Saturday, August 31, 2019

Tzinga: Applications of Marketing Management Concepts

Motivation behind selecting Tagging comes on the purview that It Is the only Energy Drink of Indian origin tit an Intensive growth profile for a relatively young Industry. The prime objective was to understand and recommend marketing strategies for Tagging. Focus was laid on accessing market opportunities, customer value addition, analysis of consumer market, evaluation of competitive dynamics and branding. The initial secondary research revealed the current segmentation, targeting, positioning, communication and branding strategies of Tagging.It also uncovered the energy market trends and competition patterns. Low cost being Taiga's unique selling point drove It to a relative dominance In the market In a short period of time. Further, primary research constituted blind test, market survey, interviews with retailers, distributors and co-founder of hector beverages. The procedure exposed the product strength of Tagging, reaffirmed the positioning appropriateness and unveiled the neces sity of improvements in terms of price- positioning trade off, communication, distribution and brand building.Indian-news of the product and Its low price can be exploited for promotion apart from Increasing The global beverage market is growing at a Compounded Annual Growth Rate (CARR) of 4. 6% and is expected to hit $1. 3 trillion by the year 2017 . And the most dynamic sector which is leading this growth is the global Energy Drink Market. Ever since the launch of Red Bull in 1987, this market has flourished at an astonishing rate, generating revenues to the tunes of billions of dollars. But in a country like India with a huge base of prospective customers, this market has not been tapped to its fullest.International players like Red Bull and Storage still dominate the equation, though a lot of new players are trying to enter this zone. In such a competitive environment, one drink which stands out and seems to have a promising future is Tagging. It is a product by Hector Beverages Put Ltd. , an Indian start up dreamt by two young management graduates – Nearer Kara and James Natal . Based in Surgeon, the company came into existence in 2011 and since then has sky-rocketed into the energy drink segment.The company now sells about a million units each month across 45 cities in India . It has a deep market penetration in Delhi, Bangor, Ago and the north eastern states and is trying to gain ground in other regions as well. The main reason for this stupendous growth can be attributed to its price, which is almost 70% less than its main competitors. It also comes with a unique packaging which is one of its USPs as per the creators. We plan to do a comprehensive study determining all the factors behind this growth story keeping our main focus on marketing.The main motive behind choosing this project is to study the inspiring growth trajectory of Tagging. It provides an excellent opportunity to understand the nuances of consumer choices and sales pattern in Ind ia. By experimenting in the relatively unexplored arena of Energy drink sector in the country, we hope to build a strong foundation of core marketing concepts which will help us throughout our professional lives. To evaluate the current segmentation, targeting and positioning strategies of Tagging and to recommend strategies for its branding and promotion.To identify and match the positioning statement of Tagging and to evaluate the necessity of change ; To define the target market, focal value elements and price- value relationship with respect to Customer Value Proposition ; To understand competitive dynamics of brand image and hence to come up with Branding and Communication strategy for Tagging ; To understand the product preferences, consumers' taste preferences and Taiga's brand perception through primary search, blind test and interviews and hence to estimate the growth prospects 1.Constraints in Primary Research: Energy drink market is a subset of the larger beverage industr y and therefore has a consumer base with limited age group, lifestyle patterns and popularity, of which Tagging is a relatively new product and is less popular. This was a challenge in terms of conducting primary surveys as it involved identifying appropriate target groups. 2. Limited area coverage: The campus comprises an eclectic mix of students from various parts of the country and thus provides a comprehensive group to conduct this study.Therefore, the scope of this project has been limited to MUM Bangor and the neighborhood of Bantamweight region. 3. Frame of Reference: This study has been conducted from an external frame of reference in the sense that, with no actual experience and Judgment of the energy drinks product market. This might have resulted in assumptions and indications slightly different from the actual energy drink market environment. 4. Market Dynamics: It is a fact that the market dynamics are dispersed and varied.Regional influence of substitutes and competito rs on consumer preferences is diverse. This makes the study subjective and strictly adherent to specificities of research environment leading to biases in perception. 5. Consumer Behavioral Dynamics: Change in consumer preferences, tastes and behavior, relative to market dynamics and self-actuation is a major instigator of limitations of this report The key parameters responsible for the success of any project are planning and execution.Adhering to this idea, a detailed methodology was followed during the entire course of this report, and the same is described below: We started by defining the precise ‘marketing decision problem' to ensure that we don't deviate from our main objective. The next part included extensive research about Tagging, its parent company – Hector Beverages and the energy drink market in general. A variety of resources like newspapers, magazines and Journals were referred, with internet emerging as the main contributor of information.The company we bsite provided major insights about Tagging, whereas research papers from online forums namely ‘OBESE' and ‘Sarcasm' formed the foundation of our literature review. Having performed significant secondary research through the aforementioned sources, we set out to corroborate these findings. This analysis was done based on various marketing models and frameworks. SOOT analysis evaluated the strengths and weaknesses of Tagging meanwhile also listing down the numerous opportunities and threats for Hector Beverages.Market forces were evaluated based on Porter's five forces and growth strategies were proposed using Nations Market-product Grid. This study helped us understand Tagging as a product, its production techniques, prevalent supply chain, operating challenges, organization structure and overall financial health. It also gave us headway on Taiga's competitors, their strategies and arrest share.The primary research is the most detailed aspect of this report and was condu cted in the following ways: a) Blind Test: 10 students of MIM-B were asked online survey was conducted and carefully monitored to restrict the respondents to I'M-B and nearby region as clearly specified in the scope and limitations. C) Retailer Survey: Shop owners of ‘Mom n pop' stores like ‘Ethical' and supermarkets like ‘Inklings' were interviewed to understand Taiga's distribution channels and existing markets in depth. D) Personal Interview with the co-founder: Mr..Squash Miser, the Co-founder and Director of Hector Beverages obliged us by providing the management's insights on Taiga's current and future strategies. A large amount of first-hand data obtained through these tests and interviews was analyzed in detail. Explanations were provided with the help of graphs and other statistical tools for better understanding. After brainstorming on the problems faced by Tagging, the team recommended certain solutions aimed at improving Taiga's branding and communicati on strategy.We extended these proposals by designing print and video advertisement campaigns for Tagging, thus concluding our report. LITERATURE REVIEW When Nearer Kara and Squash Miser, both ex-employees of Coca-Cola , came up with the idea to start a company, they were in search of a â€Å"magic† formula that would provide an affordable energy drink for the Indian market. Their main focus was to create a perfect blend of taste, price and packaging and these efforts finally yielded results in the form of a fruit flavored drink with natural ingredients.According to Kara, energy drinks in India are projected as premium products and consumed mostly by athletes, gym enthusiasts, students and socialites-rarely the average destine. They are costly, primarily due to high import duties. For example, Red Bull, which occupies a major share of the energy drink market in India, costs around RSI. 95 for a mill can. However, Tagging, on the other hand is priced a lot cheaper at RSI. 25 fo r the same quantity.Banking on its Customer Value propositioning, the company has grown tremendously in the past two years and is already a market leader in Ago and the north eastern states. The company has its manufacturing unit at Amnesia, near Surgeon and another larger production unit is coming up in Moser by October, 2013. According to the American College Health Association's National College Health Assessment , stress, sleep, disturbances, anxiety and depression are among the top five threats to academic performance among college students.Researchers have indicated that within the current regulatory void, energy drinks, if aggressively marketed will appeal particularly to the niche of young males seeking performance enhancement and other stimulation related effects. The popular energy drinks, namely Red Bull, Monster etc. Include active ingredients like carbohydrates, terrine, acculturation and caffeine. They have several benefits like increased attention, emotional states, e ndurance and physical performance.The target consumers of Tagging are profiled as follows: a) Geographic segmentation : The major demand for energy drinks comes from Tier-I cities where people lead a stressful life owing to their working environment. The population has been segmented as per their background, either rural or urban. B) Demographic segmentation (Age, Gender, Income): a-Tithe target market of 16-30 years can be further classified into the following groups: (I) Age 16-24: The school/college population which requires energy drinks mainly because they are involved in sports.Age 24-30: The young working refashions who use energy drink requirement is to combat their stressful work life. (iii) Gender based: While the current market share is dominated primarily by the male population, recent trends of energy drink consumption show female segment is also on the rise. (v) Income – Aspirants & Seekers: While premium energy drinks like Red bull target the higher end custome rs, Tagging reaches out to a larger group that comprises of the Aspirants and Seekers c) Chirography's segmentation: It is suited to the lifestyle of students and young working professionals working late night for long hours. ) Behavioral segmentation: Tagging is currently manufactured in mill pack for both light and heavy users even though heavy users