Wednesday, October 30, 2019

Personal Narrative Essay Example | Topics and Well Written Essays - 250 words

Personal Narrative - Essay Example It was first weekend after I had come of age when I could right ask my father to give me driving lesson. My parents were really enjoying my impatience and quite shamelessly made me do all the things like washing dishes and cleaning the car. But nothing could faze me and woke up early to take my first driving lesson! When I sat on the driving seat, there was no holding back my happiness and I was grinning widely. My father indicated all the controls and cautioned me especially regarding the accelerator and break. It was trusted old Beetle that I had got accustomed to watching my parents drive so various controls were easy to understand. I turned the key and started the motor. Wow! The thrill of holding the steering wheel and letting go the break was just divine. It was on first gear and though slow, I was independently handling the car. My father took me on a long drive which had lots of curves and by-lanes. I was not allowed to change gears till after I had become accustomed to the b reak and accelerator which father had made me use frequently on the track that was still isolated. Putting the car on second gear had given me huge confidence because I could speed up the car a little more. After about an hour of practice lesson, we headed back. The first driving lesson was memorable because my father was proud of the way, I had managed my driving.

Monday, October 28, 2019

Toyota Motors Japan Essay Example for Free

Toyota Motors Japan Essay The mission theme of Toyota Motors Japan is Innovation into the Future – A Passion to Create a Better Society.   Launched and announced in 2004, this mission theme is the main influence for all of the programs of Toyota Motors Japan.   It basically follows four (4) basic guidelines which the company follows in order to achieve its goals in being able to create a more prosperous society.   These four (4) basic principles are as follows: Be a driving force in global regeneration by implementing the most advanced environmental technologies. Create automobiles and a motorized society in which people can live safely, securely and comfortably. Promote the advantages of cars throughout the world and attract more Toyota fans. Be a truly global company that is trusted and respected by all people around the world. These goals are the overriding objectives of Toyota Motors Japan and figure prominently in the formulation and implementation of its corporate strategies and plans.   Toyota Motors adheres to the principle of Monozukuri, which emphasizes the manufacturing of value-added products and technological innovation.   The company believes that while Japanese cars have been associated with low costs and quality it can change all of this by offering better quality for relatively the same price.   It also emphasizes the shifting trend into more environmentally friendly vehicles in line with the Tokyo Protocol. These implementing guidelines for the mission statement of Toyota Motors Japan, which help them maintain their focus on their goals, are the following: Honor the language and spirit of the law of every nation and undertake open and fair corporate activities to be a good corporate citizen of the world. Respect the culture and customs of every nation and contribute to economic and social development through corporate activities in the communities. Dedicate ourselves to providing clean and safe products and to enhancing the quality of life everywhere through all our activities. Create and develop advanced technologies and provide outstanding products and services that fulfill the needs of customers worldwide. Foster a corporate culture that enhances individual creativity and teamwork value, while honoring mutual trust and respect between labor and management. Pursue growth in harmony with the global community through innovative management. Work with business partners in research and creation to achieve stable, long-term growth and mutual benefits, while keeping ourselves open to new partnerships.

Saturday, October 26, 2019

A Rose for Emily Essay -- A Rose For Emily, William Faulkner

1. Question no. 2 A large amount of the tension in Eugene O’ Neill’s Before Breakfast stems from the main characters’ poor economic conditions. The audience begins to understand their situation when Mrs. Rowland says to her spouse â€Å"Hmm! I suppose I might as well get breakfast ready—not that there's anything much to get. Unless you have some money? Foolish question!† (paragraph 10) Mrs. Rowland, the depressed wife of a penniless poet, spends the entirety of the story complaining about her husband’s infidelity and worthlessness. Amidst her rant, she exclaims â€Å"I've a good notion to go home, if I wasn't too proud to let them know what a failure you've been—you, the millionaire Rowland's only son, the Harvard graduate, the poet, the catch of the town—Huh!† (line 16) This quote refers to the fact that when she married Mr. Rowland, he appeared to have a very promising future and was considered, as mentione d above, the â€Å"catch of the town.† Her husband’s lack of both financial success and current employment, coupled with his unfaithfulness, are the factors that ignite her frustration and, ultimately, lead to the monologue that induces Mr. Rowland’s suicide. 2. Question no. 4 William Faulkner’s â€Å"A Rose for Emily† is presented from the viewpoint of the titular character’s neighbors and fellow townspeople. The narrator begins the story by describing Emily as somewhat of a town spectacle; a mysterious hermit basking in solitude. The first description of Emily by the narrator is â€Å"Alive, Miss Emily had been a tradition, a duty, a care; a sort of hereditary obligation upon the town†¦Ã¢â‚¬  (paragraph 3) This ingratiates the audience with the idea that Emily was not particularly personal with anyone within the town and was considered mo... ...e intemperate language to my wife.† (paragraph 6) This makes it seem as if the narrator is trying to tone down how terrible his actions are which, in turn, makes him unreliable. Bonus: Ancient Greek Drama evolved innumerable times within its period. Aeschylus, Sophocles, and Euripides contributed to and ignited many of these contributions. Aeschylus’s plays allowed for a greater number of characters to be introduced, which allowed conflict to arise within the plot. This took the place of previous plays in which characters spoke only to the chorus. Sophocles impacted Greek Drama by both creating a role for a third character and introducing more complex characters into the plot. Finally, Euripides expanded upon the idea of creating complex characters and also introduced characters that were previously unfamiliar to Greek audiences, such as female protagonists.

Thursday, October 24, 2019

Free College Essays - Allegory and Symbolism in Hawthornes Young Goodman Brown :: Young Goodman Brown YGB

Nathaniel Hawthorne is a nineteenth-century American writer of the Romantic Movement. Hawthorne was born is Salem, Massachusetts, and this is the place he used as the setting for some of his works: such as "The Scarlett Letter", "the Blithedale Romance" and "Young Goodman Brown". In writing, Hawthorne was known for his use of allegory and symbolism, which made his stories a joy for everyone to read. Hawthorne was said to be the first American writer who was conscious of the failure of modern man to realize his full capacity for moral growth. His stories contain much about the life he knew as a child being brought up in a Puritan society. As Hawthorne's writing continued it was filled with the same amount of sin and evil as his first writings. Evil that was revealed through his works. "Young Goodman Brown" was said to be one of the best stories ever written by Hawthorne (Adams70). "The Marble Faun: and "the Scarlett Letter were some of the other stories written by Hawthorne, and they were said to be "Young Goodman Brown" grown older. In this selection there is a question of maturity for Goodman Brown and whether he is good or evil. There is also a transition from childishness to adolescence to maturity. This short story in particular has a feeling of adultery, betrayal, and deception as in some of his other works. It was said by Richard P. Adams that "young Goodman Brown" was a germ for nearly all his best work that followed (Adams 71). The use of symbolism in "young Goodman Brown" shows that evil is everywhere, which becomes evident in the conclusion of this short story. Hawthorne's works are filled with symbolic elements and allegorical elements. "Young Goodman Brown" deals mostly with conventional allegorical elements, such as Young Goodman Brown and Faith. In writing his short stories or novels he based their depiction of sin on the fact that he feels like his father and grandfather committed great sins. There are two main characters in this short story, Fai th and Young Goodman Brown. "Young Goodman Brown is everyman seventeenth-century New England the title as usual giving the clue. He is the son of the Old Adam, and recently wedded to Faith. We must note that every word is significant in the opening sentence: "Young Goodman Brown came forth at sunset into the street of Sale, Village; but put his head back, after crossing the threshold, to exchange a parting kiss with his young w2ife.

