Friday, May 31, 2019

Teaching Writing :: Reflective Writing Education Feminism Essays

Teaching Writing As I look back over the product line of this semester, the image that I get is one of the murky variety. It is difficult to identify although I support felt its presence for almost four months now. There take been many moments when I fool waited for the insights to come, for the reading and the composition to mesh. And instead, I felt wish well I was lost in a fog that was sometimes dense, former(a) times only misty. The worst part is that the fog is pervading a familiar place and once it clears I will be disappointed with myself because I should have known exactly where I was. What troubles me is why I do not know where I stand, after a semester of studying concepts I believe in. My hopes for myself in this class have not been met (for which I hold myself entirely responsible). I spent the last few months searching for answers in the material, in my dialogues with my classmates and coworkers, in my writing and through my thinking. As a feminist and a critical pedagogue I thought I would surely come to some grand conclusions, with entirely these theories as my bedfellows. But instead I feel like I have abandoned and failed my agenda to better learn the theory and grow because of it. This is not to say that I have not learned anything, or not grown from the experience of this class. I know and feel that I have been changed I am just not certain how.I look back at my reaction papers and I only see doubts. Questioning the sight whose projects I admire, whose goals are not so different than mine, who know so much more than I do. And yet each paper that I have written criticizes and tries to poke holes. This sense of being lost, of not knowing is my own fault. I did not allow myself to engage with the writers. It has only been at the end, by doing my inquiry paper and reading the articles about race that I finally felt like there was a place for me this course. It has been an alienating experience to see my peers easy with our coursework while I felt like a grumpy old dwarf, shouting What about me? And then, a couple weeks ago, when we started reading Race, Rhetoric, and Composition, I felt like the fog was beginning to shift.

Thursday, May 30, 2019

The True Story of Sweeny Todd Essays -- Biography

The accredited Story of Sweeney ToddSweeney Todd was born on October 16, 1756. (Knowledge of capital of the United Kingdom. 2004) The where a bouts of where he was originally born were more or lesswhere in the fetid easterly End of London but some say at 85 Brick Lane in Londons East End. Todd was the son of Elizabeth and Samuel Todd. Elizabeth Todds vex was a silk key fruit and Todds father Samuel was a silk weaver. His parents were in a business together but came with very little compensation.When Todd was 12 years over-the-hill both of his parents died in a tragic accident that no one is quite sure of. Todd was then sent to an orphanage. in that respect he became an apprentice to a cutler named John Crook. (Knowledge of London. 2004) In two years time when Todd was only 14 years old he was arrested for stealing a pocket watch. He went to Newgate prison for five years. There in prison he met an old barber named Elmer Plummer. Plummer taught Sweeney how to cut hair, shave, a nd pick pocket costumers. (Knowledge of London. 2004) While Sweeney was waiting to be set let off he apprehension with these new obtained skills he could make a little money from his fellow inmates. Sweeney and Plummer teamed up with one another and began shaving and cutting some of the prisoners hair who could afford it. (Knowledge of London. 2004)When Todd was released from prison he found work as a flying barber. (Richard Jones.Feb 21, 2004) He found this bloodline unfulfilling and wanted to be his own boss so on an afternoon stroll he settled on this premises next to the St. Dunstans perform and a bakery. Sweeney Todd resolved to buy the premises as his business and his home. He opened his Barber Shop at 186 Fleet Street in 1775. Todd met the baker, Mrs. Lovett, who was mightily next limen to him and they became lover... ...y Sir Richard Blunt said sea-fairing men were disappearing from Todds shop. In the end Todd was accused of one murder that of Francis Thornhill. A pa wnbrokers shop clerk recognized Mr. Thornhills pearls when Todd was trying to pawn them. Todd and Mrs. Lovett were arrested in 1801. (The Independent. Jan. 3, 2006) After their arrests there was an investigation done on the basement and there the police found the piled up bones in the Weston family vault. Todd killed an estimate of 160 people in a 17 year time period. Todd was found guilty in ten proceeding after the board heard about the amount of bones found in the Weston family vault. Mrs. Lovett committed suicide while in prison. (The Independent. Jan. 3, 2006) Sweeney Todd was hanged at age 45 on January 25, 1802. His respite was at the Newgate Prison in front of the largest recorded crowd of over a thousand people. The True Story of Sweeny Todd Essays -- BiographyThe True Story of Sweeney ToddSweeney Todd was born on October 16, 1756. (Knowledge of London. 2004) The where a bouts of where he was originally born were somewhere in the fetid East End of London b ut some say at 85 Brick Lane in Londons East End. Todd was the son of Elizabeth and Samuel Todd. Elizabeth Todds mother was a silk winder and Todds father Samuel was a silk weaver. His parents were in a business together but came with very little compensation.When Todd was 12 years old both of his parents died in a tragic accident that no one is quite sure of. Todd was then sent to an orphanage. There he became an apprentice to a cutler named John Crook. (Knowledge of London. 2004) In two years time when Todd was only 14 years old he was arrested for stealing a pocket watch. He went to Newgate Prison for five years. There in prison he met an old barber named Elmer Plummer. Plummer taught Sweeney how to cut hair, shave, and pick pocket costumers. (Knowledge of London. 2004) While Sweeney was waiting to be set free he thought with these new obtained skills he could make a little money from his fellow inmates. Sweeney and Plummer teamed up with one another and began shaving and cutting some of the prisoners hair who could afford it. (Knowledge of London. 2004)When Todd was released from prison he found work as a flying barber. (Richard Jones.Feb 21, 2004) He found this job unfulfilling and wanted to be his own boss so on an afternoon stroll he settled on this premises next to the St. Dunstans Church and a bakery. Sweeney Todd decided to buy the premises as his business and his home. He opened his Barber Shop at 186 Fleet Street in 1775. Todd met the baker, Mrs. Lovett, who was right next door to him and they became lover... ...y Sir Richard Blunt said sea-fairing men were disappearing from Todds shop. In the end Todd was accused of one murder that of Francis Thornhill. A pawnbrokers clerk recognized Mr. Thornhills pearls when Todd was trying to pawn them. Todd and Mrs. Lovett were arrested in 1801. (The Independent. Jan. 3, 2006) After their arrests there was an investigation done on the basement and there the police found the piled up bones in the Weston family vault. Todd killed an estimate of 160 people in a 17 year time period. Todd was found guilty in ten minutes after the jury heard about the amount of bones found in the Weston family vault. Mrs. Lovett committed suicide while in prison. (The Independent. Jan. 3, 2006) Sweeney Todd was hanged at age 45 on January 25, 1802. His hanging was at the Newgate Prison in front of the largest recorded crowd of over a thousand people.

Wednesday, May 29, 2019

Macbeth: Shakespeare’s Two Key Motifs Essay example -- weather, blood,

The play Macbeth, by Shakespeargon, contains many motifs. Two very powerful motifs that Shakespe ar illustrates in this play are blood, and weather. channel is important because it shows that this play is violent, and the blood physically shows that these characters in the play are warriors. Weather plays an important role because it usually foreshadows events that are about to sate place. For example, a storm usually foreshadows terrible things, like death and destruction. A major motif in Macbeth is blood. business is talked about everywhere in Macbeth. Blood is found when Macbeth kills his own relative, world-beater Duncan, in order to gain power and to become the king himself. After Macbeth carries out Duncans murder, he is crowned King of Scotland. As Macbeth and Lady Macbeths murderous journey begins, the death toll rises and with each death, the amount of blood on Macbeth metaphorically and literally increases. Guilt starts to sustain Macbeth. W hen King Duncan is killed, Macbeth is convinced that all great Neptunes oceans would not wash the blood clean from his hands. Guilt is eating away at Macbeth, and his desire and intake for power is what leads to him to carry out many more murders. Blood is found several times in the text may thick my blood, the sleepy-eyed grooms with blood, Will all great Neptunes ocean wash this blood clean from my hand?, Would to the bleeding and the grim alarm excite the mortified man. Blood appears in Macbeth in two ways It appears in the text, and it also appears literally, due to the many deaths in the play. In a lot of ways, blood symbolizes a soulfulnesss bravery. For example, In Act I, after the battle, Duncan asks the wounded sergeant, Wh... ...re. Another Major motif in the play is weather. Sunshine and clear skies are not discussed at all in the play. Shakespeare wanted to create a dark and gloomy background. Most of the descriptions about the weather indicate sto rm-like conditions such as rain, thunder, and lightning. The three witches are also associated with the weather motif. Right before the first scene of the play, it is stated in the text Thunder and lightning. Enter three witches. Thunder and lightning usually represents an abnormal presence. Shakespeare wrote this play with intention on giving the reader this lesson. Too much greed can consume you and make you do something that you will possibly regret. plant life Citedhttp//intensivemacbeth.wikispaces.com/The+Motif+of+Bloodhttp//www.studymode.com/essays/Blood-Motif-In-Macbeth-64386.htmlhttp//britlit4.wikispaces.com/Macbeth+Motif-+Blood

Rene Descartes :: essays research papers

Rene DescartesRene Descartes was born March 31, 1596 in La Haye, Touraine. Descartes was theson of a minor nobleman and belonged to a family that had produced a number oflearned men. At the age of eight, he was enrolled in the Jesuit school of LaFleche in Anjou, where he remained for eight years. Besides the usual classicalstudies, he received affirmation in math and in Scholastic philosophy. RomanCatholicism exerted a strong influence on Descartes throughout his life. Upongraduation from school, he studied equity at the University of Poitiers, graduatingin 1616. He never practiced law, however--in 1618 he entered the service ofPrince Maurice of Nassau at Breda, Netherlands, with the intention of followinga military career. In succeed years Descartes served in other armies, buthis attention had already been attracted to the problems of mathematics andphilosophy to which he was to devote the rest of his life. He made a travelto Italy in 1623-24, and spent the years from 1624 to 16 28 in France. While inFrance, he devoted himself to the study of philosophy and also experimented inoptics. In 1628, having sold his properties in France, he moved to theNetherlands, where he spent most of the rest of his life. He lived for varyingperiods in a number of different cities in the Netherlands, including Amsterdam,Deventer, Utrecht, and Leiden.It was probably during the freshman years of his residence in theNetherlands that Descartes wrote his first major work, Essais philosophiques,published in 1637. The work contained four parts an essay on geometry,another on optics, a third on meteors, and Discours de la methode (Discourse onMethod), which described his philosophical theories. This was followed by otherphilosophical works, among them Meditationes de Prima Philosophia (Meditationson First Philosophy, 1641) and Principia Philosophiae (The Principles ofPhilosophy, 1644). The latter volume was devote to Princess Elizabeth Stuartof Bohemia, who lived in the Netherlands and with whom Descartes had formed adeep friendship. In 1649, Descartes was invited to the court of Queen Christinaof Sweden in Stockholm to give the queen instruction in philosophy. The rigorsof the northern pass brought on the pneumonia that caused his death onFebruary 1, 1650.The most notable contribution that Descartes made to mathematics was thesystematization of analytic geometry. He was the first mathematician to attemptto classify curves consort to the types of equations that produce them. Healso made contributions to the theory of equations and succeeded in proving theimpossibility of trisecting the angle and doubling the cube.

Tuesday, May 28, 2019

Weimar Experience And Maintaining Democracy :: essays research papers

Human nature, in individuals, as well as within united bodies of people, is to correct, pick out, and grow from integritys mistakes. If one cannot learn from ones own mistakes, it is necessary then to learn from the mistakes of others. When dealing with the political sciences, especially in international history, it is possible to analyze what has succeeded, and what has failed. The united States, being a fairly young country, has the advantage of a relatively short past, unmarked by national chaos as a go out of poor governing. The United States, by learning from past history of other nations, chose a system of stability and balance, called democracy, which has caused the United States to flourish over time. Democracy has successfully reined in this country for all of its 200-year history. Democracy, for our nation, has proved to be a keystone in every aspect of our success, our growth, and our strength as a country. It is crucial however, that we learn from the past, to reali ze that things can and do change. In the 1930s Germany, struck by inflation, a collapse in the economy, and national outrage, declined from a democratic republic, to a totalistic state. The fall of the Weimar republic, and the rise of the NSDAP, which eventually led to WWII, shows how the drastic effects of economic problems, extreme nationalism, and drastic changes in cultural identity, can lead to a totalistic state, and a complete political turnover within a nation. It is important to learn from the Weimar experience in order to help maintain the health, stability, and power of our own democracy today in the United States. At the turn of the 20th century, Germany experienced an industrial revolution that caused them to almost capitalize in trade and fruit as a country. By August of 1914 WWI had began and Germany, both economically, and socially was hit hard.By the closing months of 1918, Germany, once strong and peeking in industry and economy finances, returned from the fight battered and beaten. They were completely finished off by the 1919 Treaty of Versailles. The treaty outright blamed the war on Germany, and charged them with the damage fines of the entire war. much(prenominal) a huge amount of money would surely strike down and weaken an already tattered Germany, which was precisely the intention at hand. Germany was faced with paying for all damages caused by the war.

Weimar Experience And Maintaining Democracy :: essays research papers

Human nature, in individuals, as well as at heart united bodies of people, is to correct, learn, and grow from ones mistakes. If one provokenot learn from ones own mistakes, it is necessary then to learn from the mistakes of others. When dealing with the political sciences, especially in international history, it is possible to analyze what has succeeded, and what has failed. The United States, being a fairly young country, has the advantage of a relatively short past, unmarked by national sanatorium as a result of poor governing. The United States, by learning from past history of other nations, chose a system of stability and balance, called democracy, which has caused the United States to spread out over time. Democracy has successfully reined in this country for all of its 200-year history. Democracy, for our nation, has proved to be a keystone in every aspect of our success, our growth, and our strength as a country. It is crucial however, that we learn from the past, to r ealize that things can and do change. In the 1930s Germany, struck by inflation, a collapse in the economy, and national outrage, declined from a democratic republic, to a totalitarian state. The fall of the Weimar republic, and the rise of the NSDAP, which eventually led to WWII, shows how the drastic effects of economic problems, extreme nationalism, and drastic changes in cultural identity, can lead to a totalitarian state, and a complete political turnover within a nation. It is important to learn from the Weimar experience in order to help oneself maintain the health, stability, and power of our own democracy today in the United States. At the turn of the 20th century, Germany experienced an industrial revolution that caused them to almost capitalize in trade and production as a country. By August of 1914 WWI had began and Germany, both economically, and socially was hit hard.By the closing months of 1918, Germany, once strong and peeking in industry and economy finances, retu rned from the war battered and beaten. They were completely finished off by the 1919 Treaty of Versailles. The treaty outright blamed the war on Germany, and aerated them with the damage fines of the entire war. Such a huge amount of money would surely strike down and weaken an already tattered Germany, which was precisely the intent at hand. Germany was faced with paying for all damages caused by the war.