account for a high percentage of total consumption. Also the segments are clearly demarcated on the basis of awareness and response to the product. Strategy is value for money. It is also positioned as a healthy energy drink made of natural extracts; without any artificial chemicals and zero side effects. The product tries to build up a youthful and cool image in the minds of consumers. Its promotion campaigns such as â€Å"conquer the night† and â€Å"you are a sum of your obsessions† validate the above claims.Another noteworthy point is the environmental-friendly stance maintained by Tagging through its unique â€Å"l ow-material† packaging and increased emphasis of â€Å"No littering† as clearly mentioned on their website. Building on the above discussion, Taiga's ‘Points of Differentiation' and ‘Points of Parity have been identified below: ;Points of Differentiation: The two main attributes of Tagging which consumers like and find unique are: Low price 0 Packaging Points of Parity: Few attributes which have become increasingly common in the energy drink market and ensure a minimum equivalence with competitors are: 0Category points-of-parity: Instant Energy 0 Competitive points-of-parity: Natural flavors (Organic drink market) CUSTOMER VALUE PROPOSITIONING: The following is the value proposition currently adopted by Tagging: Value Proposition Tagging relevant composition/ attribute Benefits for consumers Favorable points of difference Resonating Focus Real Stuff is good stuff Real lemon, Real Guarani, Real ginseng Lesser caffeine and fruit extracts is a health add on Caf feine content- MGM/ mill as against MGM/ mill Mixed fruit Juice content- 1. % as against 0% of the market leader Could improve the percentage of fruit extract and hence could emphasize this value proposition This Energy Drink Works Contains Guarani instead of raw caffeine, Ginseng, Vitamin B Guarani does the same Job with no negative effects, Ginseng has anti-carcinogenic and anti-oxidant properties, Vitamin B that helps break carbohydrates Claiming Energy boosting through natural ingredients and promotion through actual communication of product values The effect of all ingredients is not brought out in promotion and packaging.Green is not Just the color Packaging appeal Tagging stands out from the clutter on the store shelf. It is a good choice for the environment. Customer's unstated need is fulfilled It allows Tagging to claim customers' value for money.Tagging could evaluate methods to reuse packaging and also offer smaller quantities, may be 1 ml or mill packets BRAND IDENTITY: The brand identity is reflected by the positioning strategy adopted by Tagging as depicted below: Ingredients Real mixed fruit Juice concentrate (from pear, pineapple, mandarin, apple, passion fruit and lemon) , Terrine, Vitamins, Omission, Ginseng, Guarani, Caffeine Tagging has natural components as compared to its competitors which make it healthy Variants Available in three flavors- Lemon Mint,Tropical Trip Mango, Strawberry Provides consumers with variety to choose from refreshing options Popularity Backbone likes -529525 Twitter followers- 836 Within a Caffeine Level 258. Pump- Tagging has comparatively less caffeine content and focuses on natural elements like Guarani. This reduces the ill-effects on health Packaging Daypack- A packaging innovation compared to usual metal cans. Attractive packaging Price RSI. 25 for mill. The price is about 4 times less than its chief competitor ‘e.This mantra chosen by Tagging satisfies the three criteria for an effective brand mantra: 1. Communicate: The words Wake up! ‘ clearly communicate Taiga's promise of energize people at any time of the night. They also have a very positive annotation. 2. Simplify: The world today is cluttered place with a person being exposed to more than 100 promotions on an average each day. And in such a situation, this message stands out from the crowd. It is short, crisp and hence memorable. 3.Inspire: In spite of being simplistic and brief, the mantra holds a lot of meaning and relevance to the target audience. It symbolizes the spirit of â€Å"Rise and shine†, thus establishing a much deeper, an emotional connection with the customer. Strengths Pricing: At RSI. 5 for 250 ml, it is the most inexpensive drink available ; Packaging: Its unique packaging is environment friendly and is easier to carry around. Flavors: It comes in three exciting flavors – Lemon Mint, Tropical Trip and Mango Strawberry, of which Tropical Trip is the most favored among youth ; Natural Ingredients: It uses natural ingredients like lemon, ginseng, Guarani etc. Weaknesses No Aggressive Marketing: Lacks aggressive marketing techniques like celebrity endorsements, sponsorships, television campaigns, college promotions etc. Availability of the product: Not easily available in all the cities ; Awareness: Due to or marketing, many people in India are unaware of this brand ; Manufacturing Units: Currently only one manufacturing unit in Amnesia near Surgeon and an upcoming plant in Moser Opportunities Availability of the product: Being an energy drink, opportunities can be explored in universities and colleges around the country ; Demographic Opportunity: India, with immense opportunity for growth. Tie-ups: Tie-ups with major sporting events can help boost the sale of the product. ; Target Markets: Only the youth is targeted currently. Since the product is natural, the targets can be expanded to include adults also ; Tier II Cities: Aggressive marketing in Tier II cities a nd rural areas Threats Misconception: Energy drinks are closely associated with alcoholic beverages. In a country with strong values and traditions it might seem a deterrent. ;Competition: The main competitor, Redouble is the biggest player globally and enjoys a huge financial clout.Micro segmentation: Once the brand is firmly established, the product can be customized to cater to micro-segments like children, housewives and the working class. ; New Product Range: Apart from energy drinks, the company can also come up with related products like â€Å"Energy candies† and â€Å"Energy bars† to attract more customers. 4. Diversification: At the current stage, Tagging does not have many options to diversify. But certainly with growth, the parent company Hector Beverages can consider Concentric and Horizontal diversification.As mentioned in the methodology earlier, the primary research has been divided into our parts – Blind test, Consumer survey, Retailer survey and an exclusive interview with the company's Co-founder/Director. The reason for adopting this four-step approach is to understand the product and its strategies from the perspective of all its stakeholders. It will provide us an all inclusive view to help us decide the branding/communication strategies and recommended measures. I) Blind Test: Strong Product As Redouble is seen as the main market leader, the blind test was conducted to compare it with Tagging and evaluate both the drinks on accounts of taste and mildness. Ten individuals hailing from different geographical and demographical segments were chosen to have a heterogeneous mix. They were then given samples of both the drinks, and asked to rate the two on various parameters. Following is the summary of the results: ;-1 The test clearly indicates that Tagging is a strong product with superior rating in both taste and mildness.Two other key findings from the test are summarized below: a) While 7 out of 10 respondents rated Ta gging better than Redouble, 6 out 10 did not even know about Tagging. And among the remaining 4, none had ever seen any Tagging advertisement. If we compare this to Redouble, all 10 were well aware of the brand and its strategies. B) The average price that one was ready to pay for Tagging came out to Tagging is only RSI. 25, this difference of RSI. 20 in the prices is nothing but the Consumer Surplus. On the other hand, Redouble charges way more than the average price one is ready to pay for it.Thus, we reiterate the fact that Tagging is a stronger product compared to its competitors. Even without enough brand awareness, it made its mark on the audience and therefore, effective promotional strategies can take it to an entirely different level. It) Interview with the Co-founder/Director, Hector Beverages The project demanded us to take a holistic view of the problem and hence, it was imperative to know the management's viewpoint and future plans about Tagging. We tried contacting the company HER in multiple ways and finally succeeded when Mr..Squash Miser, the Co-founder and Director of Hector Beverages Put. Ltd agreed to be interviewed. He is an alumnus of I'M-C and currently heads the marketing division of Tagging, Bangor in addition to his other roles. This made the talk more relevant to our study. His viewpoints in the form of key excerpts are scribed below: 1 . Advertisement and Promotion: Tagging focuses on Backbone and Twitter for mass promotion of the product. Being an energy drink, the targeted audience is the youth. Hence there are points of sale in multiple colleges, IT companies and Boos.Increased availability in these areas and colorful posters ensure that students and professionals are attracted to this product. Tagging is also looking into precision marketing through the digital medium. 2. To tackle lack of awareness: Increased promotion activities through Backbone and Twitter ensure that the youth of today are aware of this product and its benef its. The Backbone page has over 5 lake followers and the promoters make it highly interactive by answering their queries. Points of sale in colleges and various companies also help in spreading awareness. 3.Major Markets: Currently, the major markets futzing include Delhi, Bangor, North East and Ago. 4. Distribution Network: A direct distribution pattern is followed in Bangor. The retail stores are serviced directly. Biggest volume contributors include college canteens, offices and retail outlets like Afterworld and Reliance. 5. Future Plans: The immediate plan futzing is to be a 100 cry brand by next financial year. Iii) Retailer Survey: Mom n Pop Store: The approximate sale of Tagging is around 24 packets per week and is preferred by sportsperson whereas students still prefer Redouble.The vendor visits weekly to monitor sales and replenish stocks. ‘Tropical Trip' is the most popular flavor among customers. As far as profit margins are concerned, Tagging scores above Redouble and is a natural choice for retailers. However, the immense popularity of Redouble forces them to provide it more visibility. Supermarket: The scenario is quite different with Storage (Pepsico) enjoying the highest share in the energy drink segment, although no specific consumption pattern was noted by the shopkeeper.The distribution network is quite formalized with an elaborate list of -?150-200 vendors competing to supply. The re-purchase cycle occurs every 3-4 days and approve. 120 Tagging packets are sold in this duration. Again talking about profit margins, Storage gives a constant 16% whereas in Taiga's case it varies from 14-17%. Redouble offers a minimal and is thus the least preferred brand by the shop. (iv) Market Research – Questionnaire Based on the results of the blind test, we have directed our questionnaire and

