Thursday, December 26, 2019

American School Districts Should Implement A Longer School...

Presently there has been progressively more debate over whether or not American school districts should implement a longer school year. This would mean taking a month away from summer vacation, which is regularly over two months. It is controversial because some argue that it would take away from family time and that school districts simply cannot afford to do it. Although most children would prefer more vacation time, a longer school year would tremendously benefit them in the imminent future. A longer school year would develop discipline and responsibility in children, in addition to allowing them to retain the knowledge they have acquired so far. A two month break from school is an outrageous amount of time and during this time most kids lose their sense of responsibility. By cutting summers shorter, kids get a more realistic taste of what life will be like when they mature and enter the real world. Having two months of vacation time will not be the norm for most jobs available. Also, kids do not take school seriously after such a break and fail to remember a lot of the knowledge they acquired the year before. ‘Harris Cooper, an education specialist from Duke University, has argued that test results from fall compared to those in spring show â€Å"children generally slide in math and reading during the traditional summer break.’ (O’Sullivan, 2013) Extended summer breaks cause kids to become inattentive and are a waste of valuable time. According to M arketwired, duringShow MoreRelatedA Study Conducted By Edmonds Cady And Hock Essay1143 Words   |  5 Pagesconducted by Edmonds-Cady and Hock (2008), 19.6 percent of students receiving special education services were expelled without school personnel considering the manifestation determination guidelines provided by the Individual with Disability Education Act (IDEA); thus violating the rights of students with special needs. This paper will be discussing what school psychologist should consider and do when deciding to expel a student who is receiving special education services. Specifically, a student withRead MoreStudents With Attention Deficit / Hyperactivity Disorder ( Adhd ) Essay1172 Words   |  5 PagesIn a qualitative study conducted by Edmonds-Cady and Hock (2008), 19.6 percent of students receiving special education services were expelled without school personnel considering the manifestation determination guidelines provided by the Individual with Disability Education Act (IDEA). This paper will be discussing what school psychologist should consider and do when deciding to expel a student who is receiving special education services. Specifically, a student with attention-deficit/ hyperactivityRead MoreThe Year Round Schooling System Essay947 Words   |  4 Pages The traditional school calendar used by most schools in the United States stems from the original agrarian calendar as students were often called to tend to crops in the summer. This was thoughtfully and effectively designed for the time period it was created in; however, schools, research, and society have dramatically changed since then. The agrarian calendar no longer makes sense, as we consider overcrowding in schools and the significant research regarding the â€Å"summer brain drain.† ThereRead MoreNeeds Assessment Essay1678 Words   |  7 PagesNeeds assessment Sycamore Community School District 427 is a well rounded school district for the amount of ELs that are within the community. With the small number of ELs, it poses a challenge on the administration on how to best service the student body to give them the best educational experience possible to help them thrive inside and outside of school. The school demographics being majority white and English speaking, and the ELs of a very diverse background, poses a challenge on creatingRead MoreEssay on District Budget Design1631 Words   |  7 Pagesships, balancing a districts budget has become increasingly difficult. As a school board member for the Peoria School district it is important and crucial to effective budget decision making to be educated on the school districts budget design and delegated responsibilities within the system. These decisions need to be made based on the protection of public funds and property. â€Å"The legal responsibility for such protection rests solely wit h the board of education in each school district† (Brimley, VerstengenRead More No Child Left Behind Will Reform Our Educational System Essay1748 Words   |  7 Pageswas said to be the most ambitious school reform effort in at least a generation. (Symonds) No Child Left Behind, is a landmark in education reform, designed to improve student achievement and change the culture of Americas schools. Bush describes his plan as the cornerstone of my administration (Rebora). At a time of wide public concern about the state of education, the legislation sets in place requirements that reach into virtually every public school in America. The law emphasizes accountabilityRead MoreThe Civil Rights Law For Children With Disabilities1580 Words   |  7 Pagesto my current districts implementation of 504 plans. Section 504 of the Rehabilitation Act of 1973 was a legal protection for people with disabilities. It is a civil rights law in which prohibits any discrimination against people in any programs from discriminating. Congressman Charles Vanik from Ohio, and Senator Humphrey from Minnesota, proposed this amendment to the Rehabilitation Act of 1973. It is a civil rights mandate, not a special education law. When examining schools and educationalRead MoreCharter Schools Essay1610 Words   |  7 PagesCharter Schools: The Future of Education? For decades the American education system provided parents with three choices: public, homeschool or private school. If they chose public then their child(ren) would be assigned to a school past on where they lived. However , â€Å"in the early 1990s a handful of states created independent public charter schools, providing opportunities for teachers and others to develop innovative schooling options â€Å" (Palmer, Louann 2007). Not only did the creation ofRead MoreEssay on Incorporating 21st Century Technology into the Classroom2592 Words   |  11 PagesAbstract Technology has become a hot item for school district to implement into the classroom. The need for this technology comes from an every changing world and because of the way 21st century students learn. Web 2.0 technology must be used and integrated into the classroom. However, many problems occur when trying to integrate technology. Question on whether student achievement is increased, failures of school districts, and new demands placed on teachers have caused a negative spinRead MoreWashington Dc Schools Are No Longer Used For Educating951 Words   |  4 PagesWashington DC schools are no longer used for educating. DCPS has involuntary evolved to a place just to give jobs to people. Accordingly, for schools to succeed they must be treated like a business: management needs to change to higher ranking authorities, while education focused decisions are delegated to school boards and teachers. Washington DC schools are scoring the lowest in the country for reading and math in federal standards. â€Å"Many people believed that so long as the city is populated

Wednesday, December 18, 2019

Financial Analyst - 712 Words

1. I learned that, being an entrepreneur, you are required to take more risks than anybody else. Flying a plane with no direction is a constant casual situation in business. In this area of business, emotional breakdown and surprises are going to appear all the time. b. I think I earned the scores because majority of the trait that I lack are financial management. Managing my money has always been constantly a trouble for me. To be an entrepreneur, you have to be cautious on what you spend and what you purchase. Paying for mortgages , paying for rent and making key investment are some of the key examples of being a successful entrepreneur. However, I’m a big risk taker, and I’m very ambitious. Which are two of the biggest traits to†¦show more content†¦3. There are numerous business that thrives during different economy situation. For example, during a depression, the demand for online business course or education course will rise. This is because, people are l ooking for ways to save money without paying numerous amount of tuition to learn something. However, in other situation such as a booming economy, business of luxury chocolate stores or luxury items stores will strive. This is because people are able to afford much more luxury items with a booming economy. Demographic trends plays a big role in business success too. For example, the increasing number of Chinese immigrant, will help local Chinese food business to rise. Or rising tends of 2 income families will increase the sales of day care person/school. Different economic, demographic situation creates different business opportunity. One must utilized or adjust their business model base on different situation to create profit maximizing busin 4. The only trait that I think would be a slight potential failure is creativity. Creativity to a certain point can definitely help business expand and innovate. However too much creativity will sometimes kill your business. This is because an entrepreneurShow MoreRelatedDescription Of A Chartered Financial Analyst Certification707 Words   |  3 PagesFinancial Analyst Median Pay: $80, 310 per year and $38.61/hr. Typical entry-level education: Bachelor’s degree Work experience: none Number of jobs: 277,600 Outlook: 12% Becoming a financial analyst Most jobs require at least a bachelor’s degree. Most undergraduate positions such as mathematics, finance, economics and business provide the adequate skills for base level positions. However advanced positions require a master’s degree or MBA and some work experience. The FINRA is the main licensingRead MoreFinancial Analyst1306 Words   |  6 PagesField of interest: Financial Analysis Introduction I am interested in investing and that means that I am interested in almost all investment vehicles; from stocks and bonds to futures and options. However, I am in certain stage of my life where I dont have high income. So I shifted my interest primarily toward options. Because of the simply reason, options in 100 shares will cost much less than actually buying 100 shares. This reason and my todays situation have forced me to be more interestedRead MoreEssay about Walgreens; Financial Statement Analysts2248 Words   |  9 Pagesthrough innovation and execution; Leveraging the companies economic size; Reacting quickly to customers changing needs; Offerings beyond traditional pharmacy, Health Services; and Retaining and attracting top talent. (Walgreen.com, 2007) This analyst of Walgreens is focused the accounting aspects of balance sheets and ratios compare to one of Walgreens biggest competitors, CVS. Company Background Walgreens In 1901 Chicago pharmacist Charles Walgreen borrowed $2,000 from his father forRead MoreAnalyzing Financial Analysts: What They Look for in Financial Reports and How They Determine Earnings Quality4739 Words   |  19 PagesAnalyzing Financial Analysts: What They Look for in Financial Reports and How They Determine Earnings Quality Carol M Graham, Mark V Cannice, Todd L Sayre. Journal of Management Research. New Delhi: Aug 2002. Vol. 2, Iss. 2; pg. 63, 10 pgs Abstract (Summary) The impact that financial analysts have on the share prices of publicly held companies has come under increasing scrutiny. However, despite the role they play in the financial markets, surprisingly little is known about the way in which analystsRead MoreMy Internship At New York University1022 Words   |  5 PagesChris told me everything about his firm and his lifestyle there. I work in a financial advising firm that specializes in comprehensive financial planning for their clients. I majored in finance at New York University because I wanted to make a lot of money, and why not make a lot of money for others on the way. I am at my current job because of an internship I did in the summer before my senior year. It was my first internship in finance because I really did not know what I wanted to do in the fieldRead MoreFinancial Analyst With Disney World Wide Services Essay886 Words   |  4 Pages Essence of My Customer As a Financial Analyst with Disney World Wide Services (cost center), I conducted a strategic conversation with a Michael Wallick, a Software Engineer at The Walt Disney Company Parks and Resorts. He has worked at Disney for a little over a year. With a P.h.D. in Computer Science, he started with the company as a Software Developer Engineer Tester in the Parks and Recreation department, and is currently a Project Manager of Software Engineering in the same department. BeforeRead MoreMajority Of Investors And Financial Analysts From Time1676 Words   |  7 PagesMajority of investors and financial analysts from time to time utilize the fundamental analysis so as to enable buyers and sellers of stocks to make an informed decision. In this project I will specifically perform thorough market value analysis of the United States Truck Inc. and Celadon Group, Inc. which is the main competitor in logistics industry, perform ratio analysis and use these ratios to evaluate the company again st its primary competitor and finally analyze the company on each of the ratiosRead MoreThe Computer Center / User Assistance ( Ccua ) Department Of A Large Manufacturing Company1105 Words   |  5 Pagesanalysist is $31,500 per year. When compared to similar jobs, they were close to being four thousand dollars less. The lowest pay range for other company’s computer analysist is $32,143 per year, which is still higher than the highest paid computer analyst at CCUA. The health insurance coverage that is offered is at a cost of $950 per year, which deducts approximately 50 cents per hour to cover those charges. With the fact that 3.5 percent of the budget set for pay increases is being used to award performanceRead MoreLetter From Prison Answers1240 Words   |  5 Pagesprimarily the analyst community. While institutional investors were very important their buy, sell, hold decisions were primarily made while relying on analyst information rather than because of direct commu nication with the company. There were obviously exceptions to this however the above was true in the majority of cases. Institutional investors tended not to be as industry savvy as the analyst community. 2. My behavior and that of my managers was a direct result of these pressures. Analyst opinionRead MoreThe Glenarm Company Case Report1327 Words   |  6 Pagesstudy is based on Peter Sherman, CFA holder, and the ethical implications involved with his move from Pearl Investment Management to the Glenarm Company for a new position. This is Sherman’s last week working at Pearl for 5 years as a junior research analyst before he moves to his new employer Glenarm as a portfolio manager. The past history of the Glenarm Company regarding ethical problems has set the circumstances (which can be viewed as ethically dubious) to allow the opportunity for Sherman to switch

