Wednesday, July 31, 2019

Big Families Essay

Do you think there were more advantages or disadvantages to being part of a large family in the past? I think that there are advantages but also disadvantages.  It is an advantage because the family is a present that God gives to us for all the life, we have to take care of it and make it stronger as the years pass ; they are our support always, in good and bad moments, even when we don’t ask for help they are there giving a hand. We can count with them at all times, with no exceptions because there is a blood tie but also, and more important, there is an affective bond; which is stronger than any other link in the world. On the other hand, there are some disadvantages too. see more:disadvantages of small family When there is a conflict in the family, people can separate for a while because you need to calm down, take a breath and think the things well. Another weak point is to agree in a meeting point, because putting together a big amount of people is hard, taking into account the different activities and responsibilities of each individual; For example: In a birthday, in Christmas, for vacations or in any special date. I also consider that is a disadvantageous circumstance when we have a problem with a member of the family, and the rest of it starts criticizing you. Another difficulty can be presented when a family (mom and dad) have a lot of kids, and a bad economic situation, because of lack of food and lots of discomforts. In conclusion I can say that having a large family has a lot of benefits, but we have to deal with little problems that could be present with time.

Tuesday, July 30, 2019

Economic Growth and Development Essay

During the beginning of the evolution of economics of development, no distinction was drawn between the economic growth and economic development. During the seventies, the economists thought of distinguishing the economic growth and economic development. When it comes to economic development, there are two different views. The traditional view has been to interpret it in terms of changes in the structure of national product and the occupational pattern of labor force and the institutional and technological changes that bring about such changes or accompany such changes. In this view, the share of agriculture in both national product and employment of labor force declines and that of industries and services increases. Various strategies of development which were suggested until seventies generally focused on rapid industrialization so that the structural transformation could be achieved. For this purpose, the appropriate institutional and technological changes were recommended to bring about such structural changes. According to C. P.  Kindleberger, economic growth means more output and economic development implies both more output and changes in the technical and institutional arrangements by which it is produced. Thus according to this view, the economic development implies growth plus structural change. Structural changes refer to the changes in technology and institutional factors which cause shifts of labor from agriculture to modern manufacturing and services sectors and also general self sustaining growth of output. An aspect of structural change which is of special mention is that during the process of economic development there occurs a shift of the working population from low productivity employment in agriculture to the modern industrial and services sectors having higher levels of productivity of labor. It is quite interesting to note that during the process of economic development the percentage share of the working population in agriculture sharply falls whereas the percentage shares of the working population employed in modern industrial and services sectors substantially increase. Apart from the change in the sectoral distribution of the labor force, there occurs a change in sectoral composition of national income in which while percentage contribution of agriculture to national income declines, percentage contributions to national income of industrial and services sectors increase. This is on account of the various changes taking place namely; a change in the pattern of consumption of national income of the people; economy growing steadily and moving upwards; income level of the people is found to be increasing and various changes that are taking place in the levels of productivity in the different sectors of the economy.

Monday, July 29, 2019

Performing critique Assignment Example | Topics and Well Written Essays - 1250 words

Performing critique - Assignment Example It is common sense to conserve the environment, but this brings about the involvement of other resources from the political structures, independent bodies, and the entire cultural community. The utilization of other dimensions of environmental sustainability is the responsibility of every government. This article critiques the underlying reasons as to why Prime Minister Abbott’s administration decided to scrap out major environmental programs, funds and bodies to reassure of the entire world of Australia’s commitment to conserve the environment. The paper critique indicates that the social advocacies in the country and environmentalists are creating a new parallel government, the â€Å"Government of the Environment† against the administrative government in Australia. This blog qualifies as a critique as it underpins the normal aspects through new perspectives, all addressing environmentalism. On a global point of view, all governments all have departments or ministries of Environment, but are they there per se, to satisfy all entities of a democratic government or are they functional? Human existence is surrounded by the physical environment but threatened by the human environment. The existence of the world in indebted to the incredible resources and ambience provided by the physical environment, but this receipt has attracted a harsh idiosyncratic gratitude from the entire human population. Destroyed it, showing our grateful side to free resources. Since the first civilizations, the environment was an important ent ity that defined the social civilizations. It helped first peoples identify their activities and characteristics. 2 A new ideology then emerged on the conservation of the environment, developing the philosophical aspects of environmentalism. Popular sayings and practices of planting two trees after cutting one and overall conservation of the environment have since then lead on into the 21st century. Towards the