Friday, August 30, 2019

This paper presents an implementation

Abstraction: This paper presents an execution of Multistructure PIDFLC. Modification has been made to construction of the proposed PIDFLC in order to do it acts as PDFLC, PIFLC or PIDFLC depending on two external signals. Two versions of this accountant have been designed utilizing VHDL linguistic communication for FPGA execution. A new bundle has been designed in VHDL codification to implement trigonometric maps and fourth-order Runge-Kutta method to prove the proposed design with nonlinear systems. The accountant was able to bring forth an end product in 0.3 millisecond for additive workss and 0.7 millisecond for nonlinear works. Therefore, the proposed accountant will be able to command many systems with high trying rate. Keywords: PIDFLC, FPGA execution, nonlinear systems, Altera. Categorization: XYZ ( Electronic instrumentality and control )T. Jain, V. Patel and M.J. Nigam † Execution of PID Controlled SIMO Process on FPGA Using Bacterial Foraging for Optimal Performance † International Journal of Computer and Electrical Engineering, Vol. 1, No. 2, P: 1793-8198, June 2009.V. Tipsuwanporn, S. Intajag and V. Krongratana † Fuzzy Logic PID accountant based on FPGA for procedure control † Proc. IEEE International Symposium on Industrial Electronics, Bangkok, Thailand, Vol. 2, pp. 1495-1500, 4-7 May 2004.Obaid Z. A. , Sulaiman N. and M. N. Hamidon â€Å" FPGA-based Execution of Digital Logic Design utilizing Altera DE2 Board † International Journal of Computer Science and Network Security, VOL.9 No.8, P: 186-194, July 2009.Obaid Z. A. , Sulaiman N. , M. H. Marhaban and M. N. Hamidon â€Å" FPGA-Based Fuzzy Logic: Design and Applications – a Review † International Journal of Engineering and Technology, vol. 1, figure 5, P : 491-502, December 2009.Leonid Reznik, â€Å" Fuzzed accountants † , Newnes, first edition, 1997.1. IntroductionThe simplest and most usual manner to implement a fuzzed accountant is to recognize it as a computing machine plan on a general intent computing machine. However, a big figure of fuzzed control applications require a real-time operation to interface high-velocity restraints. Software execution of fuzzed logic on general purpose computing machines can non be considered as a suited design solution for this type of application higher denseness programmable logic devices such as FPGA can be used to incorporate big sums of logic in a individual IC. Semi-custom and full-custom application particular integrated circuit ( ASIC ) devices are besides used for this intent but FPGA provide extra flexibleness: they can be used with tighter time-to-market agendas [ 1 ] , [ 2 ] , [ 3 ] , [ 4 ] .2. Layout of the Proposed AccountantBy and large, this accountant accept two types of end products, the first 1 is the works ( Yp ) and the 2nd 1 is the coveted end product ( Yd ) , both of them is digital signals, and present the control action signal as a digital end product. It besides accepts four 8-bit digital signals that represent the addition parametric quantities needed by the accountant ( relative addition Kp, derivative addition Kd, built-in addition Ki, and end product gain Ko ) , and other two one-bit signals to choose the type of the accountant ( PD fuzzy logic accountant, PI fuzzy logic accountant, or PID fuzzy logic accountant ) . Fig. 1 shows the general layout of the accountant bit in a unity feedback control system. Fuzzy accountant applications do non necessitate high truth. Accuracy of 6-9 spots is adequate and is rather sufficient for different applications. Many designed FIS french friess use this scope of spots [ 5 ] , since two versions of the accountant have been designed to do a comparing in which version is closest to Matlab-based design: the first one uses 6 spots for each input and end product variables, and 4 spots for rank grade, while the other uses 8 spots and 6 spots severally.3. Structure of the Proposed PIDFLCBy and large, to stand for PID fuzzed logic accountant, it was required to plan a fuzzed illation system with three inputs that represent the proportional, derivative, and built-in constituents, and each one of them can hold up to eight fuzzy sets. So that the maximal figure of the needed fuzzy regulations to 83=512 regulations. To avoid this immense figure of regulations, the proposed accountant has been designed utilizing two parallel PD fuzzy logic accountants to implement the PID fuzzy logic accountant. The 2nd PDFLC has been converted to PIFLC by roll uping its end product. Fig. 1 shows the construction of proposed PID fuzzy logic accountant. Both accountants, PD fuzzy logic accountant and PI fuzzy logic accountant, receive the same mistake signal. The mistake signal is calculated by deducting work s end product ( yp ) from the desired end product ( yd ) . The chief block in the PD fuzzy logic accountant is the fuzzed illation block. The proposed fuzzy illation block is two inputs, one end product fuzzy system of Mamdani type that uses singleton rank maps for the end product variable. The first input is the error signal vitamin E ( n ) , and the 2nd input is the rate of alteration of mistake signal defined as the difference between two back-to-back mistake values. Before come ining the fuzzed illation block, each one of these two inputs have been multiplied by a addition coefficient inside the PD fuzzy accountant ( Kp and Kd or Kp and Ki ) . In similar mode, the end product of the fuzzed illation block is multiplied by a addition coefficient inside the PD fuzzy logic accountant, ( Ko ) . At the same clip, the end product of the fuzzed illation block in the 2nd PD fuzzy accountant is multiplied by a addition coefficient so accumulated to organize the uPIFLC. Both end products ( uPD and uPI ) are added together to organize the PIDFLC end product ( uPID ) . Since each PDFLC has its ain additions and regulations, the concluding design could work as a PDFLC, PIFLC or a PIDFLC ) depending on the two choice lines sw1 and sw0 — — , where, sw1sw0= 00, gives PD fuzzy logic accountant, sw1 sw0= 01 gives PI fuzzy logic accountant, and sw1 sw0=0x gives PID fuzzy logic accountant. The chief constituents in the proposed PD fuzzed logic accounta nt are: Input/Output block, Fuzzifier block, illation engine block, and Defuzzifier block.4. Test Bench and Simulation ResultsFor the intent of simulation symmetric triangular fuzzy sets and singleton fuzzy sets with 8 lingual variables have been used for input and end product variable severally, in add-on to govern tabular array of 64 fuzzy regulations. At first, a trial is performed to do certain that the fuzzed illation system used inside the FPGA-based design is working decently This trial is performed to do certain that the fuzzed illation system used inside the FPGA-based accountant ( 6FBC or 8FBC ) is working decently. This trial involves bring forthing control surface utilizing fuzzed sets and regulation tabular array, this trial has been used to do a comparing between both types of FBC with Matlab-based ( MSBC ) , and shows that 8FBC is superior to 6FBC and it ‘s much close to MSBC. Case Study 1: Second order theoretical account may stand for procedure such as place control of an ac motor [ 7 ] Equation ( 1 ) shows the mathematical works theoretical account, distinct transportation maps of this theoretical account has been obtained utilizing ZOH method, and the selected sampling period ( T ) is 0.52. The values of Kp, Kd, Ki, and Ko used in this trial were selected utilizing test and mistake. The accountant gives action at 0.3  µs ; when PIDFLC applied for this system, as shown in Fig. 2, 8FBC response is near to the responses utilizing MSBC, with zero mistake and small overshot. The Average differences between MSBC and 6FBC for Step response and control action are -0.0256 and -0.0009 severally, and The Mean differences between MSBC and 8FBC for Step response and control action are -0.0030 and 0.0021 severally, since the 8FBC is superior to 6FBC and its much stopping point to MSBC. Case Study 2: This instance is considered as a particular instance with the proposed design, because of VHDL accepts four mathematical operation merely, add-on, minus, division and generation, since it ‘s hard to stand for non-linear elements like trigonometric maps. In this instance, a mathematical theoretical account of nonlinear works has been used to prove the proposed accountant with unity feedback control system ; this theoretical account is characterized by Equation ( 2 ) and Equation ( 3 ) . The first order filter on U to bring forth u represents an actuator. Assume the initial conditions y ( 0 ) = 0.1 radians ( = 5.73 deg. ) , y? ( 0 ) = 0, and the initial status for the actuator province is zero. For simulation of the fourth-order, Runge-Kutta method has been used with an integrating measure size of 0.01. Again, this works has been designed utilizing MATLAB package ( for simulation in MATLAB ) , and in non-synthesizable VHDL codification ( for simulation in ModelSim ) . A particular bundle was designed in VHDL codification to implement trigonometric maps and fourth-order Runge-Kutta method which are non available in Quartus II ( or in ISE ) criterion libraries. The values of Kp, Kd, Ki, and Ko used in this trial were selected utilizing test and mistake. The accountant gives action at 0.7  µs after the input latching. When utilizing nonlinear system for trial, both versions ( 6FBC and 8FBC ) supply by and large good responses though there is some oscillation. ( one mu st non be deceived by the steady province mistake that appears in Figure ( 4 ) , since it represents less than 1 % of the end product scope in the instance of 6FBC and less than 0.5 % of the end product scope, in the instance of 8FBC ) . The absolute mean difference between the nonlinear works response, utilizing MSBC, and the nonlinear works response, utilizing 6FBC, is less than 0.0155. The absolute mean difference between the nonlinear works response, utilizing MSBC, and the nonlinear works response, utilizing 8FBC, is less than 0.0085 as shown in Fig. 3.5. Execution of the Proposed PIDFLCThe proposed PIDFLC has been implemented utilizing Altera DE2 board, this board offers a rich set of characteristics that make it suited for usage in a research lab environment for university and college classs and can used for any design executions, every bit good as for the development of sophisticated digital systems by utilizing hardware description linguistic communication ( HDL ) . All con nexions are made through the Cyclone II 2C35 FPGA device in order to supply maximal flexibleness for the user. Therefore, the user can configure the FPGA to implement any system design.6. DecisionSimulation environments have been built utilizing non-synthesizable VHDL codification for the intent of simulation in ModelSim, and the same design is coded in Matlab for the intent of simulation in Matlab ( MSBC ) . Two version of the accountant has been designed, the first one is 6-bits which uses 6-bits for each input/output variables ( 6FBC ) , while the 2nd uses 8-bits each input/output variables ( 8FBC ) . Two instance surveies have been used in order to prove this accountant. From these consequences, 8FBC is superior to 6FBC and it ‘s much close to MSBC. The accountant was able to bring forth an end product in 0.3 millisecond ( after input latching ) for additive workss and 0.7 millisecond for nonlinear works. Therefore, the proposed accountant will be able to command systems w ith high trying rate.RecognitionsThe writers would wish to thank foremost, our God, and all UPM staff and all friends who gave us any aid related to this work. Finally, the most thank is to our households and to our states which born us.

