excluded or under-represented groups in politics in the past. In most of the countries quotas are target mostly to woman. It is targeted towards woman because the county was woman to take part in the county’s politics and it also helps woman’s to bring out the problems they face in the society and what the county can do to help them solve their problems. Quotas have been introduced in many countries, for example â€Å"Latin American, Argentina was the forerunner with its introduction of legal candidate quotas in 1991. Since then this type of quotas has spread all over the Latin-American region. In Africa, South Africa has inspired other countries in the region to adopt voluntary party quotas, while Uganda has led concerning reserved seats. In South Asia gender quotas at the local level have been introduced in recent years in Pakistan, India and Bangladesh, even if these three countries do not openly refer to experience made by their neighbors. â€Å"(Quota database, 2007) Pros Quotas for women do not differentiate, but compensate for real barriers that prevent women from their reasonable share of the political seats. Women have the right as citizens to equal participation. Womens experiences are needed in or should be addressed political life. Women are just as qualified and educated as men, but womens qualifications are looked down upon and minimized in a male-dominated political system. (Quota Database, 2007) Cons Quotas are against the principle of equal chance for all, since men are given less chance and woman are given more preference. Quotas are an undemocratic way; the voters should decided who should be chosen. Again a party should decide who should be in a party and who should be selected to represent a party. Quota again tells that people are elected on the base of their gender and not on their education qualification; and the candidates who are eligible for election are kept aside. (Quota Database, 2007) Many of the non democratic countries like the Arab countries and African countries do not allow woman to take part in politics. In these countries women’s groups have been actively involved to help woman to take part or get seats in politics. Let us now take a look at how woman in the Middle Eastern regions are treated. Woman in the Middle Eastern region have been seen as an oppressed group. From the sand deserts of Saudi Arabia to the hilly lands of Afghanistan, Arab woman have faced many problems in society. The role of any woman around the world is seen nurturing and meant to be taken care of the family, even in the Middle Eastern regions woman have been seen as nurturing and home makers. But many of the women have moved on to a more new outlook they have take roles as educators and laborers. Arab woman are threatening the traditional Arab family structure by moving to a modern view, however many of the woman are willing to make the sacrifice, to see the world has more to offer them than just family circle responsibility and childbearing. Islam religion allows their woman to be educated and also to earn a separate income from their husband. As Arab woman continue to seek education and continue their jobs, society’s anticipation over them, giving more power to those who are against these a ctions. In the past decades , the number of Arab woman in work force have rise, and have included a solid education in their early life achievements. The idea of an educated and successful woman started lond time back, it dates back to almost 1500 years when Prophet Muhammad wife Khadija, she owned her own caravan and was her own employer, and she was successful at that. After the death of the Prophet the status and important of woman started declining slowly. Due to this many feminist movements started taking place. Even though these feminist movements encouraged Arab woman to raise in society only a handful were able to attain that, many countries like Saudi Arabia still held their woman back. Muslims have taken Islam religion very seriously, while each Middle Eastern county has its own set of rules. Majority of the Middle Eastern countries take a few things from the Islam religion and a few things are thrown out just to satisfy with they want to achieve. This still happens in Saudi Arabia and Yemen. While a few countries do not permit woman to work, majority of the countries allow their woman to wok, therefore the number of woman in workforce has risen and also rate of woman achieving education has risen. There are still many factors which keep the number of woman in workforce low. In many of the Arab countries girls get married at a very young age, they barely even complete their high school. Therefore these Arab families consist of many children is not an uncommon sight. These two factors are the many cause of Arab woman’s participation in work force. The role of a woman in the house is seen is always viewed as a doubtful as to whether or not she can move up to a position of power or authority. Here in the Middle Eastern region especially Saudi Arabia, men and woman are not allowed to work closely, things like a hand shake with a man and a woman is prohibited. At restaurants there will be different sitting area for men and woman and one for family area where a man and his wife and children can sit. Culture like this has a large influence on woman and their upcoming in work force. One country that is slightly advanced than the other Middle Eastern countries is Lebanon; the Lebanon government does not force their woman to wear a veil, communication between male and female is allowed publically. Lebanese woman have been given the freedom to sexually express them self. In many of the Middle Eastern families the son is educated and independent and the girl is made to work alongside to the mother in the house. They domesticate the female child at an early age and tell them that this is what they need to know. Even some parts of India, Bangladesh, Sir Lanka, woman are seen as a home maker and not fit for outside the home jobs. Even if they are they are give job like a secretarial post, or a teachers post. In Iran, woman joined the revolution to remove the Shah’s rule and played a very important role in helping. The Iranian women are now fighting against wearing the veil, and this battle they have to fight on their own. It is now up to them whether they want their freedom or not. Arab woman have become more active in their societies, they have taken part from politics to feminist movements. In Kuwait, woman made history or wrote a new chapter for all other woman in the Middle Eastern region to get involved in politics and government positions. Kuwait Parliamentary finally allowed woman to participate in election, which means which means they will participate in 2007 elections. Also a Kuwaiti woman started a campaign to run for position in municipal council in Kuwait. This is the first time woman has taken part in campaign like this since 1962. This is the first time an election campaign was organized by a woman. In 2006 Najah-al-Attar from Syria is the first woman ever to be elected or appointed in such a high position. She will be responsible for the cultural foreign policy. President Hafez Al Assad who was the president for nearly 30 years, Attar was the cultural minister during his rule. This kind of news is rare but encouraging to see woman being assigned to such high position in the Syrian government. It shows some progress on the uplifting status of woman among the Arab countries. It is good to see woman working in government and achieving such high position, it is also good to see that woman are not just treated as a symbol of domestic role. On 25th of March 2006, a news article tells us, a large number of woman in Iran have also started in working in Iranian police force, and the government wants more woman to work under crime related issues. There are around 2000 police woman, but the head of the police says that they still need around 8000 more. A police recruiter said in a Islamic state like Iran men and woman have the same amount of rights and they both have equal rights. So as there as there is a need for having policemen there is need to have policewoman too. In countries like Jordan woman are fighting to get seats in the parliament. In Morocco woman are roughly given 10% of 325 seats. A demand of quota for woman in Jordan is high. In many of the other Arab counties men feel a strong opposition to quota system and feel that political process should not be interfered with. In the year 2002 in October, all eight women lost to men even when most of them who voted were woman. Some say that this is because of the culture; woman will not vote for another woman and will vote for a men as they feel that men should the one in power. Since 1970 the number of girls in school has doubled which means that more girls are being educated. (Arab women demand quotas) Sheikha Yousef Hasan Al-Gerifi ran for city council in 2005 in Qatar. She can across many problem other woman around the world would have never faced. Since Qatar is a conservative country like its neighbor like Saudi, Sheikha Yousef Hasan Al-Gerifi’d family did not allow her to put her picture on her campaign as woman there are supposed to be wearing the Veil. But the most important that maters here is she won the election. Political scientist Hala Mustafa of Egypts al-Ahram Foundation says that woman have a small or very little power in the field of politics. In Saudi Arabia woman are granted a few political rights as compared to other countries, recently two woman were introduced to the chamber of commerce, it might be a small step but to the Arab Woman it is a very important step. Although many achievements have been made yet so much more has to be done. Arab woman have a lot of oppression yet to overcome. Like we have seen before Islam has given many rights to woman, the ones have held these rights back from woman are the males in the society. Islam religion has given their woman to right to education and earn income separate from their husband. There is a major battle between religion and culture. How will this battle be resolved? Will Arab woman give way to independence and forget their traditional duties? Will they be able to turn society as a whole, or will they be able to give justice to both worlds and bring on a new generation? Research Papers on Arab Woman to Gain QuotasDefinition of Export QuotasInfluences of Socio-Economic Status of Married MalesNever Been Kicked Out of a Place This NiceMind TravelHip-Hop is ArtAnalysis Of A Cosmetics Advertisement19 Century Society: A Deeply Divided EraPersonal Experience with Teen PregnancyResearch Process Part OneBringing Democracy to Africa