Monday, May 27, 2019

Encourage Foreigners to Invest in Philippine Real Estate Market

Topic Encourage Foreigners to Invest in Filipino Real Estate Market Real estate business enterprise is a very stipendiary and capital intensive venture. It is not for just any one, but solitary(prenominal) for those who have financial capacity and allowingness to buy real properties. Real property may come in the form of buy and sell, or merely renting and make money out of it. Kn avow as one of the most spirited real estate markets in Asia, the Philippines growing economy consistently sustained its growth despite the global sparing recession. The countrys real estate industry has been receiving validating remarks from various analysts across the globe.The reflection of its success, mainly rooted to the countrys excellent financing services, good capitalization and pro-business climate drives every real estate investors to provide the outgo real estate solutions for needs of the market. The real estate industry has been increasing year on year and this is characterized by t he dynamic growth and upsurge of condo development across Metro Manila. This growth is fuelled by the increasing overseas Filipino workers remittances as well as new investors who take improvement of the benefits of the small-scale interest rates in the housing market.The influx of condominium development across Metro Manila also validates the soaring demand for residential options, which is amongst renting an a come outment and takeing a home in the city. Various innovative unit designs and concepts are being offered in the market to suit current trends in housing and lifestyle preferences of todays market. This increasing realtors confidence to Philippine real estate industry is brought by the improving economy, implementation of good institution among private and public sectors, and the reform inspired government of the new administration.Presently, the real estate market is banking on two major components (1) remittances of overseas Filipino workers and (2) regular growth demand by the expanding business process outsourcing industry in the country. Aside from having an investing that never depreciate, investing in real estate in the Philippines would give noncitizens additional investment portfolio in a much lower cost compared if they invest it in their own land. The cost of living in the Philippines is comparatively lower compared to other nations, and at that placefore, foreigners can have more value for their money, which in turn increases their investment opportunities.That would be considered hitting two birds with one stone. The sparing outlook on the Philippine real estate market is seen to be growing, and it will continue to grow in the next five to ten geezerhood brought by the ensuing business process outsourcing industry. BPO is becoming one of the primary sources of income of the young working population in the country today. Owning/Investing Options for Foreigners Any foreigner can lease, buy and own with 100% ownership rights on c ondominium units only.As far as the law is concerned, every piece of land of the Philippines is for the Filipino only. For investment purposes, foreigners may also lease or buy building offices for business purposes, like those being rented out to others. In as much as there are limitations being followed by foreigners when investing the Philippine real estate market, there are also appearances on how they can easily own one. (1) Lease a property foreigners can lease a property from short to long-term as long as both parties to contract reciprocally agree. Leased properties may be subleased to other tenants.This form of business operation may be considered as legal operation and foreigners can take advantage of. (2) Be married to a Philippine citizen once a foreigner is married to a Philippine citizen, the rights to own a land becomes a conjugal. It may seem to be the fastest and least cost among other options. (3) Inherit the property from a deceased Philippine spouse once marr ied, but all at once the Philippine citizen spouse died. In this situation, the foreigner spouse together with the other surviving heirs will be the immediate heir and owner of the property left field behind. 4) Purchase land as Balikbayan some Filipinos who have stayed abroad and eventually availed of another citizenship, may still buy and own properties. It is also possible to own property if the parents or relatives wanted to transfer their property ownership to a Balikbayan. (5) Buy condominium units foreigners can buy condominium units, in the same way as a Philippine citizen acquires condominium unit. Some foreigners can also do trading of condominium units. They can do buy and sell business operation, wherein they will buy a barely finished unit, dress it up and fill with furnitures, and sell at a premium or lease it out. 6) mental strain a corporation this option opens the opportunity for foreigners to invest in land, but, it is a must, that the corporation be composed of at least 60% Filipino and only 40% for foreigners. The majority stakeholder should still be Filipinos. After enumerating the ways on how foreigners can invest in the Philippine real estate market, it is imperative for them to survive the basic information and obligations when investing in real property. First thing is the preparation for tax obligations. Non-resident foreigners who acquire property may be assessed with 5% 32% of taxes, depending on the nature of the transaction.Another consideration is the documentary requirements necessary for the processing of transferring of ownership to a foreign national. There are documents that need to be authenticated by the Philippine Consulate from their country. Overview of the Real Estate Investment Trust (REIT) The efforts of passing the REIT Law will open another medium for foreigners opportunity to invest in the Philippine real estate market. REIT is defined as a corporation engaged in business whose income will be generated from owning or managing real estate.Through this REIT, the country will be given a better and bigger opportunity to join the global market of real estate investment markets, and foreigners can take their part in. Since it is not yet passed as law, the regulations, rules and limitations are still unknown. Another positive contributor to success of the real estate sector is the proliferation of establishment of special economic zones across the country. The government provides incentives to companies who patronize economic zones, and this attracts more foreign corporate clients and brings their business process outsourcing facilities here.

Sunday, May 26, 2019

All Quiet on the Western Front: Corruption of Power theme Essay

Power. The word itself instigates a conundrum of fear and attraction. The attraction for it, the attraction for to a greater extent(prenominal), and the attraction for seeking the strong highest boundary of it. Those who thirst for it see visions of wealth, vast expansions territory, and above all, the ability to do some(prenominal) one and only(a) wants whenever he wants. And those who thirst for it will seek it through whatever means necessary, whether it be a fistfight or a war. Necessity is the basic derivation for all hostility and aggression therefore, ability, and its corruption, is the source of all war. such corruption is exemplified in the World War I novel, All Quiet On the Western Front, by Erich Remarque, through the eyes of the platoon leader, of the military officials, and of the highest direct of power in Germany at the time, the Kaiser.The bottommost aim of power represented in All Quiet On the Western Front is the platoon leader, who is given a run of soldi ers to bully around under his abusive authority. The authority figure in the novel is Corporal Himmelstoss, who is to train the newly enlisted soldiers in the ways of war. He is exposit as a semblance of Louis Napoleon in the novel a small undersized fellow with a foxy, waxed moustache (Remarque 23). Immediately the comment of Himmelstoss triggers an image of a short, power-hungry figure, the figure that suffers from what many refer to as small-mans syndrome. His image is further emphasized in the statement He had a supererogatory dislike of Kropp, Tjaden, Westhus, and me, because he perceived a quiet defiance (Remarque 23). Himmelstosss dislike for these soldiers is not directly related to the fact that he supposedly sensed defiance, but more so to his will to push the soldiers around.He focuses his efforts on Tjaden, the skinny locksmithwho is and always will be as thin as a rake (Remarque 2-3). To make up for his lack of size and strength, Himmelstoss attacks the thinnest, sol dier of the pack, who he assumes to be the weakest. However, when Himmelstoss loses his position of authority, he is not so brave. In the Front, during invasion, capital of Minnesota Bamer finds Himmelstoss in the dug-out pretending to be wounded. His face looks sullen. He is in a panicHe does not stir, his lips quiver, his moustache twitches (Remarque 131). Himmelstoss is not a right man on his own, but under the spell of a powerful position, he is corrupted, and abuses it todisguise his own weaknesses, allowing him to gain some form of power.The next level in the military edifice of power lies in the competitive military officials. With the increased level of power comes an increased level of corruptionand an increased level of consequence. Himmelstoss may have instigated hostility, even hatred, from his platoon, but the corruption of a higher military official may result in deaths. In a expansive effort to continue the attack on France, mass drafts occur, and the officials imme diately send the untrained recruits to the front line. capital of Minnesota Bamer states that the recruits are helpless in this gentle fighting area, they fall like flies. Modern trench-warfare demands knowledge and experience (Remarque 129). The officials, in order to look good by fighting the war long and persistently, shiver these recruits into battle, where they fall like flies. The officials carry out this inhumanity again and again, but it is not only for the sake of looking good, but for the appetency of getting promoted, for the desire of gaining more power.The head of power in Germany, and therefore the one able to command all those below, is the Kaiser, Wilhelm II. His position is so incredibly grand and authoritative, that he is seen close to as a form of deity. When Paul Bamer sees the Kaiser in person, he is really rather disappointed judging from his pictures I imagined him to be bigger and more powerfully built, and above all to have a thundering voice (Remarque 2 02). This false impression of his emphasizes the disguise of power. Under his disguise, the Kaiser is viewed as giant, mighty warrior enthroned with gold and silver. In reality, he is a man unlike any other man in power, greedy and vicious. A man so powerful, Tjaden believes he has everything he cease want already (Remarque 205). If he has everything he can want, why does he persist in the war? There is no limit to his demand for power, and so he pushes his officials further into battle, as they push their soldiers further into bloodshed.The war Wilhelm II creates is not only devastating physically, but instigates what is known as the lost generation. Paul Bamer describes his experience, being lost because of the war. He will never be able to be indifferent and hopeless again. He was a soldier, and now he is nothing but an agony for himself (Remarque 185). His well-off life wasthrown away in the war and gave way to an indifferent automata, and after his leave, he is emotionally in between war and life, in No Mans Land. An entire generation of soldiers, of human beings, of lives, is destroyed through emotion and severe disturbance. And for what? For Kaiser Wilhelm II to seek that highest boundary of power.Power is a recurrent theme in All Quiet On the Western Front, in three different levels the mindless soldier, the aspiring military official, and the boundless Kaiser. Each one desperately seeks power in an effort to make themselves appear stronger. The quest for this is usually a corrupted one, and corruption creates consequence. The more power one acquires, the more devastating the consequence. When, if at all, will the quest for power end? The corruption is inevitable.

Saturday, May 25, 2019

Heat of Formation of Magnesium Oxide

ObjetiveTo finalize the light up formation of MgO ( milligram Oxide) using Hesss Law, which states the heat within a chemical reaction is independent of the pathway amidst the initial and final states.IntroductionChemical reactions require heat expertness to complete, called an endothermic reaction, or produce heat energy, and thus called an exothermic reaction. The heat energy produced by such(prenominal) reactions can be measured using a calorimeter, a piece of equipment that can isolate the reaction in an insulated container. Using the calorimeter one can indeed determine the rise and fall in temperature of the reaction. When this temperature change is multiplied by the heat ability, the amount of heat needed to raise the temperature of a body by one degree, we can measure the change in converting our initial components (reactants) to their respective products.In this experiment we will measure the amount of heat released from 3 reactions (HA HB HC) and picture the sum of a ll 3 reactions to determine HT, which will give us the heat formation of MgO. If Hesss law holds true and barring minimum experimental error, the pathway we use to determine HT should have no bearing on our calculation matching the accepted calculation of MgO.MethodsAs per lab manual we use a calibrated calorimeter (using a rounded end thermometer so as to not puncture a hole in the calorimeter) to determine the heats of reaction for Magnesium (Mg) with Hydrochloric Acid (HCl) and Hydrochloric Acid with Magnesium Oxide (MgO). Then using mathematical formulas we were able to calculate the heat formation of MgO, which is measured in kJ/Mol. Since both reactions are in dilute water supply solutions ofHCl it was necessary to know the heat capacity of water, but because some heat would be transferred to the calorimeter whose heat capacity was unknown, we had to record a subject area factor (x) based upon the specific heat of water using the equation m(h2o)+XCwater+water=-1(m( nut wate r)Cwatertice water).We then recorded the mass (m) of live temperature water and ice water each in a respective cup and then poured the ice water into the room temperature water and recorded the temperature change. By knowing (x) we could then calculate the heat of reaction for Mg with HCl (HA kJ/mol) and for HCl with MgO (HB kJ/mol) using the equation q=m(HCl+X)C T where m is the mass of the reactant used with Mg + X, C is the heat capacity of water (4.184 J/gC), and T is the total temperature change in each reaction. Using the results of these calculations and Hesss law we can then determine the heat formation for MgO.DataAll mass readings are given in units of grams (g), and all temperature readings are given in degrees Celsius (C).Part AMass of the Calorimeter + RoomTemp Water (g)48.08Mass of room temp water (g)46.29Mass of Cal + room temp water + icewater (g)115.40Mass of ice water (g)67.32Temp of room temp water (C)42.4Temp of the ice water (C)0.1Final temp. of room temp water (C)17.3Change in temp of ice water (C)17.2Change of temp of room temp water (C)-25.1Mass of the calorimeter (g)1.79Part 2AMass of Calorimeter (g)1.79Mass of Cal + HCl (g)103.55Mass of HCL (g)101.76Mass of Mg (g)0.5Temperature of HCl (C)20.3Final temperature of HCl + Mg (C)42.0Change in Temperature (C)21.7Part BMass of Calorimeter (g)1.79Mass of Cal + HCl (g)101.76Mass of HCl (g)99.88Mass of MgO (g)0.8Temperature of HCl (C)20.3Final temperature of HCl + MgO (C)25.8Change in Temperature (C)5.50Results and DiscussionTo calculate X using the equation m(h2o)+XCwater+water=-1(m(ice water)Cwatertice water) the variable star X must be isolated and doing so we were than able to calculate the correction factorBased on the calculations of the calorimeter correction factor, X was determined to be 0.158 g. Then using the equation q=m(HCl+X)C *T, where q is equal to the amount of energy given off, and than calculating the value in -kJ/Mol (because these are exothermic reactions) we were able to determine HA and HB.qA=m(HCl+X)C xTqA=(101.76 g + 0.158 g) x 4.184 J/gC x 21.7CqA= 9250 J = 9.250 kJ 9.253602176qB= m(HCl+X)C xTqB=(101.76 g + 0.158 g) x 4.184 J/gC x 5.50CqB=2350 J = 2.350 kJTo then calculate the heat formation of MgO HT, the sum of all the reactions must be determined including HC, the heat formation of water, which is already predetermined to be -285.8 kJ/mol. However to determine the proper equation for HT, the stoichiometric equations must first be balancedTherefore the heat formation of MgO was determined to be -618.35 kJ/mol. According to the textbook, the accepted value for HT=-601.8 kJ/mol. To determine the accuracy of the calculation we can determine the % errorAs far as accuracy goes a portion error of 2.75% is very acceptable. Because the methods of the experiment were conducted using a crude calorimeter I would have expected the percent error to be higher, assuming that because of its formula it would not have very high efficiency.I would expect that any error that might have occurred happened during the transference from one cup to another. Because the substances were transferred so quickly and pickings into account the number of seconds that it took to replace the thermometer to begin recording data again it is possible that energy was either lost in the transfer or energy was lost before the recording was actually able to begin.ConclusionIn this lab we were able to determine the heat of formation of MgO using a simply constructed calorimeter, which was found to be -618.35 kJ/mol.