Cellphones and Digital Networks

Cell phones have been around for nearly 15 years and are now everywhere you look. Over a quarter of Americans and a half of Europeans own cell phones and the numbers have been increasing exponentially. With the continuing increase in technology cell phones have become smaller, cheaper, and thanks to the move from analog to digital the calls are much clearer. They offer a great amount of convenience, and can be very economically for the busy businessman on the go. Advancements in cell phones are always being made, giving a clearer sound and lighter feel, as well as a longer life. The cell phone industry has been one of the fastest growing in the world. The electronics are fairly simple, but they are so small that they are truly and engineering marvel. This paper will discuss in depth the many different components of the average cell phone, and talk about how it converts your voice into something that can be sent through a digital network. The paper will also look at how the inner workings allow for a phone to act as a microcomputer, with Internet access, address books, and even games. Finally, it will review the many exciting ideas for this growing market and look to the future of the industry, and how the industry plans on overcoming various limiting factors. Alexander Graham Bell invented the telephone in 1876, 18 years later Guglielmo Marconi created the first radio. It was only natural that these two great technologies would eventually be combined to create the cellular craze. In the 80's few people used radiophones, these phones were the precursor to cellular, but they had several limiting factors preventing them from every becoming a major part of everyday society. In the radio telephone system, there was one central antenna tower per major city, and no more than 25 channels available on that tower. Each phone needed a powerful transmitter, big enough to transmit 40 or 50 miles. It also meant that not many people could use radiotelephones due to the lack of channels. With the current cellular system any none adjacent cell can use the same frequency, so the amount of phones that can be used are nearly limitless. These cells also mean that each phone does not need a strong transmitter, so the phone can be a lot smaller. With the innovation of digital phones, many great features are now available, such as caller id, Internet access, and several other new features. It also meant that the phone would need a microprocessor to convert from analog to digital, this complicated the circuitry, but left it with new technology available the industry was able to make the phone as small as possible. The only restriction in size became the user-input devices, and the screen size. Usefulness of the Digital Cell Phone The digital cellular phone offers many advantages to today†s society. The conveniences that it offers over simply not having one are obvious and they vary from person to person. But there are many advantages over other types of phones as well. The cellular phone not only allows people to communicate with others while they are on the go, but it also offers many other features to help people. With the services that digital provides, people can access email and find information almost anywhere in the world for a reasonable fee. In the future, as the integration of phones and computers grow, people will be able to access tutorials in the field, and use them to communicate with specialists saving a great amount of time for many researchers. Today digital cell phones, such as the one shown in Appendix C figure 1, can process millions of calculations per second in order to compress and decompress the voice stream. In order to do this each phone is equipped with a circuit board that contains many different chips. The circuit board of a common phone is shown in Appendix C figure 2. Two chips described earlier are the Analog-to-Digital and Digital-to-Analog conversion chips that translate the outgoing audio signal from analog to digital and the incoming signal from digital back to analog. There is also a Digital Signal Processor that is highly customized processor designed to perform signal manipulation calculations at high speed. The microprocessor controls the keyboard and display and deals with command and control signaling with the base station, it also coordinates the rest of the functions on the board. This microprocessor is as powerful as the super computer of the 70's that took up whole rooms, but is now the size of a finger. By using its arithmetic/logic unit or ALU it can perform all mathematical operation that run many of today features in phones. It is also responsible for the transfer of data throughout the phone. It will also make decisions and then run a new set of instructions. In Appendix C figure 3 a very simple microprocessor is shown. Cell phones use microprocessors that are much more complex, but the use the same idea. The ROM and flash memory chips provide storage for the phone's operating system and customizable features, such as the directory and various simple games. (Appendix C figure 4) The RF and power section handles power management and recharging, and also deals with the hundreds of FM channels. Finally, the Radio Frequency amplifiers handle signals in and out of the antenna. The Radio Frequency amplifier is the same device as you would find in your car's radio. The display has grown considerably in size as the number of features offered by cell phones has increased. Most phones currently available offer built-in phone directories, calculators and even games. It some new products that will be discussed later, cell phone counter as PDA's offering very large screen and offer all of the benefit you would find in today's hand held computers. The display is a liquid crystal display (LCD). It is made of thousands of tiny crystals with two possible colors. They have recently announced that they will be offering color screens on some new phones that work like the display of a laptop computer. Very small speakers and microphones, about the size of a dime, amplify the analog waves. These devices are just like that of a portable radio and the microphones used on television talk shows. They are both wired to the microprocessor. In order for digital cell phones to take advantage of the added capacity and clearer quality, they must convert your voice into binary information. This means that it must break it down to 1's and 0's. The reason that this is so advantageous is that unlike analog, digital is either on or off, 1 or 0, instead of oscillating between the two. For the conversion, the device must first record an analog wave, such as the one in Appendix B figure 1. To create the highest fidelity possible, it records number to represent the wave, instead of the wave itself as represented in Appendix B figure 2. The cell phones analog-to-digital converter, a device that is also found in a CD player, does this process. On the other end a separate digital-to-analog converter is used for playback. The quality of transfer depends on the sampling rate, that controls how many samples are taken per second, and the sampling precision. The precision controls how many different levels are possible in the sample. The better these two are the clearer the sound, but it takes a higher speed processor and requires a greater amount of data transfer. In Appendix B the benefits are shown in figure 3. Most common digital cellular systems use Frequency Shift Keying to send data back and forth. This system uses one frequency for 1's and another for 0's and rapidly switching between the two. This requires optimal modulation and encoding schemes for recording, compressing, sending, and then decoding without loss of quality. Because of this digital phones contain an amazing amount of processing power. The cellular network is web of towers covering areas, generally thought of as hexagonal cells as shown in APPENDIX A Figure 1. The genius of the cellular system is because cell phones and base stations use low-power transmitters, so the same frequencies can be reused in non-adjacent cells. Each cell is about 10 square miles and has a base station that consists of a tower and a small building containing the radio equipment. As more people join the cellular world, companies are quickly adding more towers to accommodate them. Every digital carrier is assigned different frequencies, an average carrier may get about 2400 frequencies per city, and this number is about three times the amount as analog. The reason that more channels are available is because digital data can be compressed and manipulated much easier than analog. Each tower uses one seventh of the available frequencies, so none of the surrounding 6 towers interfere. The cell phone uses two frequencies per call, called a duplex channel. The duplex channel allows one channel to be used for listening and the other for talking, so unlike a CB or walkie-talkie, both people can talk at the same time. This system currently allows for about 168 people to talk in each cell, for each system. The cellular approach requires a large number of base stations in a city of any size, but because so many people are using cell phones, costs remain low per user. Every cell phone has a special code associated with it, called an electronic serial number (ESN). It is a unique 32-bit number programmed into the phone when it is manufactured. When the phone is activated another five digit code called a system identification code (SID), a unique 5 digit number that is assigned to each carrier by the FCC, is imprinted in the phones memory. When you first power up a cell phone, it checks a control channel to find the SID. If the phone cannot find any control channels to listen to, it knows it is out of range, and displays a no service message. After finding the SID, the phones check to see if it matches the SID programmed in the phone, and if it does not match it knows that the phone is roaming. The central location that the cell phone is registered to keeps track of the cell that your phone is in, so that it can find you when someone calls the phone. When the phone is turned on it sends its ESN to the control channel. If the phone goes out of range, it will take a short while to locate your phone when it enters back into service. This can cause loss of calls, even though the phone is in service, but this problem is very temporary. When someone does call your phone it is sent to the central tower called the Mobile Telephone Switching Office (MTSO). This office is continually communicating with the cell phone. It sends and receives the calls, as well as telling it what frequencies to use. This is all done through the control channel, so it does not impair any calls. As you move toward the edge of your cell, the cell's tower will see that your signal strength is diminishing. At the same time, the base station in the cell you are moving toward, which is listening and measuring signal strength on all frequencies, will be able to see your phone's signal strength increasing. The two base stations coordinate themselves through the MTSO, and at some point, your phone gets a signal on a control channel telling it to change frequencies. There are three common technologies used by cell phone providers. These are Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), and Code Division Multiple Access (CDMA). In FDMA every call is done on a separate frequency. FDMA separates the spectrum into distinct voice channels by splitting it into uniform chunks of bandwidth. This is very similar to the way that radio stations operate. Each station is assigned a signal at a different frequency within the available band. FDMA is used mainly for analog transmission, so it is slowly being phased out. It is capable of carrying digital information, but it is not considered an efficient method for digital transmission. Time Division Multiple Access gives each call a certain amount of time on a frequency. The Electronics Industry Alliance and the Telecommunications Industry Association use TDMA. In TDMA, a narrow bandwidth that is 30 kHz wide and 6. 7 milliseconds long is split time-wise into three time slots. (Appendix D, figure 1) Each conversation gets the radio frequency for one-third of the time. This is possible because voice data that has been converted to digital information is compressed so that it takes up significantly less transmission space. Therefore, TDMA has three times the capacity of an analog system using the same number of channels. TDMA systems operate in either the 800 MHz or 1900 MHz frequency bands. Some phones have the ability to switch between bands. This function is called simply Dual-Band, and is important when traveling between different band frequencies. TDMA is also the access technology for Global System for Mobile communications. The Global system uses different frequencies in different areas of the world and is not compatible with other TDMA systems. GSM operates in the 900 MHz and 1800 MHz bands in Europe and Asia and in the 1900 MHz band in the United States. GSM systems use encryption to make phone calls more secure. GSM is the international standard in Europe, Australia and much of Asia and Africa. In covered areas, cell-phone-users can buy one phone that will work anywhere else the standard is supported. To connect to the specific service providers in these different countries, GSM-users simply switch SIM cards. SIM cards are small removable disks that slip in and out of GSM cell phones. They store all the connection data and identification numbers you need to access a particular wireless service provider. Unfortunately, the 1900 MHz GSM phones used in the United States are not compatible with the international system.

Thursday, August 29, 2019

Patient Safety and the USA Healthcare System Essay

Patient Safety and the USA Healthcare System - Essay Example USA healthcare system has not been efficient in handling the safety of patients. This is because it has encountered various challenges identified by experts. One of the challenges is wrong-site surgery. This occurs when an operation is done on the wrong part of the body. Even though it is rare and preventable it still occurs in the current hospitals. It is apparent that from the year 1995 to 2010 about 956 wrong-site incidents were reported to the Joint Commission. A medication error is another challenge evident in the America health care system. It is apparent when the patients receive the wrong medication or when the wrong dosage is given to a patient. A report by the Institute of Medication in 2006 showed that estimates of 1.5 million Americans each year are harmed by medical errors. This has resulted in an extra medical cost of $3.5 billion (Pauley & Joseph, 2012).Health care-acquired infection is another challenge that the America health care is facing though at a minimal level. The challenge occurs when a person gets an infection while being treated. It is apparent that 1 out of 20 patients hospitalized in United States contract health care acquire infections. At the end, the patient spends more time in the hospital and takes longer recovery time. Falls are other causes of injuries in the health care settings and the outside environment. Research has shown that about 500,000 falls happen each year in Americans hospitals resulting to 150,000 injuries (Savage & Ford, 2008).