Wednesday, October 23, 2019

Chlamydia Trachomatis Infection Health And Social Care Essay

This chapter provides the background treatment of sexually transmitted infections ( STIs ) concentrating on Chlamydia trachomatis infection since the survey is positioned within this country taking down to the specific research inquiry and aims. In add-on, sexual wellness bar and control schemes have been explored. Health has been defined by the World Health Organization ( WHO ) as â€Å" the scientific discipline and art of forestalling disease, protracting life and advancing wellness through organised attempts of society † ( WHO, n.d. ) . Sexual activity is known as an indispensable component of human wellness and well-being contributing to quality of grownup partnerships and a demand for natural creative activity. Yet it poses a batch of hazards to wellness through transmittal of STIs. Although pox, gonorrhea and chancroid are by and large considered as the chief STIs, assorted other pathogens are catching including Herpes Simplex Virus type 2, Chlamydia trachomatis, Human immunodeficiency virus ( HIV ) Herpes Papilloma Virus, and Hepatitis B Virus ( HPA, 2010 ) ( Figure 1 ) . STIs affect people of all ages with the greatest happening amongst those under the age of 25 old ages ( Nicoll, 1999 ; Johnson, 2001 ; NCSP, 2009 ) . In the UK, certain groups of populations are affected more than others therefore making sexual wellness inequalities ( HPA,2010 ; Marmott, 2010 ) . The research has delved into chiefly secondary literature from equal reviewed journal articles, books, wellness bureau or regulating organic structures ‘ studies and articles to show what past research workers have established on CI. Furthermore, sexual wellness bar and control schemes have been explored in order to put CI in a context that engages with appropriate literature.Figure 1: Number of diagnosings of selected STIs and HIV in the UK, females: 2000-20092.2 Chlamydia Infection TrendsChlamydia trachomatis is the most widespread bacterial pathogen transmitted through infected secernments and mucose membranes of urethra, neck, rectum, conjunctivae and pharynx following unprotected sexual contact with an septic spouse. An septic pregnant adult female can infect her babe during vaginal bringing. Genital Chlamydial infection is presently the most common STI in the UK with prevalence ‘s between 2 % and 12 % detected in surveies of adult females go toing general pattern ( Fenton et al. , 2001 ; Creighton et al. , 2003 ; HPA, 2010 ) . Chlamydia infection rates are disproportionately high in under 25s ( Low, 2001 ; HPA, 2010 ) . Rate of infectivity for Chlamydia at national degree for immature people aged 15-24 is one in 10 back uping the degree of sexual activity in that group ( HPA 2010 ; NHS Salford, 2010. In 2001, adult females under 20 old ages of age had reported instances of 36 % of Chlamydia. CI instances rose by 108 % during 1998 to mid-2004 ( Ryan, 2004 ) . As reported by the Department of Health ( DH ) , diagnosing of new Chlamydia and other STI diagnosed instances in the UK such as re-infections made in GUM showed a gradual rise in 1995-2009 ( Figures 2, 3 ) ( HPA, 2010 ) .Figure 2: Number of diagnosings of Chlamydia^ , England: 1995-2009Figure 3: Number of venereal Chlamydia diagnosings by sex and age group, and figure of research labs utilizing nucleic acerb elaboration trials ( NAATs ) : 1999-2008 ( females )STI informations from research lab studies in England, Wales and Scotland and Chlamydia nucleic acid elaboration trial ( NAAT ) information from the UK National External Quality Assurance Scheme ( NEQAS ) . Most people infected with Chlamydia are symptomless ( 70 % females and 50 % males ) until a diagnostic trial is performed ( HPA, 2010 ) . Chlamydia infection is important to adult females ‘s generative wellness jobs since 10-40 % of those untreated septic adult females develop PID ( Garside, 2001 ; Sweet & A ; Gibbs, 2009 ; Pippa et al. , 2010 ) . If efficient and effectual wellness steps are non administered, the disease has the potency of doing important wellness complications to adult females ‘s well-being including relentless pelvic hurting, sterility, ectopic gestation, PID, Chlamydial pneumonia of the newborn, neonatal pinkeye, pre-term labour/delivery and neonatal decease ( Figure 4 ) ( Golden, et Al, 2000 ; Simms et al. , 2000, 2007 ; Garnett, 2008 ; Oakeshott et al. , 2010 ) . There is besides greater hazard in those with repeating and untreated infections to distribute to other generative variety meats ensuing in chronic pelvic strivings ( La Montagne, et Al, 20 07 ; Evans et al. , 2009 ; Hosenfeld et al. , 2009 ) . Sweet & A ; Gibbs ( 2009 ) province that CI can besides ease HIV transmittal adding to the already long-run effects it poses.Figure 4: Chlamydial infection complicationsBeginning: HPA catching diseases surveillance Centre. The figure of diagnosed episodes of Chlamydia infection has been lifting over the past 10 old ages ( Figures 5, 6 ) . Because GUM clinic informations is skewed towards diagnostic patients and Chlamydia is extremely symptomless, prevalence is besides used to depict the epidemiology.Figure 5: Ratess of venereal Chlamydia infection adult females by age group ( 1995 – 2004 )Datas beginnings: KC60 and STISS/ISD ( D ) 5 returns from GUM clinics, United Kingdom ( HPA, London )Figure 6: Chlamydia positiveness rates in screens performed by NCSP, 2007 ( HPA, 2008 )Surveies by Pimenta et Al. ( 2003 ) and Adams et Al. ( 2005 ) support findings of highest prevalence rates of Chlamydia infection in immature adult females aged 16-24. Pimenta et Al ( 2003 ) measured prevalence of Chlamydia infections in 16-24 twelvemonth old females instead than merely reported instances from GUM clinics ( Figure 7 ) . In Portsmouth there was a 9.8 % prevalence of Chlamydia infection in 16-24 twelvemonth old adult females, with the 18-year old adult females holding the highest extremum and Wirral had 11.2 % with the 20-year old adult females holding the highest extremum ( Pimenta et al. , 2003 ) . Most of these persons from both sites would hold been incognizant of their infection and therefore at hazard of developing Chlamydial complications.Figure 7: Prevalence of Chlamydial infections, 16-24 twelvemonth old females, Portsmouth and Wirral, 1999-2000 ( Pimenta, et al. , 2003 ) .Furthermore, the economic impact of Chlamydia infections on the wellness service is tremendous with high cost in the direction of female wellness complications ( Simms, 2006 ; Skinner, 2010 ; Land et al. , 2010 ) . United kingdom costs to NHS are estimated at & gt ; ?100 million per twelvemonth ( HPA, 2010 ) . Because of the impact of CI on the wellness of immature people, it is of import to place and handle septic patients and their spouses and as a consequence cut down the load of the disease on the people and wellness systems ( Appleby et al. , 2007 ; Adams et al. , 2007 ; Low et al. , 2009 ) .2.3 Chlamydia Awareness and KnowledgeChlamydia rates of infection do vary in each part in the UK ( HPA, 2010 ) . This fluctuation may uncover the proviso of diagnostic services every bit much as disease prevalence. Unfortunately, Chlamydia trachomatis infection like most STIs brings about negative public wellness results due to its part or causes to ill-health. In the UK and other parts of the universe, CI pose tremendous challenges for public wellness such as single wellbeing, the load of wellness costs or mental wellness. Chlamydia rate of infectivity at national degree for immature people aged 15-24 is one in 10 back uping the degree of sexual activity in that group. In the UK, certain groups of populations are affected more than others therefore making sexual wellness inequalities with immature people bearing the greatest load by being disproportionately affected by CI ( Figure 8, Table 2-4 ) ( NCSP, 2009 ; Marmott, 2010 ; HPA, 2010 ) .Figure 8: Age-specific distribution of the rate of diagnosed with Chlamydia at STI clinics, England: 2009Beginning: STI informations from GU medical specialty clinics ( HPA, 2010 )Table 2: Number of Chlamydia diagnosings by gender, male sexual orientation, age group and patient state: 2009Beginning: STI informations from GU medical specialty clinics ( HPA, 2010 )Table 3: Number of Chlamydia diagnosings by gender, male sexual orientation, age group and patient SHA: 2009Beginning: STI informations from GU medical specialty clinics ( HPA, 2010 )Table 4: Number of Chlamydia diagnosings by continent of birth: 2009Beginning: STI informations from GU medical specialty clinics ( HPA, 2010 )2.4 Sexual Behaviour: Chlamydia InfectionAlthough sex has become safer to a important extent through the usage of rubbers, Chlamydia rates significantly increased in recent old ages in the UK preponderantly from assorted factors like sexual hazard behaviors and hapless infection control. It has become a major public wellness concern as highlighted in the National Strategy for Sexual Health and HIV ( DH, 2001 ) . The 15-24 twelvemonth age group comprises merely 12 % of the population but has the largest diagnosing of STI instances of about 50 % of freshly acquired infections. Control of Chlamydia infection is complicated since it is symptomless. The sexual behavior of the population is an of import determiner of the rates of STIs. The National Survey of Sexual Attitudes and Lifestyles II identified sexual behavior as the hazard of geting an STI in the immature age groups ( McDowall et al. , 2006 ) . The factors included low age at clip of first sexual intercourse, frequent changing of spouses, increased likeliness of being involved with coincident partnerships, irregular usage of rubbers and the increased opportunities of being involved with a spouse who comes from a portion of the universe other than UK that is regarded every bit high hazard ( Figure 9 ) ( Hughes, 2000 ; Johnson, 2001, Mueller, 2008 ; Waylen, 2009 ; Skinner, 2010 ) . The immature people appear to be the cardinal portion of the hazard of go throughing on the infection to other groups of the population. Thus bar should be largely targeted at this nucleus group which would ensue in economic benefits.Figure 9: Chlamydia prevalence by hazard factors 2003  œ non GUM scenes( Montagne et al. , 2004 ) .A survey by Shiely et Al. ( 2010 ) proved that expedited spouse therapy ( EPT ) offer decreases in hazards of repeating or continual CI in straight persons, and heightening the per centum of those sex spouses who obtain intervention. Thus EPT was revealed as better than standard spouse referral over an extended scope of socio-demographic and behaviourally typical subgroups. Behavioural intercessions might be limited because picks about behavior are controlled by local context and civilization. Smedley and Syme ( 2000 ) province