Friday, May 24, 2019

The Real Facts About Abortions

Abortion Abortion is quite a controversial issue in todays government. Many of us refrain from even getting into a news over abortion, because it is such a sensitive topic. It is very unfortunate that so many women around the world take to make decisions involving abortion, period. One in triple women will overhear at least one abortion by the time she is 45, and these run the gamut of ages, races, backgrounds and beliefs. (Welch) In ones eye abortion is simply immoral and unacceptable, firearm in a nonher it is a typical procedure. Often, pro-abortionists ar portrayed s merciful and anti-abortionists as close-minded (Olasky). As an outsider I interpret distri just nowively group as one extreme to the other, and the purpose of this paper is to inform myself and the reader of both, pro- spirit and pro-choice sides and perspectives of abortion in the U. S. Somebody that claims to be in favor of the Pro-Life policy is opposed to wrongful death and in favor of life-enhancing act ions. The main argument of a pro-lifer is sacred plinthd beliefs. They fence in that an abortion is immoral because, all life was created by God and belongs to Him, no one has the right to murder another human being. (Cain) A person in favor of Pro-Life policy believes that having an abortion is a sin, but so is sex before marriage and half of the woman getting pregnant right away are not even out of high school. Does that mean that just because they decided to attempt to raise a baby at 15 that they have been forgiven for their original sin? No, either way they will be judged by those in favor of what is acceptable according to their religion. They even disagree on early abortions because they claim life begins at conception (Lowen). Anti-choice people ant to outlaw abortion, regardless of the womans situation (The Problem). They dont see any exception for committing murder. Anti- Abortionists often compare abortions to Hitler and the closeness camps, One out of every thr ee squirtren conceived in America since 1972 has died a brutal death through abortion more than than six times the go of Jews that Adolf Hitler put to death in his Nazi concentration camps. (Roe) The cost of abortion is another issue for pro-lifers, they think that the government shouldnt have to spend so very much money to undermine future growth. The inistry of health claimed that the 45,000 women treated in public hospitals for incomplete abortions each year is costing the state R19 million (Cain). They believe measure dollars should not be used to provide women with this type of birth control, it is un honorable to those who do not support the pro-choice policy and it is unacceptable. Being Pro-Choice intend being in favor of safe and legal abortions, but also in reducing the need for abortions. Their religious beliefs are not a base for their opinions on abortion. Those who are in favor of the Pro-Choice policy argue that person-hood at conception is ot a provable biolog ical fact, it is simply a religious belief (Choice Matters). Pro-choice supporters give women the benefit of the doubt allow for a logical explanation for an abortion. Abortions are medically necessary for some women, Teen girls, whose bodies are not yet ready for childbirth, are five times more alike(p)ly to die (Health). In a case like that would it be fair to pass judgment? The same goes for woman who are raped. Pro-choice people argue that instead of trying to prohibit abortion altogether, we should try alternate methods like safe, affordable contraceptives and comprehensive sex education. Laws against abortion do not stop abortion they simply make it less safe the that thing that changes is more women die (Health). Outlawing it would lead women to turn to unsafe abortions, not conducted in clinics. For some families abortion helps parents limit their families to number of children they take and can afford, both financially and emotionally (Choice Matters). Taking away the c ivil rights of women and/or families by making it illegal to have abortions, will only lead to more poverty in the linked States and lead to increasing government spending on welfare.According to the First Amendment, we all have our right to privacy. I am a woman myself and I aboveboard wouldnt appreciate strangers making decisions for me. What happens in the privacy of one womans body doesnt belong out in the open for everyone else to critique. I am fully aware that if a woman feels she is mature enough to have sexual intercourse, then she should be prepared to face the possible consequences, but this is the real world and we are only human. Mistakes do happen. I do not support women getting abortions just because they are promiscuous and lazy.Of course the abstinence policy is the best policy, but as long as we are living on planet Earth, that just wont cut it. Just like Hillary Clinton, I believe that, whatever side youre on in the pro-choice vs. pro-life debate, we can all ag ree on a third principle we would be better off with fewer of them (Sullivan). I personally think that providing all sexually active women with contraceptives is the smartest thing to do in order to decrease high rates of abortion. In the United states, 74% say having a baby would interfere with work, school, or other responsibilities (United States).Some women whitethorn have to go through with an abortion simply because she has severe health risks that whitethorn possibly kill her if she went into labor. She may want a child just as bad as many other women except her body lingo support a pregnancy. Or, if a women is raped she shouldnt have to relive the agony of such an event every single day for 9 months. What if she didnt even want kids? Just because she got pregnant from a rapist, doesnt mean she has to raise his child. Some people say an aborted child might have grown up to be President.Theres a better chance he would have grown up to be the one who taw the President (Olas ky). It would all really depend on the contract of that child, if she kept the kid and ended up to resent him/her then, that would most likely effect the child in a negative manner it would make that child have a negative outlook on life. He/she would hate everything and everyone. In that situation in my eyes, the mother would be doing the kid and herself a favor. Im not saying I would be the one to have an abortion, because in the end I most likely wouldnt have the heart to get rid of something that I partially created.I would think, what if he/she is the only chance I have at ever being a mother? What if I only had one shot and I blew it? On the other hand, I would recap on all the things I could potentially loose out on because I decided to have a child that I wasnt capable of raising yet. At the end of the day, deciding to abort a baby depends on the situation a women may be in at that point of her life it doesnt depend on all of the outsiders who think they have the right to d ecide for her. Every women has a life and has a choice, and the reasoning behind her decision is completely personal.After conducting all of my research, I noticed that there are strong points on each side of abortion. No matter what position a person takes on this issue, there will always be others critiquing it. I think it is important to accept some womans reasons for abortion, but at the same time support the fight on lowering the needs for abortion. We need to educate women about their choices and consequences. Birth control methods need to be expressed and easily obtained. Until the Pro-Choice v. Pro-Life fight gets settled, the United States will only get more and more divided as a nation.

Thursday, May 23, 2019

HCS 455 Policy Issue Worksheet Essay

Please complete all questions in this worksheet and answer the questions thoroughly, with the use of sources where indicated, and wherever else you feel is necessary. arguing an issue you believe get out have a profound impact on the future of healthc are in the US.An issue that will have a profound impact on the future will be caring for the elderly, especially those who suffer every chronic condition, and those who need to stay in a nursing homes or received home care.Why do you believe this issue is so significant? (Include sources to back up your statements) There will be a shortage of professionals that are trained to care for elderly in the future. According to a data collected 10 years from now in that respect will be about 10,000 people each day that will be celebrating their 65th birthday. This means that this is twice the amount that we have at the moment. Mion, PhD, RN (n.d.).What are some of the root causes of this issue? (include sources to back up your statements) The re will be too few doctors, nurses and other health professionals receive any formal training in how to provide the best care for older patients. Mion, PhD, RN (n.d.). Meaning those doctors, nurses and other healthcare providers that are trained properly will also be around their age. Some insurance policies do not cover some of the expenses for nursing homes and this is a burden for their families.What are some achievable solutions to this issue? (list at least two different possible solutions) A possible solution for this issue is for the government to provide better long succession care for the elderly by allowing legislation to pass a law.If you were a policymaker, what policy would you implement to address this issue? Why would you implement these policies? How would you determine if these policies were prospering?If I was a policymaker, a policy that I would implement is to provide better health coverage to the elderly. The reason that I would implement this is because by t he cadence they retired they wont have the money to cover for their expenses, and if the government reduces the cost that they will pay towards their health coverage then this means that patient which are the elders will have to pay a portion of that and some of them will not be able to afford it. The only way to determine if these policies were successful is by collecting data from all health care agencies, making sure that elders are receiving the health care they need. What services should be address or what should be change.