Wednesday, August 28, 2019

Assess the role of the French Revolution in the Rise of Nationalism Essay

Assess the role of the French Revolution in the Rise of Nationalism - Essay Example Originally, the revolution was seen as an accepted rebellion against the supreme power of the king and against the civil liberties and wealth of the selected few, however, they were carried out in the name of liberation, egalitarianism, and fraternity. Nevertheless, in actual sense it resulted to the loss of liberation, tyranny, and nationalism, additionally, the revolution was due to a detestation of tradition and yearning to utilize the power of the state to generate a new-fangled order. Therefore, people were bestowed new identities as citizens of the state, but to put an end to the resistance towards revolution and the new order, about 18,000 - 40,000 people were killed.3 Thus, because of the death of many people, the revolution was not capable of establishing a long-lasting system of governance, hence, in the subsequent century; France could be ruled differently as a republic, a tyranny, a legitimate realm, and two diverse empires and under several dissimilar constitutions. In addition to that, the following incidents caused by the revolution encompass the Napoleonic wars, the re-establishment of the realm, and two extra revolutions as recent France developed.4 Moreover, numerous incidents took place during the revolution that started from the very significant function of National Assembly beginning 1789 to 1791.5 This was followed by the collapse of the fort of Bastille, assertion of human rights, the detention of king and queen that was later followed by their murder, stop of the reign of terror with Robespear. Furthermore, revolution put an end to tyrannical and corrupt rule in France, judicious thoughts overthrew the orthodox, limitless monarchy, and feudalism was discarded.6 On the other hand, revolution had also consequences on the world in which it provided recommendation to the world that the king can never be an emissary of God but of people. Revolution also

Tuesday, August 27, 2019

Technology in Policing Essay Example | Topics and Well Written Essays - 1000 words

Technology in Policing - Essay Example First, crime on the net is on the rise, identity theft is another issue of high importance, which is the key tool in fighting terrorism and financial crimes. Thus crime prevention can occur at two levels: one to prevent crimes that are repeating in nature and the other is by analyzing possible future seat of crime. Thus, through analysis and research of recorded crimes and criminal investigations it is possible to get some statistics into the kind of future prospect of how this kind of crime will be dealt in the future by the judicial system or by the police. In case of Internet crimes; therefore, repeated crimes may not always occur as there are always some ingenious method by which the criminal escapes the law - this gap is to be identified as art of the risk management study, which should be more extensive and which should focus more on how the malpractice defenses may be made stronger. In March 2008, a former employee of Compass Bank stole a hard drive and the database containing customer information and all their financial status was breached. This employee used a credit card encoder and several blank cards to create several new cards and withdraw money from several customer accounts1. What are the monitoring approaches that can be fathomed by the state and the court or by the security organization In 2007, the US Federal Trade Commission reported that 8.3 million Americans had been victims of identity theft over a 12-month period2. In cyberspace, such identity theft may make way for further offences. Like Newburn says that in cyberspace three acts of trespassing occur, that involve viruses that immediately attack or attack at a later date citing the example of the shut-down of websites of yahoo, Amazon, ebay, and CNN which incurred a loss of 1.2 billion. He also cites the example of the Timothy Llyod, the sacked employee of Omega Engineering who planted a softwa re time bomb that detonated 20 days after he left which incurred a loss of 10 million and 80 job losses. In 2007 transatlantic fashion retailer TK Maxx was hit by hackers, who stole 45.7 million customer credit card details (Newburn 2008). By this hacking rule, even the military system is under threat and policing or the crime fighting should extend in this front effectively. However, the main problem with policing cyber crime is the amount and volume of information that is available and that cannot be restricted effectively all the time and across the boundaries of a specific place, where cyber crime laws may not even exist. In such a case probable cyber crime laws need to be implemented by predicting probable loss of information security or theft of anything that can range from information to intellectual property rights to manhandling of organizational data or system by a third party. The whole gray space that exists between identifying cyber crime that vary between countries and the definitions of it are so varied across geographical spaces that it is impossible to always thwart such mischief from happening or being conducted from across the boundary of the US. Newburn also cites the example of Russia, which has become a major source of child pornography, as it has no laws against it and therefore becoming the host for broadcasting such films by other illegal traders. Ironically, such content is not being produced there

Monday, August 26, 2019

Swot Case Study Example | Topics and Well Written Essays - 500 words

Swot - Case Study Example This essay would further analyze these four aspects regarding NBB. The strengths of NBB would first be discussed. The major strength of the company can be said to be the corporate social responsibility that the company possesses. It has always believed in providing its customers the best possible product along with the best social environment that the company can provide. The corporate social responsibility of the firm helps it to form a proper infrastructure for its employees who are given particular prizes for their job in NBB. These can be in the form of grants or other monetary values. It also keeps a special check on the recycling and reuse of products that it is manufacturing. This also adds to the corporate social responsibility of the firm. Moreover they also utilize the energy in the best possible ways because of which the release of harmful gases in the environment is quite less. All these factors together help to gain a better brand image amongst the customers. Moreover with the maintenance of corporate social responsibility the sales of the company are also maintained. Also the company has a variety of beers which are produced which help in gaining product diversity. The weaknesses of the company include the way it markets its products. Here the company does not use the proper traditional way of marketing their beer and this can cause them to lose customers. The company does not have a broad market where it produces its products as it is only limited to certain states of America. The company produces specific beers at specific times too because of which they can be at loss too as it is possible that some of the customers only like NBB because of these specific products. The opportunities that the company has can be clearly seen in the growing market of beer. Beer consumption amongst the adolescents is also increasing per day. This means that if the company expands it would be able to grab a greater

Sunday, August 25, 2019

Intensive Writing - Relationship between two Articles Essay

Intensive Writing - Relationship between two Articles - Essay Example The relationship between these articles can be based on the used themes, opinions addressed and the type of society that was used in the context of the article. "Black like them" is written by Malcolm Gladwell and most of its characters are from New York and its neighborhoods. Joane Nagel, on the other hand, writes â€Å"Constructing Ethnicity Creating and Recreating Ethnic Identity and culture† and tries to explain how different ethnicities affect the choices made by individuals. The articles share several themes since they have the same historical backgrounds. They had been based on the American society during the war era. During his period, people from different parts of the world searched for ‘greener pastures hence increasing the rate of immigrants in the United States. This action brought up the issue of racism since people moved to America from different countries. From the article, "Black like them" the Malcolm uses different characters to show how racism is evident in the society. Moreover, neighborhoods have been divided along racist lines. These blocks include the whites, Blacks, Hispanics and those who were of mixed races. For example, the writer explains how a West Indian boss claims that Garden city; a middle-class neighborhood is not a place for black people. Racial discrimination is also evident in workplaces, where the Noel works in a firm with a white workmate who is paid more than him irrespective of the same qualifications and work di d. Socialists and researchers from known universities have come up numerous situations to have a better understanding of these societies. The boss was an Indian national who could not differentiate between the Black Americans and those from the Caribbean. Joane in her book "Constructing Ethnicity" relates ethnic identity and its role in racism. This is because racism has its roots in different ethnic groups.  

Saturday, August 24, 2019

Innovation, Creativity and Enterprise in Markets Essay

Innovation, Creativity and Enterprise in Markets - Essay Example The industry that has been selected for fulfilling the objective of this study report is that of the universities in the UK. The report will be composite of the selected university analysis so that the relevance of the selected study can be established. The most essential sector of the report will be composite of evaluating the various approaches being followed in the UK universities for the effective utilisation of the concept of innovation, creativity and enterprise. The report, at the end, will draw up essential conclusion regarding the key issues being identified from the entire survey with respect to the concepts. 2. Industry Analysis The industry consisting of the various universities in the UK offers the most valuable services to the people not only within the local region but also to the people all around the world. The UK universities are open to students coming from all around the world with the required skills and potentials demanded by the universities. The industry playe rs or the number of universities in the UK are all concentrated on providing quality education to the students with proper assurance and dignity. The universities conduct routine analysis of the various courses that they offer so as to making sure that the form of education that they offer are up-to-date and essential for the betterment of the students. The UK is considered to be holding the most capacity to attract international students among the western countries of the world. Although seven European countries have been identified to be placing stiff competition to the UK’s position, the extremely competitive advantageous position of the UK with respect to providing education to the international students have assisted this country to remain at the topmost position. Autonomy, funding, staffing of international students and assistance of the funding council are the four most advantages of the universities in the UK (Becker & Et. Al., 2009). However, in the future, the compe tition within the UK universities will increase since the recession has put a triggering blow upon the people striving for application for achieving degree from the UK universities. During September 2009, 465,000 people had applied for the acquisition of degree (Curtis, 2009). 3. UK Universities- Innovation, Creativity and Enterprise Innovation, creativity and enterprise are the traits that the European countries like that of the UK aim to foster among the people. The universities have been evaluated to be the best source through which these traits can be injected into the students or the prospective future entrepreneurs. The UK universities follow a number of principles, practices and processes for creating the entrepreneurial mindsets among the students. In this section of the report, the analysis of those principles, processes and practices will be undertaken so as to evaluate their effectiveness. The various noteworthy universities in the UK have adopted the process of innovativ e learning through creative thinking in order to develop upon the characteristics of an entrepreneur among their students. The practices undertaken within the universities are composed of various policies and guidelines for carrying out innovation management and enterprise skill development among others. The practices handle the several societal, economical, entrepreneurial and managerial

Friday, August 23, 2019

Critical Summaries Essay Example | Topics and Well Written Essays - 500 words - 1

Critical Summaries - Essay Example Mimics and gestures are also predetermined by culture. At the same time, some facial expressions are universal. Russell (1991) considers different points of view and recognizes limitations of his study. Provided literature review clearly explains different approaches to emotion categorization. Significance of culture and language in emotion cognition become clear when Russell (1991) supports them with examples and observations. This article becomes the point of departure for further research in sociocultural aspect of emotions. The article The Construction of Emotion in Interactions, Relationships, and Cultures by Boiger and Mesquita (2012) presents the main argument that emotions are constructed in the process of social interactions. Authors list three main contexts of interactions which can be moment-to-moment, ongoing relationships and sociocultural. Moment-to-moment interactions motivate emotional responses in people which become parts of ongoing relationships that exist in bigger sociocultural context. All these contexts define uniqueness and character of emotional response people express in the process of communication. Boiger and Mesquita (2012) oppose naturalist models which define emotions as universal, invariant and innate programs. Their line of reasoning relies on developmental psychology which studies emotion formation in infants and adults. For instance, infants develop their in the process of interaction with their caregivers. Being in relationships, people do not only express their emotions, but share them. As a result, their emotions adapt to the kind of relationships they have. Finally, sociocultural context often defines expected emotional responses in particular situations. Overall, Boiger and Mesquita (2012) back their argument referring to other relevant research with makes their article persuasive. They present enough facts and examples to apply their theory practically and show how it works.