Monday, December 9, 2019

Political Correctness Essay Paper Example For Students

Political Correctness: Essay Paper Political Correctness:Like so many other traditions, the burning of the bruin was put on the chopping block recently. The long running University of Southern California spirit activity consisted of throwing a large stuffed bear in a bon fire the night before the football game against their rival, the University of California at Los Angeles. The Black Student Union and other student organizations recently questioned the event. Their concern was that the event too closely resembled past lynching of African Americans in the American south. This raises the question of whether it is appropriate to censor ideas that are not created to offend certain groups. Political correctness, the underlying ideal, is the particular set of attitudes about the world that its proponents maintain should be actively promoted. Clark 369 Proponents of political correctness, or PC, had good intentions in devising the idea, but it has serious flaws. Although political correctness was founded with good intent, it does more harm than good. The most noticeable example of harm is how PC proponents try to please everyone at the same time. The burning of the bruin was just one of many activities held during the week before the big UCLA game. The idea being that everyone could find something that they could identify with and rally around their school. If the burning was intentionally created to represent or oppress the offended students, the event would have been banned long ago. However, as Matt Hutaff stated in his editorial in the Daily Trojan:Its about school pride. Its love for the things that brought the university to where it is today. It is traditions that define a school; its student body and its heritage. Strip the school of its traditions and all you have is a school that isnt worth rallying behind. 5In appeasing one group, it seems the university neglected another group. It seems that the lesson that one cannot please everyone all the time still needs to be learned. Another lesson that needs to be learned is to meet offensive language head on instead of hiding from it. This cannot happen, however, if the college is sheltering us from it. It is the duty of the university to teach us how to live in the real world. How are they going to protect us from what we do not want to hear out there? The answer is they cannot, and the sheltered individuals are left unprepared to confront real world situations that will offend them. As Irene Clark points out, an article by the National Association of Scholars asserts that it is the role of higher education to enable students to grapple with contrary or unpleasant ideas and that to shield them from such ideas will be detrimental in the long run. 373 Unfortunately, there are bad things in the world. There is no way to change that. Ignoring them will not make them go away. Eventually the sheltered must face them. If a school hides these things from its students, they will be unprepared to confront them. Even if PC proponents succeeded in their goal of eliminating offensive actions and language, they can never kill the ideas behind them. In private these ideas can grow and fester unchecked. In public, the offenders can be identified. When forced to hide these ideas, the offenders will still express them in secret. When these people are allowed to express their thoughts and opinions in public, the rest of the world is able to watch what they are doing. If they are not aware that they are being offensive, they can be told, also. As Irene Clark states:whether or not we agree with speech codes, such codes, explicitly or implicitly, are not entirely new, nor do they prevent racist or sexist thought in private. 372As Clark stated earlier, PC is not a new idea. Various social movements have tried to implement this restraint before. It has not worked in the past and it is not gaining much grou..nd today. As John Ellis states in Clarks book:we can ask that people who want to take us through t he fantasy yet one more time first confront the lessons of history that show how disastrous politically correct ideas have proved to be. 378PC was brought up in the past and failed. Its performance today is just as bad. It seems that history repeats itself. .uf1ed33c9e9d04da026fbafe205b9975a , .uf1ed33c9e9d04da026fbafe205b9975a .postImageUrl , .uf1ed33c9e9d04da026fbafe205b9975a .centered-text-area { min-height: 80px; position: relative; } .uf1ed33c9e9d04da026fbafe205b9975a , .uf1ed33c9e9d04da026fbafe205b9975a:hover , .uf1ed33c9e9d04da026fbafe205b9975a:visited , .uf1ed33c9e9d04da026fbafe205b9975a:active { border:0!important; } .uf1ed33c9e9d04da026fbafe205b9975a .clearfix:after { content: ""; display: table; clear: both; } .uf1ed33c9e9d04da026fbafe205b9975a { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uf1ed33c9e9d04da026fbafe205b9975a:active , .uf1ed33c9e9d04da026fbafe205b9975a:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uf1ed33c9e9d04da026fbafe205b9975a .centered-text-area { width: 100%; position: relative ; } .uf1ed33c9e9d04da026fbafe205b9975a .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uf1ed33c9e9d04da026fbafe205b9975a .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uf1ed33c9e9d04da026fbafe205b9975a .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uf1ed33c9e9d04da026fbafe205b9975a:hover .ctaButton { background-color: #34495E!important; } .uf1ed33c9e9d04da026fbafe205b9975a .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uf1ed33c9e9d04da026fbafe205b9975a .uf1ed33c9e9d04da026fbafe205b9975a-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uf1ed33c9e9d04da026fbafe205b9975a:after { content: ""; display: block; clear: both; } READ: Why Homeschooling Is On The Rise Of The World EssayHistory teaches us other lessons, too. One lesson is that our country is not perfect, and it makes mistakes. For example, Native Americans were forced to leave their land, and then the government sold that property. The Native Americans were treated like cattle in the name of imperialism, and the country called it Gods will. These Indians, as they were called, were my ancestors. It bothers me that my government could do such a thing. Should I protest a march or similar event? It very closely resembles my ancestors plight, but it is not about repression of Native Americans. Our country made many mistakes in the past, but we have all learned from them. We should not keep reliving and suffering from them by fearing every resemblance to the original act. This brings up the fact that the burning of the bruin has only a vague resemblance to past hate crimes in the south. The resemblance would be more offensive if the toy was of human form. This is a teddy bear in question. It is preposterous to compare the personification of a toy animal to past crimes. An interesting fact is how the burning does not lead to violent actions against any real bears. If either of these happened, then there would be cause for worries. For the defense of PC, however, the argument that the offensive language is distracting does have value. However, the problem with this argument is there are many things in life that are distracting. The best way to cope is to learn how to survive the hurtful speech and offensive actions. Gwen Thomas, a community college administrator, says in Clarks book that we have to teach students how to deal with adversarial situations and how to survive offensive speech they find wounding and hurtful. 393 It may be distracting, but if we do not learn how to deal with hurtful speech we will remain in hiding which could harm us more. Other things less related might come under attack as well. The next likely candidate to be cut is Tommy Trojan, the mascot of the school. As Matt Hutaff questions from a fictitious point of view of Tommy:Im impossibly flexed in every musclea warrior, andmale. Sooner or later, thats bound to catch up with me. Ill probably be melted downLumpy theyll call me, the mascot of bland, unassuming and uninteresting icons that stir no emotionin anyone. 5All it would take is one offended person and Tommys existence is in jeopardy. Nothing is sacred, and anything can come under scrutiny. As Hutaff worries, what will we have to rally around, and to have pride in? I hope we do not get that far. In his book, 1984, George Orwell wrote of a nation, that eliminated all unnecessary words and actions. This government even went as far as to try to control thought. I am afraid that the PC movement will some day attempt this kind of act. I am also worried as to where this campaign will end. PC has already overstepped its original domain and attacked an act remotely related to the offensive actions PC was designed to fight. The best thing to do now is for the PC proponents to step out of their situation and see that respect goes both ways. We cannot have everything manipulated to please each of us. When something offends us, we need to ask ourselves if it is offensive to anyone else. We also need to learn to face our fears, and learn to deal with acts and language that we do not like. Let us not take the same path past generations have taken. Let us take the good with the bad instead of ignoring the fact that the bad does exist.

Monday, December 2, 2019

UFOs are they out there Essay Example For Students

UFOs are they out there Essay Almost every civilization in history that has kept a written history has recorded the sightings of strange objects and lights in the skies. These objects have been described as glowing wheels, colored balls of light, and disk shaped objects. Today unexplained aerial phenomena are generally referred to as unidentified flying objects (UFOs) or flying saucers. The effects of extra terrestrial sightings can have an adverse effect on people if influenced the wrong way. No solid proof has shown that UFOs are real, but many sightings cannot be proven otherwise. The media, stories, or ones own experience may often influence what one believes. The government once stated that they had captured extra terrestrials. (60 minutes, CBS) On the contrary, most scientists now agree that almost all sightings and stories of extra terrestrials are not authentic. We will write a custom essay on UFOs are they out there specifically for you for only $16.38 $13.9/page Order now The United States government has records of thousands of UFO sightings since 1948, including photos of alleged UFOs and interviews with people who claim to have seen them. Since UFOs were considered a potential security risk, the report on these sightings was originally classified as secret. (Craig, 917) When the report was later declassified it showed that 90 percent of all UFO sightings could be easily explained. Most of the sightings turned out to be celestial objects, such as stars or bright planets like Venus, or atmospheric events such as auroras or meteors falling through the atmosphere. Many other sightings turned out to be objects such as weather balloons, satellites, aircraft lights, or formations of birds. Often these sightings were accompanied by unusual weather conditions. Only 5.6 percent of these cases were not explained. Testimonies by people are often very inaccurate and dramatized. People have the tendency to explain everything they see, which is not usually completely accurate. The unaided human eye can be tricked into hallucination and has an inaccurate depth perception. Reflections from windows and eyeglasses can provide an optical illusion of a UFO. Radar is much more reliable to identify objects, but it cannot detect many characteristics that separate natural phenomena and physical objects. Radar often picks up ionized gas, rain, or thermal discontinuities. Electronic interference is also a frequent problem. Either way, scientists are left with many unanswered questions. There are many mysteries about UFOs with many indefinite answers. Many investigators have tried to solve some peculiar questions about UFOs, but many of their conclusions cannot be proven. In 1968 the United States Air Force asked Edward U. Condon, a physicist at the University of Colorado, to head a panel studying the claims of extraterrestrial crafts. (Unidentified Flying Objects, Encarta encyclopedia) The committees final report was reviewed by a special committee of the National Academy of Sciences and released in early 1969. The 37 scientists who contributed to the report interviewed UFO witnesses and studied physical and photographic evidence. The report, also known as the Condon Report, concluded that not only was there no evidence of extraterrestrial control of UFOs but also that no further UFO studies were needed. Their advice was accepted by the United States, but for other independent laboratories it was not enough. Whether or not a person believes UFOs are, in fact, real or not is probably because of influence from the media. For instance, the smash hit movie Independence Day was a movie about aliens attacking Earth so they can keep it for themselves. The company that made the movie, FOX, has been promoting extra terrestrial ideas to bring media attention to UFOs. The company bought the stretch of highway 375 outside the mysterious secret military base named Area 51, which plays an important part in the movie. In it, several aliens were captured and stored along with their aircraft. In fact, the government has announced that it has captured aliens and their aircraft, but that was later denied. (Woolward, 912) This has been said to be the cause of the vast amount of UFO reports since 1948. The government also denied that Area 51 even existed for several years, even though it had been photographed many times. Today, the military base is thought to be a very heavily guarded test sight for many st ealth planes in development for the military, including some possible flying saucers. This sight is responsible for several of the militarys top planes used today. Local residents persist that they have never seen any UFOs that couldnt be explained by the militarys aerial experiments. Tourists swear they have seen several UFOs that couldnt be anything else but extra terrestrial. Many magazines and tabloids visit the area to report about such sightings and print there own far-fetched ideas. .ub1dff2fdf2eb5913d8d0a965c414383a , .ub1dff2fdf2eb5913d8d0a965c414383a .postImageUrl , .ub1dff2fdf2eb5913d8d0a965c414383a .centered-text-area { min-height: 80px; position: relative; } .ub1dff2fdf2eb5913d8d0a965c414383a , .ub1dff2fdf2eb5913d8d0a965c414383a:hover , .ub1dff2fdf2eb5913d8d0a965c414383a:visited , .ub1dff2fdf2eb5913d8d0a965c414383a:active { border:0!important; } .ub1dff2fdf2eb5913d8d0a965c414383a .clearfix:after { content: ""; display: table; clear: both; } .ub1dff2fdf2eb5913d8d0a965c414383a { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub1dff2fdf2eb5913d8d0a965c414383a:active , .ub1dff2fdf2eb5913d8d0a965c414383a:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub1dff2fdf2eb5913d8d0a965c414383a .centered-text-area { width: 100%; position: relative ; } .ub1dff2fdf2eb5913d8d0a965c414383a .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub1dff2fdf2eb5913d8d0a965c414383a .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub1dff2fdf2eb5913d8d0a965c414383a .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub1dff2fdf2eb5913d8d0a965c414383a:hover .ctaButton { background-color: #34495E!important; } .ub1dff2fdf2eb5913d8d0a965c414383a .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub1dff2fdf2eb5913d8d0a965c414383a .ub1dff2fdf2eb5913d8d0a965c414383a-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub1dff2fdf2eb5913d8d0a965c414383a:after { content: ""; display: block; clear: both; } READ: The European Unification Essay People interpret these articles in many different ways. Because there is no true proof of any extra terrestrial crafts, people are forced to make their own decisions about reality. For instance, in March 1997, thirty-nine people committed suicide to join with Ti and Do, two UFO forces. Printed on their page on the Internet, it stated, Our 22 years of classroom here on planet Earth is finally coming to conclusion graduation from the Human Evolutionary Level. We are happily prepared to leave this world and go with Tis crew. (Heavens Gate, WWW) Such cases like these are extreme, but recent studies have shown that fifty percent of America does b elieve that there is life on other planets that may be trying to visit us. However, the majority of these people do not worry about any unwelcome situation. Opinions may vary, but until any conclusive evidence can be shown that life is visiting Earth from somewhere out in space, it is safe to say that humans are alone in their home planet. It is possible that this theorem will be proved wrong in the future, but until then all any person can do is guess, hope, and wait. What the future holds for Earth may not be what is expected, but until then scientists will be examining all the evidence to help provide a better future for the home to life as we now know it. Unidentified Flying Objects World Book Encyclopedia, 1992. Page 19, volume U-V, 1992Craig, Pat. On Nevadas Extra Terrestrial Highway. Tribune News Service August 19, 1996: Page 819 from InfoTrack/Super Tom+. On CD-ROM. Foster City, CA: Information access, 1997Unidentified Flying Objects Groilers Encyclopedia, 1994. Page 17, volume U-V, 1994Woolard, John. UFO Investigators Scoff at Abduction Claims. Tribune News Service, September 12, 1996. Page 912 from InfoTrack/Super Tom+. On CD-ROM. Foster City, CA: Information Access, 1997Heavens Gate Home Page, http://www.aeok.com/heavensgate/index.htmBibliography:Unidentified Flying Objects World Book Encyclopedia, 1992. Page 19, volume U-V, 1992Craig, Pat. On Nevadas Extra Terrestrial Highway. Tribune News Service August 19, 1996: Page 819 from InfoTrack/Super Tom+. On CD-ROM. Foster City, CA: Information access, 1997Unidentified Flying Objects Groilers Encyclopedia, 1994. Page 17, volume U-V, 1994Woolard, John. UFO Investigators Scoff at Abdu ction Claims. Tribune News Service, September 12, 1996. Page 912 from InfoTrack/Super Tom+. On CD-ROM. Foster City, CA: Information Access, 1997Heavens Gate Home Page, http://www.aeok.com/heavensgate/index.htm

Wednesday, November 27, 2019

How to Write a Critical Lens Essay

How to Write a Critical Lens Essay How to Write a Critical Lens Essay In a critical lens essay you write upon a quote and express your critical opinion about it. The quote can be from a book or can be a universally known one. Examples of universally known quotes are: â€Å"Be yourself everyone is taken†, â€Å"Two things are infinitive: the universe and the human stupidity; and I am not sure about the universe†, â€Å"Be the change you wish to see in the world†, â€Å"Life is what happens to you while you are busy making other plans†, etc. Writing a critical essay is easy as long as you pick the right quote on that you can write best or research well the ones you cannot. It is called a critical lens essay because you are supposed to view the quote you have chosen as if through critical lens; analyze and defend it. Basically, those kinds of essays are literature analysis papers and analyses requiring extensive research. How to write a critical lens essay In the final paragraph of the introduction you should state the quote you have chosen and its author, title and genre. The thesis statement must connect the quote with your work. Your whole essay will be determined by what you state in the introduction. It is important to write whether you agree or disagree with the quotation you have chosen or given to you. In order to form the right opinion on the quote, you should research facts and examples that either prove it or not. It will be good if you draft your conclusions before starting to write the actual essay. Prioritize your evidence by its convincing strength and reliability to the quotation. Brainstorm. The interpretation of the quotation is vital to making a good critical evaluation. You can try to conflict it, reason with it, even humor it but whatever the critical opinion on it will be, it has to be strong, well researched and with correctly developed examples and ideas. It is essential to interpret your quote and explain what it means to you. If necessary you can restate it and write it in your own words. Body of a critical lens essay In order to have a well-developed critical lens essay your body should consist of at least three paragraphs. It is precisely in the body of the essay where you state what you have researched so far and drafted. In that part of the essay you must convince the audience that your interpretation of the quote is logical, reasonable and acceptable. In the introduction you introduce the reader to the quote you are going to examine in a clear and short manner, you also introduce to the reader your critical opinion and attitude towards it, but it is in the body of the essay that you have to prove your point. A well-written body will make your work sound reliable and trustworthy; if it is not done well from the research to putting it down in written form, your whole essay will lack sense of completeness and trustworthiness. So, once again, research and draft not only parts of your critical lens essay but as a whole. In the first paragraph you should write about the fact, idea or character that illustrates your critical opinion on the quote best. If you are writing on a quote from a specific book you may pick up a character that best suits it and examine how he or she relates to the quote. Do not forget to connect the fact, idea or character to the critical opinion and attitude you have up to the quote. In the second paragraph focus on what the author of the quote has meant. If it comes from a book, what is its purpose and meaning in the book? For example, let’s say you have to write a critical lens essay on the quote â€Å"You never really understand a person until you consider things from his point of view Until you climb inside of his skin and walk around in it.† from the book â€Å"To Kill A Mockingbird†. The message is simple: you can never understand what the person next to you is experiencing until something similar does not happen to you. And here you can examine how this quote relates to the book itself. In the third paragraph you can write about a personal story that proves your critical attitude towards the quote or state another fact or idea you have researched. If you have more than three facts or ideas that prove your theory, keep writing as each of them is stated in a different paragraph. Conclusion of a critical lens essay In the conclusion you restate your critical opinion about the quote and the information you have given in the introduction. Make it sound strong and convincing. Always proofread your essay at least once.

