Monday, September 30, 2019

Airbus Case Study

Airbus A3XX case study Group E10, MBA 2011 Airbus A3XX case study, Group E10 Airbus objectives Both Airbus and Boeing, as well as industry experts expected worldwide passenger traffic to grow at an average annual growth rate of 4. 8-4. 9% for the next 20 years (up until 2019). Given that the traffic was expected to almost triple in volume, both manufacturers expected a significant increase in aircraft sales, although their views on the market structure were different. Airbus expected hub-to-hub routes to become the dominant type of transportation in key regions (transatlantic and transpacific), opposing Boeing’s preference for point-topoint routes. Therefore, Airbus forecasted high growth rates in very large aircraft (VLA) segment, that was expected to reach 1,235 aircraft by 2019. Although Airbus had considerably increased its market share by 1999, it still did not have a product to compete with Boeing’s 747 in the highly-promising VLA market segment. Introduction of A3XX could help Airbus capture more than a half of this segment, and given the segment’s very positive prospects, it could position Airbus as the commercial aviation industry leader. FCF model The model estimates Airbus free cash flows associated with the potential implementation of A3XX project in 2001-2020. All calculations are performed in US dollars, net present value is calculated as of December 31, 2000. Given the uncertainty of model assumptions and the long-term nature of the model itself, additional sensitivity analysis was performed in respect of (a) operating margins, (b) discount rate, (c) inflation rate, (d) aircraft sales, (e) investment expenditure, and (f) sale price. Key assumptions Sales & production †¢ Sale price: $216m as of 2006, rising afterwards at the inflation rate. Although some of the first contracts are expected to be executed with a significant discount, this is not factored into the model due to low data availability. Operating margin: 15%, learning curve effect was ignored due to insufficient data (assuming lower margin in early years and higher margin at later stages — averaging at 15% over the forecasted period). †¢ Sales ramp-up: based on the assumptions used in Lehman Brothers equity research reports (25% of ‘steady state’ capacity in 1st year, 75% in the second year). †¢ Production capacity: 53 aircraft annually in â₠¬Ëœsteady state’ (based on a total sales estimate of 730-750 aircraft in 2001-2020). Pre-payments: although a fraction of the sale price is usually paid in advance, this factor was ignored due to insufficient data (all costs and payments are assumed to occur in the year when aircraft is delivered). -1- Airbus A3XX case study, Group E10 Funding & investments †¢ Funding: $11. 9b of quasi-equity, debt is not used in the project. †¢ Launch costs: $11. 0b for research & development, $1. 0 for capital expenditures, $1. 0b for additional working capital (as per Dresdner Kleinwort report). †¢ Additional capital expenditures: assumed at zero after the investment stage (20012008) is over †¢ Discount rate: 11. % as cost of equity (CAPM = 6. 0% risk-free rate + 0. 84 commercial aviation beta * 6% market risk premium). †¢ Depreciation: straight line over 10 years, starts immediately after corresponding capital expenditures are performed. †¢ R&D expenses are n ot capitalised. Other †¢ Inflation: constant at 2. 0%. †¢ Tax rate: 38. 0% (standard French rate). †¢ Terminal value: growing perpetuity where growth is set at the rate of inflation. †¢ Boeing’s response to A3XX launch is not explicitly modelled (assuming this factor is already taken into account through unit sales and margins). Although the market demonstrates considerable cyclicality, this factor was ignored for the sake of simplicity. Modelling results Net present value of the A3XX project is estimated at $528m, consisting of ($1,447m) NPV of 2001-2020 cash flows and $1,975m of terminal value. The break-even number of planes after the investment stage (in 2009 and beyond) is estimated at 48 per year. In this case the NPV of growing perpetuity is expected at $4,702m (annual inflows of $1,061 growing at 2% with 11% discount rate), while the NPV of cash flows in 2001-2009 is estimated at ($4,552). Sensitivity analysis The following tables present bi-dimensional sensitivity analysis of the resulting NPV for model variables that have significant predictability issues and / or likely to cause huge changes in the resulting NPV: -2- Airbus A3XX case study, Group E10 Project launch considerations Implementation of the A3XX project definitely has a very high risk profile. Although the resulting NPV figure is positive under the base scenario, sensitivity analysis indicates that returns on this project are extremely sensitive to the underlying model assumptions (e. g. a drop in operating margin by just 2 percentage points results in negative NPV). Therefore, there is a high risk of negative returns on this project. The project’s profitability may also be undermined by external market factors. The most crucial ones being (a) the response of Boeing to A3XX project launch, (b) growth rate of the VLA market. However, this project is strategically important for Airbus. Over the last several decades, since the introduction of Boeing 747 the share of VLA segment has expanded significantly. Additionally, analysts estimate VLA manufacturing has the highest operating margins — that is commonly used to subsidise production of smaller aircraft. However Airbus is not present in this segment at this time. Therefore, despite a very high-risk profile of the project, Airbus has good reasons to proceed with this industrial launch. It it difficult to estimate the number of firm orders Airbus needs to have before committing to the project. The financial model suggests it needs to sell 300+ aircraft before cumulative non-discounted project cash flow becomes positive. However, taking into account the fact that airlines do not place orders with delivery time exceeding 5-6 years, it is highly unlikely that Airbus secures orders for 300+ planes before project launch. A significant amount of orders (e. g. 50+) is likely to be enough to test Airbus demand forecasts. Potential Boeing response Although Boeing’s estimations of the VLA market are not so optimistic as Airbus’, it should definitely take some actions to defend its dominant position on this market. Boeing is unlikely to undertake a similar development project (i. e. develop a new plane for the VLA segment), since it would be a lose-lose strategy for both companies given limited size of this market segment. Therefore, the most obvious decision for Boeing would be to invest in the ‘stretch’ version of its 747 model. This is likely to take significant amount of orders away from Airbus while keeping the investment costs low. In case Airbus decides not to go ahead with its A3XX project, Boeing has no incentive to incur any investment costs whatsoever, since it already has established presence in the VLA segment with its 747 aircraft. -3- Airbus A3XX case study, Group E10 Financial projections (in US$ mln) 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 Revenue Operating pro? t R&D expenses Depreciation EBIT Taxes EBIAT – – – – – 2,808 421 -880 -100 -559 212 -771 8,813 11,910 12,149 12,392 12,640 12,892 13,150 13,413 13,681 13,955 14,234 14,519 14,809 15,105 1,322 -660 -100 562 -214 775 1,787 -440 -100 1,247 -474 1,720 1,822 -100 1,722 -654 2,377 1,859 -100 1,759 -668 2,427 1,896 -100 1,796 -682 2,478 1,934 -75 1,859 -706 2,565 1,973 -40 1,933 -734 2,667 2,012 -5 2,007 -763 2,770 2,052 2,052 -780 2,832 2,093 2,093 -795 2,889 2,135 2,135 -811 2,946 2,178 2,178 -828 3,005 2,221 2,221 -844 3,066 2,266 2,266 -861 3,127 1,100 -2,200 -2,200 -2,200 -1,320 -25 -60 -95 -100 -1,100 -2,225 -2,260 -2,295 -1,420 418 846 859 872 540 -1,518 -3,071 -3,119 -3,167 -1,960 R&D expenses Capital expenditure Net working capital Operating pro? t Taxes Free cash ? ow Discounted FCF -1,100 -2,200 -2,200 -2,200 -1,320 418 -250 -150 846 -350 -300 859 -350 -300 872 -50 -200 540 -880 -50 421 212 -296 -158 -660 1,322 -214 448 21 6 -440 1,787 -474 873 379 1,822 -654 1,168 457 ,859 -668 1,190 419 1,896 -682 1,213 385 1,934 -706 1,227 351 1,973 -734 1,238 319 2,012 -763 1,249 290 2,052 -780 1,272 266 2,093 -795 1,298 244 2,135 -811 1,324 225 2,178 -828 1,350 206 2,221 -844 1,377 190 2,266 -861 1,405 174 -682 -1,755 -1,991 -1,978 -1,030 -614 -1,424 -1,456 -1,303 -611 Aircraft sale price Aircraft sold 216 13 220 40 225 53 229 53 234 53 238 53 243 53 248 53 253 53 258 53 263 53 269 53 274 53 279 53 285 53 -4-