Sunday, July 28, 2019

CIS212 U1 Discussion Essay Example | Topics and Well Written Essays - 250 words

CIS212 U1 Discussion - Essay Example These should level to a situation that is accommodating to the organization at least. The preceding is with reviewing of the security mechanisms to ascertain and ensure that frequent testing is done on them and maintained as well. There are various common means of authentication. The notion is to get the victim known to be what they allude to be. Essentially there is user authentication and entity authentication. As a result, we have form authentication that entails passing in a username and password on web pages to gain access. Cookies are authentication mechanisms as a means to achieve entity authentication. It accomplishes this through the use of sessions. Authentication at the infrastructure will involve the use of DNS names. They are applicable where applications need to allow access to other hosts. In addition, there is spoofing of IP addresses. To make it more viable, integrate with the use of SSL. Using authentication mechanisms that use usernames and passwords is all time favorite. Despite the method being familiar and readily available, it is also weak and easier to penetrate (Ciampa, 2012). Due to its user-friendliness, if precautions are into account like the inclusion of symbols and letters withi n the text then it is the cheapest. A number of issues psyche hackers. First is the fun and satisfaction they attain by hacking. Secondly, they do so to gain some finances. By getting information to third parties, they are paid highly for their services thus it is a means of livelihood to some. They use means like phishing, brute-force attack, dictionary attack, and SQL injection for site hacking. Further cross-site scripting is also applicable. They accomplish this through establishing a plan of execution. Foot printing deals with comprehension of the system they wish to hack just the way a physical gang will prepare to attack a

Saturday, July 27, 2019

The Invisible Man by Ralph Ellison Research Paper - 1

The Invisible Man by Ralph Ellison - Research Paper Example This happens rarely but it does happen and in this kind of scenario we can totally lose our self respect, confidence and will to live. A similar scenario was faced by the narrator of the novel ‘the invisible man’. It is about the person who explains that his invisibility owes not to some supernatural cause of biochemical accident but instead to the reluctance of other people to notice him. He finds himself in a position where he considers himself as invisible among the people who are sleepwalking around him and thus can’t notice him (â€Å"Invisible man†). This above mentioned instance is also known as â€Å"Alienation". As stated in PsycINFO Database by A. Davids, Alienation is a syndrome composed of five interrelated dispositions: egocentricity, anxiety, distrust, pessimism, and resentment. Alienated individuals are "lone wolves," distrusting their fellow men and apprehensive and ominous about their own future. They tend to apperceive others in their social surroundings as being more alienated than they actually are, yet less alienated than themselves. It is also stated that the alienated person has a "weak ego structure as estimated by experienced clinical judgment." However, when talking about the narrator of ‘the invisible man’, we have to make it crystal clear that his case was different, yet he had most of the symptoms of being alienated as described above. The narrator isolated himself in his room which was a shut-off section of a basement where only white tenants were allowed to live, and disguised himself by we aring dark glasses and a hat. It was not because he had a weak ego structure but he did that because he found ‘white people’ his enemy. One of the reasons that a person can get himself into the state of loneliness is when he isolates himself from the world and decides to live alienated. It is really dangerous for anyone to isolate himself, so it was dangerous for narrator of ‘the invisible man’. As

Friday, July 26, 2019

Collaborative assignments at a workplace Essay Example | Topics and Well Written Essays - 500 words

Collaborative assignments at a workplace - Essay Example Working with others can be very satisfying experience which takes off the pressure from individual to deliver solutions by themselves. In order for a team to work in an environment that boosts the morale of the members, synergy among the players must be established. Synergy is a state in which the creation of a whole is greater than the sum of its parts (Schermerhorn, et al. 2003). The people working in a collaborative assignment commit to the project and leave their egos and individualistic agendas home. They are fully committed to the team and their work efforts are based on mutual respect, good communication and common goals. It is important to create a corporate culture that promotes teamwork, collaboration, openness and friendship (Nohria & Groysberg & Lee, 2008). There are different scenarios that can hinder the ability of a team to work effective which ends up lowering employee morale and forming teams that are ineffective. One important consideration is group size. The optimal size of a team is one that is between five and seven members. If a team is too small the members have to take too many responsibilities and can not truly perform team exercises such as brainstorming sessions. Teams that are too large are hard to manage and are susceptible to having many members who slack off and let others do the work. Another important consideration is the way leadership is managed within the team setting. It is not good to foster a work environment in which team member and leaders only interchanged ideas and work tasks based on the assumption that they are doing something in exchange of getting some sort of consideration or specific reward back in exchange for the information (Collaborative Teams, 2008). It is better for the leaders of team to beco me mentors that are there to help out the other members of team without expecting anything in return. Under no circumstance should a team leader or any other