Saturday, November 23, 2019

How to Write a Dissertation Proposal

How to Write a Dissertation Proposal How to Write a Dissertation Proposal Several guidelines are provided to enable an individual to write an excellent dissertation proposal. Here they are for your attention. They should be well detailed regarding the research topic. Current research shows that to be able to write a good dissertation proposal, students have to be well conversant with the topic at hand. This means that they need to gain a lot of information on the subject matter by reading several materials and books on the topic, know current findings on the topic and be able to access various literary sources. They should be able to go outside the area of study. This mainly means that they will be able to research from related topics and as a result, the research work presented will be unique, thus outdoing previous research on the subject matter. The issue of going outside the given area of study is an advantage in that it is a good source of new ideas for a given area of study. They have to be attentive. The issue of attention is a very powerful tool, especially, in the practical application of knowledge gained. In addition, it helps individuals to know the various methods, as well as the procedures, used in a given analysis. This then becomes a great source of information for the broad topic of study. They should know how to cite papers. For instance, an individual who knows the list of authors who wrote a particular article would give a great referenced dissertation proposal paper. In addition, having a good knowledge in the area of text citations would result to a great dissertation proposal. They should be creative. When a researcher is able to refer to research papers that were written previously and come up with new ideas, the outcome document becomes of greater value in comparison to earlier documents. Below is the suggested format that should be used in the writing of a dissertation proposal: A clear formulation of the research question at hand. Justifying the Research Project. Writing a literature review. Compiling conceptual and theoretical research work. Stating the research methodology. Giving a detailed research plan that indicates how the various research stages will be carried out. Budget and Time factor. References together with appendices. Do always remember that, in case you fail to compose a dissertation proposal on your own and the deadline is due in a very short period of time, you can always contact the custom writing agency for help. Proficient writers will rescue you if you are in need and you will get a carefully composed paper within the time you had indicated to them. Do you still need dissertation proposal help online? You can hire our PhD writers who will write a custom proposal for your dissertation. Try our writing service now!

Thursday, November 21, 2019

CIMT 534 Essay Example | Topics and Well Written Essays - 1000 words

CIMT 534 - Essay Example In this kind of classroom, the teacher is the only one supposed to talk and it is the responsibility of the students to listen. Student centered learning has the focus shifting from the teacher to the student where the student has the responsibility of taking partial control over the learning process. There are certain advantages that come from both the learning strategies. For the teacher-centered mode of learning, some of the advantages include the fact that the classroom is always orderly and thus offering a quality environment. Since the teacher has the responsibility of directing the students, he/she does not have to worry about the students missing a particular topic. There are some downsides to this mode of learning (Smaldino, Lowther, & Russell, 2012). One of the disadvantages of incorporating this method of learning is the fact that it may lead to poor development in communication skills among the students since they are not allowed to work together. In these institutions, it is normal for the students to lack in concentration and this leads to their minds wondering and the consequent of this is the student failing in particular topics. Student-centered mode of learning also has its advantages in the contemporary environment. One of the major advantages of this method of learning is that the students get to develop effective communication skills that will assist them later on in life. Students also learn to ask questions at the points where they do not understand and this is vital for their understanding of the various topics. Students get interest further in the topics and this is because students are interested in activities in situations where they can interact with fellow students. One of the disadvantages of this mode of learning is the fact that the students may develop an ignorant nature and even disrespect the teacher out of the much freedom offered. The classrooms are also very noisy. Since the

Tuesday, November 19, 2019

The Forbidden City Essay Example | Topics and Well Written Essays - 1000 words

The Forbidden City - Essay Example A city, which is now Beijing, was a significant commercial center in the beginning of the ninth century BC. It became the administrative core of the principality of the Yan and eventually became the capital of Liao and later on the Jin. The northern tribe, the Tartars, constructed a city near this site in the tenth century.ii When the Venetian explorer Marco Polo visited the location, he illustrated it as the city of Khan, with fortified roofs highlighting the green flora of mulberry trees. Modern Beijing is roughly five centuries old, with several of its prominent edifices entirely restored. When Yung-lo instituted Beijing as his Chinese capital in the early fifteenth century, he commissioned roughly 200,000 laborers to construct the imperial city. Hsu Tai, Feng Chiao and Yuan An, his three engineers, were provided with the direction to build a massive, affluent and mystifying palace to function as the metropolis of the Emperor to the rest of the world. The role of the Emperor was a difficult one. Auditoriums were required for receiving delegations, along with places of worship for sacramental cleansing and processional paths. He as well demanded expansive domestic residences with backyards for himself and his loved ones in addition to administrative housing.iii The Forbidden City was entangled in ceremonial and spiritual notions. Legend tells that the core structure of the City was envisioned in a reverie by the mentor of Yung-lo, a futurist monk. He envisioned a celestial city, wherein the Lord of Heaven dwelled in a purple enclosed space, which is assumed to be a constellation shaped by 15 heavenly bodies revolving around the polestar.iv As Chinese cosmology believes, purple was an embodiment of bliss and happiness and as well as that of the polestar. Hence, the Emperor proclaimed himself as the Son of Heaven, with the divine obligation

Sunday, November 17, 2019

William Morris Research Paper Essay Example for Free

William Morris Research Paper Essay William Morris was a poet, artist, manufacturer, and socialist during the mid to late 19th century. He was most active as a wallpaper and textile designer and later in his life a graphic designer. Morris was born March of 1834 in Walthamstow, which was near to London. He lived with his wealthy family near London and learned to read at a young age. He later attended Oxford where he met is friend, Edward Burne-Jones, who would later become one of the greatest Pre-Raphaelite artists. Morris started at Oxford thinking of becoming a clergyman, but soon joined an aesthetic circle. Morris had a great interest in medieval art and architecture, because it was art that was made by people and for people with great skill and craft instead of art that was made by mass production. After graduating and inheriting his father’s money, Morris started working as an architect. After a few years, Edward Burne-Jones influenced him to become an artist instead. Morris started as a poet and painter, but later in his life became more interested in politics, tapestries, graphic design, and textile designs. â€Å"The Arts and Crafts movement evolved as a revolt against the new age of mechanization, a Romantic effort on part of Morris and others to implement the philosophy of the influential critic John Ruskin, who stated that true art should be both beautiful and useful and should base its forms on those found in nature.† Morris and others fought to return to the simplicity, beauty, and craftsmanship that were being destroyed by the process of mass production. He also became more active as a socialist, and had many writings and leadership roles involving this. La Belle Iseult was the only known and finished easel painting made by Morris. It was made in 1858 and shows his model, Jane Burden, who became his wife in 1859. Jane is modeling as Iseult standing in front of an unmade bed in a medieval room. The painting shows many rich colors, and there is great emphasis on the patterns throughout the painting. These patterns can be seen in many of Morris’s work in his tapestries. Throughout the painting Morris uses textures and patterns to make the piece feel more realistic. In the foreground he places Iseult who is standing and looking towards the left. She is not addressing the viewer and looks as though she has recently arisen from bed. In the middle ground he places an unmade bed with a dog snuggled  in. In the background there is a woman musician playing for Iseult. Morris paints Iseult with illuminating skin and keeps her the main focus with her light white and pink patterned dress. There are many curtains draping from the ceiling echoing the colors in her dress. The room is full of things placing it in medieval times. This painting of Iseult is showing her mourning over her lover, Tristram, who was exiled from the court of King Mark. She was locked in the tower after attempting to kill herself. Now she has been sick almost to the point of death mourning for her lover, and this is also shown in the mood of the painting. â€Å"She stands wistfully in her small chamber, her feelings for Tristram reinforced by the springs of rosemary, symbolizing remembrance, in her crown, and the word ‘DOLOURS’ (grief) written down the side of her mirror.† The greyhound also proves the subject to be Iseult, because it is said Tristram gave her the dog and it is now used as her identifying emblem. There has been confusion on the name of this piece, and it has also been called Queen Guenevere. This is most likely because Morris wrote a poem called The Defence of Guenevere in the same year the painting was made, which is addressing the same character in the painting. Morris struggled for months on this picture and spent more time on embroidery and woodcarving. Many of the furnishings in the picture, such as the Turkish rug, the Persian embroidered cover, and the white work hangings are inspired by his actual collection. Strawberry Thief is a printed cotton furnishing textile that was made to be used as curtains or draperies for a wall. It could have also been used as loose covers on furniture. This pattern is based on the thrushes that Morris would often see stealing his strawberries beside his home in the kitchen garden. This is one of his best known designs and is very colorful with the deep indigo blue he used. â€Å"The pattern was printed by the indigo discharge method, an ancient technique used for many centuries mostly in the East.† Morris liked the depth of the color and clarity in the detail. In May 1883 Morris wrote to his daughter, I was a great deal at Merton last week anxiously superintending the first printing of the Strawberry thief, which I think we shall manage this time. Morris was very pleased with his design and even got it patented. It was the first pattern using this old technique where red and yellow were added to the basic blue and white ground. The entire process was painstakingly long to make and it used very expensive cotton.  Even though it was sold at a high price, the textile was one of the most commercially successful patterns for Morris and one of the client’s favorites. Morris was primarily active as a wallpaper and textile designer. The flower motif was a favorite in his work. He would often make his designs simple and stylized and inspired by traditional folk art. Morris’s emphasis on the importance of skill and craft and making art for the people contradicted his expensive textiles that only the wealthy could afford. Morris worked to restore the art of fine fabric printing and often experimented and researched different methods in making fabrics. Strawberry Thief is a colorful design where Morris used an indigo disch arge technique to create it. â€Å"Morris found that in order to produce a true indigo blue the fabric could not be block printed because the indigo dye oxidizes, changing the color as the fabric dries. Morris reused an early technique of vat-dyeing the entire yardage in indigo. Then, by using either a resist process or through bleach printing, areas of the fabric could be opened (the indigo color removed) and redyed the desired color.† Morris would also study old dye recipes, and would wash his fabric in the nearby river and dry it on the grass to allow the sun to bleach away the residual color. He would use organic materials for his primary colors, and would blend dyes and change the strength of dye solution to get the secondary colors. Morris’s early works and patterns were simpler and were made from a contemporary style with more obvious repetition. His later patterns and designs became more complex with more depth. â€Å"Morris believed that a pattern should not be at once entirely self-revea ling and should hold some mystery for the viewer, being sufficiently complex to maintain his attention.† Daisy Wallpaper was made in 1862 and was hand-printed for the firm of Morris, Marshall, Faulkner Co. It is a design showing a variety of plants. The colors of plants included are white, red and yellow flowers placed on a pale background with green flecks which represent grass. â€Å"The flat simple frontal motif was adapted from a tapestry shown in an illuminated manuscript at the British Museum; Block-printed in distemper colours, on paper; The second paper William Morris designed, but the first to be issued (1864).† This wallpaper is another one of Morris’s flower motifs and is simple and stylized. This was also inspired by traditional folk art. This wallpaper was hand printed which made it very expensive. This was the first pattern that Morris  issued, which took place in the year of 1864. It is a simple design of meadow flowers, and these forms are very similar to those seen in the late medieval tapestries. This wallpaper has a medieval character that connects Mo rris’s early work with the Pre-Raphaelite painters. Morris also had an interest in making nature into ornament which also helped influence this design. Morris said â€Å"any decoration is futile when it does not remind you of something beyond itself.† William often observed the plants in his garden and studied them which then they would often end up in many of his works. Morris did not intend for his designs and flowers to be taken as literal transcriptions of natural forms, but instead they were supposed to be seen as stylized re-creations. Morris designed over 50 wallpapers, and advised that the choice of wallpaper for the home must take into account the function of the room. Morris still preferred woven textile hangings over wallpaper, and thought of wallpaper as a makeshift decoration. â€Å"Though naturalistic, they were not of the over-blown chintzy floral style generally described as French, then popular with aristocratic and wealthy customers. On the other hand, though many were flat and to a degree stylized, often drawing on medieval sources for their motifs and character, they did not have the severity and the mor al overtones of reformed design.† During the late 1890s, Morris’s wallpapers could be commonly seen in many artistic middle-class homes. He had great success in â€Å"creating structured patterns from natural forms, with a sense of organic growth controlled by a subtle geometry, was his most important design legacy.† He also influenced the skill of making flat and complex patterns, patterns that were stylized organic forms and motifs of nature. He even changed the way the middle-class decorated their homes. Throughout Morris’s career as a designer he worked to bring people away from the commercialization of the Industrial Revolution and he pushed people to come back and reawaken to the romantic ideas of handcraft medieval design. He would often find his inspiration in nature and today many of his designs can be found on tapestries, textiles, wallpaper, stained glass, carpets, and more. He was one of the more influential voices in Victorian art and architecture of the time. Although Morris did so many different kinds of art, there are a few stylistic elements and ideas that he incorporated throughout his work. Morris really emphasized quality in his work, not only in the quality of the  actual design itself, but also in the quality of life. He believed that the two were entwined in a way and he would encourage people around him to make things for themselves. He also used a historic style which played into all of his work. Bibliography Arnason, H. H. History of Modern Art: Painting Sculpture Architecture Photography. New Jersey: Prentice Hall, 2003. Print Chu, Petra ten-Doesschate. Nineteenth-Century European Art. London: Laurence King Publishing Ltd, 2012. Print. Cody, David. William Morris: A Brief Biography. The Victorian Web. N.p., 17 Oct. 2012. Web. Nov. 2012. http://www.victorianweb.org/authors/morris/wmbio.html. Fowle, Frances. La Belle Iseult. TATE. N.p., Dec. 2000. Web. Nov. 2012. http://www.tate.org.uk/art/artworks/morris-la-belle-iseult-n04999/text-summary. Mackail, John WIlliam. â€Å"William Morris.† The Dictionary of National Biography. Supp. vol. 3. London: Smith, Elder and Co., 1901. 197†203. Print. Marsh, Jan. William Morriss Painting and Drawing. JSTOR. The Burlington Magazine Publications Ltd., 1986. Web. Nov. 2012. http://www.jstor.org/stable/882655. Oman, Charles C., and Hamilton, Jean. â€Å"Wallpapers: a history and illustrated catalogue of the collection of the Victoria and Alb ert Museum.† London: Sotheby Publications, in association with the Victoria and Albert Museum, 1982. Strawberry Thief. Search the Collections. V A Collections, n.d. Web. 02 Dec. 2012. http://collections.vam.ac.uk/item/O78889/strawberry-thief-furnishing-fabric-morris-william/. Whipple, David. Textile Designs and Books by William Morris. JSTOR. Cleveland Museum of Art, 1978. Web. Nov. 2012. http://www.jstor.org/stable/25159593. William Morris Wallpaper Design. Victoria and Albert Museum. Victoria and Albert Museum, 2012. Web. Nov. 2012. http://www.vam.ac.uk/content/articles/w/william-morris-and-wallpaper- design/. Images of the Works: Title: La Belle Iseult Date: 1858 Medium: Oil Paint on Canvas Size: Support: 718 x 502 mm, Frame: 960 x755 x 61 mm Source: Tate Britain (http://www.tate.org.uk/art/artworks/morris-la-belle-iseult-n04999) Title: Strawberry Thief Date: 1883 Medium: Furnishing Fabric/Textile Size: 60.5 x 95.2 cm Source: Victoria and Albert Museum (http://collections.vam.ac.uk/item/O78889/strawberry-thief-furnishing-fabric-morris-william/) Title: Daisy Wallpaper Date: 1864 Medium: block-printed in distemper colors, on paper Size: Height: 687 mm, Width: 544 mm Source: Victoria Albert Museum (http://thetextileblog.blogspot.com/2010/09/william-morris-and-daisy-wallpaper.html) [ 1 ]. Mackail, John WIlliam. â€Å"William Morris.† The Dictionary of National Biography. Supp. vol. 3. London: Smith, Elder and Co., 1901. 197†203. [ 2 ]. Chu, Petra ten-Doesschate. Nineteenth-Century European Art. London: Laurence King Publishing Ltd, 2012. [ 3 ]. Cody, David. William Morris: A Brief Biography. The Victorian Web. N.p., 17 Oct. 2012. Web. Nov. 2012. . [ 4 ]. Arnason, H. H. History of Modern Art: Painting Sculpture Architecture Photography. New Jersey: Prentice Hall, 2003. [ 5 ]. Marsh, Jan. William Morriss Painting and Drawing. JSTOR. The Burlington Magazine Publications Ltd., 1986. Web. Nov. 2012. . [ 6 ]. Fowle, Frances. La Belle Iseult. TATE. N.p., Dec. 2000. Web. Nov. 2012. . [ 7 ]. Fowle, Fances. â€Å"La Belle Iseult.† [ 8 ]. Marsh, Jan. â€Å"William Morris’s Painting and Drawing.† [ 9 ]. Fowle, Fances. â€Å"La Belle Iseult.† [ 10 ]. Strawberry Thief. Search the Collections. V A Collections, n.d. Web. 02 Dec. 2012. [ 11 ]. Strawberry Thief. Search the Collections. V A Collections. [ 12 ]. Strawberry Thief. Search the Collections. V A Collections. [ 13 ]. Chu, Petra ten-Doesschate. Nineteenth-Century European