Sample of Selling Product Proposal

Love what you're doing when you're selling a product. The popular image of a salesperson as someone willing to â€Å"sell at all costs† is not the reality across the board in sales. A good salesperson loves sales, is motivated by what they're selling, and transfers this enthusiasm and belief to the customer. Indeed, the customer is given options, including the one to walk away, in order to avoid such undue pressure. Learn how to listen to customers and to read their body language. Avoid interrupting or disagreeing with a customer, and provide your customer with space to talk. Know how to interpret a customer's folded arms, eye contact, and manner of standing toward or away from you. Make the customer comfortable and you're off to a good start in selling your product. 2Be knowledgeable about the product. There is nothing more infuriating to a potential customer than to come across a half-hearted salesperson who claims uncertainty about what the product can and can't do, what it's made from, and what happens when things in it stop working. It is absolutely vital to know your product range inside out and if you do not know something a customer asks of you, let them know you'll find out and get back to them as soon as possible. 3Help the customer see the perks. As well as getting good product information to the right people, it is important to translate the product's features into benefits for the customer, thus making it easier for them to buy. Have you used the product, tested it, tried it out, or worked with it–whichever is relevant? Do you feel comfortable about being able to talk to a customer as someone totally familiar with the product? Ask yourself one simple question: Why should a customer buy my product? If the only answer you can come up with is â€Å"So I can get paid,† you're selling the wrong product. 4Ensure that the product has been adequately explained. Good product information, including retail packaging, is important. Lots of salespersons and sales managers don't like to admit that sales can be completed by product information. They like to think it is their personal charm, intelligence, and determination that closes sales. For the most part, that is bunk. Not only can sales be made by product information, most sales are made this way. And this is more true today than in the past because of the proliferation of â€Å"big-box stores† and other forms of product sales without the benefit of interpersonal relationships. The product information should be informative, true and complete. Ideally, it should give the prospective buyer all the information they need to buy on the spot. For most prospects shopping without assistance, clear and easy to understand information, as described above, is important. 5Make the benefits of the product loud and clear. Besides the actual utility, beauty, or even fame of the product, what are you offering above and beyond? Make it clear to the customer what key benefits the product brings to them, such as guarantees, warranties, and after-sales service. Connecting with the Buyer 1Understand the motivations of the buyer. When presenting the product to the customer, bear in mind that most successful products and services are bought, not sold. They are bought by people who have a need, and believe that the product will satisfy that need. This is often the result of marketing rather than selling, however. Selling the product rather than just offering it for sale almost always involves an emotional component. Take some time to look at the marketing side of the product. What images and promises have been created by the marketing around the product that you're trying to sell? In what ways can you continue this theme where it seems most appropriate to maintain the promised satisfaction the marketing offers? During your presentation, confirm that your prospective buyer will want or need your product. You will need to do this through a range of methods, including observing their reactions, listening to them carefully, and asking them clear questions about what they actually need. If you're visiting your potential buyer's office, look at their wall and desk. What photos, posters, or images can you see? Are there images of family, pets, vacations that will provide you with a connection to this person's wants? 2Know how to open with a customer. Instead of asking the close-ended question â€Å"May I help you? â€Å", ask the more positive, open-ended â€Å"Are you looking for something for yourself is it a gift for someone special? † And be alert to making comments on the product before getting into a deeper discussion with the customer, such as â€Å"These long legged computer stands are really popular this summer. 3Convert the customer's motivations into the product's characteristics. In marketing, this is known as â€Å"positioning†, and it consists of equating the product with the customer's hopes and desires. The following positioning factors are all of importance when selling a product[1]: Position the product in the best spectrum of the ma rket possible. Mark H, McCormack calls this finding your â€Å"biggest bulge of buyers†, and not pitching the product too high or too low in terms of affordability and luxury. [2] Position the facts about the product according to the person you're selling it to. You may have a handful of different facts, but it's up to your skill to know which of those facts best serve each individual sale. Position the facts so that they reflect the desired perception. However, don't fudge facts or lie outright. This is about perception, not deception. Position the facts so that they transcend the product itself. This means that the desirable, positive values associated with the product sell the product and have very little to do with the product itself. Companies that excel at this include Coca-Cola, Apple, and many designer goods or labels. Understand all the aspects that feed into the end sale of a product. Advertising, merchandising, and marketing are support functions for selling. Selling is the goal of these support functions and a good salesperson needs to have a decent understanding of each of these aspects in a product's life. Read basic texts on marketing. These will quickly bring you up to speed on many of the tactics and techniques underlying ad vertising, merchandising, and marketing. In addition, texts on starting a small business will often provide useful overview information of this type. Read How to understand marketing for more details. If your product is more for work than for play, learn a little about finance to quantify its benefits. If it's for a business, learn more about accounting to explain how it will make the investors as well as the employees happy. 5Be honest. Long-term lovers of your product will only come about if you've been honest with them. This means being transparent in your delivery of product information and also admitting your own lack of knowledge or mistakes you've made where needed. Don't be afraid of honesty; it builds trust. Think like (not about) your customers. Think about what you'd like to hear and learn about the product if you were in the customer's shoes. Don't take the easy way out and brush your customer off when stock is low or your knowledge is sparse. Always make a genuine effort to follow up customer wants, and to physically take customers to a product, and demonstrate it, where possible. A customer given a hands-on demonstration will feel more involved in the sale and more likely to purchase than one who is told â€Å"It's in aisle 5 that way† and given a brisk hand wave. Closing the Sale 1Close the sale. There are many styles and methods of closing a sale. One of the most effective has the mnemonic, ABC: â€Å"Always Be Closing. † As you confirm your prospective buyer's interest in the product, put forward trial closes like, â€Å"Does this sound like the product you want? â€Å". When answered in the affirmative, this may mean you have completed the sale on that product, and it is time to build the sale with related products. 2Be prepared to give customers time to consider. Appearing overly pushy is a turn-off for many modern-day buyers who do their own savvy internet research before coming to see you. They may want to go home and do a quick online search; let them do so with your enthusiastic and supportive pitch in their mind. If you've been truthful, helpful, considerate, and enthusiastic and the information you've given them matches with what they read online, it'll be your business they come back to for the product, or your product they'll prefer over a competitor's. Improving Sales 1Spread your product information. It is important to make your product information available through as many channels as possible. Today, the range of potential placements has increased a great deal thanks to the advances in communications. Give your potential buyers many possible places to find out more about your information including in the following ways: Promote your product through representatives, dealers, salesmen, radio, TV, word-of-mouth by customers, mail and email (in various forms), distribution at trade shows, seminars, telephone, fax, computer networks, product packaging, airline magazines, retail storefronts, space ads, and the Internet. And consider the worth of product placement in movies, sports games, and other big events that are televised. Use social media. This is now a very important part of getting products out into the broader, global marketplace. Places Facebook and Pinterest can be great launching pads for your product. Use local community events. Donating your product to a local school gala for auctioning to raise school funds can be a great way to get your product known, as well as getting the goodwill from the community who recognizes your generosity. 2Get creative. Sales can only be increased by certain things over which you have control but which are not necessarily self-evident. Sometimes price changes are required; other times, you'll need tweaks to the product, or a broadening or contracting of your product range. All of this will be evident from undertaking regular inventory checks and follow ups on sales performance. Some methods to increase sales include: Selling more of your existing products to your existing customers – which probably means new sales methods will need to be implemented. Adding new products. Adding new customers. Having an exclusive product for a set period of time that everyone wants. Troubleshooting Poor Sales 1Review. At regular intervals during and after the sale of your product, there should always be a review. Is the product selling well? If not, why not? Are stocks low or are you still tripping over product that has dust on it? Bear in mind the image that slow-moving or unsold products can create in the minds of a customer. Finding dust on items tells the customer the product has been there for some time and may be outdated. Seeing the same display month in and month out suggests to the customer that the product is stale and not very popular. Always review the viability of the products with these questions: Can the product be deleted from your line if it's not selling so well? Try not to add new products until you've removed the old ones or you may just have too many choices and less leverage with which to convince the potential buyer. If you're a business owner, you also risk tying up too much of your cash in stock that has the potential to go obsolete faster than you can move it. Can you liquidate obsolete products? Can you look back over your target market and sharpen the focus? You may have been missing the best fit within the market for your product. Re-evaluate product mix, product design, product location and selling methods if your product is in severe sales decline. EditTips Know what your competitors are doing and find ways to outsell their ideas. Does your product have added features, special warranties, or a better price? Using Independent Sales Reps (working on commission only). They will sell your product and get paid only when the sale is consumed. Many resources exists to find them online. Make your prices low. You will sell lots of products and get as much money as you would've done for making your item expensive and selling very little. A database such as Microsoft Access can help you organize, reorganize, and display the information your business generates for all kinds of insights. A personal information manager (PIM) program, often part of an email program, specializes in organizing contacts. A customer relationship management [3] (CRM) program goes a step further by automating their use in marketing. For example, ACT! makes it very easy to get back to a potential customer every 30 days. Other computer programs, like OpenOffice. org are also extremely helpful in organization, running reports and similar tasks. EditWarnings Never let people into your home. It is better to have an Internet-run business where people don't have direct contact with you. It may seem hard running an Internet business, but when you get going, it is definitely worth all of the work. EditRelated wikiHows

Sunday, September 29, 2019

Judging yourself

This is a strong trial that could go well over either way. Even though the state at this point in time does not have a right-to-die statue I believe it should. A doctor that one is seeking help and care from should have no say how he/she (the patient) should die. By definition a doctor is â€Å"a person licensed to practice medicine, as a physician, surgeon, dentist, or veterinarian (dictionary. com)†. Nowhere in that description does it explain a person licensed to declare rightful legal euthinization.Being the daughter of a terminal cancer patient is hard enough. I can't imagine having the extra stress of monitoring how your mother or father dies in the hospital bed. Having a state law for the right to die statue could save so many more families from extra heartache. After all it plan and simple is your very own life to live and if one wants to die in a certain way; by golly they should be allowed to. Plan and simple the statue involves, shifting the right-to-die laws from g ranting permission for death to defining hat constitutes causing a premature death.Thereby allowing choosing timely death will require new thinking within the right-to-die movement. But this second approach is likely to be supported by more people who formerly were undecided about the right-to-die. We all want to avoid premature death for ourselves. And we can support new laws that prohibit helping or causing anyone to die too soon. But this still becomes an issue because everyone has different opinions and views on life death and even health treatments.Looking on the court side the law against causing premature death specifies safeguards that might be fulfilled in order to prove that the death was timely rather than premature. And because these sateguards are included in the written law, no Judge can exclude such facts and opinions from any subsequent trial. A great example would be the last trial of Jack Kevorkian was lost because the defense could not offer testimony from the pat ient and the family that death at this time was the best possible alternative.The Judge ruled that all such facts and opinions were irrelevant. The only question was whether Jack Kevorkian gave a lethal injection. â€Å"If Dr. Kevorkian had been charged with causing premature death, he would never have been sent to prison because the death of Thomas Youk† who was dying of ALS†was not premature (Park, Permission)†. The fact that he died a timely death would have been proven by presenting safeguards that were fulfilled in choosing the best time for him to die.

How Technology Has Changed Our Lives.