Sunday, November 24, 2019

Brigids trickery no match essays

Brigid's trickery no match essays Brigids trickery no match for Sam Spades wits One of the great attributes of great noirs is the constant battle between the anti-hero and the seductive female. In The Maltese Falcon, Sam Spade is always a few steps ahead of Brigid OShaughnessy, but in Double Indemnity Walter Neff is held onto the same track as Phyllis Dietrichson by her misleading charm. Even though it is fun to watch Sam toy with Brigids plans, The Maltese Falcon falls short of the noir element of the conniving, incanting broad with wits to match the engaging male, whereas Double Indemnity is a better demonstration of this feature of film noir. To begin with each characters personality and history help support this stand. Sam Spade rolls his own cigarettes, had an affair with his partners wife, and is a pirate eye. In most of the shots he shown taller and has a dark face or half lighted face, showing that he is not showing all of his cards. On the other hand Walter Neff smokes cigarettes that are already rolled, works for a company (not himself), and has a deathly weakness for the ladies. In most of the shots of Walter, except for the ones at the end, his face is lit up. Brigid we found out has been on the run for this falcon and has had no success and is in need of help to find the falcon. She is not that strong and goes from one man to another. When she realizes that she might be ripped of by her male friend, she goes to another man (Sam Spade) to help get the falcon and get rid of her friend. As for Phyllis, she is a broad to be match up to any man. We find out that she has killed before and will do so again. She is married and is having an affair with another man. She is dependent on men but in a different way. Phyllis doesnt need a man to do things for her; she can do it herself, unless there is more to be made. On the other side Brigid needs a man for help, she is not as self-supporting. ...

Thursday, November 21, 2019

What do you understand by the network society How has the network Essay

What do you understand by the network society How has the network society changed the ways in which we work and interact - Essay Example In essence globalization emerged with national boundaries becoming porous. Gradually, people began to view themselves as a ‘global village’ national and geographic boundaries began to disappear, and work began to have no distinction of time, space or organizational hierarchy in the information society (Malamud 1997). Through network society, Information, Communication Technology (ICTS) have come up with numerous social, political and economic phenomena, a term that emerged from various theorists to explain a society that is connected by mass and telecommunication networks. Additionally, the ICTs demonstrate a society as a transformation era from an industrial age to an information age, which is central to the working of the economy. This enables annihilation of space and facilitates globalization. Of importance to note is that, network society is a global network that has led to decentralization of organization from vertical hierarchies to horizontal corporations. Large corporations decentralize themselves as networks of semi-autonomous units (Barney 2004) In a network society there exist a network economy, which acts as a new, efficient form of organization of production, distribution and management that facilitates substantial increase in productivity growth rate especially in the United States and related countries that have adopted these new forms of economic organization. In fact, many businesses have increasingly adopted a virtual approach to work space. This situation has led to evolution of business into a large organization a network that contains workforce that is distributed over diverse locations and time zones. These working forms have continually created new cultures and forms of belonging, over and above, gaining identity (Nikravesh 2004). Social Networking In light of the network society, social network has enormously contributed to a global village as would be expected. Essentially, social networking incorporates informal, transien t forms of association such as gossip flow, mobilization of social movements and political movements with the inclusion of maintenance of patron -client relations, known or unknown to each other. Besides, social networking incorporates individuals or groups who are liked by a common bond, shared social status, similar or shared functions, as well as, geographic and cultural connection. Needless to mention, social networking as web based services that give individuals to generate a public or semi public profile that is within a bounded system. It further articulates a list of users with whom they share a connection over and above being able to see what has been generated by other users in the system (Dijk 2012). As part of the information age, social networking lays its focus building online communities of people who have share interests, or are interested in searching the interest of others. Such sites include facebook, my space, twitter among others. Communication in social net wor king includes instant messaging, email, blogging and many more. This makes it easier to maintain ties simultaneously with several people, a situation that would not be possible without the presence of ICTs. In workplaces, social networking has been rated as one among the technologies that have significantly led to business development in the twenty-first century. As a result of this, maintaining professional networking has become crucial to businesses in relation to project and teamwork. For instance, those organisations that have invested in social networking

Wednesday, November 20, 2019

The Spirit Catches You and You fall down Assignment

The Spirit Catches You and You fall down - Assignment Example I would answer respond ‘yes’ assumption that the author was evenhanded in her presentation of Hmong culture and medical culture. The tumultuous history has greatly influenced the Hmong culture. Their fighting and fleeing from persecution which made them undergo a lot of torturous events such as their livers and kidneys being extracted from their bodies. In this case, their culture includes many folktales and beliefs that relate to these events. For instance, the Hmong believed that the American doctors were feeding on the liver, kidneys and hearts of Hmong patients when they die. The Hmong’s view of medicine is opposite from the doctors’ concept. Western medicine is specialized and scientific. The Hmong perception of medicine is that life, death and life after death are interconnected. According to Anne, when Lia fainted, her parents assumed that her soul was frightened and thus fled from her body as a result (Fadiman, 28). The Hmong’s most important duty is to honour and conserve their religion. On the other hand, the doctor’s most important duties are to ensure the healing of a patient. This two aspects conflict when the doctor prescribes medicine for a Hmong patient and the Hmong patient chooses to ignore the doctor’s instructions because of religious and cultural values. Doctors should understand that the Hmong belief is that diseases occur as a result of fugitive souls and can be cure by sacrifice of animal shamanism (Fadiman, 77). In the same way, the Hmong society should understand that doctors are professionally trained to handle medical issues. In this case, both parties may find a common ground to argue or relate thus find a solution to conflict between traditional culture and modern medicine. Lia was eventually taken into foster care until she recovered fully. The foster care parents were amazed by Foua and Nao Kao decision of denying their daughter medical rights in regard to cultural beliefs