Is Justice Scalia Wise Enough in His Supreme Court Rulings Research Paper

Is Justice Scalia Wise Enough in His Supreme Court Rulings - Research Paper Example The jurist is a fervent champion of the authority of the executive arm of government; he believes that the original ideology of the authors of the American constitution was to establish and protect a powerful presidency to ensure stability of the nation. In his rulings the judge rejects double standards in the application of the law such as policies aimed to empower minority groups. Talbot (43) avers that Scalia often files separate minority verdicts in which he criticizes the majority decision. This paper explores the philosophies of Justice Scalia as evident in some of the Supreme Court rulings he has made on discrimination and criminal procedure. Justice Scalia is widely described as a conservative figure on the bench, implying that he offers the Constitutional interpretation in letter and spirit of its key architects of the eighteenth century (Bramwell 370-375). In his rulings, the justice captures the philosophies that inspired the Amendment to the Constitution. Scalia believes various constitutional changes to the US laws should be interpreted with respect to their essence at the period of amendment. Nevertheless, the justice is at pains to explain his judicial approach relative to the verdict of Brown v. Board of Education of 1954, which declared segregated learning facilities illegal. The ruling also cited the Fourteenth Amendment, which the justice interprets otherwise, as a deciding factor in the case. The enactment of the Amendment contradicts Scalia’s observations as it allowed corporations some rights under the constitution (Niose 16-21). It is arguable that the architects of the Fourteenth Amendment wanted to enhance school segregation. Scalia however, says he would have rejected school segregation in America, an opinion which is driven by the need for a real united America. According to Scalia and Ring, the justice enthusiastically rejects the notion of an evolving society guided by an â€Å"adjusting† set of laws (9-11). Scaliaâ₠¬â„¢s ideology implies that it is beyond the mandate of the court to adapt the constitutional interpretation. The justice sounds an alarm that if Americans accepted the fact that constitutionalism should be modified to suit an evolving society, the dangers of evaluating changing standards may be tantamount to believing that the evolution has boiled down into one's personal opinion. Nevertheless, by comparing the Constitution with original statutes, which should be bequeathed future generations in its letter and spirit, the philosophies advanced by the justice may fail to enable the modern American society to manage new cultural trends, some of which may be good and promote peace and stability in the world (Lakin 47). Additionally, due to the fact that laws are crafted to serve justice, the evolution of the values of the American society may turn the people into â€Å"slaves† of their forefathers’ ideologies if Scalia’s philosophies are anything to go by. Plainti ff has an upper hand Scalia’s philosophy on criminal procedures is largely in favor of the plaintiff. For instance, he rejected the Court's landmark ruling in Miranda v. Arizona, which offered guidelines on the treatment of criminal suspects. The ruling held that a testimony by a suspect in police custody who is ignorant of his rights was unconstitutional. Scalia’s verdict to judicially review Miranda in the Dickerson v. United States case of 2000 hit a snag, when he found himself in the minority,

Thursday, July 25, 2019

Kerzner Office Equipment Essay Example | Topics and Well Written Essays - 1250 words

Kerzner Office Equipment - Essay Example The compny mngement hd limited time to prepre this celebrtion nd needed high performnce tems for this project. Shiseido's mngement ws frid tht on bdly plnned projects this stge often involved considerble negotition nd ltertion to the pln. It ws likely tht Shiseido's wild hve lots of chnges to mke to the pln nd tht the mngers did not relly understnd the pln (Shiseido Home Pge 2007). The problem ws tht the nniversry ws coming but nothing ws redy for the celebrtion (Burkun, 2005). 2. To void too much chopping nd chnging t this stge, Shiseido decided to involve the mngers so tht this pprovl stge becomes formlity. To improve the sitution nd 'sve' the project, Shiseido motivtes its workers finncilly nd personlly, nd sets relistic objectives. The new objectives hve motivted tem running the project, nd motivtion ws creted by setting relistic trgets tht the project tem. Its executive tem spent time with the people involved getting them to tell how things will work (Frme, 2002). 3. This sitution provides the opportunity nd motivtion for the compny nd its employees to think hed bout the project they re undertking. This process tends to revel problems nd therefore helps find solutions to them. Problems get solved while they re still smll, remote problems (Gry nd Lrson 2003). Few problems re overlooked nd left until they loom lrge. The more people tht the compny gets involved in this thinking-hed process, the better the project will be. Shiseido cnnot get someone else to do it. If nothing else, project plnning systems provide focl point bout which the project tem cn spend some time thinking bout the future, spotting problems nd overcoming them (Shiseido Home Pge 2007). Jgur Crs 1. Jgur Crs is luxury cr mnufcturer relying on innovtion technologies nd new methods. Working on 'SfeIT" progrm, Jgur Crs hs to crete high performnce tem nd meets tine limits. The project mnger ws busy trying to blnce the three objectives of the project: time, cost, nd qulity, when the specifiction suddenly chnges. SfeIT" progrm ws prt of UK. Government's progrm nd needed creful plnning nd effective mngement. gret dnger is where the cost nd time limits re precise nd the project is not. Jgur Crs found the scope of the project growing, putting the mngement under more nd more pressure s the cost nd time limits did not chnge (Frme, 2002; Jgur Compny 2007). 2. The nture of the project nd the type of resource required chnge t key dtes. The min problem is tht in softwre development projects there is very little with which to mesure progress (Frme 2002). For this reson softwre development is broken down into discrete stges seprted by key dtes or milestones. It gives the project mngement tem something to mesure ginst. s mny softwre projects re very similr to ech other, stndrd sets of milestones nd phses. This process explins wht ech stge in the project should chieve, wht informtion is needed to begin the stge, nd wht informtion should be vilble t the end. Phses hve nmes such s design, coding, nd testing. Key dtes id the preprtion of summry report-the report cn summrize the project in ten or dozen key dtes (Burkun, 2005). 3. pplying this pproch, Jgur Crs ws ble to meet objectives nd finish the project on time. lso, it creted high performnce tems nd improved communiction mong employees. in this project, the leder who concentrted only on the tsk did well in the short term. The tem gve tht leder