Thursday, August 22, 2019

Knowledge Management & Business Assignment Example | Topics and Well Written Essays - 1250 words

Knowledge Management & Business - Assignment Example From this paper it is clear that the most common characteristics that indicate a firm has suffered a severe knowledge loss especially in a firm that manufactures musical instruments are the loss of people or customers especially if deadlines were not met loss of assets, loss of projects and loss of key work functions. Knowledge loss takes place in situations such as staff mobility, career moves and through retirement. Assets are also lost through transfer of assets and the lack of asset memory or historical data. Projects on the other hand are lost through insufficient experiences. To avoid knowledge loss certain tools are used that are able to effectively capture knowledge, transfer the knowledge and produce useful and accessible results.As the paper highlights  there are numerous challenges and barriers that affect the knowledge retaining and transfer process they include; lack of time, lack of knowledge retention tools, lack of funding, lack of time. For the managing director of Global Wannabe to solve the issue of knowledge loss systematically, he must understand that in this optimized and lean business world, time factor is the most valuable asset.  The managing director also has the task of ensuring that the staff is made aware of the advantages of retaining and transferring knowledge and the impact it has on the success of a business.  The implementation of the KRT or the Knowledge retention and transfer program would be the most effective strategy in reducing risks and knowledge loss.

General Motors Essay Example for Free

General Motors Essay 1. The history, development, and growth of the company over time (e. g. , critical incidents) General Motors (GM) was founded in 1908. William C. Durant brought together 25 independent car companies to form one large corporation. Each company held its own identity as GM operated as central administration office for the 25 divisions. Due to high cost in manufacturing of automobiles, GM was only able to target wealthy customers who could afford cars. Then Henry Ford, owner and founder of Ford Motor Company, revolutionizes the production process of manufacturing cars and takes the lead in the industry. With this new process, Ford becomes GM’s largest competitor, rapidly growing their market share by mass produce affordable cars, the Model T. GM did not have the same competency to mass produce affordable as efficiently as Ford and their sales plummeted. GM was in a bad situation, producing a wide range of expensive cars for a small target market of middle class customers. From 1910- 1920 Ford grew stronger and wealthier while GM struggled to stay afloat. In 1920, Alfred P. Sloan became the CEO for GM and made major changes to GM’s strategy to more effectively compete with Ford. Sloan restructured GM to regain its competitive advantage, targeting a different segment in the market. His consolidation of the 25 companies into 5 major self-contained and operated divisions: Chevrolet, Pontiac, Buick, Cadillac, and Oldsmobile proved to be successful. In 1925 GM took the lead in the industry, hurting Ford’s sales of the Model T so bad that Ford had to shut down his factories for several months to redesign his production line and produce new models. GM became the United States car market leader with the largest market share, 70% at its highest. 925 to 1975, GM expanded its product line to all kinds of vehicles to full-size trucks, light weight trucks, and various specialized vehicles such as vans and ambulances. GM also started to vertically integrate and at one point, made more than 65% of its cars components. From 1925 to 1975, GM dominated the United States market holding approximately 65% of domestic sales. Together, GM, Chrysler, and Ford, held more than 90% of the United States market. Due to the global oil crisis and low cost/high quality Japanese cars in 1970’s, GM lost its lead in the industry. The oil embargo of 1973 revealed the inefficiency of the American â€Å"gas guzzlers†. Neither GM nor its American competitors at this that time had the competence to build fuel efficient cars. Japanese cars now entered the American market and not only were they fuel efficient, there were reliable and affordable. In the 1970s and 1980s, demand for large sedans fell and thousands of GM workers got laid off. By the end of 1970s Americans flocked to Japanese economy cars or sleek European luxury cars and ignored high cost and low quality American cars. In 1980, GM still earned 3. 3 billion on more than 60 billion in sales. With its large cash flows, GM was still able to act as a dominant competitor. Roger Smith, GM’s new CEO aimed to regain GM’s competitive advantage and launched several major programs to reduce cost and improve quality. By 1990, these programs had cost the company over 100 billion dollars, which at the time, was enough to buy out Toyota and Honda. Smith had the most the difficulty lowering cost due to the high cost labor agreements with the UAW (United Auto Workers). GM invested more than 50 billion to improve and update technology and in 1980 started to develop automated factories using robotics to increase quality and efficiency. GM lacked the competency to effectively operate automated factories and was costing them twice as much in producing parts the traditional way. In 1982, GM created a new division called Saturn to develop low-cost manufacturing skills and produce quality cars by imitating Japanese manufacturing companies. It cost GM 2 billion to build Saturn’s plant, GM largest construction project in history. Saturns were priced to compete with Honda Civic and Toyota Corolla. Saturn did not meet its quotas and 1991 and lost $800 million dollars. The next year, Saturn sales picked up and were ranked top 10 in customer satisfaction but still had a loss of $700 million. Saturn could not replicate Toyota and Honda efficiency, especially its low cost supply chain. Same as other divisions, Saturn had difficulties reducing costs because high labor cost due to previous agreements with UAW. To learn Japanese manufacturing techniques GM had a joint venture with Toyota in 1983 called new United Motor Manufacturing, Inc. NUMMI). NUMMI reopened a failed plant in California under Japanese management in 1984. By 1986, with the use of flexible work teams, plant productivity was higher than any GM factory and twice as much as with the old GM management. The flexible teams were regularly rotated, trained to perform the jobs of other works in the team, taught the procedures to analyze jobs to improve work procedures, designed all the teams’ jobs. This freed managers to focus other tasks. GM quickly implemented this system to all its plants and by 2005; GM was laiming to be the most efficient United States carmaker. However, due to tariffs and high costs involved to bring foreign car to the United States, foreign car makers were eager to open their own car plants in the United States. By 1995, foreign controlled plants were making more than 1. 5 million cars a year in the United States. Although GM’s market share declined from 50% in 1978 to 35% 1992, it had not reduced it number of plants or downsized its work force significantly. In 1990 Robert Stempel became the new CEO and like Smith, Stempel did not want to down size the company at all. However, an activist GM director, John Smale, set out to stop GM’s losses and convinced the board to appoint Jack Smith as the new CEO. Smith made drastic changes and down sized the company dramatically. His new strategy for GM was to once again become profitable by aggressively focus on cutting cost, aggressive use of marketing of new designed vehicles that better satisfy customer’s needs, and create a new more-flexible decentralized organizational structure. He also reduced number of models and platforms in which they were built. In 2000, GM built a $1 billion state-of-the-art manufacturing plant in Michigan to raise quality to Japanese levels. In 2005, GM did receive higher quality level similar to Japanese competitor but could not preform to be profitable due to high labor costs. In another attempt to lower value chain cost, GM closed down it Oldsmobile division in 2004. GM then focused on improving efficiency with its parts, components and suppliers, making various changes there. In 2000, GM, Ford, and Chrysler formed an organization called Covisint to gain power over global suppliers. Toyota launches program that reduces the number of steps needed to make components and car parts reducing its costs by 2. 6 billion. In 1992, it consolidated its nine groups into five and combined all its car divisions’ engineering and manufacturing units to eliminate redundancy. Also the five design and technical departments were combined into three to speed product development. To promote and improve coordination between departments, GM changed its organizational structure to a global matrix structure and invested heavily in IT to support this new global matrix structure. With the help of IBM, GM was now able to speed information transfer between its divisions all around the world. In attempts to quickly lower its cost, GM spun off several of its component parts divisions and vertically disintegrated. In 1996, form joint ventures with Isuzu Motors and Suzuki to establish facilities and make specialized engines and transmissions for GM. In 2000, GM acquired a 20% equity stake in Fuji, the manufacturer of Subaru cars and received a new CEO, Rick Waggoner. GM also establishes a strategic alliance with Honda. In 2001, GM’s new assembly plant in China begins production. In 2002, GM formed an alliance with Russian company. During this time, GM attempts to rapidly grow globally and competes with Ford to acquire premium European carmakers. GM bought many other European carmakers but did not find any to be profitable, only costing them more money and more failures. GM also acquired Daewoo and Hummer brand in hopes to strengthen product line and market share. All failed. In 2008, GM fell with the recession and spun off, sold, or digested many of its global assets. GM asked the government for bailouts and in the end filed for bankruptcy.