that, â€Å" It is clear that behaviour alteration is a hard and complex challenge. It is unreasonable to anticipate that people will alter their behaviors easy when so many forces in the societal, cultural and physical environment conspire against such alteration. † For illustration, Cohen et Al. ( 2006 ) survey found that when striplings were exposed to arouse instruction categories and parent-child communicating about sex, they intended to pattern safer sex ; nevertheless, this did non really lead to increased rubber usage. Rather, situational properties, including spouse attitudes about, or the handiness of, rubbers played a greater function in behavior. However, the effects of environmental hazards like poorness and favoritism might be moderated by intercessions focused on the person: â€Å" But such attempts do litt le to turn to the broader societal and economic forces that influence these hazards † ( Smedley & A ; Syme, 2000 ) . Bandura ( 1986 ) developed the self-efficacy theoretical account which offers a grade of confidence for working with persons in order to cut down hazardous behavior. Since the adult females are immature, they might non hold the necessary accomplishments to negociate and pull off rubber usage ; Bandura ‘s theoretical account may be specifically suited for them. Bandura suggested that persons beliefs in their competency to carry on certain behaviors impacts on the manner they engage themselves, their self-control when faced with troubles, and their effort in carry oning these behaviors. Foresight direct behavior with respect to peculiarly expected outcomes, though self-control allows for the control of behaviors based on criterions that are internal. Above all, self-reflection Lashkar-e-Taiba persons reflect on and go knowing by larning from their experiences.2.5 Sexual Health Prevention and Control: Chlamydia InfectionPeoples ‘s wellness and the societal and economic succe ss of the UK are highly connected. The related economic and societal costs of CI and other STIs to public wellness are tremendous and surpass UK ‘s hereafter. Two of Marmott ‘s ( 2010 ) six recommendations support the bar and control of STIs in UK ‘s population: â€Å" enabling all kids, immature people and grownups to maximize their capablenesss and have control over their lives † and â€Å" beef uping the function and impact of ill-health first-class wellbeing over their lives † . It is critical that the UK ‘s population is educated on sexual wellness issues so that they are able to do good informed sex determinations that contribute to their wellbeing and cut downing the load caused by STIs. Marmott ‘s study farther emphasised other research work ( Picket & A ; Wilkinson, 2009 ) that â€Å" it is non merely the hapless who suffer from the effects of inequality, but the bulk of the population † . High precedence should hence be given to the integrating of STI control measures into primary wellness attention. The world-wide involvement in and resources committed to forestalling AIDS supply a alone chance for wellness workers to do considerable advancement in commanding CI and other STIs.2.5.1 Chlamydia infection: attacks to bar and controlAlthough Chlamydia is a reportable infective disease, easy treated with antibiotics, and mostly prevented with rubber usage, challenges still exist globally in its bar and control. Public wellness efforts to forestall and command Chlamydia and other bacterial STIs have been applied through surveillance, clinical services, spouse presentment schemes and behavioral intercession schemes. Clinical services are an built-in portion of CI and other STIs bar programmes implemented in all communities. Chlamydia clinical services are available in a assortment of other scenes such as community wellness Centres, household planning clinics, GP surgeries, infirmary exigency suites, and prison scenes. Increasingly, CIs are being diagnosed in scenes other than public wellness clinics. Surveillance is a cardinal public wellness duty which involves monitoring of Chlamydia or its effects, antimicrobic opposition, sexual behavior, testing and healthcare quality and coverage. It is critical in observing and supervising disagreements in Chlamydia and other STIs. It is deficient to follow merely Chlamydia infection case-associated demographics for acquiring penetration into the kineticss of Chlamydia transmittal and its continuity in the affected communities. However, consideration into how and when to use the current schemes or to bring forth new 1s is critical for an efficient lessening in Chlamydia infection rates in the hazard groups. It is merely out of utilizing several surveillance attacks, everyday information analysis and reading, and rating that the load of these complex Chlamydia infections may be comprehended decently. Primary bar attempts include promoting rubber usage and patient instruction about abstention, hold of sexual intercourse, and monogamous sexual behavior. Secondary bar attempts include early and frequent showing, which have shown to cut down the prevalence of the disease ( CDC, 2000 ; HPA, 2010 ) .2.5.1 National chlamydia testing programme and spousesThe National Chlamydia Screening Programme ( NCSP ) was established back in 2003 in the UK to supply timeserving showing trials aiming sexually active adult females and work forces under 25 old ages of age who attend wellness and non-health attention scenes. Systematic showing in the UK is performed merely at GUM clinics. The debut of the NCSP in 2003 and other wellness screens in England, Wales and Northern Ireland and in Scotland in 2005 resulted in an addition of sexual wellness screens from 759,770 to 1,219,308. The programme was rolled out to the remainder of England in 2007 and it aims at testing immature adult females go toing GUM , household planning and expiration of gestation clinics ; foremost cervical vilification, young person clinics, colleges, schools and universities. Pharmacies are besides offering testing trials to immature adult females seeking exigency hormonal contraceptive method ( Brabin et al. , 2009 ) . The HPA was appointed in November 2005 by the DH to administrate the NCSP which is delivered by 152 PCTs in England. However, this was rolled out by the Greater Manchester wellness authorization part in Salford in December 2006 by puting up RUClear programme which works in coaction with NCSP and all registered showing sites. Its spouses include wellness attention suppliers and research labs in supplying high-quality CI surveillance informations required by the wellness protection bureau which is indispensable for placing and supervising CI wellness disparities. RUClear coordinates testing services through easy handiness of testing and intervention services every bit good as happening ways of carrying the immature population to utilize these services ( Appendix B ) . Diagnosis of Chlamydia instances increased by 7 % , 217,570 in 2009 from 203,773 in 2008 ( Table 6 ) ( HPA, 2010 ) . NCSP has national marks for which by 31st March 2010, 25 % of all 15-24 twelvemonth olds were screened a nd from 1st April 2010 to 31st March 2011 the mark was raised to 35 % ( anon. , 2010 ) .Table 6: Entire figure of Chlamydia diagnosings in GU medical specialty clinics and community-based scenes by gender, UK and England, 2008-2009The symptomless nature of CI consequences in important under sensing by instance coverage. Those who are symptomless might non obtain attention and hence are non likely to bring forth a instance study. Furthermore, CI may be distributed otherwise in similar racial or cultural group.Figure 11: NCSP proving locales by sex: England April – December 2010 ( HPA, 2011 ) .The showing and treating of Chlamydia is puting a batch of force per unit area for the Primary Care Trusts ( PCTs ) that have to present in instance the immature people are unwilling to see clinical services. The challenge is to acquire advanced methods that would carry the immature people to take on showing services. The standards for testing Chlamydia, although more loosely applicable, are chiefly for sexually active adult females and work forces aged under 25 old ages. In order for Chlamydia showing to be effectual, HAs should closely supervise attachment to testing standards. For case, when there is grounds of high rates of pregnant adult females accessing healthcare service but testing Numberss are low, so it means the recommended attention is non being received by these adult females. Provision of regular showing services for symptomless immature people-at-risk and prompt diagnosing and accurate intervention for immature people infected with or exposed to CI are critical constituents of effectual clinical CI infection bar and control. Correct designation and appropriate intervention are cardinal elements of CI clinical attention but spouse presentment services and reding are besides critical in hazard decrease. However, even with commercial handiness of good diagnostic trials, effectual medicines, and testing and intervention counsel for forestalling and bring arounding Chlamydia, several challenges restrict the full potency of these tools in supplying quality attention for the immature adult females. Given the reported high incidence rates of CI, the load is much more for immature people ( Figure 12, Table 5 ) ( Fenton et al. , 2005 ) . It is imperative to determine effectual bar programmes. Although heightening entree to Chlamydia testing has been an of import and pressing focal point of Chlamydia consciousness programmes and has led to regenerate attempts to increase entree to Chlamydia testing ( WHO, 2001 ; Santer, 2000, 2003 ; HPA, 2010 ) . As more people including this identified group aged under 25 learn their Chlamydia position, and in acknowledgment of the long latent period of the disease before symptoms prevail, factors related to Chlamydia consciousness remain important to place in order to plan comprehensive Chlamydia direction services that meet the demands of the population at hazard of infection ( Wight, 2000, 2002 ; Low, 2007 ; Brabin et al. , 2009 ) .Figure 12: Proportion of positive instances by age and sex: April – December 2010Table 5: Entire figure of Chlamydia diagnosings by patient Percentage: 2009Beginning: STI informations from GU medical specialty clinics ( HPA, 2010 )2.7 DrumheadIn drumhead, the above reappraisal signifier a background for understanding Chlamydia trachomatis infection and a yardstick for measuring the sexual wellness bar and control schemes whilst carefully considered and acknowledged the reported high incidence rates of infection. This chapter has vindicated many challenges and concerns that public wellness face today. Following is Chapter 3 depicting the adopted research methodological analysis to garnering pertinent research informations.