Thursday, November 14, 2019

Tendon from Different Anatomical Positions Essay -- Anatomy, Tissues

Structure of a tendon is made up of collagenous tissues, a fibrous protein constituted as a large portion of the organic matrix of bone and cartilage (Nordin & Frankel, 2001). Also termed extracellular matrix (ECM) consisting of few cells, 20% of cellular material is occupied as total tissue volume, whilst 80% accounts for extracellular matrix (approximately 70% water and 30% solids) (Nordin & Frankel, 2001). Contained within these solids is a ground like substance with minor components of elastin. Due to the dense interrelation tissue of collagen it is able to sustain stability over which the mechanics of the musculoskeletal system requires. This may be in the form of fibril, whereby, collagen molecules (type 1 collagen) are synthesized and secreted by fibroblasts (France , 2010). Procollagen is formed and further condensed to tropocollagen as the basic building block of collagen (France , 2010). Across the parallel network leading to the development of fibril; cross-links are formed within collagen type 1. The cross-links allow tissues to withstand strength and function under mechanical stress (Fratzl, 2008). The solids within the extracellular contain ground like substance proteoglycans (PG). PG molecules binds extracellular water of the tendons, ensuring the matrix is a hydrated-gel like material (Nordin & Frankel, 2001). Thereby the substance acts as an adhesive between microfibrils in bundles; stabilizing collagenous tissue forming connective tissue fascicles (appendix, figure 1). The functionality of tendons can be expressed by its materialization; primarily to transmit force from muscle to bone. During any form of movements the tendons encounter forces such as longitudinal, transversal and rotational (Kannus, 200... ...llagen tissue cross-links across maturation; revealing the number of cross-links decreased with growth. This suggests that a state of maturation cross-links are stabilsed to a non-reducible form (Robins et al, 1973). When stress is placed on tendons; tissue must adapt to stiffen and strengthen in response to the physical demands placed on them. Physical training during eccentric forces has been found to increase tensile strength of the tendons (Woo et al, 1981). Long periods of inactivity can disrupt the parallel structure of collagen fibers in the tendons, decrease water content, although increase collagen cross-linking (Loitz et al, 1989). The collagen turnover increases although reports suggest the amount of tendon components and overall mass is unchanged. Ultimately immobilization decreases tendon stiffness, failure load and strength (Matsumoto et al, 2003).

Tuesday, November 12, 2019

Promote Positve Behaviour

1. Identify types of challenging behaviour.There are many types of behaviour that can be described as challenging. Examples of these include: self-injury (eg head banging, self-biting, skin picking)  physical aggression or violent behaviour (eg punching, scratching, kicking, biting, pulling hair) verbal aggression (eg threats, insults, excessive swearing)  disruption and destruction of property or the environment (eg ripping clothes, breaking windows or furniture) racist or sexist behaviour.Stereotyped behaviours (eg rocking, spinning, hand flapping) inappropriate or unacceptable sexual behaviour (eg masturbating in public, touching others inappropriately or showing pornography) smearing and urination (eg smearing faeces, urinating in inappropriate places) stealing (eg taking possessions/food that do not belong to the individual) manipulative, deceitful and non-compliant behaviour (eg refusing to move, refusing to engage in an activity despite being able, telling lies) absconding (eg leaving school/home/residential service without permission).3. Explain the steps that are taken to maintain the dignity of and respect for an individual when responding to an incident of challenging behaviour. Children must always be treated with dignity and respect with. This may be difficult when their behaviour is threatening to their peers or members of staff, however it is essential to remember that it’s the behaviour that is adverse and not the YP. When challenging the behaviour it is important to disapprove of the negative behaviour, not the individual.Should the situation require reactive strategies, it is important to uphold best practise and continue to treat the YP in a child centred way, according to their placement plan, risk assessment and positive handling plan, paying attention to the YP faith, beliefs, culture while maintaining dignity. For example, when holding a YP, ensuring that the hold is not intrusive, especially to private parts of the body. Shoul d the YP clothes ride up, for staff to inform the YP that they are about to adjust their clothing. It is important to maintain dignity and respect when recording the incident. Not  using a derogatory tone when referring to the YP, instead recording in a way that describes the negative behaviour displayed by the YP.

Sunday, November 10, 2019

Hasty Generalisation

Hasty generalization (Anecdotal) Definition: Making assumptions about a whole group or range of cases based on a sample that is inadequate (usually because it is atypical or just too small). Stereotypes about people (â€Å"librarians are shy and smart,† â€Å"wealthy people are snobs,† etc. ) are a common example of the principle underlying hasty generalization. Example: â€Å"My roommate said her philosophy class was hard, and the one I'm in is hard, too. All philosophy classes must be hard! † Two people's experiences are, in this case, not enough on which to base a conclusion. The person committing the fallacy is misusing the following type of reasoning, which is known variously as Inductive Generalization, Generalization, and Statistical Generalization: 1. X% of all observed A's are B†s. 2. Therefore X% of all A's are Bs. The fallacy is committed when not enough A's are observed to warrant the conclusion. If enough A's are observed then the reasoning is not fallacious. Tip: Ask yourself what kind of â€Å"sample† you're using: Are you relying on the opinions or experiences of just a few people, or your own experience in just a few situations? If so, consider whether you need more evidence, or perhaps a less sweeping conclusion. (Notice that in the example, the more modest conclusion â€Å"Some philosophy classes are hard for some students† would not be a hasty generalization. ) Here are some more examples of hasty generalisations fallacies. See if you can identify the fallacy and write this in the following format â€Å"A means B. † We will then discuss what is wrong with each one: 1. Bill: â€Å"You know, those feminists all hate men. † Joe: â€Å"Really? † Bill: â€Å"Yeah. I was in my philosophy class the other day and that Rachel chick gave a presentation. † Joe: â€Å"Which Rachel? † Bill: â€Å"You know her. She's the one that runs that feminist group over at the Women's Center. She said that men are all sexist pigs. I asked her why she believed this and she said that her last few boyfriends were real sexist pigs. † Joe: â€Å"That doesn't sound like a good reason to believe that all of us are pigs. † Bill: â€Å"That was what I said. † Joe: â€Å"What did she say? † Bill: â€Å"She said that she had seen enough of men to know we are all pigs. She obviously hates all men. † Joe: â€Å"So you think all feminists are like her? † Bill: â€Å"Sure. They all hate men. † 2. â€Å"Our English teacher made us ready read some poetry last year, and it was really boring. I know now that I will never like poetry† 3. Fred the Australian, stole my wallet. Thus, all Australians are thieves. 4. I asked six of my friends what they thought of the new taxes and they agreed that they are a good idea. The new taxes are therefore generally popular. 5. All swans are white. 6. Critical thinking is not part of my university application therefore Critical Thinking has no value After the discussion write 2 or 3 examples of ad hominem/tu qouque’s of your own. India is the country with the largest population therefore Indian people love to have sex Han Eol is good at badminton therefore all Koreans are good at badminton The Virginia Tech Massacre was done by a Korean, therefore all Koreans are terrorists James Koay gets good grades therefore all Asians are smart Blondes are dumb therefore Carrie Sharp is dumb

Thursday, November 7, 2019

Free Essays on Media And Politics

It is a reasonable expectation that the media will gather the facts and report the news fairly, accurately and responsibly. The American public relies on the media for a great deal of its information. â€Å"The role of the press in American politics has become a major source of discussion and controversy in recent years† (Davis, 1). The question raised in this paper is, â€Å"Does the media present the news fairly, accurately, and completely?† The short answer is no, the long answer will be examined throughout the following essay. This essay will examine the media and its influence and effects on politics and government. â€Å"Publick Occurrences† was the first newspaper to appear in colonial America. This publication begins the history of the media and its effects on politics and government in America. The paper was struck down soon after being published and its publishers arrested. Without the protection of the First Amendment, newspapers had little chance of survival; especially if they were critical of established authority. The first successfully published American newspaper came almost fifteen years later in 1704. It was entitled the â€Å"Boston News-Letter†. Several other papers came into circulation in colonial America and just before the Revolution there were twenty-four papers in circulation. Articles in colonial newspapers were a major source of political pressure in shifting public opinion from reconciliation with England to complete political independence. Thus began the history of the media influence in America and its effects on American government and politics. The number of printed newspapers in America continued to grow and by the end of the Revolution there were approximately forty-three newspapers available to the public. They played an important role, informing the public, in the political affairs of the young nation. In 1791 the Bill of Rights was passed securing the freedom of the press. Protected by the First ... Free Essays on Media And Politics Free Essays on Media And Politics It is a reasonable expectation that the media will gather the facts and report the news fairly, accurately and responsibly. The American public relies on the media for a great deal of its information. â€Å"The role of the press in American politics has become a major source of discussion and controversy in recent years† (Davis, 1). The question raised in this paper is, â€Å"Does the media present the news fairly, accurately, and completely?† The short answer is no, the long answer will be examined throughout the following essay. This essay will examine the media and its influence and effects on politics and government. â€Å"Publick Occurrences† was the first newspaper to appear in colonial America. This publication begins the history of the media and its effects on politics and government in America. The paper was struck down soon after being published and its publishers arrested. Without the protection of the First Amendment, newspapers had little chance of survival; especially if they were critical of established authority. The first successfully published American newspaper came almost fifteen years later in 1704. It was entitled the â€Å"Boston News-Letter†. Several other papers came into circulation in colonial America and just before the Revolution there were twenty-four papers in circulation. Articles in colonial newspapers were a major source of political pressure in shifting public opinion from reconciliation with England to complete political independence. Thus began the history of the media influence in America and its effects on American government and politics. The number of printed newspapers in America continued to grow and by the end of the Revolution there were approximately forty-three newspapers available to the public. They played an important role, informing the public, in the political affairs of the young nation. In 1791 the Bill of Rights was passed securing the freedom of the press. Protected by the First ...