Wednesday, May 22, 2019

Nelson Glueck

Nelson Glueck was born on June 4, 1900 in Cincinnati, Ohio. Du camp the 70 years of his life he was a well-known Rabbi and archaeologist until his death on February 12, 1971. At the age of 23, he was ordained as a Reform rabbi by the Hebrew Union College and tetrad years later was awarded his Ph.D. at Jena, Germany, for his dissertation on the biblical concept of hesed (the Hebrew term for goodness or divine kindness). Until World War II Gluek worked with William Foxwell Albright at the American School of Oriental Re search in Jerusalem (ASOR,) and Albrights excavation of narrate Beit Mirsim. Glueck himself served as director of ASOR, as well as having a faculty position at HUC in Jerusalem.After graduating from Cincinnati Public Schools, he atteneded the University of Cincinnati where he received his bachelors degree. Glueck went home in 1931 and married Helen Ransohof Iglauer, a medical learner at the University of Cincinnati who was a professor of medicine. Their only son Dr. C harles Jonathan Glueck was a noned physician as well.Glueck continued his studies in Germany for four years and received his doctors degree degree from the University of Jena in 1926. For the next two years (1927-28) he would continue his studies at the School in Jerusalem. While studying in Palestine he became interested in archeology, returning twice (1930 and 1932) to take part in an excavation of Tell Beit Mirsim, probably Biblical Debir (Kirjath-Sepher).During World War II Glueck served in the Office of Strategic Services (the precursor of the CIA), examining possible escape routes for the allies through the desert, in anticipation of the German army under General Rommel, attain Palestine. Fortunately, Rommels advance was halted by the Allies in Egypt. He created the HUC Biblical and Archaeological School in Jerusalem in 1963, the same year that he appe atomic number 18d on the cover of Time magazine. The institute was renamed in 1972 to the Nelson Glueck School of Biblical archeology. Glueck later on the war became prefacent of the Hebrew Union College, and then president of the combined HUC-Jewish institute of Religion, a position he held until his death in 1971. This is the same colledge that ordained him as a Rabbi.As president Glueck over saying the merger of HUC with the Jewish Institute of Religion, expanding the governance based out of Cincinnati to now include schools in New York, Los Angeles, and Jerusalem. He played a vital role in the creation of the Schools of Jewish communal Service and was the frameer of the School of Biblical and Archaeological Studies in Jerusalem, in honor of him they now bears his name.Excavation Sites and Methods of ExcavationThe word of honor was his map for excavations and, in turn, the excavations shed a snowflake of light on the Bible. Sheldon H. Blank and H. Ginsberg note, A scientist he was, yet a fragment of a wall or a potsherd could evoke an emotional as well as an intellectual response. He had a love affair with the Land (the heartland), he uncovered not the history but the drama of people. This makes awareness seeing Gluecks service as a rabbi and studies of the Old Testament.Glueck excavated several sites in 1950 he excavated the remains of the civilization of the Nabataeans in Transjordan, this was a copper-mining industry that was located at the shore of the Red Sea. This showed how the Negev could support a such a large population due to the use of irrigation techniques using the Red Sea.Therefore what Glueck says about Negev is, The space and width of the Negev were interconnected with roads marked by fortresses, villages, way stations and watertight cisterns. The erecting of fortresses over the Negev served as an excellent source of protection and saw villages flourish, and agriculture grows, and watertight cisterns surrounded the Negev which made possible the emergence of villages and flocks in areas where they would otherwise not be present.Glueck too spent a lot of meter working to define a history for the Negev and wrote The Archaeological History of the Negev based on his findings. Glueck notes that there were a series of civilizations there and that the Negev is positioned betwixt Canaan, Arabia, and Egypt which made it a strategic location. He indicates that the different civilizations experienced no significant changes in the climate and that no climatic changes have occurred within the last ten gram years at least.Chalcolithic pottery has been located in the Negev which indicates that a civilization existed there during that period. After this civilization disappeared, the land was unuse for almost a m years until the Middle Bronze I period (between 21st and 19th centuries BC). This civilization was agricultural as registerd by beehive stone houses that are located on slopes of hills located above land useable for farming. Cup holes carved in limestone were found that indicate they were used for grinding grain and this evidence has been placed in MB I by the stories of Abraham in the Old Testament.Glueck ExcavationsArchaeology discovered by Glueck indicates a range of civilizations such as the Nabateans who left a substantial amount of pottery behind. Nabateans were known for their worship of multiple deities and are traditionally identified as being pagan which makes the discovery of Khierbet Et-Tannur (a temple) significant. Glueck notes that while the finished site had not been excavated at the time of his writing, A whole pantheon of hitherto unknown Nabataean deities was found in the temple that had become their grave. This temple sits on filch of a hill with evidence of staircases leading up steep areas and leading Glueck to believe that goddesses were honored at the peak of this hill and those like it.In 1938 Glueck also did an excavation on the northern third, during the excavation of the site he found a location of forty-five cortege. The mounds most impressive structure was uncovered in the nort hwestern corner of the excavated area, a construction complex consisting of three roughly square units at the northern leftover and three larger rectangular rooms extending to the south. The latter are 7.40 m in length and of varying widths (2.00-3.00 m). The building measures 13.20 m in length (north-south) and is 12.30 m wide on the north side and 13.20 m wide on the south side. The exterior walls are 1.20 m wide interior walls vary between 0.95 and 1.05 m. The walls were preserved to a vertex of 2.70 m. The building is almost entirely of mudbrick construction. Its bricks measure ca. 0.40 x 0.20 x 0.10 m and were laid in a roughly header and stretcher fashion.They found 2 horizontal rows of wooden beams that could be consider as construction to strengthening the walls. they had semicircular holes which proved this was a result of the fire and it also confirm the construction and used of wooden beams as written in I Kings. This way of construction with support beams is reference d in I Kings 636 which reads, He (Solomon) create the inner court with three courses of hewn stone and one course of cedar beams. Wooden beams, halved in the case of Tell el-Kheleifeh, were embedded across the widths of the walls, creating a stronger bond. The semicircular holes were all that remained after the timbers were consumed in a destruction by fire.These features were also discovered elsewhere in the sites architecture, notably in Room 49. eightsome installations, interpreted as hearths or ovens, were found in this casemate unit. Slag was also found at this site which Glueck believes indicates that Tell el-Kheleifeh was used to remelt globules of copper ore retrieved through metallurgic processes in the Wadi Arabah smelting sites to shape them into easily salable ingots or pour the molten metal into molds. Ezion-Geber was also a marketplace from Arabia to Palestine. Support for this fact came when pottery was found that had horn handles and mat bases which is associated with the Calebites, Kenites, Rechabites, Yerahmeelites, dated to Iron Age I-II. Furthermore, the building was identified as a stone house granary and had the means of smelting and fire malign present further supporting the results of the fire. Glueck notes, The strong winds which constantly blow from the north in the Arabah furnished the draft necessary for the straitlaced functioning of the furnaces. A strengthen outer wall protected the building, and while Ezion-Geber I was probably destroyed by Shishak, it was rebuilt with a gateway reminiscent of Jehosophat of Judah (871-849 BC).Glueck also led measurable excavations in Ezion-Geber where it is believed that Solomons naval base was located. Excavations began in March 1998, and it took three months to uncover one-third of the site. Pottery was discovered at this site along with other findings but its important to note is that the pottery varied. A piece of Edomite pottery was discovered carrying the name QoS which could refere nce a kind of a god. This indicates that this area had been occupied over a long period of time.An article published in The Biblical Archaeologist in 1965 entitled Ezion-Geber finds Glueck arguing that Tell el- Kheleifeh is Ezion-Geber. In this article he indicates that Tell el-Kheleifeh is represented by a low small mound that is located approximately in the center of the north shore of the Gulf of Aqabah, midway between Jordanian Aqabah at its east end and Israeli Eilat at its west end. Today, it sits five hundred yards from the shore and is estimated to have been at least three hundred yards away many millennia ago during its first occupation in 10th century BC. The location appear to be consistent with the Bibles description in I Kings 926 of beside Eloth, on the shore of the Red Sea, in the land of Edom.Glueck further state that, The conviction that there has been comparatively little change in the northern shoreline derives partly from our discovery of a copper smelting site on a low shoreline foothill at Mrashrash, now incorporated into Eilat, immediately overlooking the northwest end of the Gulf of Aqabah. And that the explorations in Eastern Palestine began to appear in 1933, opening new views on the movement of peoples in the Transjordan area in antiquity. Landmarks in his archaeological odyssey were King Solomons port city Ezion-Geber and his copper mines the unexpectedly numerous settlements in the Negev Khirbet Tannur and the civilization of the Nabataeans the systematic excavation of Tell Gezer.Glueck excavated area at the end of the 1940 season was ca. 80 m north-south, by 72 m east-west. The corner of a nearby garden wall was chosen for the site benchmark, established at 3.99 m over the shore of the Gulf of Aqaba. The highest point of the tell was southeast of its center (Square N17) at +2.84 m, corresponding to the absolute height above sea level of +6.83 m. The deepest excavated level, reportedly to virgin soil, was in Room 113 ( 1.53 m) bel ow benchmark level. The difference in height between the deepest wall foundation of the western casemate edge and the top of the preserved walls was 4.37 m.Although, Tell el-Kheleifeh is not considered a conspicuous site today. Its appearance is very familiar to that of the many surrounding hillocks. A surface resume in August 1980 revealed that, the area of extant architecture is little more than 12 square meters and a few mudbrick walls have been preserved to a height of 1.5 m. The fragmentary remains could not be located on the plans prepared by Gluecks architect J. Pinkerfeld. It is likely that the existing walls represent an architectural assortment from the unhomogeneous periods of occupation. They appear to be located south-southeast of the sites largest structure. The excavators northern, eastern, and western dumps provided the reference points for location. Although there are no visible remains of the most distinctive architectural elements, a wall in the northern sectio n of preserved architecture, with two horizontal rows of apertures, were interpreted initially as flues. Gluecks excavation area is where the mound has been queasy at several points by red-brick military installations, most notably an observation tower toward the southern end of Its foundationsappear to have cut still levels to a depth of 1.5 m. Several trenches have also been cut into the northern and western sections of the site, and these disturbances produced an abundance of finds, including a stamped Rhodian jar handle and a bronze trefoil arrowhead. The material remains gleaned from this survey provide a valuable complement to the 1938-40 assemblage.DiscoveriesBiblical scholars have debated for years whether or not the Edomites ever had a true kingdom, or was a mining industry. In the 1930s, Nelson Glueck made a claim to have found King Solomons mines, citing, among other things, evidence of mining trails, as well as slag mounds. However, Gluecks claim was largely dismisse d after British excavations in the 1970s and 80s seemed to show that extensive mining didnt come to the area until hundreds of years after Solomons rule. A consensus emerged that the Bible was heavily edited in the 5th century BCE, long after the events, while British excavations of the Edomite highlands in the 1970s-80s suggested the Iron Age had not even come to Edom until the 7th century BCE. Levy, Director of the Levantine Archaeology Lab at UCSD and associate director of the new Center of Interdisciplinary accomplishment for Art, Architecture, and Archaeology (CISA3), inferred that data from the first large-scale stratified and systematic excavation of a site in the southern Levant ,gave evidence that complex societies were indeed active in 10th and 9th centuries BCE. Which brings us back to the debate about the historicity of the Hebrew Bible narratives related to this period. Glueck discoveries in Faynan/Edom got laughed at, but this recent discovery has exonerated him. Bi blical ImpactGlueck believed that the Hebrew Bible contains historical memory, but one that cannot be proven. He felt that the spirit of the Israelites was still alive in modern Israel, instilling that belief in both his students and his colleagues. Today, our research paradigms may differ from those of Gluecks day, but his enthusiasm and scholarly integrity remain with us always. The range of Gluecks excavations speaks script and will echo through the sands of time.He have certainly paved the way for Biblical archaeology to memmic and gave believers more resources to study outside of the Bible. Archaeology cannot be used to prove a Biblical account, however, it definitely can be used to assert the existence of a certain nation at the same time in history. Through Glueck work and the excavations performed by him, believers now have the abilty to research further and take a deep dive into a rich history.ConclusionGlueck work not only laid a strong foundation but it also paved the wa y in a since to how archaeology is an understatement, providing believers with a broader knowledge and understanding. Through human beings like Nelson Glueck, archaeology has emerged and will continue to grow in a positive way. The works of Glueck continue to ring true and set a precedent for research that every area on the face of the earth, be it outwardly ever so waste and empty, has a story behind it which the inquisitive sooner or later will attempt to obtain. Well put statement by Glueck himself in the relationship of the Bible to archaeology. He writesAs a matter of fact, however, it may be stated categorically that no archaeological discovery has ever controverted a biblical reference. get ahead of archaeological findings have been made which confirm to clear outline or in exact detail historical statements in the Bible.And by the same token, proper eval- uations of the biblical descriptions has often led to amazing discoveries. They form tesserae in the vast mosaic of the Bibles almost incredible correct historical memory.Glueck put his conviction into physical exertion when he sought to locate King Solomonss long-lost port city of Ezion-Geber. The memory of its location had been in Glueck words snuffed out. like the flame of a gutted candle. Glueck began by consulting 1 Kings of the Bible that documented this site. The biblical statement said it was located beside Eloth, on the shore of the Red Sea in the land of Edom (1 Kings 9261022). The Bible served him as a guidebook in his explorations, and his explorations shed light on the Bible. An example we can all learn from. Not that he believed archaeology could or even should lend support to the supreme spiritual values and ethical norms which are native to the Bible.These have their own manifest value. Glueck patience and continuity in his work makes his discoveries and works worth remembering. His dedication and the contribution he has made to the field of archaeology is a valued resource for beli ever and emerging archaeologist. The Bible is the inspired and accurate Word of God and God often confirm His Word through mankind. Therefore, we should compare the Scriptural records against the archeological discoveries uncovered at these sites where many of these thrilling events of the Bible actually occurred. The results of these detailed investigations are available for all to examine.BibliographyThe Nelson Glueck School of Archaeology, Our founder Nelson Glueck (1900-1971), The Nelson Glueck School of Biblical Archaeology (2010), (accessed October 8, 2018).Albright, William F. Nelson Glueck in Memoriam. air of the American Schools of Oriental Research, no. 202 (1971) 2-1. http//www.jstor.org/stable/1356266. (accessed October 8, 2018).Glueck, Nelson. 1961. The archaeological history of the Negev. Hebrew Union College Annual 32, 11-18. ATLASerials, Religion Collection, EBSCOhost (accessed October 8, 2018)Ezion-Geber Nelson Glueck Excavations at Tell el-Kheleifeh 1965 AD, http //www.bible.ca/archeology/bible-archeology-exodus-kadesh-barnea-ezion-geber- nelson-gluecks-tell-el-kheleifeh-1965ad.htm (accessed October 8, 2018).Solomons Fortress at Elat, Aqaba Tell El-kheleifeh and Jezirit, http//www.bible.ca/archeology/bible-archeology-exodus-route-ezion-geber-elat-aq (accessed October 8, 2018).Pratico, Gary D. Nelson Gluecks 1938-1940 Excavations at Tell El-Kheleifeh A Reappraisal. Bulletin of the American Schools of Oriental Research, no. 259 (1985) 1-32. doi10.2307/1356795. (accessed October 8, 2018).Nelson Gluecks 1938-1940 Excavations At Tell El-kheleifeh .., http//www.bible.ca/archeology/bible-archeology-exodus-kadesh-barnea-ezion-geber- Nelson-gluecks-1938-1940-excavations-tell-el-kheleifeh-reappraisal-gary-pratico (accessed October 8, 2018).Uncovering The Secrets Of Kahn, Da Vinci And Solomons .., http//www.voiceofsandiego.org/topics/science-environment/uncovering-the-secrets (accessed October 8, 2018).King Solomons (copper) Mines? University Of calci um .., http//ucsdnews.ucsd.edu/archive/newsrel/soc/10-22KingSolomon.asp (accessed October 8, 2018).Nelson Glueck, Rivers in the Desert. Farrar, Straus and Cudahy, New York, Grove Press, 1960, p. 31Price, J. Randall. The Stones Cry Out What Archaeology Reveals About the Truth of the Bible. Eugene, Oreg. Harvest House, 1997.