Tuesday, October 22, 2019

Applications of Artificial Intelligence to Game Design

Applications of Artificial Intelligence to Game Design Abstract Game development is still in its infancy. But recently there has been a steady growth and somewhat of a revolution in styles in the field of computer and video games. Artificial Intelligence applications are being implemented in these games to produce the illusionary effect of intelligence augmentation in order to give the player a good game play experience.   Game AI is used to create exciting playing strategies which keep the players focused and interested in the game. Players are provided exciting opponents, more intelligent creatures that inhabit the world of their games, which exhibit interesting behavior. The main purpose is that boredom of repetition is avoided.   In this paper we will survey the applications of AI in game design. We will describe the role of AI applications in different genres of games such as action, adventure, role playing, and strategy games. Finally, this paper will show how AI in gaming covers a wide area of AI technologies including path finding, ne ural networks, finite state machines, rule systems, human behavioral modeling and many more. Introduction In the last couple decade there is a great evolution in the computer game industry. When two dimensional games were saturating the market, the introduction of 3D-technology really made the concept of a game world entered to the mainstream (Jonathan, P.1). A major advance in the early part of the next century has included player interactivity and artificial intelligence in game design.   A games story line no longer consists of only one primary character. It must consist of many, all playing an important role in the conflict resolution of their virtual world. This puts a heavy demand on the artificial intelligence required to operate non-player characters. Artificial Intelligence techniques are used to produce the illusion of intelligence in the behavior of non player characters in computer and video games. Creatures must no longer be written so as to react based on a single player, and the realness of their behavior and uniqueness of their tactics will be a more important feature t han it has been in the past (Jonathan, P.1 ). Pathfinding is another common use for AI, widely seen in real-time strategy games. Pathfinding is, as its name applies, the method for determining how to get a non-player characters from one point on a map to another, taking into consideration the terrain, and obstacles.The increased sophistication in the field of computer gaming audience has now shown a bright way to an era in which game developers, who earlier struggled in order to produce game which large amount of demographic can play, are now positioned to work with new, advanced artificial intelligence applications. Artificial intelligence in games is usually used for creating players opponents. The objective of intelligence amplification is rescuing the player from the boredom of repetition and letting him focus just on the interesting aspects of the game. The player gives high-level strategic orders, the computer-controlled units take care of detail. At the same time, the full de tail and dynamics of the game is maintained with the computer control of detail, rather than lost through abstraction. Artificial Intelligence   applications in games design is lately getting better by implementing the incredible complexity of advanced AI engines which has   been developed by the efforts and research of programming groups. There are various techniques used in AI-engines in games designs such as finite state machines, Minimax Trees and Alpha-Beta Pruning, fuzzy logic, genetic algorithms, neural networking path finding, rule systems, human behavioral modeling, sample code and many more.   AI techniques will include features like real-time interrogation of suspects, dynamic movement, and richness of behavior in game design which increase the interaction between creatures and their environment, no longer separated from the consequence of their own actions. Combination of generative and reactive planning algorithms will generate the path for creating customized and novel behavior of the characters which will change each time the game is played so that the character behavior is not l imited in ability which will provide the interest in the player. There are different genus of computer and video games in the market and we can see the role of Artificial intelligence applications in these games. Action Games Action games involve the human player controlling a character in a virtual environment, usually running around and using deadly force to save the world from the forces of evil or conquering an alien monsters or mythical creatures. In pure action games, AI is used to control the enemies. Action games like First person shooter type games usually implement the layered structure of artificial intelligence system, layers located at the bottom handle basic task like determining the optimal path to the target and the higher levels take care of tactical reasoning and selecting the behavior which an AI agent should assume in accordance with its present strategy (Janusz, P. 2). Providing realism in graphics has been the key point of competition for these games; where AI has played a major role as a point of comparison. Recent games have extended the genre so that the human player may be part of a team, including either human or AI partners. In all cases, it is the moment-to-moment reaction of the AI to the human that is most important so that the AI must be tactically savvy with little emphasis on strategy (John E, P.11 ).Latest trend is to use schedule based finite state machines (FSMs) to determine the behavior of the players adversaries(Russell, P. 1 ) Adventure Games Adventure games, and similar kind of interactive fiction, move further from action games, since they do not give importance to armed combat but accentuate more on story, plot and puzzle solving. In these games, players must solve puzzles and interact with other characters, as they progress through an unfolding adventure that is determined in part by their actions. AI can be used to create realistic supporting goal-driven characters that the player must interact with appropriately to further their progress in the game (John E, P.11 ). The majority of these games has fixed scripts and uses many tricks to force the human player through essentially linear stories. However, a few games, such as Blade Runner, have incorporated some autonomy and dynamic scripting into their characters and story line (Castle, P.87 ).Two interesting applications of AI to the adventure game category are the creation of more realistic and engaging non Player Characters and maintaining consistency in dynamic sto rylines (Chris, P. 2 ). Role Playing Games In role-playing games, a player can play different types of human characters, such as a combatant, a conjurer or a thief. The player does various kind of activities like collecting and selling items, fighting with monsters, so that they can expands the capabilities and power of their character like strength, magic or quickness, all in an extended virtual world. The Role playing game format also offers similar kind of challenges to the AI developer as the adventure game with some extra impediment due to the amount of freedom assigned to the player. To maintain a story line consistent for these kind of games becomes a biggest challenge and higher level of sophistication is required in these types of role playing games .Here AI is implemented to take control over enemies similar to action games, partners who travel and adventure with the players and also supporting characters like traveling companion, villagers etc . The massively multiplayer games provide an additional opportunity to use AI to expand and enhance the player to player social interactions (John E, P.11 ).These days major AI research areas on these types of games is to provide human interaction, social intelligence and natural language interfaces to these support characters (Brooks, P. ) (Laird, P. 15).Support characters must provide human-like responses, including realistic move ment (Hayes, P. 195), personality, emotions, natural language understanding and natural language generation. In order to do all this, a large range of integrated AI techniques capabilities are required. Strategy Games In strategy games, the human controls various kind of entities for example military elements like tanks, guns, war machines in order to conduct a battle from a   gods eye view against one or more opponents. Strategy games include reenactments of different types of battles: historical (Close Combat), alternative realities (Command and Conquer), fictional future (Starcraft), and mythical (Warcraft, Myth). The human is faced with problems of resource allocation, scheduling production, and organizing defenses and attacks (Davis, P. 24). Strategy games on the market today are an even mix between mythical, fantasy and science fiction campaigns; and recreations of historical battles. There are two distinct classes of game in this category which are turn based strategy (TBS) games involve each player taking their turn to move units, order production, mount attacks and so on and real time strategy (RTS) games which take place in real-time with players moving units, ordering production etc. in parallel (Chris, P. 2 ). AI is used in two roles: to control the detailed behavior of individual units that the human commands, and as a strategic opponent that must play the same type of game against the human (John E, P. 1). AI in strategy games needs to be applied both at the level of strategic opponents and at the level of individual units. AI at the strategic level involves the creation of computer opponents capable of mounting ordered, cohesive, well planned and innovative campaigns against the human player. This is very chall enging as players quickly identify any rigid strategies and learn to exploit them. At the unit level AI is required in order to allow a players units to carry out the players orders as accurately as possible. Challenges at unit level include accurate path finding and allowing units a degree of autonomy in order to be able to behave sensibly without the players direct control (John E, P. 11). Neural network used to choose the best strategy in a RTS-type game. Based on situation analysis, the network decides how greatly to concentrate on development, arms production, repairs after battles etc. All the parameters required by the game will be provided by the neural network on its output (Janusz, P. 3). Simulation / God Games Another sub-category origin by the strategy game is the simulation/ God game. These cast the player in the role of a protective deity .These games give the player god-like control over a simulated world. The human can modify the environment and, to some extent, its inhabitants. The entertainment comes from observing the effects of his or her actions on individuals, society, and the world. SimCity is the classic example of a simulation, or god game (John E, P. 2). The main factor distinguishing God games from strategy games is in the manner in which the player can take action in the environment. The player creates individual characters that have significant autonomy, with their own drives, goals, and strategies for satisfying those goals, but where God (the human player) can come in and stir things up both by managing the individual characters and their environment. The player has the ability to manipulate the environment – for example to raise or flatten mountains to make the land more hospitable, or to unleash the fury of a hurricane or earthquake – and units are controlled less directly than in strategy games(Laird, P. 15 ). Neural networks are used in this type of games to teach the creature behaviors. Neural networks are used for motor controller, threat assessment, attacking on enemies and for anticipation that is predicting players next move .This AI technique help to develop Human like AI (Russell, P. 12). Team Sports Team sports games have the human play a combination of coach and player in popular sports, such as football, basketball, soccer, baseball, and hockey (Whatley, P. 991). AI is used in two roles that are similar to the roles in strategy games, the first being unit level control of all the individual players. Usually the human controls one key player, like the quarterback, while the computer controls all the other members of the team. A second role is as the strategic opponent, which in this case is the opposing coach (Laird, P. 15). One unique aspect of team sport games is that they also have a role for a commentator, who gives the play by play, and color commentary of the game (Frank, P. 77). In a team sports game the strategic opponent might select a play or strategy for the entire team.   That strategy defines a role and/or approximate path for each player involved in the play.  Ã‚  Ã‚   Game programmers discovered that the A* search algorithm is a powerful and efficient way to calculate these paths in the sport games (John E, P. 2). Individual Sports/Racing Games For individual competitive sports, such as driving, flying, skiing, and snowboarding, the computer provides a simulation of the sport from a first or third person perspective (Laird, P. 15).The human player controls a participant in the game who competes against other human or computer players (Laird, P. 15). The computer player is more like an enemy in an action game than a strategic opponent or unit from a strategy game because the game is usually a tactical, real time competition. Individual sports can also require commentators (Janusz, P.4). Opponents for racing games are some of the most pure applications of artificial intelligence in games. The AI must travel over a course, controlling a vehicle (which could be a car, a boat, a plane, or even a snowboard). The AI for racing opponents almost invariably follows a recorded trace of the behavior of a human player. It is as if there is a line on the course that tells the AI where to go, what speed to use, and possibly any special ma neuvers that should be performed (John E, P.1). Conclusion As per the researchers perspective, in the present era of Internet and network games, Artificial Intelligence for interactive computer games is an emerging application area. Artificial intelligence techniques such as finite state machines, path finding, neural networks etc are applied in different genres of games in order to provide an environment for continual steady advancement and series of increasingly difficult challenges for the players to keep them interested. New advances in AI are opening a door to new game genres and even new game paradigms (Stern, P. 77)

Monday, October 21, 2019

Analysis for Still I rise Maya Angelou Essay Example

Analysis for Still I rise Maya Angelou Essay Example Analysis for Still I rise Maya Angelou Paper Analysis for Still I rise Maya Angelou Paper Essay Topic: Poetry You may write me down in history With your bitter, twisted lies, You may trod me in the very dirt But still, like dust, Ill rise. It means that there are people in your life that are going to say bad lies about you which will make you maybe sad but no matter how bad these lies are you can still get up and not let these lies hold you back from your goals Does my sassiness upset you? Why are you beset with gloom? Cause I walk like Ive got oil wells Pumping in my living room. Just like moons and like suns, With the certainty of tides, Just like hopes springing high, Still Ill rise. If u r trying to bother me when I am not harming you just because there are differences between you and me that still wouldnt harm u, I will still rise and wont care about how badly u break me down so I will still rise and reach my goals Did you want to see me broken? Bowed head and lowered eyes? Shoulders falling down like teardrops, Weakened by my soulful cries? Does my haughtiness offend you? Dont you take it awful hard Cause I laugh like Ive got gold mines Diggin in my own backyard. You may shoot me with your words, You may cut me with your eyes, You may kill me with your hatefulness, But still, like air, Ill rise. Does my sexiness upset you? Does it come as a surprise That I dance like Ive got diamonds At the meeting of my thighs? Out of the huts of historys shame I rise Up from a past thats rooted in pain I rise Im a black ocean, leaping and wide, Welling and swelling I bear in the tide. Leaving behind nights of terror and fear I rise Into a daybreak thats wondrously clear I rise Bringing the gifts that my ancestors gave, I am the dream and the hope of the slave. I rise I rise I rise. Overall I want to tell you that however you try, then you are wasting time because whenever you will try to harm me I will still not give up

Sunday, October 20, 2019

Miss Stoner Essays

Miss Stoner Essays Miss Stoner Paper Miss Stoner Paper How does Conan Doyle present Sherlock Holmes, the great detective, in his stories? My general impression of Sherlock Holmes is that he is a very mysterious, cunning and slightly deviant individual. He is cunning because he likes catching people out (by himself without anyone else knowing) so he can get all the credit and acts quite big headed too by showing off in front of his clients. As a reader he gives me the impression that he is selfish because he treats Dr Watson as a servant and accepts Watson to bow down to him all the time. He has respect for women but no respect for men, I think this is because he has soft spots for his female clients but Im probably wrong because its not in his nature to do this. When Holmes meets Helen Stoner in The Speckled Band he is always using a language to show he is a detective I observe that you are shivering along with showing her who is boss this is my intimate friend and associate Dr. Watson. Also while he meets Helen Stoner he is very polite good morning, madam whereas with men he would not talk as politely. He also tries to impress her you have come in by train this morning, I see he is self-indulgent. He shows her compassion (which is rare for Holmes to do) but its sarcastic anyway you must not fear said he soothingly, bending forward and patting her forearm. He goes into out of his way to impress Miss Stoner by going into going into great (and pointless) detail about how he knew how she travelled there You must of started early, and yet you had a good drive in a dogcart, along heavy roads, before you reached the station, weather or not hes got a soft spot for her I dont know but its highly unlikely as its not in Holmes nature to do so. Miss Stoner is baffled about how Holmes knew how she got to the meeting There is no mystery, my dear madam said he, smiling which is also shows that Holmes is smug at this moment. Once Holmes had listened to Miss Stoners story he accused straight away of not telling him everything Miss Stoner, you have not. You are screening your stepfather. He done this again by observing Miss Stoner but this time her wrist and not her clothes The marks of four fingers and a thumb, were printed upon the white wrist this could of meant that she had been cruelly abused possibly by her stepfather. He sat down in his office, by the crackling fire and there was a long silence while he thought of the information he had gathered. He then asked Miss Stoner if it would be possible if they could see over these rooms without the knowledge of your stepfather which is conspiritual. When Miss Stoner said it was alright for them to do this asks Watson you are not averse to this trip, Watson? which is more like a statement of Holmes telling Watson what to do, this shows once again that Holmes is the boss and has full control of Watson. As Miss Stoner leaves she says My heart is lightened already since I have confided my trouble to you This is her thanking Holmes and saying to him you have made me feel at ease. When Miss Stoner arrived she was agitated frightened eyes like those of a haunted animal but when she left she wasnt glided from the room this can be said as Holmes touch. Once Miss Stoner leaves Holmes tests how well Watson has been listening to the conversation by asking him And what do you think of it all, Watson? When Holmes meets Miss Stoners stepfather (Dr Grimesby Roylott) Holmes says to Roylott my name, sir, but you have the advantage of me and Roylott replies straight away with I am Dr Grimesby Roylott, of Stoke Moran as Holmes said it patronisingly and has got strong powers of observation. Holmes is always polite and charming even with people he doesnt particularly get along with (mainly men) Pray take a seat. When Roylott asks Holmes about his stepdaughter hr quickly diverts the subject by politely saying It is a little cold for the time of year, so Roylott furiously answers back with no manners at all. Homes then replies imperturbably (not bothered). Roylott obviously doesnt like Holmes and describes him as a scoundrel and also has a reputation of being a meddler and Holmes likes this. Every time Roylott mentions something about Holmes, Homes smile broadens as if he likes the fact hes got a reputation, Roylott hates him and he has got a sense of smugness about the whole thing.