{draw:rect} MODERN AGE (1950-1985) After the Second World War Americans began to prosper, millions of people were changing. The troops that were returning from war some 12 million served during the war years were going back in the workforce. Most of these men were mere children when they signed on, some from rural America that never returned to work the earth. Farming technology was being made to counter act this problem. So much so that at the turn of the twentieth century 50 percent of the workforce was on farms that provided the nation’s food. By the end of the 1950’s only 7 percent of the workforce was working the nation’s farms. Hourly wages for selected industries, United States, 1950 1901 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. $ 0. 23 1918 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. .53 1935 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. .58 1950 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1. 59 SOURCE: U. S. Bureau of Labor Statistics, Consumer Expenditure Survey Manufacturing. (Bureau of Labor Statistics) Yale Brozen writes â€Å"Fear of automation can be traced to four sources. † One is based on the assumption that there is a fixed amount of goods. The second source of fear springs from the idea that automation or cybernation is something more than the latest stage in the long evolution of technology. The third source of fear lies in the fact that we are much more aware of the people displaced by automation and concerned about them than we are of the other unemployed. Even while we reduce the amount of manpower needed to do a fixed amount of work does that fixed amount of work remain the same? As we all know this is not the case. As we free up manpower from one aspect we find new and productive uses for that manpower. His words speak the truth then as they do today. It saves lives through the aid it gives doctors. By controlling traffic signals in response to traffic flows and reducing traffic congestion, it adds hours to the free time of commuters every week. It helps scientists, with the aid of high speed data processing; to develop new knowledge that otherwise would not be available in our lifetimes. We are increasing the sc ale of educational activities because mechanization, automation, cybernation, or whatever we choose to call our new technology, makes it possible to do more than we could formerly. With the coming of automation, men are able to do more and have more. Both sublime and mundane activities are being enlarged and the number of jobs has grown as a consequence, not declined. † (Brozen) The second source of fear that the latest idea of automation or technology will become something more then what it was intended to be. People were so obsessed with what the future would hold books and movies were made to cast this fear. Science fiction was used to depict future events that could occur. Films such as one that was released in 1968 2001: A Space Odyssey where an artificially intelligent supercomputer, HAL takes over a space mission. Today some super computers are in use, are they anyway near being HAL? Some say we are getting close to true artificial intelligence, but we are far from HAL. The forth source of fear of automation is that it reduces the demand for unskilled workers. This may be true in some instances but at the same time the demand for skilled workers will increase. As stated previously companies do their best to keep their employees. When possible they are retraining these employees to fill new jobs that become available because of the new technology. If this were true then the unemployment rate would raise proportionately. If automation is added to a process and did the work of five people then five people would be unemployed. We know that this does not make sense. It has increased productivity to the process not that it reduced people from the process. NEW WAVE (1985-Present) The year 1985 saw more technological changes, Windows 1. 0 is introduced here you can do more than just one DOS application at a time. Made by this little upstart IBM partner company called Microsoft, it even comes with a calculator program. Some other wonders of 1985 is the first compact disk read only memory (CD-ROM) of none other than a Grolier Encyclopedia. Apple was the big name in computers at the time and most businesses had one. To be up to date in the office the new Apple LaserWriter printer was the best and it only cost around $7000. The main reason we call 1985 the New Wave era is this, the first . Com domain name, symbolics. com, is registered by the Symbolics Corporation. (The People History) According to David Huether, chief economist of the National Association of Manufacturers, U. S. manufacturers are producing and exporting more goods than ever before. While manufacturing output easily outpaces the larger U. S. economy, manufacturing employment, at 14. million, is at its lowest level in more than 50 years. (Williams) Another place that has felt the effects of technology is in the office, or white collar jobs. Michael J. Handel writes in a brief for SRI International: â€Å"Analyses of national data indicate that increased use of computers in the 1980s and 1990s was associated with greater use of more-educated workers withi n industries. However, the direction of causality is unclear. It may be that both educational upgrading and greater computer use simply reflect an independent increase in the number of white collar workers within industries, who are the most frequent computer users. It may be that the hiring of more-educated workers, usually office workers, stimulates demand for computers rather than vice versa. In addition, the industries upgrading their educational levels coincident with adoption of computers in the 1980s and 1990s also appear to have been upgrading educational levels before the widespread diffusion of computers. † (Handel) There are many ways to make a job better, faster, and safer. Every dayI see improvements to the work floor. There are many facets of the business that help with these improvements. Some of which are our Product Development Teams (PDT) that will follow the work to see if anything can be changed. They work closely with our Research and Development (RD) operations. These two areas have grown by 1000% in the last twenty years. Another area that has greatly grown is our engineering staff and related personal. In 1996 the skilled trades had two engineers to take all our requests to. We now have engineers for facilities, electricians, repairmen, mobile equipment, power house, and toolmakers. In all we have become more effective and more efficient in how we do our business of repairing the machinery in the factory. Everyone can be affected by technology no job is completely that same as it was in years past. Studies have been made to classify a job for automation. They are based on three dimensions, Receptiveness Stability Structuredness Some jobs are changing constantly, I have seen toll booth operations change here in Illinois just over the last two years. The new faster E-Z pass lanes going into Chicago for one. I asked one of the booth operators how they liked them, one told me that it was all good. Their day is less stressful and they have hired more people in the toll way system. More people to monitor and maintain the equipment and make sure those that did not pay get those little notices in the mail. WORKS CITED Baughman, James L. â€Å"Television Comes to America, 1947-57. † Editorial. Illinois Periodicals Online (IPO) Project. N. p. , Mar. 1993. Web. 29 Nov. 2009. http://www. lib. niu. edu/1993/ ihy930341. html. Bland Jr. , Gordon R. â€Å"The Effects of Job Automation on the Economy. † Scribd. N. p. , 4 Mar. 2009. Web. 29 Nov. 2009. http://www. scribd. com/doc/12965589/The-Effects-of-Job-Automation-on-the-Economy. Bureau of Labor Statistics. â€Å"100 Years of U. S. Consumer Spending: Data for the Nation, New York City, and Boston. † United States Department of Labor. N. p. , 3 Aug. 2006. Web. 29 Nov. 2009. http://www. bls. gov/opub/uscs/1950. pdf. Brozen, Yale. â€Å"Automation: The Retreating Catastrophe. † Ludwig von Mises Institute. N. p. , n. d. http://mises. org/journals/lar/pdfs/2_3/2_3_5. pdf. Rpt. in Automation: The Retreating Catastrophe. N. p. : n. p. , n. d. N. pag. Ludwig von Mises Institute. Web. 29 Nov. 2009. http://mises. org/. Handel, Michael J. SRI Project Number P10168. SRI International, July 2003. Web. 29 Nov. 2009. http://www. sri. om/policy/csted/reports/sandt/it/Handel_IT_Employment_InfoBrief. pdf>. Huether, David. â€Å"The Case of The Missing Jobs. † BusinessWeek. N. p. , 3 Apr. 2006. http://www. businessweek. com/magazine/content/06_14/b3978116. htm. Rpt. Web. 29 Nov. 2009. http://www. businessweek. com/magazine/content/06_14/b3978116. htm. The People History . † 1985. N. p. , 2009. Web. 29 No v. 2009. http://www. thepeoplehistory. com/ 1985. html. U. S. Congress, Office of Technology Assessment, Reducing Launch Operations Costs: New Technologies and Practices, OTA-TM-ISC-28 (Washington, DC: U. S. Government Printing Office, September 1988).

Saturday, September 28, 2019

Business Plan - The Music Entrepreneur - Music & Event Management Essay

Business Plan - The Music Entrepreneur - Music & Event Management - Essay Example Additionally, it is expected that the session will commence with 8 students who will be required to pay admission and course fee. For the admission fee, each student will be required to pay  £100 and  £5000 course fee will be required in the first year. In the subsequent year, it has been projected that 25 per cent increase in students is expected which will take number of students to 10. Consequently, this will increase revenue for the next year. As far as the expenses are concerned, it has been estimated that  £3000 will be required for purchasing music instruments for the music students. Subsequently, monthly rent, music teacher salary, heating and marketing expenses are  £800,  £1500,  £200 and  £313 respectively will be incurred. The music academic industry is highly competitive as it has been observed that the existing institutions are highly experienced and have hired quality teachers for attracting and retaining a maximum number of music students. In this regard, it is pertinent to highlight that the Music Training Academy will also ensure to provide quality music education and training to the students. For this purpose, the owner will go beyond the traditional learning and teaching of music education by providing more conducive study and learning environment in the academy. For example, the owner along with the support of teacher will provide quality education services in which the students will be able to receive knowledge and training simultaneously along with information discussion sessions relating to past and current successful music superstars and music artists as well. The purpose of this type of sessions is to ensure that the students get maximum satisfaction in the form of quality music learning and training sessions. Initially, there will be only two members in the team. The owner will develop the whole training and development course for the music lovers. First, the owner will determine class schedule. In

Cloning and Aggression among Sea Anemones Essay

Cloning and Aggression among Sea Anemones - Essay Example These clones rapidly spread out and form large aggregations of individuals exhibiting polymorphism. Individuals present in the center of clones are larger with gonads, and reproduce sexually. Individuals at the edge of the colony are smaller, with larger fighting tentacles (acrorhagi), being defensive in nature reproduce asexually. This division of labor allows individuals in the center to expend more energy on sexual reproduction and individuals on the edges of aggregations to expend their energy on developing large acrorhagi to fight the individuals of adjacent clones. Aggression is provoked when individuals on the circumference come into contact with genetically different clones. Acrorhagi, which are large projections loaded with nematysts located at the base of the tentacles, are used to sting, injure, and even kill members of the other clone. This inter-clonal fighting results in clear boundaries between adjacent aggregations. This aggressive behavior is fused on non-clone mates , as members of each clone can distinguish their own clone mates and do not attack them. Intraspecific competition of the inference sort has also been observed in experiments where two adjacent clones competed over the resource of space. The significance level for shore position, clonal/aclonal growth, and aggressiveness... Rare species were excluded for consistency and simply sharpen the focus of the present study. Study sites The samples were collected from two long north-south gradients extending from subarctic to subtropical latitudes.(Further details see L.Francis,1988,p.243) Assignment to categories The samples are categorized based on habitat, individual body size, clonal, aggressive nature. Statistical method The significance level for shore position, clonal/aclonal growth, and aggressiveness acting simultaneously is determined by using a multi-way G-test. In addition, Fisher's exact test with critical alpha levels corrected to compensate for multiple use of data is also used since some of the theoretically possible sets are though empty, is permissible, if conservative, to use [comparison wise error rate = 1 - ( 1 - )1/c, where c is the number of comparisons and is the desired level of confidence; Sidak, 1967, cited in SAS guide, 1985]. (For three sets of comparisons, a comparison wise error rate of 0.0165 is equivalent to an experimental error rate of 0.05.) Development of a model A geometric model is developed to predict the relative energy efficiency of interference as a function of increasing size: (1) for growth through isometric increase in size (simulated growth of an aclonal adult), and (2) for growth without increasing in height (simulated growth and spread of a compact, encrusting clone). Results Correlations From the observations, it was evident that overall distribution of species was uneven with respect to shore position, clonal/aclonal growth and aggressiveness. Tested separately, two of the three pair wise interactions were significant (for cloning vs. aggression and