Wednesday, July 24, 2019

Post-Stonewall LGBTQ Civil Rights and Lesbian Feminism (responses) Assignment

Post-Stonewall LGBTQ Civil Rights and Lesbian Feminism (responses) - Assignment Example gard, the topic is properly covered by the writer; however, the major issue that arising in relation to his/her presentation is that he/she did not focus on other extra information, but rather focused strictly on answering the three major questions that guided the task. The writer begins properly by providing a discussion the directly answers question one. He/she goes further provides supportive information regarding the facets of the first question. However, discussions regarding the second and the third questions are presented in a vague and a generalized manner, with the writer using only one in-text citation. In addition, he/she goes further and describes the pertinence of the week’s reading towards enhancing his/her understanding of the issues of LBGTQ community. There is also the use of poor language i.e. â€Å"we realize† and lack of adequate referencing. However, the entire presentation is quite appropriate as it depicts that the writer made an attempt to answer all the research questions, except for the vague discussion of question 2 and

Tuesday, July 23, 2019

About animal extinction Research Paper Example | Topics and Well Written Essays - 1250 words

About animal extinction - Research Paper Example Presently, most of the species that are endangered such as the Black Rhino and the South China Tiger can blame the humans for their situation (World Wildlife Fund). This is because climate change, which has been affecting most species, was caused by humans. Currently, the planet is at the stage of mass extinction where many species are dying off. According to scientists, the planet is currently losing the largest number of species since the time of the dinosaurs, which is 65 years ago. In addition, between 30 and 50 species might become extinct by mid-century (The Extinction Crisis). When taking the issue of extinction into consideration, the dying-off of one species leads to other species also becoming extinct. This is because of the ecosystem balance, which changes when a certain species is wiped out of the system as species depend on each other for survival. Therefore, extinction of one species leads to another’s extinction. Generally, when a species cannot survive in its original inhabitant and cannot re-locate or adapt in the conditions of a new environment, it dies off. According to statistical data, the average lifespan of a species is approximately 10 million years (The Extinction Crisis). Extinction may occur suddenly e specially when another species that facilitated its existence becomes extinct or gradually over a long period. This can be referred to as the extinction debt where a species becomes extinct a very long time after an event that put its extinction process in motion. Within the previous 500 years, extinction of approximately 1,000 species has been experienced (The Extinction Crisis). However, this this does not account for the many species that have gone extinct even before scientists and researchers got the chance to fully understand and describe them. Specifically, not even the scientists have the exact figure of species that have gone extinct or those that are endangered. As estimation data

Monday, July 22, 2019

Sibling Comparison of Everyday Use Essay Example for Free

Sibling Comparison of Everyday Use Essay Sibling Similar Differences â€Å"Everyday Use† by Alice Walker tells a story of a mother who narrators the visit of her daughter from college and the conflict between her two daughters. The mother, named Mrs. Johnson, gives descriptions of her daughters’, Dee and Maggie, personality and looks, and each daughter description is opposite of each other. Additionally, Mrs. Johnson describes each daughter’s education level, which also differs. The only hidden similarity between these two sisters is the fact each one of them lacks confidence. Dee’s lack of confidence is more implicit, while Maggie’s lack of confidence is explicit. By doing this, Walker has the mother to develop a contrast between the sisters’ personality, appearance, and education, but forms a similarity from each sister’s lack of confidence. Mrs. Johnson first reveals the differences between Dee’s and Maggie’s looks and personality. Mrs. Johnson states, â€Å"Dee is lighter than Maggie, with nicer hair and a full figure† (paragraph 10). This comparison of the two sister show that Mrs. Johnson favors Dee’s lighter skin tone, grade of hair and body shape over her other daughter Maggie. Moreover, Mrs. John describes Dee’s foot as â€Å"neat looking, as if God himself had shaped them with a certain style† (paragraph19). Mrs. Johnson statement makes it more evident that she praises Dee’s appearance more by including God more so in Dee’s creation and never mentions it for Maggie’s creation. By her favoring the overall look of Dee causes her daughter to feel more deserving of nicer things and seemingly more confident than Maggie. However, this pedestal that Mrs. Johnson put Dee on, makes Dee feel superior to her family that causes Dee to reject her heritage and upbringing. Contrary to Dee’s look and personality, Maggie is described to be less appealing and confident. Mrs. Johnson portrays Maggie to be â€Å"thin† (paragraph 7) and that â€Å"good looks†¦passed her by† (paragraph 13). This portrait of Maggie is insulting for a mother to say and exposes Mrs. Johnson favoritism. Additionally, she compares Maggie’s walk to that of a hit dog, showing that she prefer the overall look of Maggie. Mrs. Johnson then describes Maggie to always be â€Å"chin on chest, eyes on the ground, feet in shuffle†¦Ã¢â‚¬  (paragraph 9). This description shows that Maggie lacks confidence to the point that she feels lower than people, especially her sister, and undeserving of things unlike her sister. The major contrast between the sisters is their education level. Dee is the sister that goes to college and seems to better herself, while Maggie stays at home and mostly taught about things from her heritage. Dee is said to â€Å"read without pity† and â€Å"force† (paragraph 11) unwanted knowledge unto her family. Dee believes that this knowledge makes her higher than her family that creates a separation between her and her family. Also by gaining this knowledge she is looking for an outside life and not that of her mother and sister. In order to do this she feels as though she must change her name. While Maggie, on the other hand, does not receive the same education, but instead take on her mother ways and lack in education. Maggie reading is described as choppy with stumbling. In addition, Mrs. Johnson makes it know that Maggie â€Å"is not bright† (paragraph 13) revealing that Maggie is uneducated. Maggie is less educated than Dee because their mother pushed education more on Dee. The reason Mrs. Johnson emphasis education more on Dee is because she felt that Dee was more suited for that high level life, more so than Maggie. Maggie’s lack of education causes her to accept her home life, stifling her from ever experiencing the outside world beyond their mother’s yard. Walker may have set this educational difference up to show the dangerous that too much knowledge can lead to alienation, while the dangers of too little of an education can suppress a person’s fulfillment, which these two sister show. Even with all these difference, both sisters share one ultimate similarity of lacking confidence in some aspect of life. Maggie is seen in the forefront within her personality. Maggie is seen as shy and timid because of lifelong comparison to her sister that causes her not to feel worthless. Additionally, the scars she receives from the fire enhanced her lack of self confidence making her want to hide in the shadows. Similar to her sister, Dee shockingly lacks in confidence. Unlike Maggie, Dee does not seem to be lacking in self-confidence.