Tuesday, May 21, 2019

Bluetooth Simulation

VIDYAVARDHINIS COLLEGE OF ENGINEERING AND engineering ELECTRONICS AND TELECOMMUNICATION FINAL YEAR 2004-2005 A REPORT ON BLUETOOTH TECHNOLOGY PREPARED BY JANHAVI KHANOLKAR NAVEEN BITRA YASHESH MANKAD TABLE OF CONTENTS 1. INTRODUCTION 2. HISTORY 3. WHAT IS BLUETOOTH? 4. BLUETOOTH SPECIFICATIONS 5. BLUETOOTH NETWORKS 6. HOW DOES BLUETOOTH WORK? 7. BLUETOOTH PROTOCOL STACK 8. BLUETOOTH SECURITY 9. APPLICATIONS 10. MERITS AND DEMERITS INTRODUCTION Blue as well asth was origin both(prenominal)y conceived to commute the rats nest of billets typical in any PC setup today and this remains a compelling home masking.However, as the Bluetooth evolved it became clear that it would in addition modify a tot aloney new ne tworking paradigm, Personal Area Networks ( travels) With PAN technology a drug user go forth be open to organize a sight of personal electronic products (their PDA, carrel phone, laptop, desktop, MP3 player, etcetera ) to automatically work unneurotic. For instan ce the contact manager and calendar in the PDA, laptop, and desktop could all automatically synchronize whenever they are within lop of individually opposite). Over term PANs bequeath revolutionize the user experience of consumer electronics.Finally, Bluetooths dynamic nature get out also revolutionize consociateivity to the rest of the world. Bluetooth will automatically discover whatchamacallums and dish ups nearby so available servers, net income access, printers etc. will automatically become ocular to a Bluetooth thingamajig wherever it is. HISTORY Bluetooth is an open specification for short range wireless voice and info communications that was originally developed for cable replacement in personal area networking to operate all over the world.By enabling standardized wireless communication amid any electrical pulls, Bluetooth has created the theory of a personal Area Network (PAN), a kind of close range wireless network that looks set to revolutionize the w ay people interact with the information technology landscape around them. In 1994 the initial study for development of this technology lowed at Ericsson, Sweden. In 1998, Ericsson, Nokia, IBM, Toshiba, and Intel formed a Special interest Group (SIG) to expand the concept and develop a standard under IEEE 802. 15 WPAN (Wireless Personal Area Network ).In 1999, the first specification was released and accepted as the IEEE 802. 15 WPAN standard for 1Mbps networks. The Bluetooth SIG considers three basic scenarios The first basic scenario is the Cable Replacement ie. the wire replacement to connect a PC or laptop to its keyboard, mouse, microphone, and nonepad. It avoids the multiple short range wiring surroundings of todays personal com ranking subterfuges. The second scenario is ad hoc networking of several different users at precise short range in an area such as a conference room. The third scenario is to use Bluetooth as an AP to the wide area voice and data services provide d by the cellular networks, wired connections or satellite get togethers. Why the name Bluetooth? The story of origin of name Bluetooth is interesting. Bnluetooth was the nickname of Harald Blaatand, 10th century Viking who join Denmark and Norway. When Bluetooth specification was introduced to public, a stone carving, erected from Harald Blaatands capital city Jelling was also pre displaceed. This strange carving was interpreted as Bluetooth connecting a cellular phone and a wireless notepad in his hands.The picture was apply to symbolize the vision in using Bluetooth to connect personal computing and communication devices. What is BLUETOOTH? pic Figure1 Bluetooth system blocks The Bluetooth system consists of a radio unit, a link have got unit, and a support unit for link watchfulness and host terminal interface functions (see Figure 1). The Host ascendence Interface (HCI) provides the representation for a host device to access Bluetooth hardware capabilities. For example, a laptop computer could be the host device and a PC card inserted in the PC is the Bluetooth device.All commands from the host to the Bluetooth module and razets from the module to the host go finished the HCI interface. The protocol stack is above the radio and base dance band hardware, partly residing in the Bluetooth unit and partly in the host device. A Bluetooth solution can also be implemented as a one-processor architecture (embedded solution) where the application resides together with the Bluetooth protocols in the same hardware. In that discip class, the HCI is not needed. This is a feasible implementation for simple devices such as accessories or micro servers.Requirements of Bluetooth technology If Bluetooth technology is to replace cables, it can not be much more expensive than a cable or nobody will buy it. Because Bluetooth technology is designed for spry devices it moldiness be able to run on batteries. So it must be genuinely low power and should run on low voltages. It must also be lightweight and fiddling enough not to intrude on the design of compact mobile devices such as cellular phones, handsets etc. It must be as reliable as the cable it replaces and also it must be resilient. Bluetooth devices operate at 2. GHz in globally available, license free doctrine band, which obey a basic set of power and spectral emission and interference specifications. THUS Bluetooth has to be very robust, as thither are many existing users and polluters of this shared spectrum. Thus Bluetooth aims to be widely available, inexpensive, convenient, easy to use, reliable, small and low power. Specifications related with Bluetooth PARAMETER VALUES Frequency ply 2. 2. 4835 GHz Bandwidth of each channel 1MHz Data rate 1 Mbps Frequency hopping rate 1600 hops per seconds Range of operation 10-100 meters Bluetooth system operates in 2. GHz industrial Scientific Medicine ( ism) band. The operating band is divided into 1MHz spaced channels each s ignaling data at 1 Mbps so as to accomplish maximum available channel bandwidth with chosen modulation scheme of GFSK (Gaussian Frequency Shift Keying). Using GFSK, a binary 1 give rise to a positive relative oftenness deviation from the nominal carrier frequency while binary 0 gives rise to a negative frequency deviation. After each packet both devices retune their radio to a different frequency, effectively hopping from radio channel from radio channel.In this way Bluetooth devices use the whole of available ISM band and if transmission is compromised by interference on one channel, the retransmission will always be on a different channel. Each Bluetooth time slot lasts 625 microseconds big(p) rise to frequency hopping rate of 1600 hops per seconds. Generally devices hop once per packet. .For long data transmission, particular users whitethorn occupy multiple time slots using the same transmission frequency thus slowing instantaneous hopping rate to below 1600 hops/ sec. BLUET OOTH NETWORKS PICCONETS AND SCATTERNETThe Bluetooth network is called a piconet. In the simplest case it means that two devices are connected (see Figure 2a). The device that initiates the connection is called a cut across and the other devices are called strivers. The majority of Bluetooth applications will be come in-to-point applications. Bluetooth connections are typically ad hoc connections, which means that the network will be established just for the current task and then dismantled afterwards the data transfer has been completed. A master can have simultaneous connections (point-to-multipoint) to up to sevener slaves (see Figure2b).Then, nonetheless, the data rate is limited. One device can also be connected in two or more piconets. The set-up is called scatternet (see Figure 2c). A device can, however, only be a master to one piconet at a time. Support for hold, park, or blubber sensory system is needed for a device to be part of the scatternet. In these ways a devi ce does not actively act in a piconet, exit time for other activities such as participating in another piconet, for example. The master/slave roles are not necessarily fixed and can also be changed during the connection if, for example, the master does not have enough esources to manage the piconet. Master/slave switch is also needed in the scatternet. Master/slave switch support is not mandatory. Most of current Bluetooth implementations support piconets only. Point-to-multipoint support depends on the implementation Figure 2. Bluetooth piconet and scatternet scenarios a) Point-to-point connection between two devices b) Point-to-multipoint connection between a master and three slaves c) Scatternet that consists of three piconets Modes of operation In connection state, the Bluetooth unit can be in several modes of operation.Sniff, hold, and park modes are used to save power or to free the capacity of a piconet Active mode In the active mode, the Bluetooth unit actively participate s on the channel. Sniff mode In the sniff mode, the duty cycle of the slaves listen activity can be reduced. This means that the master can only start transmission in specified time slots. Hold mode While in connection state, the ACL link to a slave can be put in a hold (possible SCO links are chill out supported). In hold mode, the slave can do other things, such as scanning, paging, inquiring, or attending another piconet.Park mode If a slave does not need to participate in the piconet precisely still wants to remain synchronized to the channel (to participate in the piconet again later), it can enter the park mode. It gives up its active member address. Park mode is useful if there are more than seven devices that occasionally need to participate in the same piconet. The parked slave wakes up regularly to listen to the channel in rank to re-synchronize and to check for pervade messages sent by the master.. FREQUENCY HOPPING Bluetooth technology uses a frequency hopping techni que, which means that either packet is transmitted on a different frequency. In almost countries, 79 channels can be used. With a fast hop rate (1600 hops per second), good interference protection is achieved. Another benefit is a short packet length. If some other device is jamming the transmission of a packet, the packet is resent in another frequency determined by the frequency scheme of the master. This scenario is depicted in Figure 3 where packets of device 1 (colored packets) and device 2 (banded packets) are trying to use the same frequency.Note that this case only refers to situations where there are two or more simultaneous active piconets or a non-Bluetooth device using the same frequency in range. The error correction algorithmic programs are used to correct the fault caused by jammed transmissions Figure 4. Three-slot and five-slot long packets reduce overhead compared to one-slot packets. 220 s switching time after the packet is needed for changing the frequency. Sub sequent time slots are used for transmitting and receiving. The nominal slot length is 625 (s.A packet nominally covers a single slot, but can be extended to cover three or five slots, as depicted in Figure 4. In multi-slot packets the frequency remains the same until the entire packet is sent. When using a multi-slot packet, the data rate is higher because the header and a 220 (s long switching time after the packet are needed only once in each packet. On the other hand, the robustness is reduced in a crowded surroundings the long packets will more probably be lost HOW DOES BLUETOOTH WORKS? Bluetooth devices have 4 basic States.They can be a Master (in authorization of a Piconet represented by a large blue circle above), an Active knuckle down (connected and actively monitoring/participating on a Piconet mass medium orange circles), a Passive slave (still logically part of a Piconet but in a low power, occasionally monitoring but still synchronized, inactive, state medium g ray circles), and Standby (not connected to a Piconet, occasionally monitoring for inquiries from other devices, but not synchronized with any other devices small white circles). IN IDEAL STATE Bluetooth devices initially know only about themselves and in this state they will be in Standby mode.Standby is a passive mode where a Bluetooth device listens on an occasional basis performing what are called examination and/or pageboy Scans for 10 milliseconds out of every 1. 28 seconds to see if any other Bluetooth devices are looking to communicate. Passive behavior is inherent to half of Bluetooths states and is a key mechanism to achieving very low power. In Standby mode the Bluetooth devices occasional attention reduces power consumption by over 98%. While all of the Bluetooth devices in the same mode it is important to note that they are NOT synchronized or coordinated in any way.Thus they are all audience at different times and on different frequencies. pic Enquiry and page proc edures lead to connections ENQUIRY Inquiry is how a Bluetooth device learns about other devices that are within its range. In the illustration above Node A executes a Page Function on the BT Inquiry ID and receives replies from other devices. Through these replies device A learns the explicit identity of these other devices (i. e. their unique Bluetooth device ID). During the Inquiry process device A interminably broadcasts the Page command using the reserved Inquiry ID which identifies it as as a Page Inquiry.These broadcasts are spread across a standard soma of 32 Standby radio frequencies which all devices in Standby mode monitor on an occasional basis. Over a duration of some seconds it is certain that every Standby device within range will have received the Inquiry Page even though they are not synchronized in any way. By convention these nodes will respond with a standard FHS packet that provides their unique BT ID and their clock offset. With these parameters the Inquiring node can effect low latency synchronized connections.Node H (the stud circle above) illustrates how a Bluetooth device can be programmed to remain anonymous (Undiscoverable in BT jargon). This is a user controlled feature that suspends Inquiry examine, and thus device As Inquiry Procedure cannot discover Device B It is important to note that device H will continue to support Page Scanning however, and thus a users other personal devices (i. e. PAN) can penetrate this barrier by Paging straightaway to its unique Bluetooth ID. This is information that PAN devices can be configured to know and remember thus enabling private collaboration even when devices are undiscoverable.PAGING In its general form the Page command establishes a formal device to device link between a Master (the originator) and a Slave. Master/Slave connections in Bluetooth are referred to as a Piconet. To create the piconet device A broadcasts the Page command with the explicit device ID of the target Slave (B in the illustration above) which was learned earlier through an Inquiry Procedure. Further, this connection can be very low latency if the Inquiry data is recent (and thus synchronization can be accurate), but the process will simply take longer if this is not the case.All Bluetooth devices except B will ignore this command as it is not addressed to them. When the device B replies, device A will send it an FHS packet back and assign it an Active Member dole out in the Piconet. As an Active Slave device B will begin continuously monitoring for further commands from device A in synchronization with device As hopping pattern and clock offset. Further, standard Piconet activity continuously updates the clock offset data keeping the synchronization extremely accurate. Thus the Master and Slave states are not low power but exhibit very low transaction latencies. EXPANDING A PICCONETThrough successive Page commands a Bluetooth Master can usurp up to 7 Active Slaves. 7 is a hard limit as on ly 3 bits are allocated in Bluetooth for the Active Member Address (AMA) with 000 reserved for the Master and the remaining addresses allocated to Slaves. Practically, 7 is more than sufficient given Bluetooths modest performance and dynamic configurability. Again, all Active Slaves to A continuously monitor for further commands addressed to them in synchronization with device As hopping pattern. PARKING Parking is a mechanism that allows a Bluetooth Master to connect to an additional 256 devices. 56 is a hard limit as 8 bits are allocated in Bluetooth for the Parked Member Address (PMA). To Park a device the Bluetooth Master issues a Park command to an Active Slave and assigns it a PMA. This Slave then enters the Parked mode and surrenders its AMA. As a Parked Slave the device will revert to a passive mode and only monitor for commands on an occasional basis. The difference between Standby and Parked however is that the Slave will remain synchronized to the Masters hopping pattern and regularly update its clock offset. Thus this device can be reconnected at any time with a minimum latency.BLUETOOTH PROTOCOLS Protocols are needed to implement different profiles and usage models. Every profile uses at least part of the protocol stack. In order to achieve interoperability between two Bluetooth devices, they both must have the same vertical profile of the protocol stack. Bluetooth Core Protocols Baseband and Link authorisation together enable a physical RF link between Bluetooth units forming a piconet. This layer is responsible for synchronizing the transmission-hopping frequency and clocks ofdifferent Bluetooth devices Whitepaper1, p. . Audio is routed directly to and from Baseband. Any two Bluetooth devices supporting audio can send and receive audio data between each other just by first step an audio link . Link Manager Protocol (LMP) is responsible for link set-up (authentication and encoding, control, and negotiation of baseband packets) between Bluetoot h devices and for power modes and connection states of a Bluetooth unit. Logical Link sway and Adaptation Protocol (L2CAP) takes care of multiplexing, reassembly, and segmentation of packets.Service Discovery Protocol (SDP) is needed when requesting device information, services, and the characteristics of other devices. Devices have to support the same service in order to establish a connection with each other. Cable Replacement Protocol RFCOMM emulates RS-232 signals and can thus be used in applications that were formerly implemented with a serial cable (e. g. , a connection between a laptop computer and a mobile phone). Telephony Protocol Binary (TCS-BIN) defines the call control signaling for the establishment of speech and data call between Bluetooth devices.AT commands provide means for controlling a mobile phone or a modem. adopted Protocols OBEX (Object Exchange) is adopted from IrDA. It is a session protocol that provides means for simple and spontaneous object and data tr ansfer. It is independent of the transport mechanism and transport Application program Interface (API). TCP/UDP/IP is defined to operate in Bluetooth units allowing them to communicate with other units connected, for instance, to the Internet. The TCP/IP/PPP protocol configuration is used for all Internet Bridge usage scenarios in Bluetooth 1. and for OBEX in future versions. The UDP/IP/PPP configuration is available as transport for WAP. PPP in the Bluetooth technology is designed to run over RFCOMM to accomplish point-to-point connections. PPP is a packet-oriented protocol and must therefore use its serial mechanisms to convert the packet data rain cats and dogs into a serial data stream. The Wireless Application Protocol (WAP) stack can reside on top of RFCOMM (based on LAN Access Profile) or on top of L2CAP (based on PAN Profile). The latter reduces overhead and is likely to become the preferred solution for WAP over Bluetooth.Wireless Application Environment (WAE) hosts the W AP browser environment. telephone dial up networking ( tantalize) profile protocol stack DUN profile is inside the Serial Port Profile and therefore partly reuses the capabilities of the Serial Port Profile. For the DUN Profile, there are two device configurations (roles) Gateway (GW) is the device that provides access to the public network (typically mobile phones and modems) Data terminal (DT) is the device that uses the dial-up services of the entry (typically PCs) The DUN Profile needs a two-piece protocol stack and an SDP branch.PPP over RFCOMM is needed for transferring payload data. AT commands are delivered over RFCOMM to control the modem (mobile phone). The application on top of the stack is either a driver application on a PC (data terminal) or the modem emulation on a phone (gateway). Bluetooth security secret key All Bluetooth devices (master and slave) share a secret key in a particular system. This key is used during the authentication and encryption process. This key is not transmitted over the channel but is rather in-built by the manufacturer. AUTHENTICATIONAuthentication ensures the identity of Bluetooth devices. Authorization is a process of deciding if a device is allowed to have access to a specific service. User interaction may be required unless the impertinent device has been marked as trusted. Usually the user an set authorization on/off to every remote device separately. Authorization always requires authentication. Authentication in Bluetooth is performed by an encryption engine which uses the SAFER+ algo. This algorithm requires the following Number to be encrypted or decrypted master address Master clock secret key shared by master and slave. A haphazard number is generated by the encryption engine using various keys. This random number is encrypted by the master using the secret key. This number is also sent to the slave. The encrypted reply of the slave is compared with the master encrypted data. If it is a match then t he slave is authentic. BONDING AND PAIRING Pairing is a procedure that authenticates two devices based on a common passkey, thereby creating a trusted relationship between those devices. An arbitrary but identical passkey must be entered on both devices.As long as both devices are paired, the pairing procedure is not required when connecting those devices again (the existing link key is used for authentication). Devices without any infix method, like headsets, have fixed passkeys. When two devices are linked with a common link the connection is called as bind. There are two types of bonding Dedicated bonding Used to create and exchange a link key between two devices. General bonding Data over the link is available for higher layers. ENCRYPTION Encryption protects communication against eavesdropping.For example, it ensures that nobody can listen to what a laptop transmits to a phone. Encryption demands the following Negotiating encryption mode Negotiating key sizes-The key size could vary from 8 to 128 bits Starting encryption Stopping encryption SECURITY LEVELS A trusted device has been previously authenticated, a link key is stored, and the device is marked as trusted in the security database of a device. The device can access Bluetooth services without user acceptance. An untrusted device has been previously authenticated, a link key is stored, but the device is not marked as trusted. Access to services requires acceptance of the user. An unknown device means that there is no security information on this device. This is also an untrusted device. trade protection Level of Services Authorization required Access is only granted automatically to trusted devices or untrusted devices after an authorization procedure (Do you accept connection from remote device? ). Authentication is always required. Authentication required The remote device must be authenticated before connecting to the application. Encryption required The link must be changed to encrypted before accessing the service.It is also possible that a service does not require any of these mechanisms. On the other hand, the application (service) might have its own user authentication mechanisms (a PIN code, for example). APPLICATIONS 1. Bluetooth in the home will ultimately eliminate most every cable related to consumer electronics (except power). Your PC, scanner, and printer will simply need to be within 10 meters of each other in order to work. Your PDA, digital camera, and MP3 player will no longer need a docking station to transfer files or get the modish tunes (the exception will be to recharge, that power thing again).And, your home stereo and other equipment will join the party too. On the telephone front your cell phone will synchronize its address book with your PC and function as a handset to your cordless phone in the house (answering debut calls to your home number and calling out on the cheaper land line too). Finally, even though its only 720Kbps, Bluetooth is still pretty fine for broadband profit access since DSL and cable modems are typically throttled to about 384K anyway. Bluetooth access points could well be as ubiquitous as 56K modems in 2 or 3 years. . On the road much of your Bluetooth PAN goes with you. Even when your laptop is in your briefcase and your cell phone is in your pocket they will be able to collaborate to access e-mail. And, next generation cell phones featuring Bluetooth and General Packet Radio (GPR) technology will function as a wireless modems with internet access at 100Kbps+. With such performance it is likely web based e-business will flourish and these devices will become the most prevalent Bluetooth access points.This may well be the Killer App that ensures Bluetooths widespread adoption and success. When you are literally on the road your car will join your PAN too. here your cell phone may operate in a hands free mode using the car audio system and an in-dash microphone even while comfortably in your p ocket. Or you may use a wireless Bluetooth headset instead. And, your MP3 player will likely play music in 8 speaker surround sound, rip music right off of an FM broadcast, or record your phone calls for later review. And all without wiresFixed land line access points (supporting up to 720Kbps) such as a pay phone in the airport terminal or lounge, or the desk phone in your hotel, will provide true broadband access in these strategic locations. Also look for the pay phone to evolve to compete for your cell phone calls too with its low cost land lines. In the world of deregulation and open competition future smart phones may even put your calls out for ships boat and channel the traffic over the carrier offering the lowest cost 3. Telephone applications Hands free use File synchronization Calendars Contact management Land line I/F for voice and data 4. Consumer applications File transfer MP3 Digital pictures Peripheral connectivity Keyboard/mouse/remote Printer ADVANTAGES 1. Point to point and point to multiple links 2. Voice and data links 3. Compact form factor 4. Low power 5. Low cost 6. Robust frequency hopping and error correction 7. Profiles ensure application level 8. High level of security through frequency hopping, encryption and authentication 9. Non directional 10. Unlicensed ISM band LIMITATIONS 1. 8 Devices per piconet with limited extension via scatternet 2.Short range 3. No handover facility 4. Maximum data rate of 723. 2 Kb/s 5. occupies the crowded ISM band 6. Slow connection setup References Bluetooth 1. 1 Jenifer Bray Wireless Communication -Krishnamurthy Bluetooth Specifications, Bluetooth SIG at http//www. bluetooth. com Bluetooth Protocol Architecture v1. 0, Riku Mettala, Bluetooth SIG, August 1999 http//www. bluetooth. org/foundry/sitecontent/document/whitepapers_presentations Bluetooth Security Architecture, Thomas Muller, Bluetooth SIG, July 1999 http//www. bluetooth. rg/foundry/sitecontent/document/whitepapers_presentat ions Comprehensive Description of the Bluetooth System v0. 9p, Dan Sonnerstam, Bluetooth SIG, May 1998 http//info. nsu. ac. kr/cwb-data/data/ycra2/comprehensive_description_of_the_BT_system. pdf Bluetooth Technology Overview, version 1. 0, April 2003 http//forum. nokia. com pic Digital Camera Computer scanner Home Audio System MP3 Player PDA Cell Phone Operational States Master Active Slave Parked Slave* Standby* ON THE ROAD Laptop PDA Cell Phone MP3 Player Headset Hotel Phone & Access Point