Sunday, November 17, 2019

There are five questions with different marks so question with 15 Essay

There are five questions with different marks so question with 15 marks have more word count ...even the answers should be suppo - Essay Example The world trade organisation (WTO) is one such body which is a contract enforcing governments to maintain their trade policies within the agreed upon rules. The core objectives are to set and enforce rules for global trade, to offer a forum for negotiating and scrutinizing further trade liberalization and to settle trade disputes. In addition, WTO seeks to enhance transparency in decision making process, assist developing nations gain fully from global trading system and cooperate with other global economic organisations. These objectives are similar to those of GATT, but WTO pursues these goals more comprehensively.1 The new Australian government is taking severe steps in its bid to uphold the Absolute Protection for Wild Whales Act 2013. In addition, the government of Australia seeks to ban entirely the importation, distribution and sale of whale and whale products within its borders. The government gives reasons that Japan and other governments have been weak in upholding the laws stipulated in the international whaling commission. The international whaling commission was set to introduce zero catching limits for profitable whaling as well as keeping whale catch limits under scrutiny. All this was in a bid to enhance and foster the recovery of depleted whale populations. The ban applies to the vending of domestic products and products from foreign countries. This includes goods that Australian travellers bring into the country from abroad. Article I: 1 Article I: 1 of the GATT 1947 prohibits discrimination among like products coming from or destined for different countries. In the Canada-autos case, the measure at issue was Canada’s duty exemption for imports by certain manufacturers in partnership with Canadian value added. Automobile imports and imported automobiles materials were the product at issue. The appellate body/ key panel upheld that duty exemption was inconsistent to the article I:1 on the grounds that the article covers de jure and de fa cto unfairness. Moreover, the duty exemption at issue in verity was given only to imports from a smaller number of countries in which the exporter was associated with suitable Canadian manufacturers. Canada’s defence was abandoned on grounds that duty exemption was given to certain countries other than all manufacturers from all countries. In relation to Australian current issue, the country has not violated article I: 1 since the ban is not discriminatory in nature. The ban covers all aspects of whale products from foreign countries. Further, Australia is not discriminatory since it also bans whale products that Australian travellers bring into the country. One may argue that products brought by tourists do not constitute trade goods and thus this is discrimination. However, the country seals this loophole as people may exploit it to continue the usage and sale of whale products. Article III: 4 Article III: 4 were set in the case of Korea –various measures on beef; th e appellate body established three components that have to be fulfilled for the violation to arise. One, the traded in and national products at issue are â€Å"like products† that the determination is the issue at â€Å"law, directive, or obligation affecting their domestic sale, offering for sale, purchase, transport, delivery or sale†. The final component is that imported goods are given â€Å"less favourable† dealing than that given to like domestic products. In relations to article