Friday, September 27, 2019

Applying Organizational behavior when motivating employees Research Paper

Applying Organizational behavior when motivating employees - Research Paper Example In relation to the rapidly growing global business environment, marketers have been widely witnessed to implement a number of strategic measures in order to keep the workforce more optimistic with regard to their specific roles and responsibilities within the organisation. In this regard, Organisational Behaviour (OB) has long been observed to play an essential role for the entrepreneurs to develop strong workforce in accordance with the vision and postulated business goals (Tishman et al., 2012). Emphasising the notion of OB to play as an essential role in employee motivation, the primary objective of this report is to critically analyse the practice of OB by United Healthcare (UHC) while empowering performance and long-term relationship of the employees within the organisation. In this regard, the report intends to critically assess the key principles and practices of OB that are highly practiced by UHC to keep the employees satisfied within their respective job roles. In order to critically identify the importance of OB in employee motivation, the report would also ascertain key influencing factors that can enable UHC to successfully satisfy its employees along with their expected performance within the organisation. UnitedHealth Care (UHC) is considered as one of the largest and prominent health carriers across the United States. The organisation is a major part of the UnitedHealth Group Inc., one of the largest and diversified healthcare organisations in the global managed health care industry. Founded in the year 1977, UHC tends to involve a wide array of advanced healthcare systems and procedures to provide extensive services to the clients located in different regions across the globe (1UnitedHealth Group, 2013). With respect to the recent financial year, the group has been recognised to ascertain revenue earnings of US$ 111 billion in the financial year 2012,

Does learning and development contribute to organisational success and Essay

Does learning and development contribute to organisational success and performance management - Essay Example While all three fields are usually held to be one and the same, practitioners instead view them separately (Garavan, Costeen and Heraty 1995). The field of training and development is said to have people taking on roles analogous to those found in the business world (Torrington, Hall and Taylor 2004). Senior managers take on the role of sponsors; business planners, meanwhile, are analogous to clients. The term ‘participants’ alludes to the trainees themselves and finally, the HRM staff are said to be facilitators. Naturally, each of these groups will have their own agendas and ideas as to how best to go about the process, which may or may not come into conflict with each other. The most common instance is the conflict that often occurs between employees and bosses, and is the #1 reason for people quitting their jobs. As Dr. John Hoover (2003) explains, bosses are not perfect, and it is sometimes the case that their competence is matched or even exceeded by one of their subordinates. In such a case, pride must be swallowed if a healthy working relationship is to be maintained; as Hoover puts it, raw talent, knowledge and skill are rarely if ever more important than getting along well with one’s co-workers. This makes it necessary that people skills be part of the employees’ training regimen. Bob Hamilton (2009) of Articlesbase stresses training and development as one of the most important things any business owner must keep in mind. Specifically, he says, this is something vital both for high-ranking executives and lower-level managers alike. It is recommended that the employees all have a good grasp of what their work entails. They need to understand what their duties and responsibilities are, and to have the skills necessary to carry these out as efficiently as possible. Giving them a guided tour of the facilities may help in this regard, as will a straightforward

Thursday, September 26, 2019

Summary Assignment Example | Topics and Well Written Essays - 250 words - 1

Summary - Assignment Example His belief had borne fruit. Grameen Banks grew at astounding rate with 2400 branches across 78000 villages across the country. Grameen Bank, is a micro credit institution that is a self financing body. It gives out loan to the self help groups through members’ deposits. It helps to provide the poor with the necessary credit to start income generating activity and thereby raise their living standard. The members have to comply with the sixteen components of ‘decisions’ which contributes to improved socio-economic status of the community. The charter includes hygiene, restructuring of dilapidated house, no dowry, education for children etc. The genuine defaulters are given fresh lease through re-structured loan repayment schedule and if required, more finance to improve business prospects. The timely payment serves as incentive for higher loan amount. The example of Bangladesh micro credit institutions have now been taken up in other under developed countries for po verty alleviation. The concept of phone lady is highly innovative and connects the village with external linkages, while providing the person with cell phone, a profitable means of income generation. The proactive participation of non government agencies is also encouraged for improving the living standard of the poorest of the poor. Reference

Walmart Vs. Target Research Paper Example | Topics and Well Written Essays - 1250 words

Walmart Vs. Target - Research Paper Example Company’s Profile Walmart Wal-Mart was founded in 1962 in Rogers, Ark by Sam Walton (Walmart Corporate Website, n.d.). Since the time when the first Walmart discount store has been opened, the company grew to 706 stores across the United States (Walmart Corporate Website, n.d.). Walmart’s headquarter is allocated in Bentonville, Arkansas (Walmart Corporate Website, n.d.). In 1969, the company incorporated as Wal-Mart Stores Inc. (Walmart Corporate Website, n.d.). Today the company operates in different formats, including Sam’s Club membership warehouse, supercenters, neighborhood markets, marketside and online stores. Envisioned 40 years ago Walmart’s mission of â€Å"saving people money to help them live better† continues to be an incentive for the overall company’s business operating. In addition to the mission statement, the company has developed the Walmart’s Ethical Standards Program and a strong ethical policy, focused mainly on the basic value of respect for all shareholders, including customers, associates, and suppliers (Walmart Corporate Website: Culture, n.d.). Target Target was founded in 1902 by George Draper Dayton and was called as the Dayton Dry Goods Company (Target Website: Our History, n.d.). The first Target store opened in Roseville, Minnesota, in 1962 (Target Website: Our Stores, n.d.). As of today, discount retailer has captured significant market share by having allocated about 1750 stores in 49 states (Target Website: Our Stores, n.d.). By doing business and developing strategic plans for the company, current Chairman, President and CEO of Target, Gregg Steinhafel, follows the idea that: â€Å"Diversity is much more than a goal or campaign; it is a core value of the giant retailer (Steinhagel, n.d.). The mission of the company is to â€Å"make Target the preferred shopping destination for its guests by delivering outstanding value, continuous innovation and an exceptional guest experien ce by consistently fulfilling its logo: Expect More. Pay Less (Target Website: Our Mission, n.d.). Besides its main activity, Target demonstrates a strong commitment to communities by providing support to: education activities, volunteerism, different social services, military and veteran assistance and some others (Target Website: Community Outreach, n.d.). Marketing strategies Walmart The key marketing strategy formulated as the Walmart’s logo was based on the principle: Always Low Prices, Always. Therefore, the company’s pricing strategy is to provide the goods sold at the lowest prices. To gain this competitive advantage the management of the company continuously works on the cost reduction programs. Additionally, in order to achieve the maximum amount of potential customers, Walmart began to focus its marketing strategy on different target markets, by differentiating its stores into: Walmart discount stores, Walmart supercenters, Walmart neighborhood markets, mark etside, and Walmart.com (Walmartstores Corporate Website, n.d.). While analyzing mainly the Walmart store format, it can be summarized that the size of an average store is 108  000 square feet; these stores are wide and clean; the aisles are brightly-lit and the shelves are stocked with various value-prices general merchandise product, including: family apparel, electronics, toys, health and beauty aids,

Wednesday, September 25, 2019

Changing the Channel - A Solution for Television Violence Essay

Changing the Channel - A Solution for Television Violence - Essay Example Already, many children spend more time watching television than they do playing with friends, being outside or involved in other stimulating activity. Recent studies, reviews, watchdog groups and many others suggest that the high prevalence of violence that is present on television is directly promoting aggression and violence in real life. Television critic Tim Goodman argues that while television has the potential to have a large impact on violence and aggression, the full blame does not rest on the media but on the parents. If they do not want their children exposed to violence then the most simple and effective solution is to turn off the television. This essay argues that this viewpoint does not offer an effective method of solving the problem, instead it is like ignoring the crisis and assuming that if we do not pay attention to what is happening then it will not affect us. One type of program that showcases violence is wrestling. Here, violence is one of the main factors that drive individuals to watch the program, and it is widely popular among both children and adults. WWE’s Smack Down and RAW have sky rocketed in popularity in recent years. The slapping, kicking, fighting, screaming and throwing people out of the ring catch the interest of children and even adults. When the younger generation watches this brutality on television, with thousands of people praising, they perceive that it is something good. This concept is backed by Goodman, who argues that encouraging violence in this manner, and making it appear as something that is desirable increases the likelihood that the children will emulate this form of behavior. There are many cases I have witnessed where children in school have backyard fights in which they try to mimic their favorite wrestler’s stunts on others, using abusive language as they see in the shows. Even in the house, they play at wrestling or walk around acting as their favorite wrestling star; talking and walking li ke him. According to my observation it is usually the younger or weaker kids that are targeted. While Goodman argues that blaming the media for the behavior is unreasonable, and that parents can remedy this behavior by preventing children from watching programs such as wrestling, the reality is not as simple as this. It is not simple the act of observing the violence on television that causes children to emulate wrestling behavior, or aggressive behavior in general. Other factors include what children watch at their friend’s houses, what actions that their friends do, and the fact that the violence and aggression is encouraged in many different forms of media. As a consequence, changing the channel or turning off the television does not appear to be a suitable tactic to prevent children from emulating aggressive behavior, or from learning that aggressive behavior is good and encouraged. Rather, this responsibility falls onto the parents. Whether children consider that violenc e and aggression is something to be encouraged comes from the opinions and lessons that are taught by the parents. Parents have a responsibility to themselves and when they observe this kind of solution it just shows how responsible they are towards their job. Turning off the television or switching the channel cannot assure that the child will not watch it later on or at a friend’s place. Chances are that they might even see it on the internet as now even

Cyber Healths business operation Essay Example | Topics and Well Written Essays - 500 words