Tuesday, November 5, 2019

Empress Wu Zetian of Tang and Zhou

Empress Wu Zetian of Tang and Zhou Like so many other strong female leaders, from Catherine the Great to the Empress Dowager Cixi, Chinas only female emperor has been reviled in legend and history.  Yet Wu Zetian was a highly intelligent and motivated lady, with a strong interest in government affairs and literature.  In 7th century China, and for centuries afterward, these were considered inappropriate topics for a woman, so she has been painted as a murderer who poisoned or strangled most of her own family, a sexual deviant, and a ruthless usurper of the imperial throne.  Who was Wu Zetian, really? Early Life The future Empress Wu was born in Lizhou, now in Sichuan Province, on February 16, 624.  Her birth name probably was Wu Zhao, or possibly Wu Mei.  The babys father, Wu Shihuo, was a wealthy timber merchant who would become a provincial governor under the new Tang Dynasty.  Her mother, Lady Yang, was from a politically important noble family.   Wu Zhao was a curious, active girl.  Her father encouraged her to read widely, which was quite unusual at the time, so she studied politics, government, the Confucian classics, literature, poetry, and music.  When she was about 13, the girl was dispatched to the palace to become a fifth rank concubine of the Emperor Taizong of Tang.  It seems that she likely did have sexual relations with the Emperor at least once, but she was not a favorite and spent most of her time working as a secretary or lady in waiting.  She did not bear him any children. In 649, when Consort Wu was 25 years old, Emperor Taizong died.  His youngest son, 21-year-old Li Zhi, became the new Emperor Gaozong of Tang.  Consort Wu, since she had not borne the late emperor a child, was sent to Ganye temple to become a Buddhist nun.   Return From the Convent Its not clear how she accomplished the feat, but the former Consort Wu escaped from the convent and became a concubine of Emperor Gaozong.  Legend holds that Gaozong went to the Ganye Temple on the anniversary of his fathers death to make an offering, spotted the Consort Wu there, and wept at her beauty.  His wife, Empress Wang, encouraged him to make Wu his own concubine, to distract him from her rival, Consort Xiao. Whatever actually happened, Wu soon found herself back in the palace.  Although it was considered incest for a mans concubine to then pair up with his son, Emperor Gaozong took Wu into his harem around 651.  With the new emperor, she was a much higher rank, being the highest of the second rank concubines.   Emperor Gaozong was a weak ruler and suffered an illness that frequently left him dizzy.  He soon became disenchanted with both Empress Wang and Consort Xiao and began to favor Consort Wu.  She bore him two sons in 652 and 653, but he had already named another child as his heir apparent.  In 654, Consort Wu had a daughter, but the infant soon died of smothering, strangulation, or possibly natural causes.   Wu accused Empress Wang of the babys murder since she had been the last to hold the child, but many people believed that Wu herself killed the baby in order to frame the Empress.  At this remove, it is impossible to say what really happened.  In any case, the Emperor believed that Wang murdered the little girl, and by the following summer, he had the empress and also Consort Xiao deposed and imprisoned.  Consort Wu became the new empress consort in 655. Empress Consort Wu In November of 655, Empress Wu allegedly ordered the execution of her former rivals, Empress Wang and Consort Xiao, to prevent Emperor Gaozong from changing his mind and pardoning them.  A blood-thirsty later version of the story says that Wu ordered the womens hands and feet chopped off, and then had them thrown into a large wine barrel.  She reportedly said, Those two witches can get drunk down to their bones.  This ghoulish story seems likely to be a later fabrication. By 656, Emperor Gaozong replaced his former heir apparent with Empress Wus eldest son, Li Hong.  The Empress soon began to arrange for the exile or execution of government officials who had opposed her rise to power, according to traditional stories.  In 660, the sickly Emperor began to suffer from severe headaches and loss of vision, possibly from hypertension or a stroke.  Some historians have accused the Empress Wu of having him slowly poisoned, though he had never been particularly healthy. He began to delegate decisions on some government matters to her; officials were impressed with her political knowledge and the wisdom of her rulings.  By 665, Empress Wu was more or less running the government. The Emperor soon began to resent Wus increasing power. He had a chancellor draft an edict deposing her from power, but she heard what was happening and rushed to his chambers.  Gaozong lost his nerve and ripped up the document.  From that time forward, Empress Wu always sat in on imperial councils, although she sat behind a curtain at the back of Emperor Gaozongs throne. In 675, Empress Wus eldest son and the heir apparent died mysteriously.  He had been agitating to have his mother step back from her position of power, and also wanted his half-sisters by Consort Xiao to be allowed to marry.  Of course, traditional accounts state that the Empress poisoned her son to death, and replaced him with the next brother, Li Xian.  However, within five years, Li Xian fell under suspicion of assassinating his mothers favorite sorcerer, so he was deposed and sent into exile.  Li Zhe, her third son, became the new heir apparent. Empress Regent Wu On December 27, 683, the Emperor Gaozong died after a series of strokes.  Li Zhe ascended the throne as Emperor Zhongzhong.  The 28-year-old soon started to assert his independence from his mother, who was given regency over him in his fathers will despite the fact that he was well into adulthood.  After just six weeks in office (January 3 - February 26, 684), Emperor Zhongzhong was deposed by his own mother, and placed under house arrest. Empress Wu next had her fourth son enthroned on February 27, 684, as the Emperor Ruizong.  A puppet of his mother, the 22-year-old emperor did not exert any actual authority.  His mother no longer hid behind the curtain during official audiences; she was the ruler, in appearance as well as fact.  After a reign of six and a half years, in which he was virtually a prisoner within the inner palace, Emperor Ruizong abdicated in favor of his mother.  Empress Wu became Huangdi, which is usually translated in English as emperor, although it is gender-neutral in Mandarin. Emperor Wu In 690, Emperor Wu announced that she was establishing a new dynastic line, called the Zhou Dynasty.  She reportedly used spies and secret police to root out political opponents and have them exiled or killed.  However, she was also a very capable emperor and surrounded herself with well-chosen officials.  She was instrumental in making the civil service examination a key part of the Chinese imperial bureaucratic system, which allowed only the most learned and talented men to rise to high positions in government. Emperor Wu carefully observed the rites of Buddhism, Daoism, and Confucianism, and made frequent offerings to curry favor with higher powers and retain the Mandate of Heaven.  She made Buddhism the official state religion, placing it above Daoism.  She also was the first female ruler to make offerings at the sacred Buddhist mountain of Wutaishan in the year 666.   Among the ordinary people, Emperor Wu was quite popular.  Her use of the civil service examination meant that bright but poor young men had a chance to become wealthy government officials.  She also redistributed land to ensure that peasant families all had enough to feed their families, and paid high salaries to government workers in the lower ranks. In 692, Emperor Wu had her greatest military success, when her army recaptured the four garrisons of the Western Regions (Xiyu) from the Tibetan Empire.  However, a spring offensive in 696 against the Tibetans (also known as Tufan) failed miserably, and the two leading generals were demoted to commoners as a result.  A few months later, the Khitan people rose up against the Zhou, and it took nearly a year plus some hefty tribute payments as bribes to quell the unrest. The imperial succession was a constant source of unease during Emperor Wus reign.  She had appointed her son, Li Dan (the former Emperor Ruizong), as the Crown Prince.  However, some courtiers urged her to choose a nephew or cousin from the Wu clan instead, to keep the throne in her own bloodline instead of that of her late husband.  Instead, Empress Wu recalled her third son Li Zhe (the former Emperor Zhongzong) from exile, promoted him to Crown Prince, and changed his name to Wu Xian. As Emperor Wu aged, she began to rely increasingly on two handsome brothers who were allegedly also her lovers, Zhang Yizhi and Zhang Changzong.  By the year 700, when she was 75 years old, they were handling many of the affairs of state for the Emperor.  They had also been instrumental in getting Li Zhe to return and become Crown Prince in 698. In the winter of 704, the 79-year-old Emperor fell seriously ill.  She would see nobody except for the Zhang brothers, which fueled speculation that they were planning to seize the throne when she died.  Her chancellor recommended that she allow her sons to visit, but she would not.  She pulled through the illness, but the Zhang brothers were killed in a coup on February 20, 705, and their heads were hung from a bridge along with three of their other brothers.  The same day, Emperor Wu was forced to abdicate the throne to her son. The former Emperor was given the title of Empress Regnant Zetian Dasheng.  However, her dynasty was finished; Emperor Zhongzong restored the Tang Dynasty on March 3, 705.  Empress Regnant Wu died on December 16, 705, and remains to this day the only female to rule imperial China in her own name. Sources Dash, Mike.  The Demonization of Empress Wu, Smithsonian Magazine, August 10, 2012. Empress Wu Zetian: Tang Dynasty China (625 - 705 AD), Women in World History, accessed July 2014. Woo, X.L. Empress Wu the Great: Tang Dynasty China, New York: Algora Publishing, 2008.

Sunday, November 3, 2019

Precursers to WWII and Non-Germany Contributors to the Prosecution of Essay

Precursers to WWII and Non-Germany Contributors to the Prosecution of Jews - Essay Example In the aftermath of the First World War serious unrest in Europe grew, especially revanchist and irredentist nationalism. Under the Treaty of Versailles German Empire lost over 10 per cent of its pre-war territory as well as all of its overseas possessions. Furthermore limits were imposed upon the size of German army. During the period of Weimar republic domestic civil conflict took place in Germany involving both nationalists and reactionaries against moderate democrats and communists. In the aftermath of World War I concerns about anti-Semitism rose throughout Europe. By late 1928 European states were legislating immigration that sometimes prevented Jews from entering their territories. Moreover some of the newly established European states viewed ethnic Jewish immigrants as a menace to their stability. Due to the large number of Jews among bolshevist leadership some European politicians feared that Jews arriving to their countries from the east would smuggle revolutionary spirits with them. The rise to power of National Socialists in Germany in 1933 gave another powerful impetus for growing Zionist support as well as immigration to British-controlled Palestine. The long held non-Zionist and assimilationist view that Jews might live safely as minorities within European societies was seriously undermined, since Germany had been regarded before as the state in which Jews had been successfully integrated. With almost all other states closed to immigration a new wave of Jewish immigrants rushed for Palestine. Those who could not pay the due fees for immediate entry joined British waiting lists. It is worth to mention that the British did really contributed much into committing genocide against European Jewry during World War II. In 1939 they issued the o-called White Paper. That document declared that the Jewish National Home had already been established so all of their obligations under the mandate had already been fulfilled. Further migration was viewed as harm ful to Palestinian Arabs. Only 10,000 Jewish migrants were allowed to arrive to Palestine each year from 1939 to 1944. Moreover Jewish migration was supposed to require consent of the Arab majority in Palestine. Palestinians were promised independence by 1949. Furthermore the British restricted Jews’ land purchases. Being preoccupied with securing Arabian support for British war efforts against the counties of the Axis while the latter’s propaganda was targeting Muslim world. As a result Palestinian Zionists increasingly viewed Great Britain as their enemy. Having contributed much into the catastrophe of European Jewry they by no means may be blamed for killing Jews. This notwithstanding Nazi Germany was not the only power responsible for killing 6 million of them. Germany’s allies are also responsible for crimes against humanity perpetrated during World War II. As a result of 1938 Munich treaty prewar Czechoslovakian Republic was dissolved and the puppet Slovak Republic was proclaimed in March 1939. Two years later Slovakian parliament passed the so-called Jewish Code which followed notorious Nuremberg Law of Nazi Germany. Slovakian Code required that Jews were to

Friday, November 1, 2019

Sexually Transmitted Infections Essay Example | Topics and Well Written Essays - 500 words

Sexually Transmitted Infections - Essay Example Treatment is with azithromycin (single, 1g dose) or doxycycline (100mg twice daily for a week). A possible complication includes pelvic inflammatory disease (PID). This may lead to chronic pelvic pain, ectopic pregnancy and infertility. Treponema Pallidum and Neisseria Gonorrhoeae are both infections caused by a bacterium. While the infection with T. Pallidium (syphilis) manifests in the form of painless ulcers on the sites of infection, infection with N. Gonorrhoea (gonorrhea) presents in the form of painful urination, bleeding between periods and discharge from the vagina in women and discharge from the penis and painful, swollen testicles in men. Both infections may be passed from mother to baby. Syphilis may cause anomalies in babies (Syphilis, 2006). Both are diagnosed by detecting the bacterium in scrapings and samples. Syphilis may be diagnosed by detecting antibodies too. Both are treated with antibiotics. Both organisms can pass through blood to other organs. Complications of syphilis mainly involve the cardiovascular system and brain. Gonorrhoea causes PID. This in turn may lead to chronic pelvic pain, ectopic pregnancy and infertility. Both infections make the sufferer more susceptible to acquire HIV and if not treated, both may lead to death. I will explain that HSV

Wednesday, October 30, 2019

Chapter review with news article Essay Example | Topics and Well Written Essays - 750 words

Chapter review with news article - Essay Example approaches that are included a wide range of activities that are undertaken in the bid to obtain the best results from a group of people or employees of an organisation or firm. The system is a continuous concept that involves developing the employee’s goals as well as objectives, supervising the procedures concurrently with the goal that need to be achieved, analysing the outcomes and finally noting their performance. The whole of the process involves the technique of receiving and giving out feedback information. Performance management systems are usually carried so as to address various key issues; the first concept covered by performance management systems is the strategy. The strategy is important in the determination of the relationship between the various individual output in relation to the strategic objectives. Performance management systems are also responsible for the evaluation processes that are essential in the analysis of the objectives that have been obtained. Additionally, development is also a key factor that can be determined through performance management systems. Finally, diagnosis is also an aspect that can be evaluated through performance management system. Performance debates or discussion are the means by which the managers are able to come up with personalised work objectives together with their employees. This is the opportunity that the managers are able to talk about the measures that need to be undertaken in support of development of the work performance. On the contrary, the types of discussions that are held are always dependent on the various stages of the management cycle whilst the principles are always constant. It is preferable that there be at least one meeting session of discussing the performance schedule and at least two meetings for the discussion of the objectives that have been achieved. On the other hand, instances of informal meeting always create the opportunities to have discussions that are related to the