Saturday, October 19, 2019

Product Innovation on Firm Performance Research Paper

Product Innovation on Firm Performance - Research Paper Example The intention of this study is product innovation as the introduction of a new product in the market that uses different technology and has a higher utility for the consumer than the existing products. In the contemporary competitive environment, a business requires to maintain leverage in relation to its competitors through ensuring that consumer loyalty is maintained and hence a greater market share. Precautions should be observed during product innovations since the process may have a positive or negative impact on the existing product categories. They may result in a greater market share, cannibalism and destabilization of products. Nevertheless, the significance of product innovation can not be ignored. This study explores the positive relationship between product innovation and firm performance. Aboulnasr et al. established that innovation originates from the application of creative ideas to develop marketable products from the existing ones. This process begins through inventi on whereby the new ideas are generated in relation to the performance targets of business. Products usually have a life cycle that decreases over time and requires enhancement through constant innovations to maintain competitiveness in the market. Kim & Huang noted that innovations can be accomplished through development of fresh knowledge or new products in the market that increases a firm’s leverage through increased profits and consumer satisfaction. Customer preferences change with time and therefore continuous assessment of the market is needed. Innovations targeted at consumer satisfaction depend on research that helps managers to determine market dynamics in terms of consumer preferences. Studies indicate that innovativeness leads to improved quality of products and services (Lee 2010). Any invention in business is focused on the improvement of the current product in the market. Innovations emerge from understanding of the need to change the prevailing product quality to match market demand. Radical changes need to enhance product quality and to strengthen its competitiveness in the market. Firms engage in research and development to identify the gaps that hamper profitability. It also assists them to identify the strategic responses to competition. Strategic response is a continuous process that involves decision making and analyzing a firm’s strengths and weaknesses, opportunities and threats. In many situations, a firm capitalizes on its strengths and takes opportunity of the competitor’s weaknesses. With this regard, innovation is necessary to keep an organization abreast with the prevailing market circumstances hence a greater capacity to cope with competition (Kim & Huang 2011). Innovations allow product differentiation giving consumers an array of products to choose from. An organization is able to serve a

Friday, October 18, 2019

A Strategic Choice of Market Segmentation in the Medical Aesthetic Dissertation

A Strategic Choice of Market Segmentation in the Medical Aesthetic Devices industry - Dissertation Example Fashion specialists indicate that fashionable trends start in big cities as centers of invention. However, developed societies like America have shown a big trend in the way the market has responded to the changes in the customer tastes, preferences and need for new devices in the industry (Mei~data, 2012). To this cause, medicine field had evolved from the aspect of just treating diseases to more sophisticated operations like changing the actual form of the human body. Specifically, the medical field has moved to the aesthetic level of changing the physical appearance, whole or in part of the concerned person (Moretti, 2009). With the current generation endeared towards fashion and beauty, the medical aesthetic devices industry has become very interesting although it is still very young, having started just close to 35 years ago. By 2012, the annual industry growth had grown to an all-time high of 11.9%. The devices used earlier on were based on medical use in which case high risk d evices such as lasers were used. However, the needed changes raised the need to have better devices leading to introduction of other devices such as IPL, Electroporation and RF devices. Much safer devices have since been introduced into the market. Beauty salons, Spas and aestheticians then decided on the need to have these devices for their customers. They created a very important market segment (GBI, 2012). Over the years, the complexity of the industry has seen simpler operations carried out at homes and non-specialized places (Jesitus, 2008). This was a market niche that had developed leading to a more rampant consideration as another segment in the industry. These home-based aesthetic medical services became a center of consideration since there had to be pricing, assurance of efficiency of these products, product regulation and marketing (Frentzen, 2013). A strategic direction has to be therefore identified in the market that would effectively and efficiently not only be profi table to the companies in the industry but also serve the market well. Three niche markets are identified therefore for service by this industry; the medical field, home use and the beauty section. Companies have come up and focused in the market through different strategies that have allowed them to venture into different markets as stated by the niches above (Jassal, 2013). There are companies that have concentrated on any of the three choices the companies have come up with aspects of production aiming at devices that; hair removal, acne treatment, skin rejuvenation and many other aesthetic services (Kuechel, 2004). Research Aim Taking a reference at the research question, we get the idea that companies require a strategic choice for their medical aesthetic devices in the three identified market niches. The aim will therefore direct the companies on whether there is need to make changes to their current marketing strategy, expand them or invent new ones. This will also lead to th e invention of the need to either segregate the market or come up with a clearer way of operating. Research Question and Objectives From the hypothetical statement indicated in the proposal, the research questions look to determine whether there is a need for a strategic change for market segmentation for a medically focused aesthetic company considering that there are recent changes and

Free Will Essay Example | Topics and Well Written Essays - 1250 words

Free Will - Essay Example This leads to the realization that in deed power inflicts corruption of the mind and absolute power corrupts the mind completely (Blaug 67). The statement that power has the ability to corrupt the mind has been vividly observed in almost every part of the world. Individuals in the opposition have proven to be some of the best leaders before assuming the throne. They articulate people’s grievances and would convince that they are the best to be mandated to lead the people, ironically, when they are eventually elected to power they change to be the known despots of the world (Curra 97). In support of these, the history of Adolf Hitler can serve as an example. Hitler was German who was incarcerated for many years allegedly for castigating the regime that was in power then, after serving his sentence, Hitler was unanimously endorsed to be the Germans king on premise that he had vehemently articulated people’s voices and out rightly was the best bet then (Lewis 56). Upon ass uming the office, Hitler turn to be driven by the ever-growing need to conquer the world by claiming every part of it to be German’s territory. ... This is a clear illustration that power can corrupt the mind to an extent that it insulates critical analysis of one’s actions and impact negatively to the society or a nation at large. With reference to power as a way of corrupting the mind Hitler is not the only culprit, there are other world’s leaders who have acquired the title ‘despots’ by the way they managed power, the long list includes people like Pol Pot (Cambodian dictator) and Slobodan Milosevic of Yugoslavia (Lewis 204). At the helm of power, all these leaders demonstrated radical change in perception thus enabling us to construe that they were corrupted by power The notion that power corrupts the mind is a blanket accusation that cannot be used to include every leader who has been at the helm of power. We have very many leaders starting from grassroots level to the national level who have served in their capacities diligently with honesty and the rule of the law negating the fact that with the onset of power what follows is the corruption of the mind (Lewis 215). Again, when enumerating leaders who have shown deviance while in power, the proportion of the leaders who perfect this is negligible compared to the entire population. It is becoming necessary that we critically understand the relation between power and individuality, power itself cannot corrupt the mind, but the mind can corrupt power (Curra 198). It should then be construed the other way round. Before we relate power to the corruption of the mind, we should first have all the fundamentals of power that directly influences leader in power to depict contrary behaviors and without these, it will be elusive to admit that power affects leaders negatively. The other

Thursday, October 17, 2019

Management problem solving Essay Example | Topics and Well Written Essays - 500 words

Management problem solving - Essay Example The very fact that now people are being considered as resource instead of liability marks the importance of human beings constituting this resource. Moe's too believes in valuing the contribution of its workforce. But at times situations arise which present not only a challenge, for the HR manager, to come out with effective solution to the issue but it also provides a wholesome learning experience i. Moe's is basically into services i.e. service sector organizing i.e. Moe's mission basically centers on welcoming the hunger of its customers and then satisfying it. The smiling staff spread the fragrance of a hearty "Welcome to Moe's!" when the customer walks in. Therefore Moe's is into hospitality events and not in production and manufacturing I used to tell the boys that customer satisfaction is the key to our success, and believed in positively motivating them to excel in life. Motivation in simplest terms can be defined as a means of providing motives. Motives can act towards making or breaking the work, towards doing a job more efficiently or for distorting the work environment. The lack of any positive motivation by the managers often results in an automatic provisioning of negative motivation.