Cyber Healths business operation - Essay Example It should be noted that the institution's students directly interact with the programmed med teach agents in the website. Thus, making some features in the website customizable by each student is a key where Cyber Health can enhance the experience of the customer as well as enable them to create a learning environment which is more enjoyable and can better serve them well. Some of the interactive marketing benchmarks that Cyber Health can incorporate in are customizable website designs, online instant messaging, and a personalized webpage for the student. Every student of Cyber Health should be able to personalize the website design of the learning environment. It is irrefutable that every individual has his or own favourite colour and prefers a font from another. Furthermore, permitting an individual to customize the layout and template of the website of Cyber Health can further the institutions goal of providing more comfort and convenience to the students. It is recommended that when a student log on, he or she will be redirected to the website with his or her preferred website layout, colour, design, and font. In Cyber Health's quest to provide quality education to its customers, the company should provide an instant messaging system which allows the student to ask questions which

Tuesday, September 24, 2019

Analyse the global supply chain of the company Essay

Analyse the global supply chain of the company - Essay Example As per the five forces analysis, there is intense competitive rivalry present within the industry along with high bargaining power of suppliers. The core competency of the firm is its high quality product with exceptional customer service. According to game theory, the company can gain temporary advantage through focusing on unique selling proposition and staying aligned with customer demand of Lithuania. Dunning’s Eclectic paradigm is such theoretical framework that helps to define competitive advantage gained by a company. It states that monopolistic advantage supports a firm operating abroad to overcome prevalent disadvantages in foreign markets. There are two forms of advantages as per this paradigm such as location advantage and ownership advantage. Learning theories highlight psychic distance paradox as proposed by Lane and O’Grady. According to this theory, there exist some features in host country and operating country which facilitates business operations or re sults into complete failure (Ulwick, 2005). On the other hand, network theory indicates that commitment and trust are critical aspects for achieving success and growth. Learning and trust are further complimented by commitment, risk, control and uncertainty. Figure 2 clearly states that there are four kinds of strategy which can be chosen by a company in terms of business strategic implementation. As per figure two there are four strategies based on local responsiveness pressure and cost reduction pressure. They are global standardization strategy, transnational strategy, international strategy and localization strategy. In case of Starbucks the best strategy which can be incorporated is internationalization strategy. This would enable the firm to expand over larger geographical area and acquire high profit margins. International strategy is all about implementing best possible strategy to establish a strong market position in foreign country. The four possible international

Real Courage Essay Example | Topics and Well Written Essays - 500 words

Real Courage - Essay Example I am normally a very outgoing person and within a few days, I had made many friends, among who was Tim, who would eventually become my closest friend. Tim was shorter than me and with a smaller build and I had heard rumors that he was often a victim of bullying. I had not witnessed the bullying firsthand and Tim always refused to talk about it whenever I asked. I therefore thought that it was nothing serious until one day after school, I saw Tim being beaten up by an older kid. He was much bigger than I was and despite my desire to stop him, I was suddenly afraid and instead of going to Tim’s aid, I pretended that I had not seen him and went home. For several days afterwards, I did not have peace because I realized that I had been in a position to do the right thing and help my friend yet I had not had the courage to do so. I felt very ashamed for failing Tim and I did my best to avoid him as much as I could because I could not look him in the eye. However, not long afterwards, as I was heading home from school, I saw Tim being beaten up by the same bully and for the first time, instead of being overwhelmed by fear, I felt an anger that I had never felt before rising inside me. All the frustration and shame that I had felt for many days came rushing forward and I suddenly went for the bully. My sudden onslaught and its ferocity must have taken the bully by surprise because he did not defend himself and against all my expectations, he turned and ran. I was so furious that I chased him for an entire block before I became too tired to follow. I went back to see whether Tim was alright and he was so dumbstruck by my actions that he at first did not answer me. However, after his initial shock, he told me that he was fine and then he told me the story about why he was always the bully’s victim. The bully, named Tony, always demanded Tim’s lunch money and whenever he did not have it, Tony would ambush him after school. I later came to realize that

Monday, September 23, 2019

Project Management Challenges Essay Example | Topics and Well Written Essays - 500 words

Project Management Challenges - Essay Example A project manager may have to perform extra hard in case of chains being spread across different parts of the world where different cultural values are in place. In a broadly segmented and international enterprises where the employees are appointed from different domains and locations, the factor of cultural context and other variables also becomes important with regard to the project manger’s tasks and duties. Cultural consideration is a subsequent challenge that comes along with the international Human Resource Management handling. Ensuring that the responsibilities are assigned to the people in the due manner without giving any one in the organization any compensation and leverage is also a core function of a project manager. The work so divided must be based on equal consideration and proportion and it must not put on employee under great stress in contrast to other enjoying relaxation from the decision making and responsibilities and duties fulfillment. The second most prevalent challenge that is faced by the software project managers in modern times is that of creating an actual relationship between the virtual world activities and the real world scenarios. Often the software project mangers suffer issues merging the two facets of the digital virtual world of software related projects. Too much virtual environment makes it easy to appear but in actual it gets further difficult to handle, co relating between the different variables and bringing them onto one table. In the real world businesses the tasks so performed are done so through the actual interactions and meetings. In the case of online multiple units spread out software enterprises that are connected online, it at times becomes a challenge taking them on board and gathering in a collective meeting. Hence the virtual nature of the applications, the softwares, the clients and stakeholders,

The theory of natural selection has been applied to human culture in Essay

The theory of natural selection has been applied to human culture in many different realms. How are the forces that produce diff - Essay Example In India, where social stratification still obviously persists, the rich became rich because he came from a rich family. In contrast, the poor cannot reach the same affluence because the society simply does not permit such occurrence. Second, there is differential reproduction (www.berkeley.edu). In the end of Jurassic era, the huge terrestrial animals might have gone extinct, but the boring creatures such as cockroaches continue to live on until the present. However, unlike in Biology wherein the favored group of creatures prospered, it is not the case in society. Rich Chinese clans, for example, only allow marriages among their family members, so as to maintain their huge assets within the same knit of people. Third, there is inheritance (www.berkley.edu). For example, in humans, the two-leggedness has been passed more successfully than four-leggedness, because the stand-up stance can better utilize their eyes in searching for new places to move on. The same absoluteness cannot be said about society. The traits inherited do not do anything to the social stratification. Among the rich, it is only the name that allows one to be in a favorable strata. However, not all family members do not really end up rich. Those that have become rich did not just have the name, but also the persistence and education This character, in turn, can only be molded with experience, not heredity. References Thorpe, R. S.

Sunday, September 22, 2019

The Parable of the Old Man and the Young Essay Example for Free

The Parable of the Old Man and the Young Essay The Parable of the Old Man and the Young is a short poem written by Wilfred Owen in 1920, As the title mentions, the poem is a parable. It is generally accepted that the old man, Abram, represents the European nations or more probably their governments, the first view of the poem is that it is heavily based on the story Abram (Genesis 22:1-18), where Abram is told to sacrifice his son. In the story, as he was about to sacrifice his son as an offering to God, an angel comes down and tells him to stop and to sacrifice a lamb instead. He does as hes told and makes a covenant with God saying that Abram will be the Father of a new nation. But the twist in this poem is that when Abram is told by the angel to stop, he doesnt and kills his son. But the old man would not so, but slew his son,/And half the seed of Europe, one by one. The author also manages to include metaphors and symbolisms referring to a war. Then Abram bound the youth with belts and straps, /and builded parapets and trenches there. This quote is clearly depicting an image of Isaac going unwillingly to war with the parapets and trenches. When lo! an angel called him out of heaven,/ Saying, Lay not thy hand upon the lad,/ Neither do anything to him. Behold,/ A ram, caught in a thicket by its horns;/ Offer the Ram of Pride instead of him. The quote symbolizes that all that all Abram has to do is give up his pride and not send his son Isaac to the gruesome war. But the old man would not so, but slew his son,/ And half the seed of Europe, one by one. I believe that Abram represents the government of Europe, drafting the people (Isaac) to go to their doom in war. Along with the rest of the population of Europe to die at war, heartlessly and without any regret all the government had to do was give up their pride. Probably Europe lost the war. The last two lines are the only ones that rhyme, and the image they paint is chilling: an old man methodically killing the seed of Europe. It is mainly the power of this image, set out in the poem and culminating in the last two lines, that makes it haunting. Recruiting Recruiting is a poem written by E. A. Mackintosh, who served in World War 1 until 1917 were he was killed at the Somme. Mackintosh’s poem is very bitter, heavily sarcastic and he aims to send a message to the people back in England who pressure young men to go to war. The first word in the poem is â€Å"Lads† suggests youth and innocence, which contrasts how Mackintosh sees the people who set up the campaign as the â€Å"fat civilians† which shows emphasises of how these people could not fight the war themselves. The second stanza the poet supports how the â€Å"fat civilians† could not fight by quoting them saying â€Å"Could go and fight the Hun† Knowing they will never be in danger of doing anything of the sort as they â€Å"thank God they are over fourty one† The poet also attacks the shallow girls who are often seen as the reasons why men went off to die, to please them. The girls are said to have feathers because they would give them to men who hadn’t joined up as a sign of cowardice. The songs are â€Å"vulgar songs† meaning they have little real emotion, they are shallow and crude. After the third stanza Mackintosh speaks of what the recruiting posters should say if they are honest: â€Å"the real picture of â€Å"shivering in the morning dew† and killing people â€Å"like yourselves. † Which is a frequent theme that the Mackintosh wants the reader to know that the German soldiers were ordinary men just like them. Mackibtosh also attacks the journalists as he belives that they like the war because the casualties give them something to talk about, this is shown in the line â€Å"Help o keep them nicee and safe† which is really bitter aimed at those who would send young men to die to protect their own comfort but who would do nothing about it themselves. The last line â€Å"Lad’s you’re wanted – out you go. † Ends with a dismissive phrase after the dash to show how eagerly the civilians wanted the soldiers to go.