Sunday, July 21, 2019

The South Korean Plastic Surgery Craze

The South Korean Plastic Surgery Craze Plastic surgery has become a craze among South Koreans since the beginning of the twenty first century. South Korea has the highest rate of plastic surgery than any other country in the world, with 74 procedures per 10,000 people (Winchester, 2013). Majority of people in Korea believe that facial appearance is an important factor in measuring one’s success in life. This paper argues that plastic surgery in South Korea needs a limitation and the plastic surgery craze in Korea has to be stopped. Three reasons why plastic surgery has to be reduced are because of plastic surgery addiction, standardization in physical appearance and side effects of cosmetic operations. Plastic surgery was introduced in Korea by Dr. Ralph Millard, an American plastic surgeon, who arrived in Korea in 1954 and performed double eyelid surgeries for Korean patients (Stone, 2013). Millard’s role was to help treat accident and burnt victims but he decided to help in a different way. Millard thought that a more western appearance would help Koreans assimilate better in the emerging international economy. (Millard. R, n.d.). The surgery quickly caught on and the first aesthetic surgery clinic opened in Korea in 1961. From then, numbers of women undergoing plastic surgeries increased from year to year. Currently double eyelids and nose jobs are so common that they are not named surgery but called as â€Å"procedure†. It is true to say that once Koreans desired to look more western, but nowadays cosmetic operations are not to look more western but to look more stunning as what Koreans think. According to Dr. Hyunenong Park (as cited in Stone, 2013), a plastic su rgeon in Korea, said â€Å"Even though many Caucasians have small and slim faces, it doesnt mean Asians want to be like Caucasians. If you inspect some Caucasian celebrities, you find countless examples of prominent jaws and high cheekbones. Nonetheless, if you inspect Asian celebrities, they all have small jaws and cheekbones. That’s because small and slim face is ideal to most Koreans†. This shows that Koreans undergoing plastic surgeries still look for distinctively Korean feature, rather than looks similar to Caucasian. Some people argue that plastic surgery boosts self-confidence and decreases the rate of depression in patients. Patients suffering from a health issue related to physical appearances had a great change in how they feel about themselves after procedure. For instance, a study found that patients who surgically altered their physical appearance, claimed to achieve their goal, felt healthier, less anxious and developed more self-esteem compared to those who chose not to have plastic surgery (Royal University of Bhutan, 2013). Moreover, researchers found out that plastic surgery plays a major role in decreasing depression in patients with appearance issues. Research carried out by the American Society of Plastic Surgeons (2006), demonstrated a high correlation between plastic surgery procedures and mitigating depression in patients. The research showed 31 percent of the patients electing for the procedure who was currently on anti-depressants, had stopped taking anti-depressant medication for six months, after the surgery (American Society of Plastic Surgeons, 2006). This shows that plastic surgery does play an important role in enhancing ones self-esteem and decreasing the level of depression but overdone plastic surgeries are causing major problems in our society. Peoples obsession with plastic surgery, is one of the reasons why plastic surgery needs to be reduced. Most of the people have something they don’t like about their appearance, but if it is not serious and does not affect our daily live, it is not necessary to undergo surgeries. Whereas in Korea, people have become more open about ‘reconstructing’ their face and procedures like eye-and-nose jobs have become what they call â€Å"basics† Furthermore, people’s obsession with plastic surgery is moving on from the ‘basics’ to radical surgical operations that require long painful recovery period which is potentially dangerous surgery (Standen, 2013). These people who are not satisfied with their current appearance and go through numerous procedures are suffering from Body Dysmorphic Disorder (BDD). BDD refers to people who continually find flaws in areas where there are no flaws and need to proceed several times of surgeries (ADAA, n.d.). They perceive themselves as being ugly while others could see him or her as physically attractive and are hardly satisfied with