Sunday, October 27, 2019

Design and Planning of 2G, 3G and Channel Modelling of 4G

Design and Planning of 2G, 3G and Channel Modelling of 4G Chapter 1 Fundamentals of Cellular Communication In this chapter, all the background knowledge which is required for this project has been discussed. 1.1 Cell The area covered by single BTS(base transceiver station) is known as cell. 1.1.1 Shape of cell The shape of cell depends upon the coverage of the base station. The actual coverage of the base station is called footprint and is found with the help of measurements from the field. We can make our calculations easier by using the shape of circle noting that there would not be spaces between them. As, the purpose is to provide coverage to each and every subscriber. But if there are spaces between the coverage areas then the person in that specific area will not be able to get any coverage. To cover the problem of interleaving spaces, the shapes that can be used theoretically are: Square Triangle Hexagon But in selection criteria one thing must be kept in mind that every person within a cell get same coverage specially the person at the edges of the cell. So hexagon is the shape among these three choices with largest coverage area. Its coverage area and shape is closest to the circle and it helps tessellate. Omnidirectional antenna is used in the center of it, and if we want to use sectored directional antenna then it must be used at any three corners of it. 1.1.2 Area of the Cell The area of a cell with radius R is shown in figure 1.1(a), is given by: 1.2 Frequency planning While developing the cellular system, it has limited capacity due to the given bandwidth. So, in order to solve this problem Cellular Systems have to depends on an intelligent and more use of channels through out the area. Every cellular base station is alloted a group of different radio channels to be used in a cell. Base station in the adjacent cells use completely different frequencies. For this purpose antennas are used such that their power may get limited within the cell. In this way the allocated frequencies maybe reused in different cells again. The process of allocating and selecting channel groups for all the base stations in a system is known as frequency reuse or frequency planning. We use two types of antennas: Omnidirectional antenna Sectored directional antenna Omnidirectional antennas are used in the cells which are centrally excited and sectored directional antennas are used in the edge excite cells. To understand the concept of frequency reuse, let us say that S are the total no. of duplex channels available for use, k number of channels given to each cell i.e. k S=kN (1.2) Where N is no. of cells which uses the complete set of available frequencies known as cluster frequency reuse factor (1.3) Each cell is in the cluster is assigned of the available channels. The radio frequency from 3Hz to 3000GHz are separated into 12 bands, as shown in the table. Frequency spectrum has different propagation characteristics. As far as concerned to the mobile communication, we only pay attention to the UHF spectrum. 1.2.1 Cluster size(N) If we use N large (a large cluster), the ratio of the cell radius and the distance between co-channel decreases, which causes weaker co-channel interference. But if N is smaller, by keeping the cell size same then we more clusters are needed to cover an area. Hence the capacity is increased. So if we use N larger then the quality of voice is good but the capacity is less and vice versa. 1.3 Interference Interference is one of the major factor in the capacity and performance of a cellular network. The interference is due to a call in the neighbouring cell, another base station operating in the same frequency. Interference causes crosstalk and noise. There are two types of interference. Adjacent channel interference Co-channel interference 1.3.1 Adjacent channel interference Adjacent channel interference results from the signals which are side by side in frequencies to the desires signal. Adjacent channel interference is caused by wrong filtering, like incomplete filtering of not wanted modulation in frequency modulation (FM) systems, not proper tuning, or poor control of frequency. It causes problem. Adjacent channel interference can be reduced by careful channel assignment, filtering and power control within a cell. 1.3.2 Co-channel interference Co-channel cells are the cell which use the same set of frequencies. For example, in the figure 1.2 all the letter ‘A are the co-channel cell because they use the same set of frequencies. Interference due to the co-channel cells is called co-channel interference. It can be reduced by using greater value of N(cluster size). If D is the distance between the co-channel cells and R is radius of the cell, then by using greater value of N the ratio between D to R is increased hence reducing co-channel interference. The relation can b written as: 1.4 Improving coverage and capacity The number of channels assigned to a cell became insufficiently as the demand of wireless system increases. To provide more channels per coverage, some techniques are introduced which improve the coverage and capacity. These techniques are: Cell splitting Sectoring Microcell zone concept 1.4.1 Cell Splitting Cell splitting is the process of dividing a cell into smaller cells. In this process we reduce the antenna height and power of the base station. Cell splitting increases the capacity by increasing frequency reuse factor. In cell splitting Channel assignment techniques remain the same. SIR remains the same Trunking inefficiency do not get suffer. Trunking efficiency is the measure of the number of users which can be offered a particular Grade of service with the specific configuration of the channels. The grade of service (GOS) is the measure of the ability to access a trunked system during the busy hours. The radius of the new cell is reduce to half. So power is also reduced. 1.4.2 Sectoring Sectoring uses directional antennas for controlling the interferences and frequency reuse of channels. The co-channel interference is reduced and thus increasing system performance by using directional antenna. A cell is normally divided into three 120 sectors or six 60 °sectors. When sectoring is used, the channels used in a particular cell are broken into sectored groups and are used only within a particular sector. The no. of channels get divided into sectored groups, so the trunking efficiency is reduced. In sectoring SIR is improved by reducing interference and trunking efficiency is reduced. Handoff increased in sectoring. The s/I improvement allows to decrease the cluster size N in order to improve the frequency reuse, and thus the system capacity. Further improvements in s/I is achieved by downtilting the sector antennas. 1.4.3 Microcell Zone Concept Microcell Zone concept distributes the coverage of a cell and extends the cell boundry to hard to reach places. It maintains the S/I and trunking efficiency, and increases the coverage and capacity of an area. 1.5 Radio wave propagation Radio waves propagate through different channels and by different ways to reach the MS(Mobile Station). It also depends upon the speed of the wave. The propagation of radio waves depends into two types: Large scale propagation Small scale propagation(Fading) 1.5.1 Large scale propagation The model predicts that the average signal strength for all transmitter-receiver (TR) distance on a scale known as large scale propogation model. 1.5.2 Small scale propagation The models that predicts the rapid fluctuation of the received signal strength over a short distance known as small scale propagation model or fading. 1.5.3 Free Space Propagation Model The free space propagation model is used when the transmitter and receiver have line of sight (LOS) between them to predict the received signal strength. Where Pr = received power. Pt = transmitted power, Gt and Gr = transmitter and receiver antenna gain, do= T-R separation, L = system loss factor ÃŽ » = wavelength. 1.6 Propagation Mechanisms The propagation mechanisms which effect propagation are: Reflection Scattering Diffraction Reach directly (in case of Line of Sight) If there is line of sight signal reach the Mobile station directly and signal power is very strong. 1.6.1 Reflection Reflection occurs when an electromagnetic wave falls upon an object which is large as compare to the wavelength of the wave. It occurs from buildings, walls, surface of earth etc. 1.6.2 Diffraction Diffraction happens when the path between the transmitters and receivers is disturbed by a surface with sharp edges. It source is any sharp edge object. Knife edge diffraction Model is used for diffraction. 1.6.3 Scattering Scattering occurs when an electromagnetic wave falls upon an object which has small dimension as compared to the wavelength of the wave. Scattering occurs due to small objects, rough surfaces or any irregularities. Objects such as lamp posts, trees scatter the radio waves. Radar Cross Section Model is used for sectoring. 1.7 Small Scale Fading Fading is the fluctuation in the received signal strength over very short distance. Fading is due to reception of different versions of same signals. Following are the factors which influence Small-Scale Fading are: Multipath propagation: Due to absence of LOS signal follows the multipath due to reflection, diffraction, scattering. Speed of the mobile: Fading also accurs due to the movement of the mobile as the signal strength changes. Speed of the surrounding objects: Fading also occurs due to the movement of mobile, if the speed of the surrounding object is much faster then the speed of the mobile then it also induces Doppler shift. The transmission BW (bandwidth) of the signal: The received signal is distorted if the transmitted signal bandwidth is greater than the bandwidth of the channel. 1.8 GSM The first GSM network was launched in 1991. The GSM network was structured hierarchically. It consists of one administrative region, which is assigned to MSC. Each administrative region is consists of at least one location area (LA). LA is also called the visited area. An LA consists of several cell groups. Each cell group is assigned to a base station controller (BSC). Cells of one BSC may belong to different LAs. GSM distinguishes explicitly between users and identifiers. The user identity associates with a MS by mans of personal chip cards, the subscriber identity module (SIM). The SIM is portable and transferable MSs. The mobile Roaming number is a temporary location-dependent ISDN number. It is assigned by a locally responsible Visited Location Number (VLR). The GSM network can defined into four major parts. Mobile station (MS). Base station Sub-system (BSS). Network and switching Sub-system (NSS). Operation and support Sub-system (OSS). 1.8.1 Mobile station A mobile station consists of two parts. Mobile equipment and terminal. Subscriber identity module (SIM). 1.8.2 THE Terminal There are different types of terminal distinguished principally by their power and application: The fixed terminals are installed in cars. The GSM portable terminals can be used in the vehicles. The hand held terminals have experienced a biggest success depending upon their weight and volume, which are decreasing continuously. These terminals can emit power of 2 w. The evolution of technologies decreases the maxpower to 0.8 watts. 1.8.3 SIM Sim is a smart card which identifies the terminal. Using the sim card in the mobile, the user can access all the services provided by the provider. Terminal does not operate without the sim,. Personal identification number(PIN) helps protect sim. 1.9 The Base Station Subsystem The BSS connects the MS to Network Switching Sub-system. It is incharge of transmission as well as reception. The BSS is further divided into two main parts. Base transceiver station (BTS) or base station. Base Station Controller(BSC). 1.9.1 The Base Transceiver Station The BTS deals with the transceivers and antennas which are used in each cell of a network. BTS is usually in the center of cell. Size of the cell is defined by its transmitting power. Each BTS has one to sixteen transceivers which depends upon the density of users. 1.10 The Base Station Controller The BSC controllers the group of BTS and manages radio resources. The BSC is incharge of handover, frequency hoping and exchange of radio frequency power level of BTSs. 1.11 The Network and Switching Subsystem It is to manage the communication between mobile and other users, such as ISDN users, telephony users. It store the information in data bases about the subscriber and manage their mobility. 1.12 The Mobile Services Switching Center (MSC) It is the central component of the NSS. Network Switching Functions are performed by the MSC. It provides connection to more other networks. Chapter 2 Planning One of the important phase of the project in which all the detail information is gathered about different areas and their population including city boundary, market analysis and roads are the key features in these details are city profiling. This phase is divided into different tasks. 2.1 Lahore City Map First is to get the detailed map of the Lahore city, which includes all the aspects related to the project. These are following:- Area division Dense area Sub-urban area open area Boundaries of City 2.2 Boundary Marking The project â€Å"Radio Frequency Planning † is basically the frequency planning of the city, not to its belongings areas. The exact boundary of the city is marked in order to concentrate on the marked area. 2.3 Population Population of the city plays an important role in the frequency planning. It helps a lot in the estimations and assumptions. The population of the city is around 10 million. 2.4 Estimations and Assumptions This part is mainly concerned with the frequency planning. When a new telecommunication company comes in the market, it estimates it users. This estimation is done with respect to the total population of the particular area. The estimations are done to estimate the users on urban, suburban and open areas. 2.5 Area Division The area division depends upon the percentage of population in an area and type of area as it is the important factor in the site as wall as frequency planning. The Lahore city is divided into three major areas. 2.5.1 Urban Area Urban area is an area which is surrounded by more density of humans and structures in comparison to the areas surrounding it 2.5.2 Sub-Urban Area Suburban area is districts located either inside a town or citys outer premises or just outside its limits. 2.5.3 Open Area Open area is partially settled places away from the large cities. Such areas are different from more intensively settled urban and suburban areas. There are less population as compared to urban and sub-urban areas. 2.6 Site Planning 2.6.1 Map of Lahore 2.6.2 Urban Area 2.6.3 Sub-Urban Area 2.6.4 Open Area HATA Model for Urban Area = Path loss in Urban Areas in decibel (dB) = Height of base station in meters (m) = Height of mobile station Antenna in meters (m) = Frequency of Transmission in megahertz (MHz). = Distance between the base station and mobile stations in kilometers To calculate radius of a site of Urban Area For Downlink =-75 dBm(this power covers both indoor and outdoor coverage range -70 to -90 dBm ) = 35 m(Average height of antenna in city is 30 to 200 m) = 1.5 m = 13 dBm = 46 dBm (Max Power transmitted by Base Station) = Cable loss = 2.01 dBm = 945 Mhz (Downlink frequency 935 to 960 MHz) = Combine Loss= 5.5 dBm Putting in HATA equation For Uplink = -102 dbm(Min Power received by Base Station) = 29.1 dBm (Max transmitted power mobile) = 900 MHz (890 to 915 MHz) Putting in HATA equation We will be using d=0.90 Km as it covers both Uplink and Downlink. For Sub-Urban Area For Downlink For downlink of Suburban parameters are same as for Urban. For Uplink Uplink parameters are also same as Urban Areas We will be using d=2.32 Km for Suburban Area. For Open Areas Downlink For downlink parameters are same as Urban Areas For Uplink We will be using d=8 for Open Areas. We will be using 65 degree directional Antennas. Angle between 2 consecutive lobes is 120 degree. r=Radius of lobes For Full Lobe For All 3 Lobes Area of site in Urban Area of site in Suburban Area of site in Fields(Open Area) Calculations for Number of BTS 2.7 Frequency Planning One of the breakthrough in solving the problem of congestion and user capacity is the cellular concept. Cellular radio systems rely on reuse of channels throughout a coverage region. A group of radio channels are allocated to each cellular base station to be used within a area known as cell. Different channels are assingned in the adjacent cells of the base station. The same group of channels can be used by limiting the coverage area, within the boundaries of a cell to cover different levels, within tolerable limits. Frequency planning is the design process of selecting, allocating or assinging channel group stations within a system. The theoretical calculations, and fixed size of a cell is assumed, that can differentiate no of channels in a cell and from that can differentiate cluster size and will differ, the capacity of the cellular system. There is a trade between the interference abd capacity in theoretical calculation as if we reduce the cluster size more cells are needed to cover the area and more capacity. But from another perceptive small cluster size causes the ratio between cell radius, and the distance between co-channels cells to increase, leading to stronger co-channels interference. In practical calculations, a fixed no of channels are allocated to a cell. One channel per lobe 3channels are allocated to a cell. The capacity can be increased by allocating 2 channels per lobe or 6 channels per cell. But after allocating channels once, they will remain fixed for the whole cellular system and frequency planning. Now as with the fixed no of channels as per cell, the capacity will remain constant of the system and we can achieve weaker co-channel interference, by having a small cluster size(N). A cluster size of 7 is selected in this project, which is also discussed. So in later practical world , there is not a trade-off between capacity and co-channel interference. 2.7.1 Calculations The city of Lahore is divided into 120 cells. We take 3 channels per cell that gives us 1 cell = 3 channels Reuse factor = 1/N = 1/7 Which means that frequency can be reused after a cluster of 7 cells. That gives us the total of 7 x 3 =21+ 2(guard cells)=23 channels We will be using 23 channels with a reuse factor of 1/7. 