Monday, May 20, 2019

Cheating Essay

beguiler is cheating yourself trickster on take aim exert is never justifiable. Students argon responsible for their own kick the bucket, and it is unfair to cheat in whatever trend. Teachers grade pupils on their own academician ability and if a disciple is covertly or openly cheating that is considered infringement of being a student. Being a student requires personal interpretation, and analysis. Copying some iodine elses work is disadvantageous. If cheating becomes a stiff practice to some unmatched it can be harmful to their future. Plagiarism is a major form of cheating that is distinctly forbidden. If students argon not accountable for their own work, then they should be punished for it.The adjudicate of going to tame is to learn and be able to consume new information. Copying someone elses work does not serve this purpose and is useless regards to learning new material. For example, if a student is charge to take notes on a certain reading, and hand in the same w orded notes as an separate student it is possible that one student copied the other. If they worked on the notes together, and spent time to word it in the same way, this would not be considered cheating. However, if this was the case then the students should clarify with their instructor that the notes were worked on together. If this was not the case, this would be considered cheating and it should not be tolerated. From experience, I once allowed one of my friends to look over my class notes. As I gracefully gave them the paper, I didnt think that my friend would copy the notes word for word. A few days later, afterward handing in the notes, we got them back. I looked down at my paper and saw on the top a null written in red marker. I looked over at my friends paper which read the same grade. The teacher had both of us stay after class, and told us that he didnt know who was responsible for pickings the notes, and that either way it was cheating. As the year proceeded, I coul d tell my teacher was always skeptical of work that my friend and I would hand in following this incident. duplicity can lose values of trust, which I felt it did between my teacher and I. Since that day, I shake off not willingly handed pop any of my papers. Since school in beneficial to an individual, cheating defeats this purpose.One of my teachers in high school would continuously retell the saying When you cheat, you cheat yourself. I have seen people cheat their way through high school which does not better themselves in any way. For example, someone in my graduating class had the advantage of being one of the best football players in our conference, and was praised for it by my school and town. When ivy league schools started to recruit him, he reckon he had to step his academic game up. How he did this was unfair because he regularly would copy other peoples work. Students would have no problem handing over papers to him, oblivious to what would happen to him in the lon g run. This phenomenal football player committed to Brown, I knew he had it coming. Since cheating became a regular practice to him, he would not be able to keep up with the academic work shipment at Brown. When asking a friend how he was doing, I heard that he was considering to transfer after the first semester. I assumed that this was because he did not feel like he could handle the school work since cheating had become part of his nature. In addition to cheating to yourself, this practice also includes rancid accomplishment. This football player had the privilege of attending Brown University, but his actions of getting there were unfair. He was a fully qualified football player for the University, but his academic level was a fraud. He faculty feel proud of this accomplishment for getting into and attending Brown, but really he is lying to himself. Cheating should never be tolerated, let alone regularly done because it results in negative effects much(prenominal) as what ha ppened to this football player.Plagiarism is a major form of cheating that is frowned upon. Plagiarism is intolerable at colleges, and has detrimental consequences. In every one of my syllabuss for my college course, plagiarism is addressed. It is clearly stated that if students are caught for plagiarizing, they will be penalized and consequences may even result in expulsion of the course. Plagiarism is defined as the practice of taking someone elses work or ideas and passing them off as ones own. It is unfair for one to claim that their work is someone elses which is why a student is punished for it if they are caught. I have always been taught to make sure that I cite my sources if I have copied or taken information from another source. I am aware of the consequences of plagiarism so I am always careful when taking informationfrom other sources. I have had a friend in high school that got caught for plagiarism. There was no way for her to defend herself for the action, so she rel iable a zero on this paper. There are no excuses for plagiarism which is why it is never justifiable.Cheating in relationships usually results in break ups. This is significant and similar to cheating on school work because as you could conclude from reading this paper, there are no advantages of cheating. One might feel that they will never get caught for such an action, but they themselves cannot feel satisfied for their work since it is not their own. My experience of handing out my paper to my friend made me more aware of the outcomes which could occur due to this action. This is why I have never cheated since this has happened. My observation of the football player at Brown demonstrated the false representation he played in regards to his academic achievements. The severe repercussions plagiarism creates are enforced at schools and universities throughout the world. Cheating is never acceptable on school work since there is nothing good that comes out of it.