Friday, November 15, 2019

Design of Manchester Serial Data Communications Channel

Design of Manchester Serial Data Communications Channel The Design of Manchester Serial Data Communications Channel Based on Vivado (Systemverilog) Abstract As the explosive growth of wireless communication system and also with the proliferation of laptop and palmtop computers, the requirement of high quality data communication channel is also growing rapidly. By transforming line voltage frequently and proportioning to the clock rate, the Manchester coding is able to help recover the clock and data. It is now widely used in many domains. This project studies the function of the clock divider, the pseudo random bit sequence generator (PRBSG), the shift register and the finite state machine (FSM), then comprise them together into a Manchester serial data communications channel. It is used for recovering clock signal from the encoded data. The further application is setting up a bit error rate (BER) tester to detect the condition of the whole system. If the bit error rate (BER) is high, which means the whole system is not integrated; if low, the integrality of the system is great. 1.1 Background In modern life, wireless communication develops rapidly in many aspects, especially in the communication industry. So, it has achieved lots of attention from media and public. The development of cellular phones is also swift and violent. During the whole world, the cellular phones have experienced geometric growth over the last decade and the number of cellular phone users will grows up to a billion in the foreseeable future. In fact, by replacing out-dated wireless systems, cellular phones are becoming much more widely used, and they have already played a very important role in business domain, also the indispensable part of everyday life. Besides, wired networks in many businesses and campuses are now replaced or supplemented by local area wireless networks for officers and students to use it more convenient. Numbers of new applications such as wireless sensor networks, smart homes and appliances, automated highways and factories and remote telemedicine, are becoming reality, which is a huge improvement of technology. The conditions such as the explosive growth of wireless systems and the proliferation of laptop and palmtop computers show a bright future of wireless networks, not only in independent systems but also in larger networking infrastructure. However, in order to support the required performance of emerging applications, it is quite challenging to design, analysis and solve any problems that occurs in wireless networks. With the development of wireless communication system, Manchester encoding is widely used. Due to its development at the University of Manchester, it is known as a synchronous clock encoding technique that used by the physical layer for encoding the clock and data of a synchronous bit stream. At the very first beginning, it was used to save data on the magnetic drum of the Manchester Mark one computer. In Manchester code, the binary data that need to be transmitted over the cable will not sent as a sequence of logic 0 and 1, which is also called Non Return to Zero (NRZ). However, if the bits are transformed into different format, then it will have lots of advantages than the straight binary form only like Non Return to Zero (NRZ). However, in digital transmission, noise, interference, distortion or bit synchronization errors are the main factors that affect the number of bit errors. Every time when transmitting data though a data link, there is a possibility of errors being introduced into the system. If errors are introduced into the data, which means the signal will be interfered, and the system would not be integrated. So for this situation, it is necessary to assess the performance of the system, and bit error rate (BER) provides an ideal way to achieve the requirements. The bit error rate (BER) is the number of bit errors that occurs every unit time, and the bit error ratio (BER) is defined as the number of bit errors that occurs divided by the total number of transferred bits during a controllable study time period. It is a unit less performance measure, which is always expressed in percentage form. Bit error rate (BER) assesses the full end to end performance of a system which includes the transmitter, receiver and the medium between the two. Due to this situation, bit error rate (BER) enables to test the actual performance of an operating system. It is different from other forms of assessment and works in a much better way. 1.2 Objectives Figure 1 The Diagram of Physical Components Connection The figure 1 above shows the components used in the system and the connection configuration of the system. First of all, the signal generator outputs data into the T junction chip (signal emitter) which includes the clock divider, prbsgen and the logic xor gate. Secondly, the data will be transmitted through the transmission channel which is made up by two vertical metal bars, one is LED light for transmitting data, the other is light sensor for receiving data. Thirdly, the data will be sent into the signal analysis and recover part which includes the shift register, pattdet and fsm components. Finally, the recovered signal and original data both will be sent into the oscilloscope to check the difference and make sure if the result is satisfied. The objective of this project is setting up a Manchester serial data communications channel based on the vivado operation system which using System Verilog language to match this physical system. It can be used as radio channel, bit error rate tester and etc. In this project, the application of the system is designed as a bit error rate (BER) tester. As shown in figure 2 below is the design of bit error rate tester. During a complete simulation period, once received the number of errors that occurs and total number of bits that sent, then the bit error rate is available. Figure 2 Bit Error Rate Tester Design 1.3 Theory a. Bit Error Rate Bit error rate (BER) is a key parameter that is used for transmitting digital data from one location to another in assessing systems. It is widely used to monitor the state of digital signal in different applications, such as radio data links, fibre optic data systems, Ethernet and those who transmit data through some form of networks. Generally, it affected by noise, interference and phase jitter. Although these systems work in different ways, and have disparate impact on the bit error rate, the basics of bit error rate are still the same. Every time when transmitting data though a data link, there is a possibility of errors being introduced into the system. If errors are introduced into the data, which means the signal will be interfered, and the system would not be integrated. So for this situation, it is necessary to assess the performance of the system, and bit error rate (BER) provides an ideal way to achieve the requirements. Bit error rate (BER) assesses the full end to end performance of a system including the transmitter, receiver and the medium between the two. Because of this, bit error rate (BER) enables to test the actual performance of an operating system. It is different from other forms of assessment and works in a much better way. Bit error rate (BER) is defined as the rate at which errors occur in a transmission system. It can be translated into the number of errors that occur in a string of a stated number of bits directly. The definition of bit error rate in simple formula is: If the medium between the transmitter and receiver is good and the signal to noise ratio (SNR) is high, the bit error rate will become very small, which means the error barely has noticeable effect on the overall system and could be ignored. However, if the number of errors is big, the signal to noise ratio (SNR) is low, and then the bit error rate needs to be considered. In another word, the system has been affected by noise. Noise and the propagation path change (radio signal paths are used) are two main reasons that cause the degradation of data channel and generate the corresponding bit error rate (BER). However the two effects affect in different ways. For example the noise following a Gaussian probability function while the propagation model follow a Rayleigh model. Which means it is very necessary using statistical analysis techniques to undertake the analysis of the channel characteristics. For fibre optic systems, bit errors usually caused by the imperfections in the components such as the optical driver, receiver, fibre and connectors that used for making the link. However it may also be introduced by optical dispersion and attenuation. Whats more, the optical receiver may detects the noise, this will also interfere the system. Typically, the fibre optical system will use sensitive photodiodes and amplifiers to respond to very small changes, and there is a possibility that high noise level will be detected. The phase jitter that present in the system is another possible factor which enable the sampling of the data altered. A number of factors are able to affect the bit error rate (BER). To optimize the system and acquire the required performance levels, it is very necessary to manipulate the controllable variables. Normally, in order to adjust the performance parameters at the initial design concept stages, this should be undertaken in the design stages of a data transmission system. Interference: The interference levels in the system are usually controlled by external factors, and can not be changed by optimizing the system design. However, the bandwidth of the system is a controllable factor. The level of interference will be reduced if the bandwidth is reduced. However the disadvantage is the achievable data throughput will be low when the bandwidth gets reduced. Increase transmitter power: To increase the power per bit, the power level of the system should be increased at the same time. Factors like the interference levels to other users and the impact of increasing the power output on the size of the power amplifier and overall power consumption and battery life, the impact of them should be reduced to help control the bit error rate (BER). Lower order modulation: Lower order modulation schemes are thinkable way to balance the bit error rate. However the achievable data throughput will reduce. Reduce bandwidth: Another adoptable approach is reducing the bandwidth of the system to reduce the bit error rate (BER). As a result, the system will receive lower levels of noise and the signal to noise ratio (SNR) will be improved. However, the achievable data throughput will reduce as well. However it is not possible to achieve all the requirements, sometimes needs to do some trade-offs. In order to achieve the required bit error rate (BER), it is very necessary to balance all the available factors. When the bit error rate (BER) is lower than expected, under the risk of receiving unsatisfied levels of error correction that are introduced into the data being transmitted, further trade-offs are still necessary. Even though it may need higher levels of error correction when sending more redundant data, but the effect of any bit errors can be masked, as a result, the overall bit error rate (BER) will improve. As radio and fibre optic system, in order to detect the indication of the performance of a data link, bit error rate (BER) is an excellent parameter for that. It is also one of the main parameter of interest in data links that detects the number of errors that occurs. Other features of the link such as the power and bandwidth, etc are able to get the performance that required after adjusting with the knowledge of the bit error rate (BER). b. Shift Register The Shift Register is another type of sequential logic circuit that can be used to save or transfer data in the form of binary numbers. It loads data that present on its inputs and then moves or shifts data to its output during every clock cycle. Basically, a shift register is comprised by numbers of single bit D-Type Data Latches, one for each data bit, either a logic 0 or a 1. The connection arrangement type is serial chain, which is able to keep turning every output from data latch become the input of the next latch. In shift register configuration, the data bits are able to work in several ways such as fed in or out from either the left or right direction one by one or all together in parallel at the same time. Usually, the most widely used construction of a single shift register is made up by eight individual data latches to match eight bits (one byte) data, which means the number of individual data latches is decided by the number of bits that need to be stored. While a shift register may comprise numbers of individual data latches, but all of them are driven by one common clock (CLK) signal, which makes those latches working synchronously. Shift registers normally used in computers or calculates for storing or transferring data. The principle of it is converting data from serial to parallel or from parallel to serial format. For example, if saving data inside computer, shift registers can store all