their appearance. Many people in Korea are currently experiencing this disorder but they are not conscious about it and this can lead to severe side effect. For example, a former Korean model Hang Mioku, addicted to plastic surgery, injected cooking oil into her face because plastic surgeons refused to perform any more plastic surgeries on her (Nair, 2013). Her face is badly disfigured but she is still desperate for softer, smoother skin. This Korean model is actually suffering from BDD but she is not conscious of the fact that she has a mental disorder. Another reason why there needs to be a limitation to plastic surgery is because careless operations cause serious side effects. According to the Korean Consumer Agency (as cited by Lim, 2014), rate of medical dispute on cosmetic surgery was the highest of all medical disputes in the year 2013 and it increased 28.5 percent more in the year 2014. Due to the enormous expansion of aesthetic surgery industry, plastic surgeons are not enough to cover all the patients and as a result, many unqualified plastic surgeons or doctors from other medical fields known as the ‘shadow doctors’ are doing procedures for. Shadow doctors, substitute plastic surgeons, are reported to be the main cause of the huge increase in medical incidents that were reported in recent years (Yoo, 2015). 70 percent of plastic surgery malpractice suits that were reported are from asymmetric problems followed by prosthesis failure, inflammation and post-scars (Lee, 2015). These side effects lead to health and mental diseases or even death. For instance, Kim Bok Soon, a patient who wanted to have her nose done to gain more self- confidence, was convinced by an unqualified doctor to have fifteen operations done to look like a celebrity but the result came out as a disaster. After the procedure, she cannot close her eyes or stop her nose from running and is currently suffering from chronic depression (Carney, 2014). Not only this, but a Chinese woman was found brain dead while undergoing combined eye and nose procedure in a clinic located in southern Seoul (Choi, Park, 2014). She suddenly stopped breathing and lost consciousness while surgery and was sent to a nearby hospital but was diagnosed with brain death and currently remaining comatose. Lastly, standardization in appearance is also a reason why the aesthetic operation has to be reduced. A series of photos of 2013 Miss Korea preliminary contestants revealed by an anonymous blogger shocked not only Koreans but the whole world and news organizations worldwide. International news presses all at once, criticized on how plastic surgery has turned the 2013 preliminary pageant contestants into almost identical looking people (Lewis, 2013; Odell, 2013; Zimmerman, 2013). Not only contestants but similarly looking women can be easily seen in many places in Korea but especially in Gangnam a district popular for plastic surgery. Christina Lim, who is trying to emulate doll-like features of the K-pop celebrities, said â€Å"Plastic surgery is a normal thing. My friends, they would actually just go on vacation and then they would come back with a new face. In Korea, you go down the street, you see this girl and you walk down the street, you see that girl again. The two girls are actually different person† (Chang Thompson, 2014). As Lim stated, many Korean women desire to undergo operations to achieve big eyes, round forehead, tall nose and v-line shaped jaw lines which is the latest beauty standard in Korea. The problem occurs from people who do not fit the beauty standard. People who are considered as not pretty because they do not fit into the beauty standard have a hard time with getting along with others and fit in to the society. In conclusion, the paper argued about limitation of plastic surgery in Korea. We have looked at how cosmetic operations enhance self-esteem and decrease depression but on the other hand, cause serious problems like aesthetic surgery addiction, standardization in appearance and severe side effects that may lead to death and serious social problems. Cosmetic surgery was a surgery to remove the physical appearances that cause other health disease or mental disease but because it is carelessly done and overly used in Korea, it is causing more problems than benefit to the society. To prevent this, cosmetic operations have to be limited to patients who really need the procedure and not to unnecessary people. Doctors performing procedures should also be carefully examined before they can do any cosmetic operations to patients to avoid any malpractice caused by unqualified doctors. 1