Sunday, May 19, 2019

PROJECT ON CUSTOMER RELATIONSHIP MANAGEMENT WITH RELIGARE SECURITIES LTD Essay

The solitary(prenominal)iance back thusly use the in orderion to learn about the style of its clients and improve the way it does a worry. It can look at recurring complaints from multiple nodes to solve a problem which would otherwise go unchecked with a normal for drags and vigilance organization of the federation. The main fair game of my project is to find effective solution for the node blood anxiety and harmonisely ontogeny the credibility and profitability of the participation.This learn is more(prenominal) related to consumer behavior and perception about the facilities and convenience provided by the family, guest Satisfaction is emphasized in this management. o Helping an enterprise to enable its merchandiseing departments to identify and identify their best customers, manage commercializeing campaigns with clear goals and objectives, and generate musical none leads for the gross sales group.Assisting the organization to improve telesales, acc ount, and sales management by optimizing information shargond by multiple employees, and streamlining animate processes (for example, fetching orders using wide awake devices) o Allowing the formation of individualized affinitys with customers, with the aim of improving customer satisfaction and maximizing profits identifying the nigh profitable customers and providing them the higher(prenominal)est level of value. o Providing employees with the information and processes necessary to get their customers, netherstand their inevitably, and effectively build relationships betwixt the fellowship, its customer base, and distribution partners.CHAPTER 2.OBJECTIVE OF THE STUDYOBJECTIVES OF THE PROJECTA. Title of the project customer Relationship centering (CRM) with Relig argon Securities B. Objective of the StudyThe objective of the project was to analyze Effective node Relationship focus for Relig atomic number 18 Securities Ltd., Pune for that we hold back to understand authentic CRM System and helpfulnesss provided from the company and its effect on Customer Needs, Satisfaction Level, their receipt and emotions.The objective of this take up to analyze existing customer satisfaction as those customers argon the headstone sources to crude customers with respect to the performance, sales efforts and sales servicing. As the company stands second in India in aspect of overturn after Kotak Mahindra Securities, its clear that it has very strong Customer Relationship circumspection System and stomach sex community to handle it properly for the benefit of customers and company as tumefy. Actual and someoneal meeting with existing customers and employees has brought me to the reality of the effectiveness of the system and their success. For analyzing the alike factor I passd my whole duration of the project and concurrently for internal study and market watch and other separate assignments.Questionnaire is based on the existing go and the satisfaction level of the existing customers which includes questions like Name, Age, Gender, Income, Investment Frequency, feedback about operate which they argon provided like conformation, forebodes, suggestions, solutions on stuck money like dead enthronement and tout ensemble. On an average all the customers are happy with the company and look forward to the growth of it. C. Scope of the studyScope the this study is it depart assist Religare to draw and quarter its own Customer Relationship Management system mirror well and it go forth get all the important quashgs before eyes to apply all the achievable ways to provide a vivid function to the customers and accordingly make them loyal and retain them retentive moveing and too to get in the buff customers to be served. Scopes can be stated in few points as follows. o Maintain current / existing customers.o Achieve refreshful potential customers.o Retain all the customers.o profitableness Incremento Reputatio n and credibility Increment, etc.The heart of CRM is not creation customer central but rather to use customer profitability as a driver for decision make and action. Before exploring this assertion, it is reclaimable to review the process of resource allocation as it is practiced in intimately organizations. The budget process largely consists of an extrapolation of the retiring(a). Resource constraints pit single-valued function against function with back room deals that are based on internal politics versus the market get. This decision process has little insight as to what is workings and what is not working (as it applies to the market nonplus) or for that matter why? Without insight relative to cause and effect, the organization has no choice but to follow intuition and anecdote. It is analogous to the story about the exchange VP who admitted that half the advertize budget was wasted the problem was he did not know which half.CHAPTER 3.PROFILE OF THE COMPANY pen of c ompanyReligare go-aheads Limited (REL)Religare, a Ranbaxy get alongr group company, is one of the leading integrated fiscal work institutions of India. The company offers a large and diverse scent of services ranging from equities, commodities, insurance broking, to wealth advisory, portfolio management services, personal finance services, Investment banking and institutional broking services.The services are broadly clubbed across trine key business verticals- Retail, wealth management and the Institutional spectrum. Religare Enterprises Limited is the holding company for all its businesses, structured and world operated by dint of divers(a) subsidiaries. Religares retail ne 2rk spreads across the length and breadth of the country with its front end done more than 1,217 locations across more than 392 cities and towns. Having spread itself fairly well across the country and with the promise of not resting on its laurels, it has in like manner aggressively started eyeing orbiculate geographies Religare Enterprises Limited (REL) is one of the leading integrated monetary services groups of India. RELs businesses are broadly clubbed across three key verticals, the Retail Institutional and Wealth spectrums, catering to a diverse and wide base of clients. The vision is to build Religare as a globally trusted scar in the financial services domain and present it as the Investment Gateway of India.All employees of the group guided by an experienced and professional management team are committed to providing financial care, plump for by the core values of diligence and transparency. REL offers a multitude of coronation options and a diverse bouquet of financial services with its pan India reach in more than 1800 locations across more than 490 cities and towns. REL operates globally undermentioned its acquisition of Londons oldest securities firm firm and investiture firm, Hichens, Harrison and Co. plc. With a view to expand, diversify and introduce o blations benchmarked against global best practices, Religare operates its Life Insurance business in partnership with the global major- AEGON.For its wealth management business Religare has partnered with Australia based financial services major- Macquarie. Religare has also partnered with Vistaar Entertainment to launch Indias root SEBI approved get Fund offering a unique alternative asset class of investments. Religare Securities Limited (RSL), a degree Celsius% subsidiary of Religare Enterprises Limited is a leading rectitude and securities firm in India. The company currently handles hefty volumes traded on NSE and in the realm of online art and investments it currently holds a reasonable share of the market. The major activities and offerings of the company today are Equity Broking, deposition Participant Services, Portfolio Management Services, International Advisory Fund Management Services, Institutional Broking andResearch Services. To broaden the gamut of services o ffered to its investors, the company offers an online investment portal armed with a phalanx of revolutionary features.o RSL is a member of the National bank line Exchange of India, Bombay Stock Exchange of India, depositary Participant with National Securities repository Limited and Central depositary Services (I) Limited, and is a SEBI approved Portfolio Manager. o Religare has been constantly innovating in terms of crop and services and to offer oft(prenominal)(prenominal) incisive services to particular user segments it has also started the NRI, FII, HNI and Corporate Servicing groups. These groups shell out all the portfolio investment decisions depending upon a clients riskiness / return parameter. o Religare has a very credible Research and Analysis disagreement, which not only caters to the need of our Institutional clientele, but also allows their valuable inputs to investment dealers. avocation in Equities with Religare truly empowers you for your investment needs. We ensure you throw superlative merchandise experience through A exceedingly process driven, channelise approach the aright way Research & Analytics and One of the best-class dealing roomsFurther, Religare also has one the largest retail networks, with its presence in more than 1800* locations across more than 490* cities and towns. This performer, you can walk into any of these branches and connect to our highly consummate and dedicated relationship managers to get the best services. The Religare Edgeo Pan India footprinto Powerful seek and analytics back up by a pool of highly sk paralyticed search analysts o good business practiceso Single window for all investment needs through your unique CRNReligare Enterprise Limited, through its subsidiaries, offers a ladder of integrated financial products and services to retail inventors, high net worth individuals, and corporate and institutional clients in India. It operates in three divisions Retail Spectrum, Wealt h Spectrum, and Institutional Spectrum. The Retail Spectrum division offers equity brokerage firm, commodities brokerage, personal financial services, including insurance brokerage and mutual fund distribution internet trading loans against shares and personal loans. The Wealth Spectrum division provides portfolio management services, wealth advisory services, and private client equity services, such as international equity services. The company was formerly known as Religare Enterprises Private Limited and changed its build to Religare Enterprises Limited in July 2006. The company was incorporated in 1984 and is based in New Delhi, India.Industry Profile19Industry ProfileWhile regulation and reforms rich person made major improvements in the quality of the equity markets in India, its rapid growth and development are largely over callable to strong and in force(p) market intermediation. The robustness of the Indian markets today is attributable to a healthy blend of the quali ty of market Structure and efficient intermediation. Even as some(prenominal) countries are instituting procedures to commence. Equity derivative markets, India ranks amongst the top five-spot countries globally in this segment, in less than five course of studys of its introduction.This is an example of the proactive and be onive constitution of the Indian brokerage industry. In the uttermost decade, the Indian brokerage industry has undergone a dramatic transformation. From being made of close groups, the broking industry today is one of the most transparent and form oriented businesses. longsighted settlement cycles and large scale bad deliveries are a thing of the past with the advent of T+2 (Trading day + 2 days) settlement cycle and de satisfyingization. Large and fixed commissions have been replaced by wafer thin margins, with competition driving down the brokerage fee, in some cases, to a few basis points. 20There have also been major changes in the way business is c onducted. Technology has emerged as the key driver of business and investment advice has become research based. At the same time, adherence to regulation and compliance has vastly increased. The orbital cavity of services have enhanced frombeing equity products to a wide run away of financial services. Investor protection has assumed significance, and so has providing them with education and awareness. Greater need for hoodization has induced several firms to penetration the capital market foreign firms are showing increasing interest in taking equity stakes in domestic broking firms. Major developments in equity brokerage industry in India1. Corporate membershipsThere is a growing surge of corporate memberships (92% in NSE and 75% in BSE), and the scope of functioning of the brokerage firms has transformed from that of being a family run business to that of professional organized function that lays great emphasis on observance of market principles and best practices. With prol iferation of unsanded markets and products, corporate character of the memberships is enabling broking firms to expand the realm of their operations into other convinces as also other product offerings. Memberships range from property market to derivatives to commodities and a few broking firms are making forays into obtaining memberships in swaps outside the country subject to their availableness and eligibility. 212. Wider product offeringsThe product offerings of brokerage firms today go much beyond the traditional trading of equities. A typical brokerage firm today offers trading in equities and derivatives, most probably commodities futures, exchange traded funds, distributes mutual funds and insurance and also offers personal loans for housing, consumptions and other related loans, offers portfolio management services, and some in time go to the extent of creating niche services such as a brokerage firm offering art advisory services. In the background of growing opportu nities for investors to invest in India as also abroad, the range of products and services will widen further. In the offing will be interesting opportunities that might bone in the exchange enabled corporate bond trading, soon after its commencement and futures trading that might be introduced in the near future in the areas of interest rates and Indian currency. 223. Greater combine on researchClient advising in India has graduated from personal insights, market tips to becoming extensively research oriented and governed by fundamentals and technical factors. Vast progress has been made in developing company research and refining methods in technical and fundamental analysis. The research and advice are made online heavy(a) lay out and real time glide slope to market research for investors and clients, thus making research important deformity equity for the brokerage firms.4. Accessing equity capital marketsAccess to reliable financial resources has been one of the major con straints confront by the equity brokerage industry in India since long. Since the banking system is not fully integrated with the securities markets, brokerage firms face limitations in raising financial resources for business and expansion. With buoyancy of the var. markets and the rising prospects of several well organized broking firms, important opportunity to access capital markets for resource mobilization has become available. The recent past witnessed several leading brokerage firms accessing capital markets for financial resources with success. 235. Foreign collaborations and joint venturesThe way the brokerage industry is run and the manner in which several of them pursued growth and development attracted foreign financial institutions and investment banks to buy stakes in domestic brokerage firms, paving the way for stronger brokerage entities and possible scope for consolidation in the future. Foreign firms picked up stake in some of the leading brokerage firms, which m ight lead to creating of greater interest in investing in brokerage firms by entities in India and abroad. 6. Specialized services/niche brokingWhile supermarkets approach are espouse in general by broking firms, there are some which are creating niche services that attract a particular client group such as day traders, arbitrage trading, investing in small cap stocks etc, and providing complete range of research and other support to back up this function. 7. Online brokingSeveral brokers are extending benefits of online trading through creation of separate windows. Some others have dedicated online broking portals. Emergence of online broking enabled reduction in exploit be and bells of trading. Keen competition has emerged in online broking services, with some of these offering trading services at the cost of a few basis points or costs which are fixed in nature disregarding of the volume of 24trading conducted. A wide range of incentives are being created and offered by onli ne brokerage firms to attract larger number of clients.8. Compliance oriented With stringent regulatory norms in operation, broking industry is giving greater emphasis on regulatory compliance and observance of market principles and codes of conduct. Many brokerage firms are investing time, money and resources to create efficient and effective compliance and treating systems that will swear out them in avoiding costly mistakes and possible market abuses. Brokerage firms now have a compliance officer who is amenable for all compliance related aspects and for interacting with clients and other stake holders on aspects of regulation and compliance. 9. Focus on formulation and skill setsBrokerage firms are giving importance and significance to aspects such as training on skill sets that could prove to be beneficial in the long run. With the nature of markets and products becoming more complex, it becomes pressing for the broking firms to keep their staff continuously updated with l atest development in practices and procedures. to a greater extentover, it is mandated for certain shells of dealers/brokers to seek specific support and examinations that will make them eligible to carry business or trade. Greater emphasis on aspects such as research and analysis is giving scope 25for in-depth training and skills sets on topics such as trading programs, valuations, economic and financial forecasting and company research. 10. From owners to tradersA fundamental change that has taken place in the equity brokerage industry, which is a global trend as well, is the transformation of broking from owners of the stock exchange to traders of the stock market.Demutualization and corporatization of stock exchanges bifurcated the ownership and trading rights with brokers vested only with the later and ownership being wide distributed. Demutualization is providing balanced welfare gains to both the stock exchanges and the members with the former being able to run as corporati ons and the last mentioned being able to avoid conflict of interests that sometimes came as a major deterrent for the long term growth of the industry. Emerging challenges and outlook for the brokerage industry .Brokerage firms in India made much progress in pursuing growth and building professionalism in operations. Given the nature of the brokerage industry being very dynamic, changes could be rapid and so as the challenges that emerge from time to time. A brief exposition on some of the prospects and challenges of the brokerage firms are discussed below. 2611. FragmentationIndian brokerage industry is highly fragmented. Numerous small firms operate in this space. Given the growing importance of technology in operations and increasing emphasis on regulatory compliance, smaller firms might find it constrained to make right type of investments that will help in business growth and promotion of investor interests. 12. enceinte AdequacyCapital adequacy has emerged as an important d eterminant that governs the scope of business in the financial sector. Current requirements presumption capital adequacy in regard to trading exposure, but in future more tighter norms of capital adequacy might come into force as a part of the prudential norms in the financial sector. In this background, it becomes imperative for the brokerage firms to focus on raising capital resources that will enable to pretend continuous thrust and focus on business growth. 13. Global OpportunitiesBroking in the future will progressively become international in character with the stock markets being open for domestic and international investors including institutions and individuals, as also opportunities for investing abroad. Keeping abreast with developments in international markets as also familiarization with global standards in broking operations and assimilating major practices and procedures will become relevant for the domesticbrokerage firms. 2714. Opportunities from regional finance Regional economic integration such as that under the European Union and the ASEAN have greatly benefited businesses in the individual countries with cross border opportunities that helped to expand the scope and significance of the business. Initial measures to promote South Asian economic integration is being made by governments in the region original at the political level to be followed up in regard to financial markets. South Asian economic integration will provide greater opportunities for broking firms in India to pursue cross border business. In view of several of common features prevailing in the markets, it would be easier to make progress in this regard. 15. return DynamicsAs domestic finance matures and greater flow of cross border flows continue, new market segments will come into force, which could benefit the domestic brokerage firms, if they are well prepared. For instance, in the last three to four years, brokerage firms had newer opportunities in the form of commo dities futures, distribution of insurance products, wealth management, mutual funds etc, and as the market momentum continues, broking firms will have an opportunity to introduce a wider number of products. 2816. arguing from foreign firmsSurging markets and growing opportunities will attract a number of international firms that will increase the pace of competition. Global firms with higher levels of capital, expertise and market experience will bring dramatic changes in the brokerage industry space which the local firms should be able to absorb and compete. Domestic broking firms should always give due focus to emerging trends in competition and prepare accordingly. 17. Investor ProtectionIssues of investor interest and protection will assume centre stage. Firms found not having suitable infrastructure and processes to ensure investor resort and protection will encounter constraints from regulation as also class action suits that investors might bring against erring firms. Thena ture of penalties and punitive damages would become more severe. It is important for brokerage firms to establish strong and streamlined systems and procedures for ensuring investor safety and protection. 29Chapter 4.Literature ReviewLiterature ReviewHistorical BackgroundCustomer relationship management (CRM), a concept that has been around since the mid 90s, has its roots in the technology of sales automation and describe center operations. At that time, it was thought that merging the customer info from the sports stadium (sales) with the call center interactions would way out in more aware interactions with the customer. The concept resonated with user organizations and soon mergers and acquisitions created a host of software vendors all claiming to have an integrated set of capabilities that became known as CRM.On a parallel track, Internet-based tools such as e-commerce, Internet marketing, personalization, and self-help were evolving. These products competed outside of th e CRM sphere due to the newness of the technology, and they were referred to as e-business. When the concepts of CRM and e-business melded together there was a short rate of flow of e-madness where vendors talked about eCRM and e-everything. There are still vestiges of this transition in the industry such as basically using e-business to add value to vendors and referring to it as partner relationship management (PRM) or providing tools for employees and referring to it as employee relationship management (ERM). 