the binary numbers before them added together. In order to set or reset the state of shift register, it always contains an additional connection with the required function. There are four different operation modes for shift register to transfer data. Serial-in to Serial out (SISO) either a left or right direction, with the same clock, the data is shifted serially IN and OUT of the register one bit at a time. The figure 3 below shows an example of it which transfer data from left to right. Figure 3 4-bit Serial-in to Serial-out Shift Register Serial-in to Parallel-out (SIPO) one bit at a time, the data is loaded in register serially, and available to output together in parallel way. The figure 4 below shows an example of it but with 4 bits data input and output and the data transferred from left to right. Figure 4 4-bit Serial-in to Parallel-out Shift Register Parallel-in to Parallel-out (PIPO) the parallel data is introduced together into the register at the same time, and then transferred to each correspondent outputs together under the same clock pulse. The figure 5 below shows an example of it with 4 bits parallel data input and output and the direction of data movement is from left to right. Figure 5 4-bit Parallel-in to Parallel-out Shift Register Parallel-in to Serial-out (PISO) the parallel data is introduced together into the register in the meantime, and then one bit at a time, shifted out serially under the control of clock. The figure 6 below shows an example of it with 4 bits data input which transfer data from left to right. Figure 6 4-bit Parallel-in to Serial-out Shift Register c. Pseudo Random Bit Sequence Generator (PRBSGEN) A random bit generator is a device or algorithm that used to output a sequence of independent and unbiased binary digits in statistics. Meanwhile, a pseudo random bit sequence generator (PRBSG) is a deterministic algorithm, which means if a truly random binary sequence of length X is given, the binary sequence output of length Y >> X would be random. The input of the pseudo random bit sequence generator (PRBSG) is normally called the seed, while the output of it is called a pseudo random bit sequence. The pseudo random bit sequence generator (PRBSG) can be used as random because the value of an element of the sequence is not related to the values of any of the other elements. However, the output of a pseudo random bit sequence generator (PRBSG) is not truly random. With all possible binary sequences of length Y, the number of possible output sequences is a small fraction maximally. After N elements, the sequence starts to repeat itself, which means it is deterministic. The aim is to receive a small truly random sequence and then expand it into a sequence with much larger length. Generally, the implementation of pseudo random bit sequence generator (PRBSG) is based on the linear feedback shift register (LFSR). The pseudo random bit sequence generator (PRBSG) makes a sequence of logic 0 and 1 under the same probability. A sequence of serial n*(2^n -1) bits use one data pattern, and this pattern will repeat itself over time. In the Manchester serial data communications channel, the pseudo random bit sequence generator (PRBSG) is implemented in System Verilog programming language, and used to sample two bit input data and managed through a logic xor gate, then introduce the result into the first bit of the sequence as the feedback. The output of the pseudo random bit sequence generator (PRBSG) was taken from all the nine bits of the shift register. The feedback connections of the pseudo random bit sequence generator (PRBSG) are shown in appendix A. As a result, the output of the pseudo random bit sequence generator (PRBSG) cycles between 0 to 511. Figure 7 Principle of Pseudo Random Bit Sequence Generator (PRBSG) d. Manchester Coding The Manchester coding is well known because of the development in the University of Manchester. It is used to save data on the magnetic drum of the Manchester mark one computer. In signal transmission domain, Manchester coding is widely used. However in order to achieve the same data rate but less bandwidth, the more complex codes are created such as 8B/10B encoding. Meanwhile the disadvantages of them are in the transmitter device, not able to have high tolerant of frequency errors and jitter, and receiver reference clocks. The worst problem is the Manchester encoding is not suitable for higher data rate because it will introduce some difficult frequency errors into the system. But the advantage of Manchester coding is helping recover the clock by transforming line voltage frequently, which is proportional to the clock rate directly. It is very convenient to transmit data by media like Ethernet without a DC component because the DC component of encoded signal is not determined by the data that transmitted, which means no information will be transmitted in signal. The figure 8 below shows the principles of Manchester coding, which are: Each bit is transmitted once a period. Logic 0 expresses a low-to-high transition, logic 1 expresses a high-to-low transition. At the midpoint of a period, logic 0 or 1 will be interconverted. The transformation at the beginning of a period does not mean the data. Figure 8 Principle of Manchester Encoding Figure 9 The Circuit Design    The figure 9 above is the complete design of whole circuit. All the components that required comprising a Manchester serial data communications channel are designed successfully. The data will be divided in the clock divider (Divclk) component, sampled in the pseudo random bit sequence generator (Prbsgen) component, and then altered into Manchester signal by a logic xor gate, through the transmission channel, the data will be sent into the shift register, combine into 10 bits DATA signal, after analysed in the Pattdet component, 4 states will be sent into finite state machine (FSM) component and be recovered as the signal of RBC and RNRZ. In this system the clock frequency is 100MHZ and the reset will set at logic 1 before the system work. The programs of all components used in the system are shown below. Figure 10 Clock Divider Program The figure 10 above is the click divider program. This component is designed for dividing the clock signal into two different clock signal div_out and div_out2. These two output signals are shown in figure 13. In which the signal div_out gets one clock of high pulse every 10 clocks, the frequency is 10MHZ, and works as the specific input o the Prbsgen component. While signal div_out2 gets 5 clocks of high pluses per 5 clocks, also the frequency is 10MHZ. Figure 11 Prbsgen Program The figure 11 above is the Prbsgen program. It works as a pseudo-random bit sequence generator, which records 10 bits of data each clock, when signal div_out gets high impulse, sampling the 4th and 8th data into a logic xor gate and then put the result into the 1st data position as the feedback of the sampling function. Finally, output the prbs signal (as shown in figure 7) or NRZ signal (in figure 13). Figure 12 Logic Xor Gate Program The figure 12 above is the logic xor gate program. In order to combine the NRZ and Bit_clk signal together and output the signal T (Manchester code) which is shown in figure 13 below. When NRZ gets high and Bit_clk gets low, output Manchester is high; when NRZ gets high and Bit_clk gets high, Manchester is low; when NRZ gets low and Bit_clk gets high, Manchester is high; when NRZ gets low and Bit_clk gets low, Manchester is low. Figure 13 Manchester Signal As the figure 13 shown, the clock divider, the pseudo random bit sequence generator (PRBSG), and logic xor gate all work well, the output signal div_out and div_out2 are both divided as required, while the prbs signal (NRZ) is as expected and the T signal (Manchester code) is the same as the signal that xors with div_out2 and prbs (NRZ) signal. Figure 14 Transmission Delay Program The figure 14 above is the transmission delay program. It is used to simulate the data transmission delay during the real life. Normally, errors like noise, interference and phase jitter are introduced into the data through this part, while the time of transmission delay depends on the distance between the signal emitter and receiver. In this system, the parameter of time delay set at 1.5e-6 in seconds. Figure 15 Shift Register Program The figure 15 above is the signal register program. The function of it is compressing and storing the Manchester data and then transfer into pattdet component. It starts working only when reset is logic 0, input en is logic 1. Figure 16 DATA Signal The output of 10 bits data (DATA) is the same as required, which means the program of shift register works well. Figure 17 Pattdet Program The figure 17 above is the pattdet program. It is used for analysing the DATA signal, and the output follows the principle which shown in table 1 below. Data 00000 00000 00000 11111 11111 00000 11111 11111 State S1 10h3EQ S2 10h01F S3 10h3FF S4 10h000 Table 1 The Working Principle of Pattdet Component Figure 18 4 States From figure 18 above, 4 states of s1, s2, s3, s4 are outputted separately and successfully. Figure 19 Finite State Machine (FSM) Program The figure 19 above is the finite state machine (FSM) program. The function of it is analysing the 4 states and recovering the bit_clk, bit_EN and NRZ signal, and the principle of it is shown in below figure 20. From the figure 20, when signal NRZ turns to logic 0 from logic 0, state s1 turns to s2; when signal NRZ turns to logic 1 from logic 0, state s1 turns to s4; when signal NRZ turns to logic 1 from logic 1, state s2 turns to s1; when signal NRZ turns to logic 0 from logic 1, state s2 turns to s3. Figure 20 The Principle Of FSM Figure 21 The Bit Error Rate Tester (BERT) Program The figure 21 above is the catalogue program of bit error rate tester. It contains the clock divider, prbsgen, encoder (logic xor gate), shift register, pattdet and fsm program file. Figure 22 The Test Bench Program The figure 22 above is the test bench program. It defines all the factors in the system and especially the period of reset and clock. Figure 23 The Implemented Design This is the implemented design figure, which shows the service condition of devices. Figure 24 The Schematic Design Figure 25 The Detailed Figure of FSM The figure 25 above is the schematic design which shows the real used state of every component. However, the part of clock divider and pseudo random bit sequence generator (PRBSG) is not satisfied one. The problem may be caused by the vivado operation system software issue or the definition of clock divider and pseudo random bit sequence generator (PRBSG) is not recognised by the software. The Manchester serial data communications channel built up successfully. In figure 26, the signal RBC, RNRZ and RBE are all recovered, just the same as the original signal bit_clk, NRZ and bit_en but with some time delay. The next objective is developing applications for the Manchester serial data communications channel. The chosen target is a bit error rate tester. By setting up a noise component for introducing random noise into the Manchester signal and then an error counter inside the finite state machine (FSM) for counting the number of errors that occurs and the total number of bits sent. As a result, the bit error rate (BER) will be able to count in the system. Figure 26 Recovered RNRZ and RBC Signal The figure 26 above is the final simulation result. Signal of recovered non return to zero (RNRZ), recovered bit_clock (RBC) and recovered bit_en (RBE) are all the same as their original data but with time delays. Figure 27 The Signal of Input and Recovered From the figure 27 above, the recovered signal is almost the same as the original input data. These two figures prove the design of Manchester serial data communications channel is successful. After setting up this communication channel, the next step is developing applications for further requirements. The theory of pseudo random bit sequence generator (PRBSG), Manchester coding, shift register and bit error rate are proved to be feasible. This project is a great opportunity to practise from research ideas to concrete systems. With the explosive growth of wireless communication system, Ciletti, M. (2011). Advanced digital design with the Verilog HDL. 1st ed. Boston: Prentice Hall. (Accessed: October 9 2016). Menezes, A., Van Oorschot, P. and Vanstone, S. (1997). Handbook of applied cryptography. 1st ed. Boca Raton: CRC Press, p.chapter. Available at: http://cacr.uwaterloo.ca/hac/about/chap5.pdf (Accessed: December 25 2016). MUKHERJEE, S. and PANDEY, R. (2007). DESIGN AND IMPLEMENTATION OF PRBS GENERATOR USING VHDL. bachelor. Department of Electronics Communication Engineering National Institute of Technology Rourkela. Available at: https://pdfs.semanticscholar.org/42e7/490ec8905ea8afe618c6882f2b050ece2ae4.pdf (Accessed: October 14 2016). Malviya, S. and Kumari, P. (2014). Implementation of Pseudo-Noise Sequence Generator on FPGA Using Verilog. [online] Dept of Electronics and Communication, Sobhasaria Group of Institution, Sikar, Rajasthan. Available at: https://www.ripublication.com/irph/ijeee_spl/ijeeev7n8_16.pdf [Accessed