2.8 Implementation in GAIA Figure 2.1 is a snapshot of GAIA planning tool showing us the structure of an urban area. This figure illustrates the urban boundary which we calculate during city profiling. It also shows the antenna system used, in this case 3 sectors with 120 degree azimuth spacing is used. Antennas are installed on the rooftop of buildings or houses due to dense population and to provide a better coverage. Figure 2.2 shows us the planning of a Sub-Urban area with sites more distance apart as population is less, compared to urban. In Sub-Urban 3 sector cell is used which is similar to the ones used in Urban Figure 2.3 shows us the coverage planning of a network in an open area. Here the sites are further apart as open area has least population. 3 sector cell is used with the antennas installed above a steel structure for better coverage. Figure 2.4 shows the sector wise cell area of the sites in the urban area of the city in GAIA, which can be differentiated with the help of different color for each sector, also it shows the coverage area of every site. We have used grid approach in this planning, it is the most widely used and most effective technique used theoretically and practically. Figure 2.5 shows the cell boundary of sites in Sub-urban area of the city. Figure 2.6 shows the cell boundary in the open area of the city. Figure 2.7 illustrates the signal strength in the urban area of the city. Because of the dense population the signal power is strong throughout to ensure high quality calls to the subscribers with minimum interference and call drop. Figure 2.8 shows the 2G signal strength in the Sub-urban areas where population density is low and so the power required is less as compared to urban areas. Figure 2.9 shows the serving signal strength in open area. The signal is the weakest as there is the least number of people in open area. CHAPTER 3 FUNDAMENTALS OF 3G 3.1 INTRODUCTION The Universal Mobile Telephony System (UMTS) or 3G as it is known is the next big thing in the world of mobile telecommunications. It provides convergence between mobile telephony broadband access and Internet Protocol (IP) backbones. This introduces very variable data rates on the air interface, as well as the independence of the radio access infrastructure and the service platform. For users this makes available a wide spectrum of circuit-switched or packet data services through the newly developed high bit rate radio technology named Wideband Code Division Multiple Access (WCDMA). The variable bit rate and variety of traffic on the air interface have presented completely new possibilities for both operators and users, but also new challenges to network planning and optimization. The success of the technology lies in optimum utilization of resources by efficient planning of the network for maximum coverage, capacity and quality of service. This part of our project aims to detail method of UMTS Radio Network (UTRAN) Planning. The new technologies and services have brought vast changes within the network planning; the planning of a 3G network is now a complex balancing act between all the variables in order to achieve the optimal coverage, capacity and Quality of Service simultaneously. 3.2 WCDMA In UMTS access scheme is DS-CDMA (Direct Sequence CDMA) which involves that a code sequence is directly used to modulate the transmitted radio signal with information which is spreaded over approximately 5 MHz bandwidth and data rate up to 2 Mbps. Every user is assigned a separate code/s depending upon the transaction, thus separation is not based on frequency or time but on the basis of codes. The major advantage of using WCDMA is that there is no plan for frequency re-use. 3.3 NODE B Node B functions as a RBS (Radio Base Station) and provides radio coverage to a geographical area, by providing physical radio link between the UE (User Equipment) and the network. Node B also refer the codes that are important to identify channels in a WCDMA system. It contains the RF transceiver, combiner, network interface and system controller, timing card, channel card and backplane. The Main Functions of Node B are: Closed loop power control CDMA Physical Channel coding Modulation /Demodulation Micro Diversity Air interface Transmission /Reception Error handling Both FDD and TDD modes are supported by Single node B and it can be co-located with a GSM BTS to reduce implementation costs. The conversion of data from the Radio interface is the main task of Node B. It measures strength and quality of the connection. The Node B participates in power control and is also responsible for the FDD softer handover. On the basis of coverage, capacity and antenna arrangement Node B can be categorizes as Omni directional and Sectorial: OTSR (Omni Transmitter Sector Receiver) STSR (Sector Transmitter Sector Receiver) 3.3.1 OTSR (Omni Transmit Sector Receive) The OTSR configuration uses a single (PA) Power Amplifier, whose output is fed to a transmit splitter. The power of the RF signal is divided by three and fed to the duplexers of the three sectors, which are connected to sectorized antennas. 3.3.2 STSR (Sectorial Transmit Sector Receive) The STSR configuration uses three (PA) Power Amplifier, whose output is fed directly to the duplexers of the three sectors, which are connected to sectorized antennas. Node B serve the cells which depend on sectoring. 3.4 ACCESS MODES 3.4.1 FDD (Frequency Division Duplex) A duplex method whereby uplink and downlink transmissions use two separated radio frequencies. In the FDD, each downlink and uplink uses the different frequency band. 3.4.2 TDD (Time Division Duplex) It is a method in which same frequency is used for the transmission of downlink and uplink by using synchronized time intervals. Time slots are divided into transmission and reception part in the physical channel. 3.4.3 Frequency Bands 3.4 CELLULAR CONCEPT The UMTS network is third generation of cellular radio network which operate on the principle of dividing the coverage area into zones or cells (node B in this case), each of which has its own set of resources or transceivers (transmitters /receivers) to provide communication channels, which can be accessed by the users of the network. A cell is created by transmitting numerous number of low power transmitters. Cell size is determined by the different power levels according to the subscriber demand and density within a specific region. Cells can be added to accommodate growth. Communication in a cellular network is full duplex, which is attained by sending and receiving messages on two different frequencies. In order to increase the frequency reuse capability to promote spectrum efficiency of a system, it is desirable to reuse the same channel set in two cells which are close to each other as possible, however this increases the probability of co-channel interference . The performance of cellular mobile radio is affected by co channel interference. Co-channel interference, when not minimized, decreases the ratio of carrier to interference powers (C/I) at the periphery of cells, causing diminished system capacity, more frequent handoffs, and dropped calls. Usually cells are represented by a hexagonal cell structure, to demonstrate the concept, however, in practice the shape of cell is determined by the local topography. 3.4.1 Types of Cell The 3G network is divided on the basis of size of area covered. Micro cell the area of intermediate coverage, e.g., middle of a city. Pico cell the area of smallest coverage, e.g., a hot spot in airport or hotel. Macro cell the area of largest coverage, e.g., an complete city. 3.5 FADING Fading is another major constraint in wireless communication. All signals regardless of the medium used, lose strength this is known as attenuation/fading. There are three types of fading: Pathloss Shadowing Rayleigh Fading 3.5.1 Pathloss Pathloss occurs as the power of the signal steadily decreases over distance from the transmitter. 3.5.2 Shadowing Shadowing or Log normal Fading is causes by the presence of building, hills or even tree foilage. 3.5.3 Rayleigh Fading Rayleigh Fading or multipath fading is a sudden decrease in signal strength as a result of interference between direct and reflected signal reaching the mobile station. 3.6 HANDOVER IN CDMA The term handover or handoff refers to the process of transferring data session or an ongoing call from channel to channel connected to the core network to another. The handover is performed due to the mobility of a user that can be served in another cell more efficiently. Handover is necessary to support mobility of users. Handover are of following types (also known as handoff): Hard Handover Soft Handover Softer Handover 3.6.1Hard.Handover In Hard handover the old radio links in the UE are dispose of before the new radio links takes place. It can be either seamless or non-seamless. In seamless hard handover, the handover is not detected by the user. A handover that needs a change of the carrier frequency is a hard handover. 3.6.2Soft.Handover Soft handover takes place when cells on the same frequency are changed. Atleast one radio link is always kept to the UTRAN in the removal and addition of the radio links. It is opperated by means of macro diversity in which many radio links are active. 3.6.3Softer.handover It is one of the important case of soft handover which describe the removal and addition of the radio links which is being belonged by the same Node B. Macro diversity can be performed in the NODE B with maximum ratio combining in softer handover. There are inter-cell and intra-cell handover. Handover 3G 2G (e.g. handover to GSM) FDD inter-frequency hard handover TDD/FDD handover (change of cell) TDD/TDD handover FDD/TDD handover (chan Design and Planning of 2G, 3G and Channel Modelling of 4G Design and Planning of 2G, 3G and Channel Modelling of 4G Chapter 1 Fundamentals of Cellular Communication In this chapter, all the background knowledge which is required for this project has been discussed. 1.1 Cell The area covered by single BTS(base transceiver station) is known as cell. 1.1.1 Shape of cell The shape of cell depends upon the coverage of the base station. The actual coverage of the base station is called footprint and is found with the help of measurements from the field. We can make our calculations easier by using the shape of circle noting that there would not be spaces between them. As, the purpose is to provide coverage to each and every subscriber. But if there are spaces between the coverage areas then the person in that specific area will not be able to get any coverage. To cover the problem of interleaving spaces, the shapes that can be used theoretically are: Square Triangle Hexagon But in selection criteria one thing must be kept in mind that every person within a cell get same coverage specially the person at the edges of the cell. So hexagon is the shape among these three choices with largest coverage area. Its coverage area and shape is closest to the circle and it helps tessellate. Omnidirectional antenna is used in the center of it, and if we want to use sectored directional antenna then it must be used at any three corners of it. 1.1.2 Area of the Cell The area of a cell with radius R is shown in figure 1.1(a), is given by: 1.2 Frequency planning While developing the cellular system, it has limited capacity due to the given bandwidth. So, in order to solve this problem Cellular Systems have to depends on an intelligent and more use of channels through out the area. Every cellular base station is alloted a group of different radio channels to be used in a cell. Base station in the adjacent cells use completely different frequencies. For this purpose antennas are used such that their power may get limited within the cell. In this way the allocated frequencies maybe reused in different cells again. The process of allocating and selecting channel groups for all the base stations in a system is known as frequency reuse or frequency planning. We use two types of antennas: Omnidirectional antenna Sectored directional antenna Omnidirectional antennas are used in the cells which are centrally excited and sectored directional antennas are used in the edge excite cells. To understand the concept of frequency reuse, let us say that S are the total no. of duplex channels available for use, k number of channels given to each cell i.e. k S=kN (1.2) Where N is no. of cells which uses the complete set of available frequencies known as cluster frequency reuse factor (1.3) Each cell is in the cluster is assigned of the available channels. The radio frequency from 3Hz to 3000GHz are separated into 12 bands, as shown in the table. Frequency spectrum has different propagation characteristics. As far as concerned to the mobile communication, we only pay attention to the UHF spectrum. 1.2.1 Cluster size(N) If we use N large (a large cluster), the ratio of the cell radius and the distance between co-channel decreases, which causes weaker co-channel interference. But if N is smaller, by keeping the cell size same then we more clusters are needed to cover an area. Hence the capacity is increased. So if we use N larger then the quality of voice is good but the capacity is less and vice versa. 1.3 Interference Interference is one of the major factor in the capacity and performance of a cellular network. The interference is due to a call in the neighbouring cell, another base station operating in the same frequency. Interference causes crosstalk and noise. There are two types of interference. Adjacent channel interference Co-channel interference 1.3.1 Adjacent channel interference Adjacent channel interference results from the signals which are side by side in frequencies to the desires signal. Adjacent channel interference is caused by wrong filtering, like incomplete filtering of not wanted modulation in frequency modulation (FM) systems, not proper tuning, or poor control of frequency. It causes problem. Adjacent channel interference can be reduced by careful channel assignment, filtering and power control within a cell. 1.3.2 Co-channel interference Co-channel cells are the cell which use the same set of frequencies. For example, in the figure 1.2 all the letter ‘A are the co-channel cell because they use the same set of frequencies. Interference due to the co-channel cells is called co-channel interference. It can be reduced by using greater value of N(cluster size). If D is the distance between the co-channel cells and R is radius of the cell, then by using greater value of N the ratio between D to R is increased hence reducing co-channel interference. The relation can b written as: 1.4 Improving coverage and capacity The number of channels assigned to a cell became insufficiently as the demand of wireless system increases. To provide more channels per coverage, some techniques are introduced which improve the coverage and capacity. These techniques are: Cell splitting Sectoring Microcell zone concept 1.4.1 Cell Splitting Cell splitting is the process of dividing a cell into smaller cells. In this process we reduce the antenna height and power of the base station. Cell splitting increases the capacity by increasing frequency reuse factor. In cell splitting Channel assignment techniques remain the same. SIR remains the same Trunking inefficiency do not get suffer. Trunking efficiency is the measure of the number of users which can be offered a particular Grade of service with the specific configuration of the channels. The grade of service (GOS) is the measure of the ability to access a trunked system during the busy hours. The radius of the new cell is reduce to half. So power is also reduced. 1.4.2 Sectoring Sectoring uses directional antennas for controlling the interferences and frequency reuse of channels. The co-channel interference is reduced and thus increasing system performance by using directional antenna. A cell is normally divided into three 120 sectors or six 60 °sectors. When sectoring is used, the channels used in a particular cell are broken into sectored groups and are used only within a particular sector. The no. of channels get divided into sectored groups, so the trunking efficiency is reduced. In sectoring SIR is improved by reducing interference and trunking efficiency is reduced. Handoff increased in sectoring. The s/I improvement allows to decrease the cluster size N in order to improve the frequency reuse, and thus the system capacity. Further improvements in s/I is achieved by downtilting the sector antennas. 1.4.3 Microcell Zone Concept Microcell Zone concept distributes the coverage of a cell and extends the cell boundry to hard to reach places. It maintains the S/I and trunking efficiency, and increases the coverage and capacity of an area. 1.5 Radio wave propagation Radio waves propagate through different channels and by different ways to reach the MS(Mobile Station). It also depends upon the speed of the wave. The propagation of radio waves depends into two types: Large scale propagation Small scale propagation(Fading) 1.5.1 Large scale propagation The model predicts that the average signal strength for all transmitter-receiver (TR) distance on a scale known as large scale propogation model. 1.5.2 Small scale propagation The models that predicts the rapid fluctuation of the received signal strength over a short distance known as small scale propagation model or fading. 1.5.3 Free Space Propagation Model The free space propagation model is used when the transmitter and receiver have line of sight (LOS) between them to predict the received signal strength. Where Pr = received power. Pt = transmitted power, Gt and Gr = transmitter and receiver antenna gain, do= T-R separation, L = system loss factor ÃŽ » = wavelength. 1.6 Propagation Mechanisms The propagation mechanisms which effect propagation are: Reflection Scattering Diffraction Reach directly (in case of Line of Sight) If there is line of sight signal reach the Mobile station directly and signal power is very strong. 1.6.1 Reflection Reflection occurs when an electromagnetic wave falls upon an object which is large as compare to the wavelength of the wave. It occurs from buildings, walls, surface of earth etc. 1.6.2 Diffraction Diffraction happens when the path between the transmitters and receivers is disturbed by a surface with sharp edges. It source is any sharp edge object. Knife edge diffraction Model is used for diffraction. 1.6.3 Scattering Scattering occurs when an electromagnetic wave falls upon an object which has small dimension as compared to the wavelength of the wave. Scattering occurs due to small objects, rough surfaces or any irregularities. Objects such as lamp posts, trees scatter the radio waves. Radar Cross Section Model is used for sectoring. 1.7 Small Scale Fading Fading is the fluctuation in the received signal strength over very short distance. Fading is due to reception of different versions of same signals. Following are the factors which influence Small-Scale Fading are: Multipath propagation: Due to absence of LOS signal follows the multipath due to reflection, diffraction, scattering. Speed of the mobile: Fading also accurs due to the movement of the mobile as the signal strength changes. Speed of the surrounding objects: Fading also occurs due to the movement of mobile, if the speed of the surrounding object is much faster then the speed of the mobile then it also induces Doppler shift. The transmission BW (bandwidth) of the signal: The received signal is distorted if the transmitted signal bandwidth is greater than the bandwidth of the channel. 