31Similarly, enterprise resource planning (ERP) vendors realized that the 360-degree view of the customer has to include transaction data, so they have likewise developed an integrated package with CRM capabilities. Thus from a technology berth CRM consists of a set of applications that address the needs of customer-facing functions that in turn feed a common database that is supported by business analytics. Each vendor has variations on this theme. On the other hands, CR M can be outlined as a process or methodology used to learn more about customers needs and behaviors in orderto manage and develop stronger relationships in an organized way with them. 32Components of CRM1. Contact an cover ManagementRelevant data for customer profile is captured with the help of the software. Necessary information is captured from prospective customers. CRM system stores data in common customer database. The database integrates customer account information and presents it in desirable format to the company. The data is used for sales, marketing, services and other applications. 332. gross revenueSales process management follows a customized sales methodology with specific sales policies and procedures. Sales activities include Product information, Product configuration, sales course catalog and sales quote generation. CRM also provide the history of customer account so that the sales call can be plan accordingly. 3. Marketing and fulfillmentCRM helps the profes sionals in product marketing, target marketing, relationship marketing and campaign management. By analyzing customer and business value of direct marketing can be estimated. CRM also helps in customer retention, behavior prediction, channel optimization, personalization. Customer response and requests can be quickly scheduled and hence sales contacts. 344. Customer Service and supportCRM system provides service representatives with adequate access to customer database. It also helps to create, assign and manage the service requests by customers. Calling format is intented to road customer calls to respective attendants as per the skills and authority to handle special cases. Help desk system is developed to help customer service representative to help customers who face problems with product or service to resolve it. Web-based ego Service means help customer to access personalized information at company website. 5. belongings and loyalty programsThe primary objective of CRM is to enhance and optimize customer retention and loyalty. CRM systems are also useful in determining most loyal and profitable customers and reward. 35The essential link between Marketing, Sales and Customer Service Too often, the three key functions that directly affect customers -Marketing, Sales and Customer Service operate independently of one another. This can create confusion and inconsistency in how you communicate and service your customers. For examples, marketing staff whitethorn come up with a price promotion. However, if that is not communicated to the sales team, the moment could be incorrect billing, which may take time or resources from the customer to rectify and could create ill will and mistrust, making it seem like your company does not adhere to its word. 36Similarly, if a salesperson makes a sale and gives certain guarantees to a customer but those are not communicated to the customer service team or even to the other sales team members, then the customer may fees as if the company is not standing behind its assurance. This can be particularly problematic if there is employee derangement and poor communication between or even departments. This silo effect where information is between vertically in departments that may or may not communicate with each other- could actually damage your business.With comprehensive CRM system, however, customer communication is captured and housed in an accessible database, making the most current information available to anyone who needs it and has access to the system. By breaking through barriers between various business functions and making communication transparent, your company can act in a more consistent and unified fashion with its customers, instilling a greater level of trust and strengthening customer relationships. Religare Securities Limited (RSL) provides a host of financial services under one roof following a ONE STOP SHOP philosophy. It has a dedicated team of professionals to cater to the variety of services to unmarrieds, Corporate and Institutions. The team updates its clients with opportunities with a sense of competitive urgency and risk management. Whats more, their special analysts design customized services for HNI and Institutions. 37Over the years Religare Securities Ltd. has played a prospered role inclients wealth creation. In the process Religare Securities Ltd. also refined itself, as an investment advisor and is poised to provide complete Investment Management Solutions to its valued clientele. The following is the product profile of the company. Equity Broking BSE and NSE Derivatives Futures and Options Internet Broking- Online Trading Commodities Trading NCDEX & MCX Institutional Broking Depository Services NSDL & CDSL Portfolio Management Services NRI Investments Initial Public Offerings (IPO) Mutual Fund InvestmentNEWSReligare Securities bags LIPPER-STARMINE Award for Excellence in Research Mumbai, February 18, 2009 Religare Securities Limite d a wholly owned subsidiary of Religare Enterprises Limited has been recently granted the LIPPER-STARMINE broker award for Earnings Estimates in Midcap Research for 2008. The Lipper StarMine Awards organized by Thomson Reuters, for summation Management and sell-side broking Companies in India, were announced last week in Mumbai. The awards recognize analysts who are more accurate than their peers in forecasting earnings, awarding reference book to those who demonstrate an ability to make accurate estimates earlier than their peers.On receiving the award, Mr. Amitabh Chakraborty, President (Equity), said, We are extremely dashing to receive this award as a validation of our efforts in what was the most difficult and volatile year in stock market and corporate history. It is in these difficult times that the ability of a team to accurately estimate corporate earnings stands its truest test and we havesucceeded in enabling our customers to make informed buy or sell recommendations in order to give above average returns to investors. 40EquitiesWhat is equity?Funds brought into a business by its shareholders is called equity. It is a measure of a stake of a person or group of persons starting a business. What does investing in equity mean?When you buy a companys equity, you are in effect financing it, and being compensated with a stake in the business. You become part-owner of the company, entitled to dividends and other benefits that the company may announce, but without any guarantee of a return on your investments.DematerializationWhat is Demat?Demat is a commonly used abbreviation of Dematerialisation, which is a process whereby securities like shares, debentures are converted from the material (paper documents) into electronic data and stored in the computers of an electronic Depository (SEE next page). You surrender material securities registered in your name to a Depository Participant (DP). These are then sent to the respective companies 41who cancel th em after dematerialization and credit your Depository Account with the DP. The securities on dematerialization appear as balances in the Depository Account. These balances are transferable like physical shares. If at a later date you wish to have these Demat securities converted back into paper certificates, the Depository can help to revive the paper shares. What is the procedure for the dematerialisation of securities? retrovert with a DP as to whether the securities you hold can be dematerialised. Then open an account with a DP and surrender the share certificates. What is a Depository?A Depository is a securities bank, where dematerialised physical securities are held in custody, and from where they can be traded. This facilitates faster, risk-free and low cost settlement. A Depository is akin to a bank and performs activities similar in nature. At present, there are two Depositories in India, National Securities Depository Limited (NSDL) and Central Depository Services (CDS). NSDL was the first Indian Depository. It was inaugurated in November 1996. NSDL was set up with an sign capital of Rs 124 crores, promoted by Industrial Development Bank of 42India (IDBI), Unit Trust of India (UTI), National Stock Exchange of India Ltd. (NSEIL) and the State Bank of India (SBI). Who is a Depository Participant (DP)?NSDL carries out its activities through business partners Depository Participants (DPs), Issuing Corporates and their Registrars and Transfer Agents, Clearing Corporations/Clearing Houses. NSDL is electronically linked to each of these business partners via a transmit link through Very Small Aperture Terminals (VSATS). The entire integrated system (including the VSAT linkups and the software at NSDL and at each business partners end) has been named the NEST (National Electronic Settlement & Transfer) system. The investor interacts with the Depository through a Depository Participant of NSDL. A DP can be a bank, financial institution, a custodian or a broker. 43Chapter 5.Research mannerology44Research MethodologyResearch instaurationResearch design means adopting that type technique of research which is most suited for the research and study of the problem. For the study and the research of the problem proper material has to be selected and slanged for the investigation. A research design is the arrangement of conditions for collection and analysis of data in a manner that aims to combine relevance to the research purpose with economy in procedure. Jahoda, deutish. Cook.In order to know about effectiveness of Customer Relationship Management in Religare Securities Ltd., it was necessary to interact with the customer. The sample taken comprised of respondents from Pune city. A questionnaire had to be designed to collect valuable information from the diametricalcustomer groups. The questionnaire which was designed suitably to meet the objective of research work. 45Nature of ResearchIn this project report I have undertaken quan titative type of study. sheath of the questionsThe questions in the questionnaire asked to the visiting customers of Religare Securities Ltd, Regional office in Pune, are Straight Forward and Limited Probing. emblem of the QuestionnaireThe questionnaire in this project report is straight forward and formalized. Type of AnalysisThe analysis done in this particular project report is statistical. 46Sources of selective informationa. Primary informationThe Primary data are those data which are collected fresh and for the first time and thus happen to be pilot burner in character. The primary data that was collected through interview conducted in Regional Branch with fooling visiting customers. The primary data sources include copies of questionnaire and data of their respective responses. b. secondary winding DataThe secondary data are those which have already been collected by someone else and which have been passed through the statistical process. Secondary data was collected thr ough company websites. Some of the web sites http//www.religaresecurities.com/ and some others like. 47Chapter 6.Primary Data Collection48Primary Data CollectionResearch TechniqueAs the researcher, I adopted survey method as a research technique for this particular project report. Contact MethodI as a researcher interviewed the respondents by personal interview. Sampling Plana) PopulationThe nation covered in this project report refers to the existing (Office Coming) customers of Regional Office, who have their trading and Dmat A/c with Religare Securities Ltd. b) Sample SizeThe sample size undertaken by me for this particular project report is one hundred respondents. 49c) Sample ElementThe respondents contacted and interviewed in this project report are all from diametrical domain some of them were phone linemen, High Net-worth Investors, Proprietors, even Students also invest in Share Market. d) Sample endAs a researcher, I conducted this survey only for the customers in Regi onal Office of Religare Securities, Pune. e) Sample sequenceThe survey was undertaken from the 01st June, 2009 to 30th July, 2009 i.e. for two months. f) Research InstrumentQuestionnaires containing both open cease and close ended questions were used as a research instrument in this particular project report. 50Chapter 7.Data Analysis & interpreting51Data Analysis & Interpretation 1. RespondentsRespondentsBusinessmenHNIsProprietorsIndividuals spot of respondentsInterpretation in a higher place pie chart represents that research contains 100 respondents which are Businessmen, HNIs, Proprietors and Individuals and they are 30, 8, 24, 38 respectively in numbers and percentages. 30%8%24%38%BusinessmenHNIsProprietorsIndividuals522. Income Group(Annual)Income Group(INR)10000 1 Lakh1 Lakh 5 Lakh5 Lakh-10 Lakh10 Lakh AboveNumber of respondentsInterpretationAbove pie chart represents that the research contained 100 investors and customers of Religare Securities Ltd. All the people were from different different Income group which are in numbers shown above. W e can clearly see sample includes more customers from first income group i.e. INR 10,000 1 Lakh 43%37%13%7%10000 -1 Lakh1 Lakh -5 Lakh5 Lakh -10 Lakh10 Lakh -Above532. conjunction interaction via Email and Telephone Calls interaction Via Email and Telephone CallsInterpretationFrom the above allow of Company Interaction via Email and Telephone calls, we can imagine the satisfaction level of customers and accordingly Customer Relationship is managed through electronic media to maximize the wealth of customers. In Religare broadly speaking dealers are in touch of regular traders / customers and customers also get loyal to the company through this practice. Every call is taped by default for the secernate of orders to buy or sell the stocks and Emails too. ExcellentInterpretationWhen it was asked sudden and on the time answer was the same of maximumpeople, it means the credibility and trustworthiness of the company is on the tallness. Its nothing but the result of Relationship Management. It is said that Share Market means Well of Loss, just Religares Customer dont have any tension in investing because they believe in Companys Researchers and Analysts and their investment tips too. 96%Number of respondentsInterpretationFrom the above answers Customer Relationship can be very well highlighted because out of 100, 43 people have rated Religare on the scale of 1 to 10 and again in remaining maximum customers say that they rate Religare at on the scale of 1 to 10.Every customer has his own value and consideration about Religare because they invest their Hard Earned money and take risk to earn more cause of Religares Services and Attachment and it is all the output of Customer Relationship Management. 4%5. Where do you invest/ trade mostly?Where Customers Invest mostlyEquitygoodCurrencyNumber of respondents661915InterpretationOne general question was asked in questionnaire to know the inv estment flow of customers towards Religare Services. When it was asked why they invest in specific area mostly then it was answered by many people that liquidity market is easy to make money out of investment and take money out whenever we feel not to put. And other reason many customers dont want to invest for long time.And about currency some people were not interested. 66%19%15%EquityCommodityCurrency576. Where do you trade mostly?Where Customers Trade mostlyIntraday bringingBothNumber of respondents48371548%37%15%IntradayDeliveryBoth58InterpretationFrom the above view of graph we come to know that maximum people, 61% customers trade in Intraday Trading. On this customers say they like to trade in Intraday because of Short term investment and high level of excitement and sometimes they feel their money seems to sink. Its like One mean solar day Cricket play for many customers. In Delivery, people say here is No / Low Risk, More Money , in this people say if scrip goes down like Satyam, then also we get chance to book profit buying current stocks in low price and putting old stock aside temporarily. Here we find people hesitate to invest in Intraday and confident to trade in Delivery trading. Very less traders population do trade in both area, for few people its nothing but fund managing, if one finds difficulty in making money in Intraday, they simultaneously manage their fund for Delivery, but very few people feel do this type of management. Eventually Religare is the Broking firm and it doesnt lose its attention from making money for its customers and lose its attention from Customer Relationship Management. 597. Do you trade in any other broking firm?Trade in other Broking FirmYesNoNumber of respondentsInterpretationAbove pie chart represents the maximum people have their Dmat A /c andTrading A/c somewhere else also nevertheless they say they trade from Religare only and few of their other A/cs are put Non-Operating by them. Here we get a fact that Reli gares Customer Relationship Management really has something very attractive and attachable to emotions cause of services. Few of them were hesitating succession answering this question.8. be you satisfied with the services provided by Religare? SatisfactionStrongly YesSlightly YesNoStrongly NoSlightly NoNumber of respondentsInterpretationAbove chart represents us the output of Customer Relationship Management with the help of the services and customers satisfaction can show a mirror of the efforts of the company towards making their customers loyal to them. Here 64% customers have selected and stated that they are fully satisfied with the services that they are getting from Religare Securities Ltd. 64%9. Since last how many years you are in field of trading?Since when customers are trading ?Less than 1 yearMore than 1yearMore than 2 yearsNumber of respondentsInterpretationThis question was asked intentionally to know the loyalty of customers with Religare Securities Ltd., which is nothing but the back-screen coding of on screen output. These all things are the proud of Religare and its customers are also very proud to be in Religare. 17%Customer Relationship Management Business Drivers and Benefits It empowers management with a real-time pipelines and forecasting so they can build and focus on high profit, sustainable relationships. It empowers staff wit customer intelligence and best practices to increase their likelihood of successful transactions. It increases customers acquisition, retention, loyalty, and profitability by integrating information across the enterprise. It enables executive and management to gain customer insight. 64Customer Relationship Management Risks Effective internal controls must be in place to prevent customer information from becoming scattered across databases and servers. CRM can be associated with significant revenue cycle. CRM should be kept and handled and carefully kept inside the company only otherwise Customers Databa se can be misused by rivals. Customer Common Findings while contacting Generally people whom I have contacted they were from different domains like Business, Proprietors, High Net worth Income Group (HNIs) and students. Their responses may not be proper because of their hum in Dealing Room. This data is called Primary Data, which is considered very genuine but is this case it misrepresents the Reality and Credibility. 65 Some people, its felt that they gave fake response, with impression that this questionnaire is from Religare Securities internal. Some people did not take it serious because this was not important to them as they are busy for trading at dealing Room. Every data interpreting and statistics cannot be think worthy from their results because this study is for only two months altogether. 66Chapter 8.Limitations67LimitationsFindings are according to the observations.1. Many consultants, vendors, and analysts today define CRM in terms of being a customer-centric busi ness strategy that is enabled by a set of applications that support customer-facing functions and management decision making. That may capture the essence of what CRM is, but while it does not concentrate on the extra expenses occurring on Companys A/c due to increment in expenses in serving customers all the ways and Return on investment means consideration may not be more than expected. Customer may not give that much business transactions which is estimated or expected. 2. It needs specific staffs to handle all the tasks of Customer Relationship Management because the data that is feed in system cannot be handled merelyby Relationship Managers who has to make new customers and take care of their dealings and also to accomplish their additional responsibilities. 68Suggestions69Suggestions1. Short lengtho Project research duration was only for two months, in this tenure neither study nor observation can be done properly. For example, we saw sample plan in that only 100 customers could be contacted and now the problem is- from this samples we cannot think of Macro Level Perception of customers. Many people may be from same point of view and many may not and those 100 people may not contain these type of people. So duration of Research Project should be more than two months. 2. Customer Categoryo To find effective Customer Relationship Management, Broking firm can do one more thing which will be very beneficial to them in finding Asset Customers from the bottom level management to top level management. Religare should adopt system of allotting Customer Categories according to their transactions, due payments, exposure, loyalty, frequency of trading and all. 70o In this system at all the level where CRM is handled and watched by Top class officials of the company, they also get to know the list names and details of the loyal customers and chief operating officer or Board of Directors also get to know replete(p) customers and at last their turnover of the tota l transaction. 3. Affiliated Awareness Programso Religare should arrange affiliated programs within its own groups to come to the sense of new people and accordingly to prospecting and acquiring new customers. o With the help of it companies CRM will help it to get height of success and dominate the world of Services. Because CRM affects Marketing, Sales and profitability and these all can be achieved by CRM. o For E.g., Religare Securities can play few awareness documentaries and Advertisement with Religare Vistaar this will result in getting more and more customers to serve and accordingly Religare can become the first ranker in turnover very soon. 71AppendixI. Copy of questionnaireII. Bibliography,72Questionnaire1. Name________________________________________________2. Contact No________________________________________________ 3. OccupationBusinessman Proprietor HNI Individual4. Income Group(Annual) 10000 1 Lakh 1 Lakh 5 Lakh 5 Lakh-10 Lakh 10 Lakh Above5. How do you find Com pany Interaction via Email and Telephone Calls ? Poor light Good Very Good736. Do you find companys investment tips useful and beneficial? Yes No Cant Say7. Where do you rate Religare on the scale of 10 in terms of Services? 4 6 8 108. Where do you invest/ trade mostly?Equity Commodity Currency9. Where do you trade mostly?Intraday trading Delivery Trading10. Do you trade in any other broking firm?Yes NoIf Yes, name of the broking firm__________________________________ 7411. Are you satisfied with the services provided by Religare? Yes NoSince last how many years you are in field of trading?Less than 1 grade More Than 1 Year More than 5 Year12. What improvement do you want be done in companys services? _______________________________________________________________________________________________________________________________________________________________________________ 13. Which service do you like most in Religare?____________________________________________________________ ___________________________________________________________________________________________________________________ 75BibliographyWebsites =http//deadpresident.blogspot.comhttp//religareonline.comhttp//www.religaresecurities.comNewspapers =The HinduBooks =