Tuesday, November 12, 2019

Book Review on Sanchar Mimamsa

Book: Sanchar Mimamsa Author: Nirmala Mani Adhikary Publication: Media Educators Association of Nepal Pages: 33 Date of publication: 2068(2011 AD) â€Å"Sanchar Mimamsa† composed by Nirmala Mani Adhikary puts forth communication Studies and process from the perspectives of vaidika Hindu amid western theories and models of communication. The book brings to light,’Sadharanikaran theory and model as per propounded by Adhikary himself. It is quite unique and interesting, reading theories in verses. The theory and model have been described in Jhyaure laya.We all know, communication was an indispensible practice since we came into an existence. Though unfortunately and fortunately, it was twentieth century, a communication study was accounted as a discipline. Communication studies though, are rooted back to ages back, according to the Vedic Hindu perspective. Sadharanikaran is rooted back to 4th BC. The theory was illumined once again after J. S Yadava and I. P Tiwari brought Sadharanikaran into limelight around 1980s. Adhikary, who continued his research on the theory, came up with a model in 2003. Sanchar Mimamsa’ is all about Sadharanikaran and its elements and goal of attaining sahridayata, ultimate goal on Sadharanikaran process. Sadharanikaran as a process is an asymmetrical process, where senders and receivers become sahridayas, directed to attain sahridayata, thus establishing mutual understanding between them. Sahridayata as a concept is a state of â€Å"common orientation, commonality or oneness† where senders and receivers’ ultimate goal is to make Sadharanikaran process successful or to become one in communication process.Sanchar Mimamsa is classified into 3 parts while verses are divided into 5 parts. First one puts forth the possibility of getting problem solved. Through communications, not merely human, also animals and other creatures involve in communication in pursuance of life and peace. Second part affirms the si gnificance of theories and model in communication studies. Unfortunately, the world’s walking on merely western theories and models instead of executing one’s self culturally relative studies. Nevertheless, after the initiation of duo scholar, Tiwari and Yadava,Sadharanikaran came into limelight. It has its root in Natyashastra by Bhartrihari and is identified with Bhattanayaka. Elements of Sadharanikaran process are sahridayas(senders and receivers), Bhava(moods), Abhivyanjana( expression or encoding),sandesha(message or information), Sarani(channel), rasaswadan (deals with achieving the rasa), doshas(noises), sandarva(context) and finally pratikriya( process of feedback). Sahridayata is ultimate goal of the whole process of Sadharanikaran, in which sender and receiver become one, and where feedback is no more necessary.The communication models in the west usually weigh on sender while, Sadharanikaran process puts an end to differences between senders and receivers, u ltimately they become one. Sadharanikaran process is different to other or west’s models in terms of structure. It is a non linear model where mutual understanding is possible. It is a broad notion that is able to deal with all three dimensions of life: adhibhautika(physical), adhidaibhika(Mental) and adhyatmika(spiritual). Moreover The model also apprehends communication competent enough to achieve all of the purushartha chatustayas i. artha, kama, dharma and moksha. Final and fifth part sets forth, the solution to the conflict ongoing in the world via attaining sahridayata. Thus Adhikary argues sadharanikaran process can be a solution to put an end to disastrous conflict ongoing among the countries. It also has envisioned ’sanchar vidha’, communication sector, as a mean for attaining ‘Moksha’, the final goal of life according to Hindu perspective. Verses are followed by second and third part of the book in which Sadharanikaran theory and model are described and summarized.The book is distinct as it narrates whole theory and model in verses but the success of the book lies on rasaswadana of the sandesha encompassed in the book. Not only the Sadharanikaran theory but whole communication field is described from Hindu point of view, a significant step in communication studies in the world, other than westernized studies. On the other hand, the uniqueness of the book i. e. verses have also limited itself to a certain audience, those who are keenly interested in traditional verses.But the second and third part exempts audiences from this limitation and even language barrier has been considered. Descriptions are available in both Nepali and English. Though Sadharanikaran theory and model is new in studies the process isn’t new to us. If we can embody the process in our daily activities, ultimately we become able to manage conflicts and attaining moksha is also possible. This is how the book ‘Sanchar Mimamsa’ has represented the beauty of Sadharanikaran theory and model in simpler and few words.