1.8 GSM The first GSM network was launched in 1991. The GSM network was structured hierarchically. It consists of one administrative region, which is assigned to MSC. Each administrative region is consists of at least one location area (LA). LA is also called the visited area. An LA consists of several cell groups. Each cell group is assigned to a base station controller (BSC). Cells of one BSC may belong to different LAs. GSM distinguishes explicitly between users and identifiers. The user identity associates with a MS by mans of personal chip cards, the subscriber identity module (SIM). The SIM is portable and transferable MSs. The mobile Roaming number is a temporary location-dependent ISDN number. It is assigned by a locally responsible Visited Location Number (VLR). The GSM network can defined into four major parts. Mobile station (MS). Base station Sub-system (BSS). Network and switching Sub-system (NSS). Operation and support Sub-system (OSS). 1.8.1 Mobile station A mobile station consists of two parts. Mobile equipment and terminal. Subscriber identity module (SIM). 1.8.2 THE Terminal There are different types of terminal distinguished principally by their power and application: The fixed terminals are installed in cars. The GSM portable terminals can be used in the vehicles. The hand held terminals have experienced a biggest success depending upon their weight and volume, which are decreasing continuously. These terminals can emit power of 2 w. The evolution of technologies decreases the maxpower to 0.8 watts. 1.8.3 SIM Sim is a smart card which identifies the terminal. Using the sim card in the mobile, the user can access all the services provided by the provider. Terminal does not operate without the sim,. Personal identification number(PIN) helps protect sim. 1.9 The Base Station Subsystem The BSS connects the MS to Network Switching Sub-system. It is incharge of transmission as well as reception. The BSS is further divided into two main parts. Base transceiver station (BTS) or base station. Base Station Controller(BSC). 1.9.1 The Base Transceiver Station The BTS deals with the transceivers and antennas which are used in each cell of a network. BTS is usually in the center of cell. Size of the cell is defined by its transmitting power. Each BTS has one to sixteen transceivers which depends upon the density of users. 1.10 The Base Station Controller The BSC controllers the group of BTS and manages radio resources. The BSC is incharge of handover, frequency hoping and exchange of radio frequency power level of BTSs. 1.11 The Network and Switching Subsystem It is to manage the communication between mobile and other users, such as ISDN users, telephony users. It store the information in data bases about the subscriber and manage their mobility. 1.12 The Mobile Services Switching Center (MSC) It is the central component of the NSS. Network Switching Functions are performed by the MSC. It provides connection to more other networks. Chapter 2 Planning One of the important phase of the project in which all the detail information is gathered about different areas and their population including city boundary, market analysis and roads are the key features in these details are city profiling. This phase is divided into different tasks. 2.1 Lahore City Map First is to get the detailed map of the Lahore city, which includes all the aspects related to the project. These are following:- Area division Dense area Sub-urban area open area Boundaries of City 2.2 Boundary Marking The project â€Å"Radio Frequency Planning † is basically the frequency planning of the city, not to its belongings areas. The exact boundary of the city is marked in order to concentrate on the marked area. 2.3 Population Population of the city plays an important role in the frequency planning. It helps a lot in the estimations and assumptions. The population of the city is around 10 million. 2.4 Estimations and Assumptions This part is mainly concerned with the frequency planning. When a new telecommunication company comes in the market, it estimates it users. This estimation is done with respect to the total population of the particular area. The estimations are done to estimate the users on urban, suburban and open areas. 2.5 Area Division The area division depends upon the percentage of population in an area and type of area as it is the important factor in the site as wall as frequency planning. The Lahore city is divided into three major areas. 2.5.1 Urban Area Urban area is an area which is surrounded by more density of humans and structures in comparison to the areas surrounding it 2.5.2 Sub-Urban Area Suburban area is districts located either inside a town or citys outer premises or just outside its limits. 2.5.3 Open Area Open area is partially settled places away from the large cities. Such areas are different from more intensively settled urban and suburban areas. There are less population as compared to urban and sub-urban areas. 2.6 Site Planning 2.6.1 Map of Lahore 2.6.2 Urban Area 2.6.3 Sub-Urban Area 2.6.4 Open Area HATA Model for Urban Area = Path loss in Urban Areas in decibel (dB) = Height of base station in meters (m) = Height of mobile station Antenna in meters (m) = Frequency of Transmission in megahertz (MHz). = Distance between the base station and mobile stations in kilometers To calculate radius of a site of Urban Area For Downlink =-75 dBm(this power covers both indoor and outdoor coverage range -70 to -90 dBm ) = 35 m(Average height of antenna in city is 30 to 200 m) = 1.5 m = 13 dBm = 46 dBm (Max Power transmitted by Base Station) = Cable loss = 2.01 dBm = 945 Mhz (Downlink frequency 935 to 960 MHz) = Combine Loss= 5.5 dBm Putting in HATA equation For Uplink = -102 dbm(Min Power received by Base Station) = 29.1 dBm (Max transmitted power mobile) = 900 MHz (890 to 915 MHz) Putting in HATA equation We will be using d=0.90 Km as it covers both Uplink and Downlink. For Sub-Urban Area For Downlink For downlink of Suburban parameters are same as for Urban. For Uplink Uplink parameters are also same as Urban Areas We will be using d=2.32 Km for Suburban Area. For Open Areas Downlink For downlink parameters are same as Urban Areas For Uplink We will be using d=8 for Open Areas. We will be using 65 degree directional Antennas. Angle between 2 consecutive lobes is 120 degree. r=Radius of lobes For Full Lobe For All 3 Lobes Area of site in Urban Area of site in Suburban Area of site in Fields(Open Area) Calculations for Number of BTS 2.7 Frequency Planning One of the breakthrough in solving the problem of congestion and user capacity is the cellular concept. Cellular radio systems rely on reuse of channels throughout a coverage region. A group of radio channels are allocated to each cellular base station to be used within a area known as cell. Different channels are assingned in the adjacent cells of the base station. The same group of channels can be used by limiting the coverage area, within the boundaries of a cell to cover different levels, within tolerable limits. Frequency planning is the design process of selecting, allocating or assinging channel group stations within a system. The theoretical calculations, and fixed size of a cell is assumed, that can differentiate no of channels in a cell and from that can differentiate cluster size and will differ, the capacity of the cellular system. There is a trade between the interference abd capacity in theoretical calculation as if we reduce the cluster size more cells are needed to cover the area and more capacity. But from another perceptive small cluster size causes the ratio between cell radius, and the distance between co-channels cells to increase, leading to stronger co-channels interference. In practical calculations, a fixed no of channels are allocated to a cell. One channel per lobe 3channels are allocated to a cell. The capacity can be increased by allocating 2 channels per lobe or 6 channels per cell. But after allocating channels once, they will remain fixed for the whole cellular system and frequency planning. Now as with the fixed no of channels as per cell, the capacity will remain constant of the system and we can achieve weaker co-channel interference, by having a small cluster size(N). A cluster size of 7 is selected in this project, which is also discussed. So in later practical world , there is not a trade-off between capacity and co-channel interference. 2.7.1 Calculations The city of Lahore is divided into 120 cells. We take 3 channels per cell that gives us 1 cell = 3 channels Reuse factor = 1/N = 1/7 Which means that frequency can be reused after a cluster of 7 cells. That gives us the total of 7 x 3 =21+ 2(guard cells)=23 channels We will be using 23 channels with a reuse factor of 1/7. 2.8 Implementation in GAIA Figure 2.1 is a snapshot of GAIA planning tool showing us the structure of an urban area. This figure illustrates the urban boundary which we calculate during city profiling. It also shows the antenna system used, in this case 3 sectors with 120 degree azimuth spacing is used. Antennas are installed on the rooftop of buildings or houses due to dense population and to provide a better coverage. Figure 2.2 shows us the planning of a Sub-Urban area with sites more distance apart as population is less, compared to urban. In Sub-Urban 3 sector cell is used which is similar to the ones used in Urban Figure 2.3 shows us the coverage planning of a network in an open area. Here the sites are further apart as open area has least population. 3 sector cell is used with the antennas installed above a steel structure for better coverage. Figure 2.4 shows the sector wise cell area of the sites in the urban area of the city in GAIA, which can be differentiated with the help of different color for each sector, also it shows the coverage area of every site. We have used grid approach in this planning, it is the most widely used and most effective technique used theoretically and practically. Figure 2.5 shows the cell boundary of sites in Sub-urban area of the city. Figure 2.6 shows the cell boundary in the open area of the city. Figure 2.7 illustrates the signal strength in the urban area of the city. Because of the dense population the signal power is strong throughout to ensure high quality calls to the subscribers with minimum interference and call drop. Figure 2.8 shows the 2G signal strength in the Sub-urban areas where population density is low and so the power required is less as compared to urban areas. Figure 2.9 shows the serving signal strength in open area. The signal is the weakest as there is the least number of people in open area. CHAPTER 3 FUNDAMENTALS OF 3G 3.1 INTRODUCTION The Universal Mobile Telephony System (UMTS) or 3G as it is known is the next big thing in the world of mobile telecommunications. It provides convergence between mobile telephony broadband access and Internet Protocol (IP) backbones. This introduces very variable data rates on the air interface, as well as the independence of the radio access infrastructure and the service platform. For users this makes available a wide spectrum of circuit-switched or packet data services through the newly developed high bit rate radio technology named Wideband Code Division Multiple Access (WCDMA). The variable bit rate and variety of traffic on the air interface have presented completely new possibilities for both operators and users, but also new challenges to network planning and optimization. The success of the technology lies in optimum utilization of resources by efficient planning of the network for maximum coverage, capacity and quality of service. This part of our project aims to detail method of UMTS Radio Network (UTRAN) Planning. The new technologies and services have brought vast changes within the network planning; the planning of a 3G network is now a complex balancing act between all the variables in order to achieve the optimal coverage, capacity and Quality of Service simultaneously. 3.2 WCDMA In UMTS access scheme is DS-CDMA (Direct Sequence CDMA) which involves that a code sequence is directly used to modulate the transmitted radio signal with information which is spreaded over approximately 5 MHz bandwidth and data rate up to 2 Mbps. Every user is assigned a separate code/s depending upon the transaction, thus separation is not based on frequency or time but on the basis of codes. The major advantage of using WCDMA is that there is no plan for frequency re-use. 3.3 NODE B Node B functions as a RBS (Radio Base Station) and provides radio coverage to a geographical area, by providing physical radio link between the UE (User Equipment) and the network. Node B also refer the codes that are important to identify channels in a WCDMA system. It contains the RF transceiver, combiner, network interface and system controller, timing card, channel card and backplane. The Main Functions of Node B are: Closed loop power control CDMA Physical Channel coding Modulation /Demodulation Micro Diversity Air interface Transmission /Reception Error handling Both FDD and TDD modes are supported by Single node B and it can be co-located with a GSM BTS to reduce implementation costs. The conversion of data from the Radio interface is the main task of Node B. It measures strength and quality of the connection. The Node B participates in power control and is also responsible for the FDD softer handover. On the basis of coverage, capacity and antenna arrangement Node B can be categorizes as Omni directional and Sectorial: OTSR (Omni Transmitter Sector Receiver) STSR (Sector Transmitter Sector Receiver) 3.3.1 OTSR (Omni Transmit Sector Receive) The OTSR configuration uses a single (PA) Power Amplifier, whose output is fed to a transmit splitter. The power of the RF signal is divided by three and fed to the duplexers of the three sectors, which are connected to sectorized antennas. 3.3.2 STSR (Sectorial Transmit Sector Receive) The STSR configuration uses three (PA) Power Amplifier, whose output is fed directly to the duplexers of the three sectors, which are connected to sectorized antennas. Node B serve the cells which depend on sectoring. 3.4 ACCESS MODES 3.4.1 FDD (Frequency Division Duplex) A duplex method whereby uplink and downlink transmissions use two separated radio frequencies. In the FDD, each downlink and uplink uses the different frequency band. 3.4.2 TDD (Time Division Duplex) It is a method in which same frequency is used for the transmission of downlink and uplink by using synchronized time intervals. Time slots are divided into transmission and reception part in the physical channel. 3.4.3 Frequency Bands 3.4 CELLULAR CONCEPT The UMTS network is third generation of cellular radio network which operate on the principle of dividing the coverage area into zones or cells (node B in this case), each of which has its own set of resources or transceivers (transmitters /receivers) to provide communication channels, which can be accessed by the users of the network. A cell is created by transmitting numerous number of low power transmitters. Cell size is determined by the different power levels according to the subscriber demand and density within a specific region. Cells can be added to accommodate growth. Communication in a cellular network is full duplex, which is attained by sending and receiving messages on two different frequencies. In order to increase the frequency reuse capability to promote spectrum efficiency of a system, it is desirable to reuse the same channel set in two cells which are close to each other as possible, however this increases the probability of co-channel interference . The performance of cellular mobile radio is affected by co channel interference. Co-channel interference, when not minimized, decreases the ratio of carrier to interference powers (C/I) at the periphery of cells, causing diminished system capacity, more frequent handoffs, and dropped calls. Usually cells are represented by a hexagonal cell structure, to demonstrate the concept, however, in practice the shape of cell is determined by the local topography. 3.4.1 Types of Cell The 3G network is divided on the basis of size of area covered. Micro cell the area of intermediate coverage, e.g., middle of a city. Pico cell the area of smallest coverage, e.g., a hot spot in airport or hotel. Macro cell the area of largest coverage, e.g., an complete city. 3.5 FADING Fading is another major constraint in wireless communication. All signals regardless of the medium used, lose strength this is known as attenuation/fading. There are three types of fading: Pathloss Shadowing Rayleigh Fading 3.5.1 Pathloss Pathloss occurs as the power of the signal steadily decreases over distance from the transmitter. 3.5.2 Shadowing Shadowing or Log normal Fading is causes by the presence of building, hills or even tree foilage. 3.5.3 Rayleigh Fading Rayleigh Fading or multipath fading is a sudden decrease in signal strength as a result of interference between direct and reflected signal reaching the mobile station. 3.6 HANDOVER IN CDMA The term handover or handoff refers to the process of transferring data session or an ongoing call from channel to channel connected to the core network to another. The handover is performed due to the mobility of a user that can be served in another cell more efficiently. Handover is necessary to support mobility of users. Handover are of following types (also known as handoff): Hard Handover Soft Handover Softer Handover 3.6.1Hard.Handover In Hard handover the old radio links in the UE are dispose of before the new radio links takes place. It can be either seamless or non-seamless. In seamless hard handover, the handover is not detected by the user. A handover that needs a change of the carrier frequency is a hard handover. 3.6.2Soft.Handover Soft handover takes place when cells on the same frequency are changed. Atleast one radio link is always kept to the UTRAN in the removal and addition of the radio links. It is opperated by means of macro diversity in which many radio links are active. 3.6.3Softer.handover It is one of the important case of soft handover which describe the removal and addition of the radio links which is being belonged by the same Node B. Macro diversity can be performed in the NODE B with maximum ratio combining in softer handover. There are inter-cell and intra-cell handover. Handover 3G 2G (e.g. handover to GSM) FDD inter-frequency hard handover TDD/FDD handover (change of cell) TDD/TDD handover FDD/TDD handover (chan