Impacts Of Social Networks On Social Behaviour

Impacts Of Social Networks On Social Behaviour Social network sites have become a global phenomenon that plays important roles in our society today. It is a social milieu that allows individuals to present themselves, communicate with one another and to maintain relationships. These SNSs (Facebook, LinkedIn, Twitter, and MySpace) are rapidly increasing visibly among the University students. Social network does not only influence students learning outcome but it also help the University students to attain social acceptance as well as adapting to University culture which may play central role towards improving their learning outcome. Several researchers revealed that SNS as technological tools can be used to effectively improve student-student and student-teacher interactions in higher institutions. In this regards SNS plays a prominent role in learning environment as a major conduit for getting resources, knowledge, and social support and also provides help for students preparing for or/ finding employment. On the other hand, many researchers observed that students spend several hours in a day attending to different social network sites even during lecturers and library sessions thus creating distractions and reducing the time to focus on their studies. This discourse therefore reviews the benefits and obstacles of social networks on social behaviour and academic performance of students. It also reviews the attitude of students towards the use of technology, SNS and how social network can improve learning style as it portends great promise towards enhancing their academic performance. 1.0 Introduction Academic institutions all over the world especially in developed countries have made tremendous investment in computer and internet infrastructure with the hope that this would result in the utilisation of web-based knowledge resources which may leads to significant increase in academic performance and productivity of students or staff (Oskouei, 2010) . However, this investment may not have yielded the desired goals of increasing learning quality and productivity of the students because these resources are used for both academic and non-academic works (Oskouei, 2010). It has been estimated that young adults are the highest computer and internet users in the world population today, about 46% of them uses it for completing school assignment, 36% for e-mail or instant messaging and 38% for playing computer games (DeBell and Chapman, 2006). Social network sites which are online communication tool that have existed less than a decade allows its users to create public and private profile thus enabling them to interact with people in the same network (Boyd and Ellison, 2008). Social networks can be defined as web-based activities that allow individuals to build public and/or semi-public profiles within a confined system; articulate and connects to list of other users with which they are connected; view and check their list of connections with the ones created by others inside the system(Boyd and Ellison, 2008, Kirschner and Karpinski, 2010). Examples of the new phenomenon of social networks are MySpace, Facebook, LinkedIn, and Twitter. Facebook is the leading social network in many countries followed by Twitter and LinkedIn in popularity. It has been reported that Facebook have 901 million monthly users and more than 125 billion friends connected at the end of March, 2012 (Karpinski et al., 2013). The positive and negative impacts of social network on students social behaviour and academic achievement can be examined by their engagement, collaborative work, creativity, distraction, and grade point average (GPA). Research has shown that students participation on social networks have a positive connection to their engagement, and negative connection to their academic performance. Many researchers indicate that students academic performance can be increased by enhancing their engagement, and it has been stated that students engagement has a significant predictor of their academic performance (Wise et al., 2011). The relationship between students academic engagement and their academic performance is in agreement with (Junco, 2012). They reported that students engagements are powerful forces for psychosocial development and academic success. Social networks have the potentials of improving learning styles, as they provides alternative to traditional teaching format such as creation of online classroom community, and also enhancement of student-teacher and student-student interaction (Merchant, 2012) Social network increases social interactions and allows easy communication between, families, friends, neighbourhoods and global communities. Most social networks incorporate lots of communication tools like mobile connectivity, blogs, photos and video sharing which allows cross-posting to each other as desired by the users (Merchant, 2012) It has been reported that social network interactions allows quality relationships, connectedness, positive behaviours and also sharing of relevant information have been observed on social network sites (Martin Dowson, 2009). Forkosh-Baruch Hershkovitz, (2012), also reported that lecturers, learners, system/software designers, decision makers and students are coming to social network sites for significant educational activities, and also establishes new innovations using interactive and collaborative online journals. Griffith and Liyange (2008) reported that students use social network in their academic studies such group and team based works. In this regards social network plays a central role in learning environment as a major conduit for getting resources, knowledge, social support and socialization for learning distribution (Cho et al., 2007). It provides help for students preparing for or finding employment (Connelly, 2011). On the other hand, researchers have shown that high level of internet usage among adults of certain age group (16-24 years) for social and emotional advancement could be regarded as internet addiction or pathological internet users for the group (Odaci and Kalkan, 2010). Internet addiction is the inability to limit internet usage despite its detrimental effects on social behaviour and academic performance; and also cause of anxiety when internet accessibility is restricted (Odaci, 2013). Young adults that experience difficulties in communication skills in the real life have reported significantly reduction while using social network but in real life their social skill is inadequate and therefore problematic in social behaviour and academic performance (Caldwell Cunningham, 2010; Caplan, 2010; Odaci, 2013). Social behaviour is an indispensable constituent of social psychology that can either be positive or negative. It consists of social determinant such as attitude, self-concept, collaboration, communication, violent behaviour and conflict reduction etc (Bertram, 2009). Social network helps to provide information on direct friendships and also generates a better global modelling for social organisation which determines how individual patterns of social behaviour correlate to group characteristics. The behaviour of an individual can affect the behaviours of others within the same social networks. Social behaviour can, for instance, influence flow of information or behaviours throughout a group (Makagon et al., 2012). Social networks do not only provide an assessment of popularity, but they can also be exploited as a vehicle to gain or access important information (Fetta et al., 2012). According to Lewis et al., (2007), the mass movement of people to the use of social network has instigated researchers into investigating impacts of social networks. It may not be an exaggeration if we say that many modern day young adults, especially students, make use of social network on a daily basis (Boyd Ellison 2007). According to Bryant Bryant (2005), the internet possesses the capability