Accountability, Responsibility and Respect Essay Example for Free

Accountability, Responsibility and Respect Essay Running Head: Accountability, Respresponsibility, and Respect 3 Essay on Accountability, Responsibility, and Respect Among military members and civilians alike, there are personal qualities that determine how you act professionally and also how you act in your personal life. These qualities also determine how other people view you and judge your abilities in both aspects previously stated. In the military, certain qualities are especially prudent because of the nature of the work we complete, and the monetary value of the equipment that we work with. According to Eagle1 Fox2 (2008) Our organization is 1,394,311 soldiers strong, and in order to keep order and, discipline, key values are instilled into us from the day we start our careers, in basic training. Among these values, i am writing about 3 in particular; Accountability, Reponsibility and Respect. See more: Experiment on polytropic process Essay The Value of accountability can be applied to all facets of life. Dictionary.com (2012) defines Accountability as â€Å"The Quality or state of being accountable; especially : an obligation or willingness to accept responsibility or to account for ones actions.† The military uses the word Acccountability with a broader definition. Being accountable gives your command the ability to trust you with tasks and equipment. It also provides them with an accurate idea of where you are at, at all times. If all soldiers were accountable, the military would operate at a much higher performance level. Time for orders to be given, and time it takes for the orders to be carried out would drop. Allowing the military to free resources and also cut monetary spending. Leading to a more productive and cheaper military.

Saturday, September 21, 2019

Formal Presentation Tactics Essay Example for Free

Formal Presentation Tactics Essay Presentations, unlike reports, carry the personality of a speaker, simultaneously allowing for interaction between all participants involved. A good presentation is hinged on precise, well researched content as well as a clear well laid out structure. Simply put, content relates to information useful to the people. It differs significantly from presentations to reports. The latter are analyzed at the readers’ pace but the former must account for the amount of information that can be assimilated in a single sitting. The structure followed must be logical, sequenced as well as suitably paced so that the audience can effectively follow the proceedings. Other salient aspects are packaging and the human element. Presentations must be well prepared for the audience is literally at the presenter’s mercy; they do not have the option of rereading certain portions or skipping others altogether. The human element, when used effectively, contributes greatly to the success of any presentation (Clark, 2007). The importance of preparation cannot be overstated. It may be a threadbare cliche, but failure to prepare really is preparation to fail. Research is vital both in term of content and the audience. The material presented must be accurate, supported with credible illustrations. Simple concise statements of intent usually assist in defining the scope of a presentation. Presenters must also establish the nature of the audience it terms of level of education, employment cadre and familiarity with the language. The findings serve as an indicator of the jargon the presenter may use as well as the vocabulary used. This aspect also defines the audience’s aims and objectives as for attending the presentation (Blair, n. d. ). If this is not effectively done, there will be little communication, rendering the entire presentation an exercise in futility. The introduction of any presentation is vital. Based on this aspect alone, it is possible to determine success. It is not enough to attract the attention of the audience; presenters must sustain it. One of the most effective ways of doing this is to establish a theme that the presentation will revolve around. This works well with a quick breakdown of the presentation’s guiding structure and an establishment of a rapport with the audience. Apart from maintaining the audience’s attention, it allows both parties to feel comfortable and significantly reduces the presenter’s level of anxiety. A good beginning deserves an equally good ending. Some experts dispense with the idea of starting the conclusion by stating that it is a recapitulation of the presentation as people may switch off. They favor either a sudden end marked with a phrase that will linger in the memories of the audience, or with a flourish, pace as well as voice carrying listener through a powerful crescendo (Blair, n. d. ). Preparing the body of the presentation does not translate to writing down the speech word for word. Having the main points on cards provides an outline as well as an effective memory jogger. Important questions to keep in mind, as stated in the research phase are the purpose, the nature of people attending, their familiarity on the subject and audience’s attitude towards the speaker. Other options to explore in terms of the structure of the body are timeline, problem/solution, classification, climax and complex to simple (or vice versa) layout (Clark, 2007). In contemporary group communication, visual aids are vital as they reinforce the delivery of the verbal message. Technology has lent itself to this respect, allowing for larger audiences to participate. Behavioral studies suggest that novelty and creativity in the application of visual aids is a major contributor to the success of a presentation. An example is displaying four different styles of hats when describing four major functions of project managers. With traditional aids, the rule of thumb is to employ different slides for distinct purposes; they should not be there at all if they have no purpose. Slides should not be cluttered as it has the counteractive effect of confusing the audience, rather than elucidating verbal message. Presenters must speak to their audience, as opposed to the visual aids. Therefore they must be thoroughly conversant with every slide to avoid presenting their backs to the audience as they struggle to explain what is going on. Legibility, color, contrast and size are factors to consider in the design of each slide. Everyone in the room should easily follow the aids without movement or strain. Delivery is another pillar of presentations. Presenters on one hand have the ability to enhance a presentation manifold and on the other, butcher it. The discussions of this aspect start with focus on the eyes. The fact that they are usually described as windows to the soul indicates that they are the first, most effective instruments in convincing people of speakers’ openness, honesty and their confidence in the material they are presenting. Herein lies the importance of maintaining eye contact. Doing so with all sections of the audience, accompanied by the hint of a smile convinces an audience that the presenter acknowledges and values their presence. Voice is the next aspect to assess, particularly variation and projection. However, projection does not mean shouting. Carefully watching the audience is the best indicator of the level of audibility. Voice variation is so powerful that it can make a well prepared presentation appear dull or make transform a boring topic into an exciting one. This aspect rules out monotonic speeches and their soporific effect. Changes in tone and well timed poses emphasize delineation and express certain feelings, moods and emotions. Rhetorical questions have proved useful in this respect as they inherently have tone variations at the end (Blair, n. d. ). Body language, expressed through appearance and stance are other important elements under the topic of formal presentation tactics. Posture as well as body orientation communicate a multitude of messages. By standing erect while leaning forward, speakers express approachability, receptiveness and friendliness. Gestures also play their role by making the content of the presentation more interesting in addition to facilitating understanding (Clark, 2007). The topic of speaker anxiety has been tackled from a number of angles. Some people insist on the impact of a simple change in attitude (Sathoff, 2008) while others encourage speakers to embrace nerves. The thinking behind the proposal is premised on the â€Å"flight or fight† condition occasioned by the release of adrenaline. Welcoming and recognizing nerves allows speakers to gain the edge by taking the fight option. They tackle the challenge of the presentation better, achieving better results than they envisaged. Attitude change encompasses positive thinking, mental visualizations of the task at hand and the belief that mistakes are part and parcel of the learning process. In all cases, deep breaths and short water breaks are of great help. Alcohol is not an option, as misinformed parties claim (Clark, 2007). Formal presentations are powerful avenues for self expression. Practice really does make perfect. Listening and watching self recordings allows for self discovery. Presenters can assess their performance and improvement against a checklist. Watching seasoned presenters in their element provides tried and tested success tricks. It is quite heartening to learn that oral presentation skills can easily be learned. Works Cited: Blair, G. M. , â€Å"Presentation Skills for Emergent Managers†, n. d. Retrieved on 25th March, 2009, from http://www. see. ed. ac. uk/~gerard/Management/art1. html Clark, D. R. , â€Å"Presentation Skills†, 2007. Retrieved on 25th March, 2009, from http://www. nwlink. com/~donclark/leader/leadpres. html Sathoff, R. , â€Å"Speaker Tips†, 2008. Retrieved on 25th March, 2009, from http://www. ed-u. com/publicspeaking. htm