Sunday, November 10, 2019

Carol Ann Duffy uses the theme of growing up in her poem Essay

Carol Ann Duffy uses the theme of growing up in her poem ‘In Mrs Tilscher’s Class’. She starts off by setting the first stanza in a class in a primary school. She uses ‘you could travel up the Blue Nile with your finger, tracing the route while Mrs Tilscher chanted the scenery. Tana. Ethiopia. Khartoum. Aswan’. This quite obviously tells us that she teaching the young, ambitious class with a globe, again referring back to the classroom scenery as most primary school classrooms have globes. Then she says ‘That for an hour, then a skittle of milk and the chalky pyramids rubbed into dust’. Here, Carol Ann Duffy is showing that when the geography lesson has finished and the children have had a break they simply forget about what they’ve been taught. She also refers back to the geography with chalky pyramids. This stanza basically emphasising the happiness of the children at that age. ‘This was better than home. Enthralling books. The classroom glowed like a sweetshop’. This is the opening two lines of the second stanza again showing the happiness and excitement of the children. ‘Better than home’ home is great so school must be even greater. ‘The classroom glowed like a sweetshop’ a child’s favourite place is a sweetshop so Carol Ann Duffy here is using a simile showing that the atmosphere in her classroom is electrified by excited children as if they’re in their favourite sweet shop. ‘Brady and Hindley’ these were two child murderers that the children wouldn’t know about. Carol Ann Duffy, I think, has added these to humiliate them and to show the reader that the children are safe and in a totally different world to the murderers. ‘Mrs Tilscher loved you. Some mornings, you found she’d left a gold star by your name’ the poet here is showing the reader the relationship between Mrs Tilscher and her children, again referring back to this really happy atmosphere and how Mrs Tilscher puts herself out to keep these children eager to learn, maybe, the next country or continent on the globe or looking at Vincent Van Gogh’s famous paintings. Moving on to the next stanza, Carol Ann Duffy has started with ‘Over the Easter term, the inky tadpoles changed from commas into exclamation marks’. This is definitely a signal from the poet that the children are growing up. The poet here has put the poem into reality going back to when the reader was at this stage, everyone had the tadpoles experience before Easter then come back and they’d all turned into frogs but here the poet is putting the children in conjunction with the tadpoles signifying that they are growing up as well. As you can see Carol Ann Duffy, the poet, adds something in this stanza that almost everybody has the experience of as a youngster, ‘A rough boy told you how you were born. You kicked him, but stared at your parents, appalled, when you got back home’. It was that day never to be forgotten, the day you found out that you don’t just pop out your mums belly button but everybody, eventually, takes in the truth and carries on with their lives. The next stanza begins. By now the children aren’t really, in fact, children anymore. They’ve finally reached the final curtain before senior school. They were in their last term of primary school and what fools they were to believe that this was a relief. ‘That feverish July, the air tasted of electricity. A tangible alarm made you always untidy, hot, fractious under the heavy, sexy sky’. Here, the poet is just emphasising the summer season and hot weather and I think with the use of the word electricity she means how immensely excited they were about leaving. ‘You asked her how you were born and Mrs Tilscher smiled, then turned away’. Again referring back to the, once disgusting but now quite interesting, subject of sex, here showing that their minds still don’t really want to believe it but aren’t perfectly sure what’s true and what isn’t. ‘Mrs Tilscher smiled, then turned away’. Here again emphasising that sex isn’t to be found out about at this age and certainly isn’t a subject of conversation for the classroom. ‘Reports were handed out. You ran through the gates, impatient to be grown, as the sky splits into a thunderstorm. It must be the last day; the children are extremely excited about leaving. First of all, at the end of the day, you get your report and without even saying your last goodbyes you’ve ran through the gates, but these may not be the gates of your school but the gates to a bumpy ride to hell! ‘Impatient to be grown’ after all the children or should I say young adults have hit the puberty barrier and now want to be just like their mother and father, no longer embarrassed about sex but wanting to be involved with it. ‘As the sky split open into a thunderstorm’ this is a very powerful use of language, it almost hits the reader. But Carol Ann Duffy is basically showing the reader that they don’t know what they’re in for and could turn out to be horrendous. The use of the word thunderstorm maybe referring back to the weather because usually after really hot days after days you get a thunderstorm and also could be referring back to the unsafe world looking back at Child murderers Brady and Hindley.