The competitive advantage of the Country Singapore using Porter's Essay

The competitive advantage of the Country Singapore using Porter's Competitive advantage and the Diamond factors - Essay Example We also find out in this study that, though the country has a natural small land area, the country capabilities and efficient and effective use of information technology has more than compensated for its present international position in the shipping and sea transportation industry. The country position and image has been further enhanced through electronic government that has transformed public services. This paper examined the competitive advantage of Singapore using Porters competitive advantage of nations. Porter tries to solve apparent puzzle of a country's competitive advantage, or why one country is more competitive than the other through the attributes of his competitive advantage of nations (Porter 1990).These constitute the essence of his notion of competitive advantage. Porter (1990) echoes an important question in which he provides a succinct answer. For example, "why does a nation achieve international success in a particular industry Porter argues that, the answer to this question lies in four broad attributes of a nation that shape the environments in which local firms compete and promote or impede the creation of competitive advantage." (1990:71). ... The first part of the paper examined Porter's competitive advantage of nation, the second part of the paper looks at this competitive advantage with respect to Singapore. The last part of the paper provides a brief finding conclusions and recommendations. 1.1 Porter's Competitive Advantage of Nation-Porter's Diamond Porter's essential task in his ground breaking tool was to explain why a nation would succeed in a particular industry and not in another. In the words of Porter (1990), "in global competition, firms from any nation can gain scale economies by selling worldwide" (Porter 1990:71). To the researcher, which nation's firms will do so Thus, to Porter, a range of new explanations for trade has been proposed. One is economies of scale which give the nation's firms that are able to capture them a cost advantage that allows them to export, but however this theory are fraud with gross weaknesses (Porter 1990). Porter in his ground breaking work of (1990) postulates that a nation's competitive advantage can be deduced from his four attributes of competitive advantage. These attributes include include (1) factor conditions, which he defines as: "The nation's position in factors of production, such as skilled labor or infrastructure, necessary to compete in a given industry." (Porter 1990). The second attribute in Porter's competitive advantage of Nations is the demand conditions. Porter (1990) refers to this as the nature of home demand for industry's product or service. The third attributes of Porter's competitive advantage of nations focuses on related and supporting industries, which according to Porter (1990) refers as: "The presence or

Wednesday, October 16, 2019

Management problem solving Essay Example | Topics and Well Written Essays - 500 words

Management problem solving - Essay Example The very fact that now people are being considered as resource instead of liability marks the importance of human beings constituting this resource. Moe's too believes in valuing the contribution of its workforce. But at times situations arise which present not only a challenge, for the HR manager, to come out with effective solution to the issue but it also provides a wholesome learning experience i. Moe's is basically into services i.e. service sector organizing i.e. Moe's mission basically centers on welcoming the hunger of its customers and then satisfying it. The smiling staff spread the fragrance of a hearty "Welcome to Moe's!" when the customer walks in. Therefore Moe's is into hospitality events and not in production and manufacturing I used to tell the boys that customer satisfaction is the key to our success, and believed in positively motivating them to excel in life. Motivation in simplest terms can be defined as a means of providing motives. Motives can act towards making or breaking the work, towards doing a job more efficiently or for distorting the work environment. The lack of any positive motivation by the managers often results in an automatic provisioning of negative motivation.

Tuesday, October 15, 2019

Heaney Digging or Frost The Road Not Taken Essay

Heaney Digging or Frost The Road Not Taken - Essay Example Life is a journey where every turn is a major turning point. One decision can make or break a life-long expedition. Life is influenced so much by time and like what Frost stated in the first stanza of his poem, it is such a disappointment that one cannot travel a certain path and knows exactly what would happen through its journey there. There are other factors that should be taken into consideration like the time and opportunity that is presented at a given situation. One can consider the possible pros and cons that might occur during the circumstances. Things may present to be more appealing at the first sight but may have complex hurdles along the way which the person would not know how to overcome it unless it is already right under his nose (10). Frost put into metaphor a person’s life and a traveler’s journey to an unknown place. It would be a pity not to explore ideas at the same time to know the beauty and the consequences that life or the journey may bring. There are roads or opportunities which may present itself as a totally disastrous event yet at the onset yet as one goes through this path, the more fulfilling it is becoming for the person. This is usually the road not taken especially in recent years as more and more people would choose the easier path that may bring instant gratification rather than the one which may need time before gathering any form of fulfillment. Others may decide towards the road because of status-quo, it is just like ordering the usual at a fast-food chain at the corner of the street. There is no adventure in it and simply represents a routine (10). On the third stanza of the poem, Frost gave an example as to what may one thinks if there are two ideas presented having an identical onset presentation. However, these ideas may have and will have different path struggles which may incur various outcomes. One cannot go back to the starting point and take the

Billie Holiday & Misuse of Drugs Essay Example for Free

Billie Holiday Misuse of Drugs Essay Billie Holiday was born Eleanora Fagan, on April 7, 1915 to a thirteen year old mother and a fifteen year old jazz guitarist, father. After a difficult early childhood, which included scrubbing floors at a brothel and singing in night clubs to make ends meet she was ‘discovered’ by the record producer John Hammond in around 1932. In 1933 she made her first recording of a song called ‘Your Mothers Son-In-Law’ and her career took off. Billie started leisurely use of marijuana as very early in her life, by some accounts when she was twelve years old. However it was the eventual use of heroin, which she was introduced to by the men in her life, which actually destroyed her (Clarke, 2000). She married trombonist Jimmy Monroe on August 25, 1941 and while married to him became romantically involved with trumpeter Joe Guy and became his common law wife. Joe Guy introduced Billie to drugs and was her dealer. It was during the forties that Billy had made some of her most well known recordings. This however was also the time period that her dependence on drugs grew. She started using heroin intravenously during the early forties. It is a well known fact that heroin gives the user a short-lived elation, which is succeeded by drowsiness. Long term effects of heroin are slowing of the heart rate, breathing and activity of the brain. It is also accredited with depressing appetite, thirst and the reflexes. When the effects of the drug begin to wear off, usually four to eight hours after the last dose, withdrawal symtoms set in. These include chills, sweating, runny nose, irritability, insomnia, tremors, and body pain. There comes a point when the user does not take the drug for pleasure but to relieave the pain that sets in as the effects of the drug start to wear off. Unfortunately, at the peek of her career, Billy was not only using heroin but cocaine and opium as well and in addition to alcohol and cigarettes. Her unchecked drug use and chronic depression brought her careen to a sudden halt. In 1947 Holiday was arrested for possession of illegal drugs and volunteered to be placed in drug-rehabilitation center for eight months. In order to revive her career after her release, her manager booked her at Carnegie Hall where she performed in front of a packed hall. However, this was a turning point in her career, as she could not get her cabaret license reinstated. Thus she was not permitted to perform in establishments that served alcohol (Dufty, 1956). With the passage of time, the excessive use of drugs and alcohol had a profound effect on her voice and her health in general, to the point that she had a difficult time making a living performing. In 1954 She toured Europe and performed at the Royal Albert Hall, but by this time her performances had weakened. Miles Davis remembered the last time he saw her was in 1959, when he was performing in Birdland and Holiday came to visit and ask for money to buy heroin. Miles claims he gave her about a hundred dollars (Davis, 1990). Billy Holiday’s last public performance was in 1959. She was forty four years old, and was in such poor health that she had to be escorted off stage only after two songs. Prior to her death on July 17th, 1959, Billy wrote her autobiography with the help of William Dufty and talked about her issues with drug abuse and growing up poor. When Billy died she was under house arrest undergoing treatment for kidney failure, due to drug and alcohol misuse. Use of alcohol, narcotics and tobacco exact a toll not only on the addict but society as well. Misuse of drugs, as seen in the case of Billy Holiday, can make a talented individual a burden on society. Medical treatment of these individuals consumes resources that can be more productively used elsewhere. Nearly 80% of prisoners in U. S. A. are incarcerated for drug related issues. Tobacco kills nearly 400,000 people, while alcolhol kills 80,000 and Cocaine and Heroin kills 4,500 people in a typical year (Drug Information, 1999). Works Cited Clarke, D. (2000). Wishing On the Moon. In D. Clarke, Wishing On the Moon (pp. 12 and 395-9). (1990). Miles: the autobiography. In M. Davis. Drug Information. (1999, June 1). Retrieved June 07, 2010, from www. a1b2c3. com/drugs/: http://www. a1b2c3. com/drugs/ (1956). Lady Sings the Blues . In W. Dufty, Lady Sings the Blues. New York: Doubleday.