Wednesday, August 21, 2019

A microscope: An overview

A microscope: An overview 1. Introduction A microscope is an instrument used to investigate tiny objects which cannot be seen by naked eyes. There exist three types of microscopes which are optical microscopes, electron microscopes, and scanning probe microscopes. (1) Six types of microscopes talked in this report are reflected and transmitted light microscope, scanning electron microscopes (SEM), transmission electron microscopes (TEM), focused ion beam (FIB), and atomic force microscope (AFM). 1.1 Reflected light microscopes Reflected light microscope is a type of microscope using visible light and a system of lenses to magnify images of small samples. It is used to examine opaque specimens which will not transmit light and other materials such as ceramics.The reflected light travels through the objective lens, which in this arrangement acts as both a condenser and an objective, and strikes the specimen.It is then reflected off the specimen back up through the objective lens, the head, the eyepieces, and finally to the eye.(2) 1.2 Transmitted light microscope Transmitted light microscope is a type of microscope where the light transmits from a source on the opposite side of the specimen from the objective. Usually the light is passed through a condenser to focus it on the specimen to get very high illumination. (3)After the light passes through the specimen, the image of the specimen goes through the objective lens and to the oculars where the enlarged image is viewed. 1.3 Scanning electron microscope The scanning electron microscope (SEM) is one kind of electron microscope. The SEM utilizes a very fine probing beam of electrons scanning over the specimen to emit a variety of radiations. The signal which is proportional to the amount of radiation leaves an individual point of the sample at any time. The signal obtained from one point will display the information of that point. In practice, the points follow one another with very high speed so that the image of each point becomes an image of a line, and the line move down the screen so rapidly that the naked eye sees a complete image on the computer. SEMs are patterned after reflecting light microscopes and will yield similar information 1.4 Transmission electron microscope A transmission electron microscope (TEM) works much like a slide projector. A projector shines a beam of light through the slide, as the light passes through it is affected by the structures and objects on the slide. These effects result in only certain parts of the light beam being transmitted through certain parts of the slide. This transmitted beam is then projected onto the viewing screen, forming an enlarged image of the slide. TEMs work the same way except that they shine a beam of electrons through the specimen. Whatever part is transmitted is projected onto a screen for the user to see. TEMs are patterned after transmission light microscopes and will yield similar information. 1.5 Focused ion beam A focused ion beam system (FIB) is a relatively new tool that has a high degree of analogy with a focused electron beam system such as a scanning electron microscope or a transmission electron microscope. In SEM and TEM the electron beam is directed towards the sample generating signals that are used to create high magnification images of the sample. The major difference with a focused ion beam system is the use of a different particle to create the primary beam that interacts with the sample. A highly focused ion beam is used instead of electrons in FIB. As the beam scans the surface of the sample, a highly magnified image is created, which allows the system operator to view the samples microscopic features clearly. 1.6 Atomic force microscope The AFM is one of the foremost tools for imaging, measuring and manipulating matter at the nanoscale. The information is gathered by feeling the surface with a mechanical probe. To achieve atomic scale resolution, a sharp stylus (radius ~1-2 nm) attached to a cantilever is used in the AFM to scan an object point by point and contouring it while a constant small force is applied to the stylus. Piezoelectric elements that facilitate tiny but accurate and precise movements enable the very precise scanning. (4) 2. Study of comparison among six kinds of microscopes 2.1 Optical microscopes Optical microscopes, which use visible wavelengths of light, are the simplest and most used. Both transmitted light microscopy and reflected light microscopy need low energy and the microscope itself is much cheaper and smaller than electron microscopes. Compared to electron microscopes, the optical microscopes have another advantage that the image obtained from them is in color. Comparing to reflected light microscope, the transmitted light microscope only works on light transparent specimens but not metal, ceramics and some polymers such as rubber. However sample preparation of transmitted light microscope is relatively complicated. As it requires sample thin enough for the light to go through. This can be done by using a microtome to slice at lower temperature; as well the distortion of the section due to the sample preparation is a problem for observing. (5) 2.2 SEM The SEM has allowed researchers to examine a much bigger variety of specimens no matter it is bulk or thin layer. The scanning electron microscope has many advantages over optical microscopes.The SEM has a large depth of field, which allows more of a specimen to be in focus at one time.The SEM has much higher resolution (~1-5nm). (5)Because the SEM uses electromagnets rather than lenses, much more control in the degree of magnification can be done.All of these advantages, as well as the actual strikingly clear images, make the scanning electron microscope one of the most useful instruments in research today. However, materials that can be examined in the SEM must be vacuum compatible, clean and electrically conducting such as metal. But for non-conducting materials such as ceramic and polymers, gold or carbon coating on the surface of the sample is essential. 2.3 TEM TEM is a technology using a high energy (80-200kV) beam of electrons to transmit through an ultra thin specimen (50-200nm). High resolution (~0.2nm) is the most significant advantage of TEM. (5) However, there are a number of drawbacks to the TEM technique. Many materials require extensive sample preparation to produce a sample thin enough to be electron transparent, which makes TEM analysis a relatively time consuming process. The structure of the sample may be changed during the preparation process. Also the field of view is relatively small, which leads to the region analyzed may not be characteristic of the whole sample. There is potential that the sample may be damaged by the electron beam, particularly in the case of biological materials. 2.4 FIB FIB is usually used to examine metal surfaces. If the sample is non-conductive, a low energy electron flood gun can be used to provide charge neutralization. FIB is inherently destructive to the specimen because when the high-energy gallium ions strike the sample, they will sputter atoms from the surface. Ga atoms will also be implanted into the top few nanometers of the surface making the surface amorphous. (6) These limitations produce noticeable effects when using techniques such as high-resolution lattice imaging TEM or electron energy loss spectroscopy. 2.5 AFM The AFM is a very high-resolution type of scanning probe microscope, with demonstrated resolution of fractions of 1 nm. (4) AFM provides a true three-dimensional surface profile. Additionally, samples viewed by AFM do not require any special treatments such as coating. Most AFM modes can work perfectly in air or even a liquid environment without a need of vacuum. This makes it possible to study not only metal, ceramic, polymer but also biological macromolecules and even living organisms. In principle, AFM can provide higher resolution than SEM. It has been shown to give true atomic resolution in ultra-high vacuum and in liquid environments. High resolution AFM is comparable in resolution to TEM. A disadvantage of AFM compared with the scanning electron microscope (SEM) is the image size. The AFM can only image a maximum height on the order of 10-20 micrometers and a maximum scanning area of around 150 by 150 micrometers. (4) Another inconvenience is that the AFM could not scan images as fast as an SEM, requiring several minutes for a typical scan, while a SEM is capable of scanning at near real-time after the chamber is evacuated. The relatively slow rate of scanning during AFM imaging often leads to thermal drift in the image making the AFM microscope less suited for measuring accurate distances between topographical features on the image. (4) 2.6 Competition 3. Example of applications 3.1 Reflected light microscope Normally, reflected light microscope is used to image metal, ceramic and rubber. Thats the reason why it is also called metallurgical microscope. Nowadays it becomes a fast growing interest; especially in regard to its increasing usefulness in the fluorescence microscopy as well as the rapidly growing semiconductor industry had also led to an increase in the use of reflected light microscopes. (7) 3.2 Transmitted light microscope Polymers can commonly be looked at under the transmitted light microscope, because most of them are transparent or translucent. It can also analyze cell slices obtained from organism. Most of the lab can afford a transmitted light microscope since it is relatively cheap. 3.3 SEM About any scientific field can use an SEM as a research tool. It can be used to look at the crystalline structures of chemical compounds and how their bonds form. A scanning electron microscope is especially useful for looking at the surfaces of materials at an atomic level. 3.4 TEM TEM can do diffraction analysis of small areas by selected area diffraction. High resolution x-ray microanalysis and analysis of crystal defects such as dislocations, stacking faults using diffraction contrast can also be done by using TEM. Another important application is it can image lattice of crystalline materials. (8) 3.5 FIB FIB can be used as Ion beam imaging. The FIB also offers the ability to perform nanopatterning and micromachining respectively, and by instructing the machine to add or remove pertinent features, operator can design and prototype a new micro or nanostructure, modify integrated circuits and cross section specific features to allow failure analysis even in the 3D (TEM sample preparation). FIB is also used for Secondary ion mass spectrometry (SIMS). (7) The ejected secondary ions are collected and analyzed after the surface of the specimen has been sputtered with a primary focused ion beam. 3.6 AFM The atomic force microscope (AFM) is one of the most powerful tools for determining the surface topography of native biomolecules at subnanometer resolution. AFM allows biomolecules to be imaged not only under physiological conditions, but also while biological processes are at work. The AFM can also provide insight into the binding properties of biological systems. 4. Summary Characteristics of six different types of microscopes are compared in this article, including sample preparation and technique limitations. Each one has its advantage and disadvantage, so it is necessary to consider comprehensively before choosing, for example, the type of the material, needed information, vacuum compatible, conductivity and sample preparation, etc. References Microscopy and Analysis. [Online] http://www.microscopy-analysis.com/. Reflected Light Microscopes. [Online] http://reflectedlightmicroscopes.com/. Wikipidia. Optical microscope. [Online] http://en.wikipedia.org/wiki/optical Microscope. W. Richard Bowen, Nidal Hilal. Atomic force microscopy in process engineering : introduction to AFM for improved processes and products. 2009. Geoff West, John Bates, David Ross, D Grandy, J Perkins. MPP242 Microscopy Handouts. Loughborough: The department of materials, 2009. Peter J. Goodhew, Richard Beanland, John Humphreys. Electron microscopy and analysis. s.l.: Taylor Francis Ltd, 2000. The Royal Microscope socieity. [Online] http://www.rms.org.uk/. Brent Fultz, James Howe. Transmission electron microscopy and diffractometry of materials . 2008.