P2P File Sharing And Its Influence Essay Example for Free

P2P File Sharing And Its Influence Essay With the advancement of technology we have moved into the digital word, into the days when property transactions are physically tangible. Now property more specifically intellectual property sharing ha s become common and is done easily over the internet using. P2P file sharing software easily available over the internet. In corporate network where this is done by making use of file servers, but on the internet it is done through the peer-to-peer model where files are stored and shared over the personal computers of the person. Most people engaging in such activities both provide and download such files from the internet. In the P2P network uploading the file is not necessary you can easily share the file with a person. P2P allows clients to share files online throughout some unofficial network that can be provided by both the users using the same download software. File sharing gives you access to a wide variety of information. Copyrighted material, pornography or viruses are all just a click away. (Ardenghi, Jorge and Javier Echaiz) On a daily basis numerous users share files with each other online. Be it music, games, software’s, videos etc. Software that can connect people to each other is usually freely available. Although these software are freely available over the internet they come with great risk, for example when sharing files with users, the user can use the same program to access information which you do not mean to share with people over the network. You can also download copyrighted material that could put you into legal problems. Or you may unsuspectingly download pornography when it is named something else. Also sometimes closing the window may not actually close the program and this could actually put you into a greater security risk. These â€Å"always on† connections are an invitation for users and sometimes hackers and preachers to access your private information and use it to their advantage (Sebastian Rupley, pp. 1). Importance of P2P: P2P networking has generated load of interest over the internet in a very short span of time. Daily thousands of people become part of this network. P2pP software systems like Kazaa and Napster are the most highly ranked and most commonly available P2P programs. Several businesses and websites have been promoting â€Å"peer-to-peer† technology to be the future of the Internet’s world of networking Having existed for many years now, P2P technologies promise to radicalize the word of networking. Although P2P file sharing software has created a lot of controversy over the legality issues as well as its fair use (Erik, pp. 1). P2P sharing has become the single most famous internet application over the past 10-15 year. Although people see it as P2P file sharing rather than P2P networking. To access the world of P2P networking a user just has to install a suitable P2P client application. Several P2P software and P2P networks applications subsist. Some P2P functions work only with a single P2P system, while others functions cross-network. Similarly, some P2P networks sustain only one request, while others sustain numerous requests. The importance of P2P can be seen from the fact that daily a lot of people are entering into the world of P2P sharing. P2P allows for quicker file sharing between users and it has become the household name for computer users all around the globe (Erik, pp. 1). Every passing day the importance of P2P is increasing at a rapid speed. Important files are shared over a P2P network. This save a lot of time that is wasted in attempt to first uploading the file over the internet and then allowing for the user to download the files from the link. When the user’s computer acts as an online server there is no need to upload the material over the internet first for the other user to download it. Now the user himself can download or share the data directly from the other user’s computer. This has solved a lot of issues like shortage of space. Plus most P2P software allow for continuation of download in case the software collapses or if the link is broken for some reason. The file does not have to be downloaded over and over again. (Duchechene, Anne and Patrick Waelbroeck, 565-570) Meaning to the Average American: Today to the average American the use of P2P sharing for downloading songs, videos, software, game etc has become part of their household. Research has shown that 60% of the young Americans downloading things of the internet are over the age of 12 and are mostly in their teenage. The young American teenager has been affected the most the P2P sharing around the world as clearly shown by the stats (Scholastic, 10). It means a great deal to the average American for the simple fact that the average American is able to save a lot on the downloading of free music from over the internet, even though there is enough awareness over the internet as this being illegal. But still as long as you don’t get trapped who minds if it’s illegal. The average American downloads at least 20 files at an average on a daily basis using their P2P software. In America the most commonly used software is Napster which is accessible free over the internet. A typical American is involved more in downloading illegal stuff instead of making use of this advancement of technology constructively. This sharing method is being used somewhat constructively in business environments where important data is being shared without having to be uploaded. Also this method saves a lot of space on the computer and also saves a lot of valuable bandwidth and time from being wasted. In case of the average American this is just a way of downloading free music, software, games etc. The average American who makes use of the P2P network mostly belongs to the teenage. These individuals spend most of their time downloading free music which is mostly illegal as it is copyright material and people sharing such music should be punished. But most of the times these individuals who are sharing these files are not from the US but in fact belong to some country where piracy is not that big a crime or is not punishable. These people easily share pirated material over the sharing software and the average American is more than happy to make use of the material as it does not cost them money (Scholastic, 75). Mostly the average American is aware of the intellectual property rights and he also knows that it is an act which is punishable by the US law but still they do not refrain from illegal file sharing as it is cheap and it is hard to detect, and what is hard to detect is hard to punish. Most of the average Americans are also aware that this is theft of intellectual property rights and it is same as stealing from someone. As when the music is transferred using file transfer or P2P software, the singer or the real owner of the music does not get any loyalty for it. Also the average American uses it to download pornography. This is something that the average user of the P2P in America watches. These are young individuals who are still in their teenage (well at least over 60% of them are). These individuals firstly use the internet without supervision which gives them the authority to do whatever they like over the internet and with the advancement of the P2P software they do not have to search much, they just have to make use of their P2P software, search for the required item and there it is, ready for them to download and watch. The P2P software that is being used mostly does not have a restriction clause in them or do not warn viewer about the age limit before they download the files for viewing. The advance broadband internet technology also make it easy and quicker for these young P2P file users to download pornography and watch it, with the new software they can even stream it while it downloads. Influence of P2P on American Pop culture (music, movies, TV shows etc) The birth of pop took place in the downtown sanctions of New York City at the end of the disco era. The new age music caught the attention of those MCs, who were capable of lyrically painting tapestries of anecdotes that were witty and stylized autobiographies. A pop prodigy was accompanied by a DJ who was able to produce a unique sound to go along with the lyrical flow. The beginning of Pop began when the Music composers introduced a DJ and tried to keep the attention of the crowd when introducing the next DJ. Before long this became a common practice where an MC was performing with a particular DJ, one example is Will The Fresh Prince Smith and DJ Jazzy Jeff. In 1979, a huge fan following for pop had developed along with entry of new comers, which secured the hold of pop on the music industry. In 1990 gangsta rap a sub-category of pop was developed. A lot of argument was made on the lyrics used as encouraging brutality, promiscuity and the utilization of drugs. The culture of pop is a challenging culture to some extent. It is a way to express the fight in opposition to the ethnic unfairness against the white Americans. So this makes it a way of expression for the African Americans and obviously a defending act for the way to communicate for their racial differences. A P2P computer system utilizes assorted connectivity of users and accumulative bandwidth rather than sharing resources provided by low number of servers. The important thing in understanding a P2P network is that all customers offer equivalent resources. Computer users with the same type of P2P application can remotely access each others hard drives and can share files Such a network is useful in many purposes, mostly known for file sharing containing audio, video or any kind of data available in digital format. One of the oldest and commonly known P2P file sharing software is Kaaza. Its file trading music tool was the number one search engine of 2003 as music and multimedia continues to dominate Americas online mindshare as reported this week by tech news world. Nowadays, it’s clear that Kaaza and other such software’s are most popular mainstream culture for file sharing. The problem with this is that music and all the other industries are worried that why would anyone actually pay for an album or a movie when anyone and everyone can get it online for free. Sharing of movies, music albums and TV shows is becoming very common among amateurs. One influence this has on American culture is that some books or movies which are for specific age are now available to children of all ages as keeping a tap over their downloading activities has become impossible. Now a thirteen year old kid can easily get any rated movie by just giving the wrong information about his age. The culture is tied together by the links. Culture from all around the world have borrowed and also contributed to the jargon of pop and also changed the meaning of some words to fit their own use. Some consider the language of pop to be rude, sexist, violent, focusing on the darker aspects of the society, and also considered as being nothing more than a bunch of babble. But being able to climb the tower of babble; making use of the process of abstraction, will help us understand as to why the language of pop has become so forceful in today’s society. Abstraction is the process whereby we reach a point where we ignore a great amount of stimuli and focus on a limited few; classifying it according to the characteristics and the reality of our experiences through a unique filter system which is influenced by our cultural and personal experiences. Possible P2P copyright violation and security problem: Numerous studies have shown that sharing of file has had an unconstructive blow on record sales. As already discussed Sharing of movies, music albums and TV shows is becoming very common among amateurs. Such distribution hardly brings any income to the producer. One biggest possible copyright violation problem brought in my P2P networks in another such network known as Anonymous P2P network in which users are anonymous by default. This P2P network is specially becoming famous due to many reasons including data retention and lawsuits against bloggers. Such networks may also hold appeal to user who wishes to share copyrighted files like music movies etc. Users who normally use anonymous P2P networks usually require secrecy as to the contents they put on sharing which may my include material which is not only illegal but also incriminating. One of the first P2P system, Napster was shut down in 2001 by some major entertainment firms on the basis that as these file sharing system made it possible to not only share files but also to make illegal copies of copyrighted material while others are still running. According to survey conducted by MPAA, the movie industry lost around 6. 1 billion which is 75% higher than they predicted. In the US alone the movie studio’s lost 1. 3 billion in 2005. Unauthorized services that allow data as free download to other users such as songs, music and movies is blamed for falling sales. Security problems that arise by P2P networks can cause companies to lose millions worth of source code due to disguising files using P2P technologies. P2P covering tools, such as Wrapstar (a freeware service which can cover a . zip file with corporation resource code, as an MP3 of a song hit) as a result an accessory outside the company can use Morpheus to download the disguised file. To the companies security this looks like a common transaction, even if the company has frowned upon employees using P2P in music sharing without a clue that their company has just been robbed, and possibly millions worth of software has been lost. Another security risk involving P2P networking allows your network to be open to various forms of attack, break-in, and espionage. P2P does not carry new virus to the system, just common threats such as virus attacks and worms. One major risk of P2P network is unconsciously allocating files that are confidential. (Banerjee, Anirban, Faloutsos, Michalis, and Laxmi Bhuyan, 1273-1275) Laws kept up with changing technology: Private property is mainly known as the original way to present ideas, may it be the symbols and words. All this is represented as products or services of an individual. Music is also included in such a property. Copyright defines the rules for ones owned property. May it be novels or poems, films or musical works? These all are includes on literary and artistic works. Artist work can include the photography, paintings, illustrations, sculptures or drawings or any kind of architectural designs. Copyrights are compulsory on any kind of trademarks or patents. P2P is the mainly notorious action on the internet these days. The industry now is using latest strategies; including advising ISP’s (internet service providers) to slash off the accounts of customers who are common sharers of files. Gaspary, Luciano Paschoal, 4797) According to the FCC, the federal law is desecrated if vulgar programming is aired at any time. The contents are ought to be obscene, when it succeeds throughout 3 divided checks. Concerning modern principles to a usual individual, it has to be created, as an entire, attractive to the prurient attention; portray or illustrate, i n a deliberately unpleasant technique, sexual behavior particularly classified by appropriate regulation; and deficiency of severe legendary, imaginative, supporting, or methodical importance. The FCC has described transmit offensiveness as language or material that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards for the broadcast medium, sexual or excretory organs or activities. (M. Fattah, Hassan, pg 44). It does not, however, augment to the echelon of vulgarity. Conclusion: When it comes to downloading software, it is easily done through P2P software. Using the P2P software the average American also downloads software for free, software for which in normal circumstances they have to pay a fee. This too is an illegal activity but something that has not been looked in to as deeply as the issue of the download of illegal music using the P2P software. This is mainly because the download of music over the internet is something that is measurable and not a lot of average American users are interested in downloading software from the internet. Although all good things come with some disadvantages, p2p sharing is one of them. It is very easy to just search up files and download the. But it is an illegal act. Because many files are copyrighted, and since there rights are preserved, it is ethically wrong to go against them. American pop culture is affected in such a way that, many people take the disadvantage of it, but breaking the official rights of the music. Pop music is now a culture in many countries. This culture is effecting the youth in such a way that they are now more in to bad deeds, rather than right ones. â€Å"Intellectual property illustrates nicely that property is a legal right rather than a physical thing. Intellectual property applies to allow owners to exclude others from intangible resources like certain secrets that businesses have, the copying of various creative expressions, and the reproducing of inventions and marks that identify the producers of goods and services. Property is a legal right to exclude, not a physical thing, and the object of a property copyright includes the reproduction of music for commercial profit. The market resource is diminished for the copyright owner when file sharers misappropriate music