Friday, November 8, 2019

Book Report on Stand the Storm A History of the Atlantic Slave Trade essays

Book Report on Stand the Storm A History of the Atlantic Slave Trade essays Reynolds, Edward. , Stand the Storm: A History of the Atlantic Slave Trade. My Responses from Reading Stand the Storm With my sallow understanding of slavery, I imagined slavery only happening in the New World, where they obtained a better treatment than the book recorded; at least, slaves would have enough nutritious food on their trip to North and South America. After reading this book, Stand the Storm, the pains of African slaves conjured up on my mind, and I thought their suffering and humiliation was difficult to compensate with any amount of money. This book portrays thorough history and impacts of how African slaves were captured and sent to North and South America. One thing was true that slave trade favored the economic development of Americas to expand in a fast pace. However, it was absolutely an evil economic activity that brought great suffering and incredible distress to many thousands of the Africans. In this paper, I would like to probe deeply on how the Africans slaves were treated in their tribes. Also, in that sense they were captured to serve as slave on their own continent of Africa. Comparing with North and South America, I will find out the differences of practicing slavery between both places, and the ways of the African salves adapted to the new environment and conditions in the New World. Slavery was common in many African tribal societies long ago before the Europeans introduced slavery to the New World. In Africa, a slave was generally known as servant or property of his host whose social status was lower than the other society members'. In the most inferior case, especially in Eastern Nigeria, they could be pawned by their masters, or even acted as a medium of exchange. Their lives were worth nothing that could be completely controlled by their masters; it meant he could take it or leave it. Once slaves were captured or traded to another kinship society, they would probably be treated as outs...

Wednesday, November 6, 2019

Ancient Chinese Invented Gunpowder

Ancient Chinese Invented Gunpowder Few substances in history have had as profound an effect on human history as gunpowder, yet its discovery in China was an accident. Contrary to myth, it was not simply used for fireworks but was put to military uses from its time of discovery. Eventually, this secret weapon leaked out to the rest of the medieval world. Chinese Alchemists Tinker With Saltpeter and Make Gunpowder Ancient alchemists in China spent centuries trying to discover an elixir of life that would render the user immortal. One important ingredient in many of the failed elixirs was saltpeter, also known as potassium nitrate. During the Tang Dynasty, around 850 A.D., an enterprising alchemist (whose name has been lost to history) mixed 75 parts saltpeter with 15 parts charcoal and 10 parts sulfur. This mixture had no discernable life-lengthening properties, but it did explode with a flash and a bang when exposed to an open flame. According to a text from that era, smoke and flames result, so that [the alchemists] hands and faces have been burnt, and even the whole house where they were working burned down. Use of Gunpowder in China Many western history books over the years have stated that the Chinese used this discovery only for fireworks, but that is not true. Song Dynasty military forces as early as 904 A.D. used gunpowder devices against their primary enemy, the Mongols. These weapons included flying fire (fei huo), an arrow with a burning tube of gunpowder attached to the shaft. Flying fire arrows were miniature rockets, which propelled themselves into enemy ranks and inspired terror among both men and horses. It must have seemed like fearsome magic to the first warriors who were confronted with the power of gunpowder. Other Song military applications of gunpowder included primitive hand grenades, poisonous gas shells, flamethrowers and landmines. The first artillery pieces were rocket tubes made from hollow bamboo shoots, but these were soon upgraded to cast metal. McGill University professor Robin Yates notes that the worlds first illustration of a cannon comes from Song China, in a painting from about 1127 A.D. This depiction was made a century and a half before Europeans began to manufacture artillery pieces. The Secret of Gunpowder Leaks Out of China By the mid- to late-eleventh century, the Song government had become concerned about gunpowder technology spreading to other countries. The sale of saltpeter to foreigners was banned in 1076. Nonetheless, knowledge of the miraculous substance was carried along the Silk Road to India, the Middle East, and Europe. In 1267, a European writer made reference to gunpowder, and by 1280 the first recipes for the explosive mixture were published in the west. Chinas secret was out. Down through the centuries, Chinese inventions have had a profound effect on human culture. Items like paper, the magnetic compass, and silk have diffused around the world. None of those inventions, however, have had quite the impact that gunpowder has, for good and for bad.

Sunday, November 3, 2019

Capitalism vs. Socialism Essay Example | Topics and Well Written Essays - 1000 words

Capitalism vs. Socialism - Essay Example As the essay discusses capitalism increases competition whereas socialism discourages competition. Every country needs domestic food production for its own national security and independence. Domestic food production can be increased only with the help of competition. In nom-competing economies or in socialist countries, the absence of competition makes people lazy. The resources in this world are fixed whereas the population size is increasing. It is difficult for the increasing population to find better living standards if they adhere to a particular level of productivity. Socialism on the other hand does not believe much in competition. It works on certain impractical principles which may appear good at a glance. This discussion stresses that none of the socialistic world or communist countries succeeded in achieving the objectives of socialism which is the major reason why communism wiped off from Europe and on the verge of destruction in other parts of the world as well. Not only China, even Cuba has recently announced lot of economic reformation policies which were earlier black listed by these countries as the bi-products of capitalist economy. Capitalism utilizes the willpower of individuals, especially entrepreneurs, to foment economic activity. Capitalism is based on the assumption that individuals operate based on self interest; however, by doing so they not only help themselves, but also propel others towards economic success. (Socialism vs Capitalism). One of the major criticisms against capitalism is that it makes two types of citizen in a country; rich and poor. However, it should be noted that even after years of implementation of socialistic principles, countries like China, Cub a and Soviet Union failed to reduce the gap between the rich and poor in their territory. On the other hand, it should be noted that capitalist countries like America and Britain not only remain wealthy, but also succeeded in reducing the gap between t

Friday, November 1, 2019

Organisational Behaviour and Change Management Essay

Organisational Behaviour and Change Management - Essay Example So, in 2005, it actualized that plan by adopting the diversity program. This program apart from improving Nike’s ethical image, also positively affects the economic and non-economic aspects of Nike’s functioning. Importantly it opens up a surge of opportunities and so this paper as part of a strategic plan will discuss those opportunities, focusing on the ethical dilemmas associated with those opportunities. Then the paper will discuss the actualization of those opportunities through optimization of the strategic plan, incorporating strategies from other organization. Any organized human activity, which is done in-group, will be most times constituted into an organization. So, organization is a ‘structure’ where ‘collage’ of workers will do their allocated work under the supervision of a leader, for the benefit of the organization as well as them. When one speaks or thinks about an industry or an office or an organization, the ‘mental picture’, one visualizes is of machines, large assembling plants, etc, etc (in case of industries) and papers, computers, cabins etc, etc (in case of offices). But, the crucial thing that the mind ‘crops out’ is the picture of a working human. Without delving deeply into why mind always associate industry and office with non-living things, the point is, humans are the crucial things who can put an organization in a cruise mode in terms of production, sales, profits, etc. So, the workers only form the crucial ‘cog’ in the running of the organization. On ly if these crucial workers are recruited or staffed optimally through an effective recruitment process, the organization can achieve optimum success. But, for the organizations particularly multinational companies, recruiting the apt workers is not the end of the task, they have to recruit employees from diverse backgrounds in their home operations and