Tuesday, August 20, 2019

The Knowledge Which Are Independent Of Our Culture Philosophy Essay

The Knowledge Which Are Independent Of Our Culture Philosophy Essay It is important to first establish that one cannot analyse beliefs and knowledge together, especially in relation to culture, thus they must be handled differently because they are both separate entities, in how they influence an individuals culture. Culture is the behaviour, and beliefs characteristic of an individual, particular, social ethnic group age group.  [1]   Culture is the society and values upon which one is raised. It is built upon customs, practices, beliefs and ideas that are instilled in an individual by influential parties such as parents from childhood. These are all derived from imagination, knowledge and cultural values which are developed over time depending on customs and beliefs. These then influence an individuals customs. Also, culture is divided into two, individual culture which is the way one Its the repetition of affirmations that leads to belief. -Mohammed Ali  [2]   This is basically to say that once something is repeated to an individual over time especially by someone in authority over them, they begin to believe and practice the said affirmation. Belief is something that is perceived to be true by an individual but is not common to all individuals. According to Michael Woolman, belief is a tendency to accept principles one has always accepted regardless of evidence to the contrary.  [3]  Belief can be deemed fallacious because it is relative especially by people who do not share the same beliefs. Belief is also confidence in the truth of what we believe in and it is justified by its working.  [4]  Belief is also associated with action, ergo, one must practice what they believe in. If I try to doubt all my beliefs, one day I will find that there is at least one whose truth I cannot doubt Rene Descartes  [5]   Descartes basically means that you cannot doubt your beliefs for there is a reason you believed in the first place. Over time, beliefs evolve from being just mere beliefs and become part of an individuals belief system which is what people believe in, inspired by their culture. Therefore, we cannot have beliefs which are independent of our culture. Culture does not exist in a social vacuum but it inhabits a complex world where the attitudes and beliefs of those around an individual have a massive impact on every aspect of their lives. This means that culture, be it societal or individual is influenced by other beliefs from other cultures which end up an individual, depending on what the already present belief is and how closely related it is to the other culture. Culture determines behaviour, customs, values, habits and tradition and it meditates on every aspect of our lives and experiences.  [6]   There is a thin line between knowledge and belief in the sense that belief never leads to knowledge, but knowledge leads to belief. It is not possible for one to believe in something they do not know, however, it is possible to know something they do not believe in. For instance, in the late 1800s, the Kikuyu community of Kenya believed in naming people according to what they were good at, akin to the characteristics they exhibited. This is paradigm of a culture believing in something they know. On the other hand, one may possess full knowledge of what a religion other than their own stands for but may not believe in the tenets (the example of Islam).. According to Bastian Sue, Bammi Vivek , Howard Craig, Kitching Julian, Oberg Dennis, Wilkinson David and Salomon Manjula. knowledge is, a sub-category of belief and it is a claim that one accepts regardless of the degree of confidence, emotional intensity and sense of significance one may have. p This is to say that for one to know they must believe. This only applies to the statement Knowledge leads to belief as it may differ in regard to other statements or claims. This is justified because knowledge is information that is factual and based on the truth. Knowledge is the acquaintance of facts, truths and principles as a form of study or investigation also as to have a clear perception as of fact or truth.  [7]  Also, according to Plato, knowledge is justified as true belief. The greater our knowledge increases, the more our ignorance unfolds. John F Kennedy 3 This quote by J F Kennedy implies that as we learn more, our lack of knowledge expresses how ignorant we are. To some extent, knowledge and belief are somewhat alike in the sense that most of the time they are both based on perception and on what one is told rather that what one knows for a fact. After research, I realised that Knowledge does not have a clear definition of what it is but rather related words like teaching are used to express it. According to geek philosopher Aristotle The one exclusive sign of knowledge is the power of teaching. Among the Ways of Knowing (Woks), Knowledge by Authority and Perception are the most applicable when looking at knowledge in relation to culture. Knowledge by authority is when an individual knows something from someone older, knowledgeable and in authority over them so much so to influence them. For instance, parents and teachers. Authoritative knowledge is usually led by wisdom because such knowledge is thought to have been tested over time. However, it is important not to pass over the fact that authorities may also be wrong. Perception is the act  or  faculty  of  apprehending  by  means  ofthe  senses  or  of  the  mind;   cognition, understanding or the immediate  or  intuitive  recognition  or appreciation,  as  of  moral,  psychological,  or aesthetic  qualities:  insight;  intuition; discernment.  [8]  Knowledge by perception follows the empiricism view that all knowledge is derived from what is observed. This is one Way of Knowing under which belief is and this is because with perception, one makes an observation and sometimes, it may influence what the individual believes in. Belief is the confidence in the truth or existence of something not immediately susceptible to rigorous proof.  [9]  This implies that more often than not, what is believed cannot be proved. It may also not be the truth it could however be deep trust about something and they tend to buried deep within the subconscious with the result that they trigger automatic reactions and behaviours. We seldom question beliefs because we hold them to be truths which have been repeated over time such that they automatically become truths.  [10]  This then means that people internalise beliefs from the people around us when we are most vulnerable and this is when we are children. This way of thinking can be fallacious in that it is an error in reasoning. In this case, the question of whether or not we can have beliefs or knowledge that are independent of culture. It is the repetition of affirmations that leads to belief -Muhammad Ali  [11]   According to Famous boxer Muhammad Ali, when something is repeated and stressed to an individual then it becomes part of their belief s. The stressing and repetition of the belief not done by the believer but by another party who influences the believer to believe that what has been said is truth, thus making the belief part the believers conscience. The fact that sometimes, beliefs cannot be proved doesnt make them right, neither does it make them wrong because as much as there is no proof n its truth, there is no proof that it is false. For instance the statement I believe today is Wednesday is only true because it has been repeated to us over and over again to the extent that it is now true although it is not a statement that has be proved right or wrong theoretically and scientifically. Therefore, it is impossible to have beliefs which are independent of our culture because culture and belief work hand in hand to make an individuals values, traditions, values and habits therefore they cannot be separated and one cannot have beliefs which are independent of our culture. It is also important to note that the culture in question here is an individuals culture and not anothers culture, because one cannot believe in a culture that they do not practice because belief is backed by action. In conclusion, it is possible to have knowledge which is independent of our culture but it is not possible to have beliefs which are independent of our culture.

Monday, August 19, 2019

The Mad Hamlet :: essays research papers

The Mad Hamlet William Shakespeare wrote "Hamlet, Prince of Denmark". "Hamlet, Prince of Denmark" is a tragedy. William Shakespeare was born 1564 and died 1616. William Shakespeare himself, was one of the greatest play writers of all times. Hamlet was an odd character in the play because of the way he acted. Hamlet is intelligent, mad, and selfish. Hamlet is a very intelligent character. Claudius and Polonius planned to send Hamlet to England to be put to death, escorted by Rosencrantz and Guildenstern. Hamlet was supposed to be killed in England by getting beheaded, but he found a way around it. "†¦ My head should be struck off," (V, 2) "†¦Read it at more leisure†¦" (V, 2) and "†¦Devised a new commission, wrote it fair..." (V, 2) shows how Hamlet outsmarted Rosencrantz, Guildenstern, Claudius, and Polonius. Hamlet wrote a different letter that said that Rosencrantz and Guildenstern were to be executed, and therefore cheated death. Hamlet revenged his father's death by murdering Claudius. After Hamlet found out that the sword he and Laertes were struck with was poisoned he then stabbed Claudius with it; "The point envenom'd too? Then, venom, to thy work." (V, 2) From Hamlet's point of view, what he did to Ophelia was intelligent. When Ophelia went mad she said, "T omorrow is Saint Valentine's Day†¦ Never departed more," (IV, 5) and "Young men will do't, if they come to't†¦ You promised me to wed." (IV, 5) Ophelia was saying that Hamlet told her that they would get married if she had sex with him, and that he never showed any love for her, this was intelligent from Hamlet's or some males point of view. Hamlet was mad throughout the whole play. Hamlet murdered Rosencrantz, Guildenstern, Claudius, Laertes, Polonius, and may have been the reason Ophelia went mad and drowned. Rosencrantz and Guildenstern: "He should the bearers†¦" (V, 2) Claudius: "†¦ Then, venom, to thy work," (V, 2) Laertes: "They bleed on both sides†¦" (V, 2) Polonius: "†¦Dead for a ducat, dead," (III, 4) Ophelia: "What the fair Ophelia!" (V, 2) At one point Hamlet was so mad and depressed he wanted to kill himself. "To be, or not to be, that is the question†¦" (III, 1) The worst possible thoughts that Hamlet could have ever thought, he thought incestuously about his mother and himself. He never said that he wanted to be with his mother, but he was just mad that Claudius took the throne from him at the beginning of the play, not that his father was dead.

Sunday, August 18, 2019

Blind Mans Bluff :: essays research papers

Blind Man’s Bluff   Ã‚  Ã‚  Ã‚  Ã‚  Sometimes in literature, the characters in the story make an important contribution to society. In the novel, Blind Man’s Bluff, by Sherry Sontag and Christopher Drew, the brave men and women that served in the Navy’s ‘Secret Service’ did just that. If it wasn’t for them, many more lives would have been lost and more land would be destroyed. They had to endure many hardships and suffer for this country.   Ã‚  Ã‚  Ã‚  Ã‚  This book is compiled of many missions that happened throughout the Cold War. It shows what the Naval Program was like during that period and how it changed due to advancing technology. These people operated the spy submarines and risked being killed or captured by the Soviets. One example of this is when Commander Charles R. McVean took his crew and tapped a Soviet telephone line at the bottom of the Sea of Okhotsk. This stopped a potential nuclear war. They also started to make submarines that could dive deeper and explore murky depths.   Ã‚  Ã‚  Ã‚  Ã‚  Other submarines are used for surveillance. If we were suspicious about a certain ship, a surveillance submarine would so out and spy on the ship and see what they were up to. These subs played a huge roll in the war. If a ship was transporting weapons or bomb making materials to the enemy, the sub could ratio to US forces and take over the ship. One very brave commander in the war was Norman G. Bessac. He commanded the USS Gudgeon, which was an old diesel engined submarine straight into enemy territory. The Gudgeon was caught and pounded by enemy subs. One of the very important subs in the war was the Cochino. It monitored the development of the atomic bomb that the soviets were making. Unfortunately the Cochino crashed into the Tusk and set the after-battery on fire. This eventually caused the end of Cochino. Nine days after the Cochino sank the Air Force found evidence that the Soviets detonated a nuclear device.