Friday, September 20, 2019

Wireless Body Area Network Technology

Wireless Body Area Network Technology INTRODUCTION A Body Area Network is defined by IEEE 802.15 as a standard for communication in or near the human body that can serve a variety of applications like medical testing, electronics and private entertainment optimized for low power devices and operation [1]. In more common terms, to cooperate for the benefit of the user Body Area Network is a device system in a close contact to a person’s body. A Wireless Body Area Network is capable of establishing a wireless communication link consists of intelligent and small devices implanted or attached in the body. These devices provide health monitoring for continuous and provides feedback to the medical personnel or user which is real time. The measurements can be recorded and used over a long period of time. There are two types of devices can be used for evaluation: sensors and actuators. The sensors, internal or external, are implanted on body to measure some parameters of the human body. For example body temperature, measuring the heartbeat or recording an ECG readings. The actuators can take some specific actions according to the data received from the sensors e.g., any sensor equipped with a built-in reservoir checks the correct dose of insulin to give, based on the glucose level measurements, to a diabetics patient. In body area network for medical purposes, a number of sensors are implanted on patient’s body. These sensors collect the data from body and send collected data to the main sensor. This main sensor analyzes the data and takes specific action. It sometimes consists of actuator which is used for taking required action. For eg. the sensors collect the data from body of a diabetic patient and sends it the main sensor. The main sensor analyzes the data and if it is dropped then it can inject insulin into the body of the patient and make it comfortable till the main medical aid it gets. IEEE 802.15.4 is a standard for low-rate (LR) WPANs. A LR-WPAN network allows wireless connectivity in applications with limited power, low cost and simple communication and relaxed throughput requirements.[4] Ease of installation, extremely low cost, reliable data transfer, short-range operation and a reasonable battery life are the main objective. There are different type of topologies are used in communication system for different purposes and according to our need. Topologies which are used widely are : Star ,Mesh and Cluster, Ring, Bus topology. On the basis of average jitter, throughput, end –to-end delay, traffic bits sent, traffic bits received, we can find out that which topology is good for our system. With different topologies come different routing protocols. The routing protocols to be used with zigbee protocol are AODV, DYMO, DSR etc. In wireless communication, there is no any fixed or dedicated route is assigned between two nodes for communication. Whenever , they want to communicate with each other or any other node they request for route to the system and these routing protocols , according to their properties find out the best route for communication. That route will be shorter in length so that their won’t be any delay. Body area network is being used very widely in today’s high tech world. Mainly for body area sensors detection, health monitoring and for providing assistance to differently able persons. Below are some of the advantages of Body Area Network:- Quick transmission time Reliability Good quality of service Different data rates can be used Compatibility Low power required (as work on battery) Security (because of encryption) Portable As there are many kind of routing protocols and topologies are available for communication. There are routing protocols like AODV, DYMO, Bellman ford ,LANMAR etc but it depends on type of requirement and demand that which protocol is suitable for our purpose. So, in this project we will try to find out that which routing protocol is better for our system with suitable toplogy like star, mesh etc. In this project we have zigbee based wireless sensors for monitoring. It defines the upper layers like physical and MAC layer. It is suitable choice for monitoring medical purpose sensors. Every node will sense the data from body and collected data will be sent to main node. We will design and simulate these systems on Qualnet then we will make comparison between them on the basis of throughput, average jitter, average end-to-end delay etc. The performance of each topology will be compared with every routing protocol. TECHNOLOGY TO BE USED BODY AREA NETWORK Introduction With the invent of new and high tech environment there is need of small, low power, light weight, portable devices with sensors. These devices can be used at low data rates for improving speed and accuracy. A number of these devices can be implemented on body for the monitoring of body sensor networks for applications such as health monitoring. In a body area network , it consists of small, portable devices that can be easily implanted on one’s body and they can establish wireless network link. These devices take the data continuously for health monitoring and provide real time readings to the medical examiners. These readings can be recorded and can be used for long time. A body area network generally consists of actuators and sensors, which can be implanted on or inside the body. These sensors are used to collect data. Like for eg. taking heartbeats, taking readings of ECG or temperature of body etc. The actuators take required actions on the basis of data they receive from sensors or from users. Sometimes these actuators have in-built pumps or reservoirs that keep on checking the dose of insulin and it can inject it inside body if needed. It is helpful for diabetic patients. The communication with other person or user can be done by portable wireless devices such as smart phone or PDA. The body area network works on the principle in which data is received through implanted devices and transmitted to external devices. The sensors implanted in or outside the body interact with one another and to the actuators. The actuator is based on the process of taking action according to the surrounding conditions. All the sensors send their data to main sensor. The main sensor collects the data from each sensor, fuses it and sends it to the particular person via internet. Generally, body area network comprise of small sensors and devices therefore ad-hoc network is best suitable choice for this kind of network. The IMEC (Interuniversity Micro Electronics Center) working on the principle to get hospital to the nearest location with patient. It is gives the patient the freedom of not going to hospital on regular basis for checking and taking his readings. The patient is now out of worries of regular check-up. The devices itself will take the readings and pass it to the concerned doctor and according to the readings it can take required action too, without the need of any medical personnel, in case of emergency. Architecture A body area network has a network created in or around the human body. The architecture of the body area network is as shown below. Figure 2.1 Architecture of body area network Figure 2.2 Core of body area network The proposed architecture of body area network as shown in figure 2.1 consists of following elements : Sensors: These are used to collect data from the different parts of the body continuously and transmitted this data to main sensor. Main sensor: The main sensors collect the data from other sensors and fuse it together. Then it supplies this data to coordinator. Coordinator: The coordinator analyzes the data and takes suitable action, if required otherwise send this data to PDA being used by the user. PDA or smart phone : These are the devices which get data in the form required from the sensors and transmit over the network to the laptop or desktop, wherever it is being recorded for future purpose. The core of body area network as shown in figure 2.2 consists of several body sensor units (BSU) and one body control unit (BCU). Applications 1. Medical Applications With the invent of new technology and fast processing, there was need of speed, comfortablity and convenience in the field of health monitoring too. So, with the help of body area network, it became possible and easy to monitor the health of patient remotely. 2. Sports Applications In the field of medical, it can check the health of athletes and can give a accurate and clear picture about it to their coaches so that they can determine their weaknesses and strengths. It can be used in measuring many factors during competitions like race. This kind of observation can be done anywhere and there is no need of going to laboratory and running on trademills everytime for taking readings. 3. Entertainment Applications Body area network can be used for entertainment also. It can be used for gaming, multimedia applications, 3D video and video buffering etc. Issues involved 1. Sensors: What type of sensors should be used? The types of sensors to be used depend on the requirement and purpose. 2. Source of power: These devices are to be used for a long time and continuously therefore power source should be continuous and strong. 3. Communication Range: The range of the system should be such that it can give person nearest location help and should not get disconnected even if it is far. 4. Size and weight: The size of the sensor should be small enough to be get implanted on body easily and weight should be as minimum as possible. Because a number of sensors are to be implanted on body so it should not be difficult for the person to carry them over his body. 5. Mounting of sensor: The sensors should be implanted at the correct point of the body so that sensors can take the readings correctly. If they are mounted incorrectly then system may not get the required reading. If the sensors have to count heartbeats then sensors should be placed near heart for taking data. 6. Robustness: There is very less probability of taking wrong readings if the readings are taken incorrectly then it can cause big problems. 7. Synchronization: The sensors should be synchronized with each other and with main sensor. They should be working in real time. 8. Cost: The cost of the system should be low so that more number of persons can use it and could be used for mass production. ZIGBEE PROTOCOL Introduction SIMULATION AND RESULTS Simulation is the main process of finding out the performance of the proposed system. It tells us the ability and efficiency of the particular system when it is used under different system, surrounding and environmental conditions. It tells us that how really our system is going to work in a real environment and what factors should be taken care of while using and designing it .So, instead of designing any factory prototype of system before , it is simulated and ran on software by virtually designing it. In this project we are working for IEEE 802.15.4 zigbee protocol for body sensor network. We have used two topologies : star and mesh. We have used software QUALNET 5.0 for simulation of our scenarios that is star and mesh for different routing protocols such as AODV and DYMO. QUALNET 5.0 is a product of scalable technologies and is a good software for designing and simulating wired and wireless networks such as wi-fi, wi-max, GSM etc. There are a number of protocols available for simulation of different type of systems. It also has 802.15.4 protocol for zigbee which can be used for designing body area network prototypes. Qualnet is chosen because of its accuracy and its available graphical user interface. Using qualnet we designed star and mesh topologies containing PAN co-ordinator, routers and a number of sensor elements and then we developed them for different routing protocols such as AODV and DYMO. After developing them, we tested and compared them for throughput, end-to-end delay, average jitter etc. So that we can find out better performing routing protocol for respective topology used. The simulation results are shown as per respective factor for different topology showing performance on different routing protocol. THROUGHPUT: Any routing protocol in any network can send only a fixed amount of data over the route so if we are having a large bit message then we have to divide that data into a number of packets that can be transferred over the route to the destination. These packets have size which is applicable for the route. When these are sent over the network then some of the packets can get corrupted due to the noise or lost or discarded and not all of the sent packets will be received by the receiver. Then, throughput comes into picture which is the rate of the successful transfer of packets. It is measured in bps that is bits per second. Below are the simulation results for throughput of star and mesh topologies : The above result is shown for the throughput comparison of star topology for AODV and DYMO routing protocol at different nodes . It can be seen from the figure that the throughput is same for both. The above result shows the comparison of mesh topology for AODV and DYMO routing protocol. From the above result we can see that throughput for DYMO is very less than the AODV. So it can be concluded that AODV is better than DYMO for mesh topology. AVERAGE JITTER: When a number of packets are transmitted over a network then there can be some delay (latency) over the network due to which the receiver will receive packet after the expected time. The variability in time can be observed for various networks. This variability in latency is jitter. A network which has no latency or constant latency has no jitter. The above result is shown for comparison of average jitter of star topology for AODV and DYMO routing protocol. It can be seen from the above result that average jitter for AODV is larger than DYMO so it can be concluded that DYMO is better than AODV for star because it has less dealys for packet transmission. Also, it can be concluded that there will be less collision in DYMO because it is taking less time for transmission. The above result is shown for comparison of mesh topology for AODV and DYMO routing protocol for average jitter. It can been seen from the result that DYMO has less jitter than AODV. That means DYMO is better than AODV because it has less latency. Also, it can be concluded that there will be less collision in DYMO because it is taking less time for transmission. Same was the result for star topology so it can be concluded that DYMO is better when it comes to the performance based on the jitter.