Monday, October 14, 2019

E-voting system

E-voting system CHAPTER 1: INTRODUCTION Introduction Motivation Objectives The aim of this project is to design an e-voting system that makes use of Java and Bluetooth technologies. The specific objectives of this project are: To create voting software that using Java 2 Micro Edition (J2ME) that can run on any mobile devices which will act as server and clients. To develop Java 2 Micro Edition (J2ME) based voting system that able to fully utilize the functionality of Bluetooth technologies by transferring data (voter database, voting records, etc.), between two mobile devices. To build a low cost and reliable client-server based voting system. Outline of Thesis The content of this thesis is organized according to the chapter. Chapter 1 is mainly about the brief introduction of the project done with some motivation and objectives. Chapter 2 is generally about the literature review of Java 2 Micro Edition (J2ME), Bluetooth and JSR-82 technologies, and also overview about the BVote itself. Next, Chapter 3 is about the methodology and details of the design whereas Chapter 4 is about the implementation of program through simulator and hardware devices since it is the output of the work done on Chapter 3. Chapter 5 is in relation to the presentation of data of the program with some program module hierarchy and classes used for Java programming. Then, Chapter 6 is concerning the discussion about the program outcome and its limitation. Finally, Chapter 7 is the final part of any reports or thesis which is the conclusion and some recommendations for future research. CHAPTER 2: LITERATURE REVIEW Overview of Java Micro Edition (Java ME) Introduction Java is a programming language originally developed by James Gosling at Sun Microsystems, which is now a subsidiary of Oracle Corporation. It was released in 1995 as a core component of Sun Microsystems Java platform. Java is general-purpose, concurrent, class-based, and object-oriented, and is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers write once, run anywhere. Recognizing that one size doesnt fit all, Sun has defined and supports four editions of Java aiming different application environments and segmented many of its APIs so that they belong to one of the platforms. The platforms are: Java Card aimed for smartcards. Java Platform, Micro Edition (Java ME) aimed at small and memory constrained devices by means of environments with limited resources. Java Platform, Standard Edition (Java SE) aimed at standard desktop and workstation environments. Java Platform, Enterprise Edition (Java EE) aimed at heavy duty server systems, large distributed enterprise or Internet environments. Java ME was formerly known as Java 2 Platform Micro Edition (J2ME), is a Java platform designed for mobile devices and embedded systems. Java ME technology was originally created in order to deal with the constraints associated with building applications for small devices with as little as 128KB of RAM and with processors a lot less powerful than those used on typical desktop and server machines. Thus, Sun defined the basics for Java ME technology to fit such a limited environment and make it possible to create Java applications running on small devices with limited memory, display and power capacity. There are three core concepts in the Java ME technology: Configuration provides the most basic set of libraries and virtual machine capabilities for a broad range of devices. Profile set of APIs that support a narrower range of devices. Optional package set of APIs in support of additional, common behaviours that dont really belong in one specific configuration or profile J2ME consists of a set of profiles. Each profile is defined for a particular type of device and consists of a minimum set of class libraries required for the particular type of device and a specification of a Java virtual machine required to support the device. A profile itself does not do anything; it just defines the specification. Since profiles are subsets of configurations, profiles are implemented with a configuration. Ultimately, Java ME platform has been divided into two base configurations which is Connected Device Configuration (CDC) and Connected Limited Device Configuration (CLDC). Java ME was designed to use profiles and configurations to enables devices of varying ability to able to run Java ME applications on the Kilobytes Virtual Machine (KVM), which is the micro version of Java Virtual Machine (JVM). Figure 1 illustrates how the CDC and the CLDC together make Java ME. The diagram also shows an overview of the components of Java ME architecture, and how it fits in the overall Java model. Configurations Configuration is a preliminary Java platform for devices with similar requirements with respect to total memory, processing speed, power and display constraints. Specifically, a configuration consists of Java language features, JVM features and a limited set of generalized APIs. Configurations are closely linked with JVM. In fact, configuration is a term identifying Java language features as a set of APIs and a specific JVM for that particular configuration. The dividing line as to what configuration applies to a device is for the most part, dependent on the memory, processing power, network connectivity and display constraints of a device. Connected Limited Device Configuration (CLDC). The Connected Limited Device Configuration (CLDC) is a fundamental part of the architecture of the Java ME that targeting resource-constraint devices like mobile phones. It is specifically designed to meet the needs for a Java platform to run on devices with limited memory, processing power and graphical capabilities. CLDC contains a strict subset of the Java-class libraries, and is the minimum amount needed for a Java virtual machine to operate. CLDC is basically used to classify myriad devices into a fixed configuration. When coupled with one or more profiles, the CLDC gives developers a solid Java platform for creating applications for consumer and embedded devices. CLDC is designed to bring the many advantages of the Java platform to network-connected devices that have limited processing power, memory, and graphical capability. Target devices typically have the following capabilities: A 16-bit or 32-bit processor with a clock speed of 16MHz or higher. At least 160 KB of non-volatile memory. At least 192 KB of total memory available for the Java platform. Low power consumption, often operating on battery power. Connectivity to some kind of network, often with a wireless, intermittent connection and limited bandwidth. On top of the different configurations Java ME platform also specifies a number of profiles defining a set of higher-level APIs that further define the application. A widely adopted example is to combine the CLDC with the Mobile Information Device Profile (MIDP) to provide a complete Java application environment for mobile phones and other devices with similar capabilities. Connected Device Configuration (CDC) CDC is a specification of a framework for Java ME applications describing the basic set of libraries and virtual-machine features that must be present in an implementation. The targets for CDC-based technology comprise a broad range of consumer and embedded devices like smart communicators, pagers, high-end personal digital assistants (PDAs), and set-top boxes. Within this range, CDC is the basis for several standard API bundles that address the needs of developers of applications for specific categories of devices. Devices that support CDC typically include a 32-bit microprocessor/controller and make about 2 MB of RAM and 2.5 MB of ROM available to the Java application environment. The CDC configuration was designed to bring the many advantages of the Java platform to a broad range of network-connected consumer and embedded devices. CDC versus CLDC The CLDC is different from, yet also a subset of the CDC. The two configurations are independent of each other, however, so they should not be used together to define a platform. The CLDC is a proper subset of the CDC. Neither the CLDC nor the CDC is a proper subset of the J2SE platform, however, because both of these configurations add new classes necessary to deliver services on their respective families of devices. Like the CDC, the CLDC specifies the level of support of the Java programming language required, the required functional support of a compliant Java VM, and the set of class libraries required. Figure 2 shows the relationship between the two configurations and the J2SE platform. Profiles Profiles are an extension of its underlying configuration. A profile simply is a set of APIs but unlike configurations, profiles are closer and specific to the target device capabilities. They are intended to include device specific APIs providing those functionality missing at configuration level such as user interface, persistence, etc. Profiles obtain the required foundation from configuration and hence are layered above configurations. Currently, there are a handful profiles available and a few more are being finalized. MIDP is a profile supported by CLDC while CDC support three different profiles namely the Foundation Profile (JSR 219), Personal Basis Profile (JSR 217) and Personal Profile (JSR 216). Foundation Profile (FP) Foundation Profile is the most basic of the CDC family of profiles. It is a skeleton upon which a developer can create a new profile. The FP APIs, together with CDC APIs provides a complete Java ME JRE for consumer electronics and embedded devices. It is a set of Java APIs tuned for low-footprint devices that have limited resources that do not need a graphical user interface system. It provides a complete Java ME application environment for consumer products and embedded devices but without a standards-based GUI system. Version 1.1.2 is specified in JSR 219 and implements a subset of Java SE 1.4.2, including a set of security-related optional packages, such as Java Authentication and Authorization Service (JAAS), Java Secure Socket Extension (JSSE), and Java Cryptography Extension (JCE). The Mobile Information Device Profile (MIDP) The Mobile Information Device Profile (MIDP), combined with the Connected Limited Device Configuration (CLDC), is the Java runtime environment for todays mobile information devices such as phones and entry level PDAs. MIDP provides the core application functionality required by mobile applications including the user interface, network connectivity, local data storage, and application lifecycle management. Currently, there are three version of MIDP which are MIDP 1.0, MIDP 2.0 and MIDP 3.0. With the configuration and profiles, the actual application then resides, using the different available APIs in the profile. Following in the tradition of Java parlance, MIDP applications are called MIDlets. A MIDlet is a Java application that uses the MIDP profile and the CLDC configuration, created by a Java ME software developer, such as a game, a business application or other mobile features. These MIDlets can be written once and run on every available device conforming to the specifications for Java ME technology. The MIDlet can reside on a repository somewhere in the ecosystem and the end user can search for a specific type of application and having it downloaded over the air to another device. Kilobyte Virtual Machine (KVM) The Kilobyte virtual machine (KVM) is a virtual machine derived from the Java Virtual Machine (VM) specification. The VM that comes with the CLDC reference implementation is called the Kilobyte Virtual Machine (KVM) because it uses only a few kilobyte of runtime memory as opposed to megabyte. It is a reference implementation that adheres to the CLDC specifications description of a compliant VM. It is designed for small devices as it has a small memory footprint. It supports a subset of the features of the higher end JVM. For low-end, resource-limited products, Java ME and the KVM support minimal configurations of the Java virtual machine and Java APIs that capture just the essential capabilities of each type of device. KVM can be deployed flexibly to address a range of trade-offs between space and functionality. The KVM is engineered and specified to support the standardized, incremental deployment of the Java virtual machine features and the Java APIs included in the Java ME architecture. Overview of Bluetooth Technology Introduction Bluetooth is a proprietary open wireless communication protocol for exchanging data over short distances by using short length radio waves from fixed and mobile devices, creating personal area networks (PANs). The Bluetooth wireless connectivity technology was originally envisioned in 1994 by Ericsson as a way for mobile devices to communicate with each other at short ranges up to 30 feet, or 10 meters. While Bluetooth is positioned as a replacement for cable, infrared, and other connection media, it offers a variety of other services, and creates opportunities for new usage models. It can connect several devices, overcoming problems of synchronization and it works quietly, unconsciously, and automatically in the background. Bluetooth has client-server architecture. In client-server architecture, the one that initiates the connection is the client, and the one who receives the connection is the server. Bluetooth is a great protocol for wireless communication because its capable of transmitting data at nearly 1MB/s, while consuming 1/100th of the power of Wi-Fi. In order for Bluetooth devices to communicate properly, they all need to conform to the Bluetooth specification. The Bluetooth specification, like any other specification, defines the standard that a Bluetooth device should adhere to, as well as rules that need to be enforced when communicating. The Bluetooth protocol stack and profiles together comprise the Bluetooth specification. Bluetooth Protocol Stack Bluetooth uses a variety of protocols. Core protocols are defined by the trade organization Bluetooth Special Interest Group (SIG). Additional protocols have been adopted from other standards bodies. The Bluetooth stack is the software or firmware component that has direct access to the Bluetooth device. The Bluetooth protocol stack is split in two parts: a controller stack containing the timing critical radio interface, and a host stack dealing with high level data. It has control over things such as device settings, communication parameters, and power levels for the Bluetooth device. The stack itself consists of layers, and each layer of the stack has a specific task in the overall functionality of the Bluetooth device. Since Bluetooth device manufacturers are not required to use all of the layers in the stack, listed below are the overview of the core protocols and those adopted protocols that are widely used and implemented in almost every Bluetooth device: L2CAP: The Logical Link Controller and Adaptation Protocol used to send packets between host and client. This layer is the multiplexer of all data passing through the unit. It receives application data and adapts it to the Bluetooth format. Qualities of Service (QoS) parameters are exchanged at this layer. LMP: The Link Manager Protocol uses the links set up by the baseband to establish connections and manage piconets. Responsibilities of the LMP also include authentication and security services, and monitoring of service quality. SDP: The Service Discovery Protocol is used to find services on remote Bluetooth devices. HCI: The Host Controller Interface is the interface between the radio and the host computer. HCI is the dividing line between software and hardware. The HCI is the driver interface for the physical bus that connects these two components. RFCOMM: The Radio Frequency COMMunication is very easy and uncomplicated. Widely known as the virtual serial port protocol, it is used to stream simple data. OBEX: The Object Exchange communication protocol is used to exchange physical data such as files, images, and so on in binary format. Bluetooth Profiles Bluetooth profiles are intended to ensure interoperability among Bluetooth-enabled devices and applications from different manufacturers and vendors. A Bluetooth profile is a designed set of functionality for Bluetooth devices that defines the roles and capabilities for specific types of applications. If Bluetooth-enabled devices want to interact, having the bare minimum Bluetooth stack is not enough. It also needs to conform to a particular profile. Listed are some of the Bluetooth profiles: The Generic Access Profile defines connection procedures, device discovery, and link management. It also defines procedures related to use of different security models and common format requirements for parameters accessible on the user interface level. At a minimum all Bluetooth devices must support this profile. The Service Discovery Application and Profile defines the features and procedures for an application in a Bluetooth device to discover services registered in other Bluetooth devices, and retrieves information related to the services. The Serial Port Profile defines the requirements for Bluetooth devices that need to set up connections that emulate serial cables and use the RFCOMM protocol. The LAN Access Profile defines how Bluetooth devices can access the services of a LAN using PPP, and shows how PPP mechanisms can be used to form a network consisting of Bluetooth devices. The Synchronization Profile defines the application requirements for Bluetooth devices that need to synchronize data on two or more devices. Bluetooth Network Topology Bluetooth-enabled devices are organized in groups called piconets or also known as Personal Area Network (PAN). A piconet consists of one master and up to seven active slaves. The slaves in a piconet can only link to the master. Slaves cannot directly transmit data to one another. In fact, the master acts as a switch for the piconet and all traffic must pass through the master. A master and a single slave use point-to-point communication. If there are multiple slaves; point-to-multipoint communication is used. A master unit is the device that initiates the communication. A device in one piconet can communicate to another device in another piconet, forming a scatternet. A Bluetooth unit can be a slave in two or more piconets, but only one Bluetooth can be a master. Devices that participate in two or more piconets may act as gateways, forwarding traffic from one piconet to another.Notice that a master in one piconet may be a slave in another piconet: The basic concepts of any Bluetooth application consist of the following five components: Stack Initialization Device Management Device Discovery Service Discovery Communication Bluetooth vs. Infrared The major difference between the two methods of data transmission is that Bluetooth is based on radio technology (from 2.4GHz bands upwards), while Infrared utilizes invisible light in the 400 700nm wavelength. Infrared is fairly reliable and doesnt cost much to build into devices but it does have drawbacks: Its line-of-sight, so a sender must align with its receiver. Its one-to-one, so a device cant send to multiple receivers at the same time. Infrareds advantages are consequences of its disadvantages: Because its line-of-sight, interference is uncommon. Because its one-to-one, message delivery is reliable: each message sent goes to the intended recipient no matter how many infrared receivers are in the room. Bluetooth vs. 802.11b Both Bluetooth and IEEE 802.11b are wireless communication protocols and both operate in the 2.4GHz band, but they are designed to accomplish different goals. A major difference is that 802.11b was not designed for voice communications, while any Bluetooth connection can support both data and voice communications. The 802.11b protocol is designed to connect relatively large devices with lots of power and speed, such as desktops and laptops. Devices communicate at up to 11 Mbit/sec, at greater distances (up to 300 feet, or 100 meters). By contrast, Bluetooth is designed to connect small devices like PDAs, mobile phones, and peripherals at slower speeds (1 Mbit/sec), within a shorter range (30 feet, or 10 meters), which reduces power requirements. Overview of Java APIs for Bluetooth Technology (JSR-82) Java APIs for Bluetooth Wireless Technology Bluetooth is an important emerging standard for wireless integration of small devices. The specification standardizes a set of Java APIs to allow Java-enabled devices to integrate into a Bluetooth environment. Previously, there has been no standardized way to develop Bluetooth applications until JSR 82 came into play JSR-82 is a standard defined by the Java Community Process for providing a standard to develop Bluetooth applications using the Java programming language. It is the first open and non-proprietary standard for developing Bluetooth applications. The JSR-82 API hides the complexity of the Bluetooth protocol stack behind a set of Java APIs that allow to focus on application development rather than the low-level details of Bluetooth, by exposing a simple set of Java APIs. JSR 82 is based on version 1.1 of the Bluetooth Specification. JSR 82 consists of two optional packages: the core Bluetooth API and the Object Exchange (OBEX) API. The latter is transport-independent and can be used without the former. The Java APIs for Bluetooth do not implement the Bluetooth specification, but rather provide a set of APIs to access and control a Bluetooth-enabled device. JSR 82 concerns itself primarily with providing Bluetooth capabilities to J2ME-enabled devices. Java APIs described in the JSR-82 interface for following Bluetooth Protocols/Profiles: SDAP Service Discovery Application Profile RFCOMM Serial Cable Emulation Protocol L2CAP Logical Link Control and Adaptation Protocol GOEP Generic Object Exchange (OBEX) Profile The API Architecture The goal of the specification was to define an open, non-proprietary standard API that can be used by all J2ME-enabled devices. Therefore, it was designed using standard J2ME APIs and CLDC/MIDPs Generic Connection Framework. JSR 82 requires that the Bluetooth stack underlying a JSR 82 implementation be qualified for the Generic Access Profile, the Service Discovery Application Profile, and the Serial Port Profile. The stack must also provide access to its Service Discovery Protocol, and to the RFCOMM and L2CAP layers. The APIs are designed in such a way that developers can use the Java programming language to build new Bluetooth profiles on top of this API as long as the core layer specification does not change. JSR 82 includes APIs for OBEX and L2CAP so that future Bluetooth profiles can be implemented in Java, and these are already being used for that purpose. Figure 4 shows where the APIs defined in this specification fit in CLDC/MIDP architecture. Capabilities of JSR-82 These are the properties and capabilities of JSR-82 in a nutshell. The JSR-82 API is intended to provide the following capabilities options: Manage the Local Bluetooth Device settings. Discover other Bluetooth devices in the neighbourhood. Search for Bluetooth services on the discovered Bluetooth devices. Connect to any of those Bluetooth services and communicate with it. Register a Bluetooth service on the Local Bluetooth Device, so that other Bluetooth devices can connect to it. Establish RFCOMM, L2CAP, and OBEX connections between devices Manage and control the communication connections. Provide the security to all of the above options. Reasons on Using Java Platform Micro Edition (Java ME) Java ME has significant advantages over other languages and environments that make it suitable for Bluetooth Voting System (BVote). The advantages of Java are as follows: Most of mobile devices nowadays are compatible and supports Java ME application development. Java ME has a particularly high market penetration. According to Morales and Nelson, approximately 68% of mobile phones are Java ME capable, which equates to more than 350 million Java ME capable mobile devices worldwide. Java ME is an open source and free. There are no licensing expenses needed for the SDK. Java ME is platform-independent. Java has the ability to move easily from one computer system to another.Java is a platform-independent at both the source and binary levels. It can run on any operating system without modification Simplicity and ease-of-use. Java was designed to be easy to use and is therefore easy to write, compile, debug, and learn than other programming languages. Java uses automatic memory allocation and garbage collection. In addition, the I/O and network library is very easy to use. Java ME is robust. Java compilers are able to detect many problems that would first show up during execution time in other languages. Java ME is interpreted. An interpreter is needed in order to run Java programs. With Java, the program need only be compiled once, and the bytecode generated by the Java compiler can run on any platform. Reasons on Using Bluetooth Technology There are various reasons to use a Bluetooth technology. These reasons are mainly based on the advantages of the Bluetooth technology itself that it offers to users. Availability of Bluetooth connectivity wireless technology in mobile devices. Bluetooth has already become a standard inclusion and important feature on most mobile phones nowadays. No cost per transmission. As an alternative for the current Short Message Services (SMS) that would be charge per transmission, Bluetooth cost no charge for its communication. Low energy consumption as Bluetooth uses low power signals. Thus, the technology requires little energy and hence uses less battery or electrical power. Standardize technology. Since Bluetooth is a standardized wireless specification, a high level of compatibility among devices is guaranteed. In addition, Bluetooth is a universal, world-wide, wireless standard. Ability to keep information private. In order to make a transfer or allow someone to access the files in the phone, it will need to give the access by accepting or rejecting the request through the phone. Therefore, authentication will prevent unauthorized access to important data and make it very difficult to listen in. Signals are omni-directional and can pass through walls. Communicating devices do not need to be aligned and do not need an unobstructed line of sight. Besides, Bluetooth uses frequency hopping. Its spread spectrum approach greatly reduces the risk that communications will be intercepted. Overview on Bluetooth Voting System (BVote) The name of this project is BVote. BVote is being developed using Java 2 Micro Edition (J2ME) programming language in order to create an open source, freely available and platform-independent mobile voting platform with basic connectivity options to expedite the process of data transfer and multi-user collaboration. It consists of two parts which are server and client. The server is the one that become the administrator. The administrator is responsible to manage all the registration of the voters and set the question(s) of the voting. As for the client, it can only log in the voting system as a voter and vote for the question that is being sent. In order to create such a program like BVote, it must meet some basic requirements before the application can be run. Firstly, as BVote is being developed using J2ME, therefore both server and client must use mobile devices as their platform. In addition, both server and client must be able to communicate with each other through Bluetooth technology. Last but not least, since BVote is voting system application software, BVote must accept processing, storing, and updating functions especially for the server part. Research on E-Voting System http://en.wikipedia.org/wiki/Electronic_voting http://en.wikipedia.org/wiki/Electronic_voting_examples http://en.wikipedia.org/wiki/Indian_voting_machines http://www.topbits.com/e-voting.html http://www.howstuffworks.com/e-voting.htm http://avirubin.com/vote/analysis/ CHAPTER 3: DESIGN METHODLOGY AND DETAILS This chapter addressed issues that arise when implementing and using the Java APIs for Bluetooth Wireless Technology and designing the software application using Java 2 Micro Edition (J2ME). Lastly, this section discusses issues on the hardware and technology that involved on the implementation and development of Bluetooth Voting System. Hardware Mobile Phone Mobile phone is acting as the main hardware for Bluetooth Voting System, both for server and client part. Nowadays, a mobile phone in market is growing up rapidly with respectively to mobile technology. The fast growing of the mobile technology has benefited and improved the quality of life. In addition, the Bluetooth technology has become the main features in all the latest product of mobile devices available on market. With this specification, the objective to develop a low cost system has been met. As this project make the most of the Bluetooth as a connection medium for voting process, mobile phone has been fully utilized due to its ability in supporting Bluetooth. PC or Laptop In the development work, PC has been used as a workstation for programming and simulation process. For the simulation purpose, it had been perform in PC by using Java IDE and mobile phone emulator generated by Sun Wireless Toolkits. After the simulation work is done, a .jar executable file will be installing in mobile phones for real time hardware testing. Software and Development Toolkit The following software will be used: J2SDK1.5.0 Eclipse 3.0.1: one of the best Java IDE 😉 J2ME Wireless toolkit 2.2 EclipseME 0.7: Eclipse plugin to help develop J2ME code ProGuard 2.1: class file shrinker and obfuscator. Wireless Toolkit 2.5.2 The Sun Java Wireless Toolkit for CLDC (formerly known as Java 2 Platfo