to influence our young adults and students behaviour very easily. This researcher has had experiences with youths/students in the library and classes that spend most of their time chatting and watching sexually explicit resources that might produce negative effects on their behaviour. Arising from the fore going, this researcher intends to study the postgraduate students attitudes as regards the use of social network during formal classes and library in Heriot-Watt University. At the end of the research, recommendations will be made based on the students response. Facebook, MySpace, LinkedIn and Twitter are chosen for this research study because of the large number of students that use these online social networks for chatting and sending messages (Cheung et al., 2010; Golder et al., 2007; Stutzman, 2006). It is essential for the academic institutions to know the positive and negative impacts of social network on students behaviour and academic performances. Benefits and obstacles of social network on educational system Social network sites (SNS) has become one of the useful tools that can revolutionized educational sector to suit requirement to improved knowledge for both student-student and student-teacher interaction. As an effective new culture of learning, social network site (SNS) offers students opportunity to use informal ways to communication, learn and collaborate independent of time and space (Zaidieh, 2012). It also helps teacher to keep constant communication and get feedback from students which improves learning efficiency. Social network sites play major role between students-teachers by allowing students to be in constant connections with other students, educators, alumni, administrators within and outside the academic environment (Jiang and Tang, 2010; Zaidieh, 2012). SNS has the ability to attract, motivate and engage students in meaningful academic practices, content exchange and other collaborations (Mills, 2011). SNS provides student-teacher flexibility in learning, teaching and also the ability to join groups in specific subjects or disciplines and enable them to connect, view photos, videos and instructional activities established by other users of the network (ELI, 2007). SNS gives students and teachers the possibility of repetition i.e to either retrieve information immediately or later which is hard when using traditional methods of teaching (Dobrzanski and Brytan, 2007). In contrast to SNS the non-SNS method such as blackboard and module are much focused and lack personal touch and network capacity of SNS. SNS has the potentials to actively encourage online community building and extend learning beyond the boundaries of the classroom (Smith, 2009; Brady et al., 2010). It provides unique opportunities for educators and instructors to facilitate a very strong sense of community within students and encourages creation of new knowledge and collective intelligence by personal interactions. SNS provides shared forum where students can post or share, and engage in collaborative discussion while sharing common sources like links, video and photos (McCann, 2009). It represents a defined shift towards social and community web-based application that can cultivate and sustain subject specific social networking. It does not only attract people but also hold their attention, propel them, to contribute and bring them back time without number all to get desirable qualities for educational purposes. SNS makes it easy and quick to access, review, update and edit learning materials any time and everywhere (Cheong, 2002) and allows students and teachers to select desirable materials from large quantity of course offered on online. It allows easy distribution of learning materials and reduces stress and increases satisfaction among students. It gives students opportunity to study at their own self-pace and allow them to join bulletin board discussion any time while visiting classmates and instructors remotely in chat room. It overcomes the limitations of space and time in education and allows accessibility of available materials in their sites and also helps to resolves time table conflicts (Zaidieh, 2012). The major challenges of SNS in education sector including lack of privacy, miscommunication and taking up times. Privacy is the major obstacles of SNS in education. Nissenbaum, (2004) described privacy as the contextual integrity which refers to the rules of appropriateness, in confines of the nature and types of information about different individuals within a given context, that is allowed, expected, or demanded to be revealed, and the rules of distribution, in confines of the movement, or transfer from one person to another. It simply means that in social network interaction; individuals have expectations concerning what information is deem appropriate to collect and circulate. Thus, specific types of information are appropriate for sharing among a certain groups of friends but may not be good to open to other social network users outside that group (Pai and Arnott, 2012). Its users express concern about privacy of their personal information and are most vigilant about safeguardin g it (Dwyer et al., 2007). In social network site (SNS), people have lots of friends and the quality and integrity of these friendship are always in question because they are not always 100% honest and reliable and cannot actually verify personal details (age and location) of their members. It also allows accurate and positive self-profile that can be potentially abused by the openness (Zaidieh, 2012). Miscommunication: In most cases, learner (students) face difficulties in expressing their ideas and views in writing as most of them prefer to express their ideas and views orally, the approach they are used to for many years of their studies. Face-to-face allows one individuals to perceive physical clues like tones, reflection, body language in an online environment (Zaidieh, 2012). Taking up time: Social network users spent much time in Internet, and more time online for their studies and works. Most times this causes lack of motivation towards learning and can be bored sitting in front of a computer for a very long time especially when the learning materials presented is free of audio and visual effects that can attract learner towards learning (Zaidieh, 2012). Lenhart et al., (2010) reported that half of the users are idled online for hours from time to time. This finding suggested that the more online time, the more SNS users, took their toll on information consumption through the social network platforms. According to Zhong et al., (2011), more than half of the social network users stated that reading information and watching videos online gave them short time for using non-SNS materials, such as broadcast and printed documents, indicating a move in trend of information from non-SNS to SNS, especially among students. Many researchers observed that students spend several hours in a day attending to different social network sites even during lectures and library sessions thus creating distractions and reducing the time to focus on their studies. For example, in the lecture or library, most students leave their mobile phone on and silently chat on the social network sites and when the lecturer sets an examination, with high expectation of good grades; majority of the students will not do well. This scenario is ominous for both the students involved and the society at large. If this situation is not put under control, it will affect the students focus towards academics and possibly increase the number of students dropping out of school. Pempek, et al., (2009) studied College Students social networking experiences on Facebook using 92 scholars. The study revealed that the students spend minimum of 1 hr. on daily bases with social network. The researchers reported that students spend more time reading the contents from their friends responses, uploading pictures and to keep in touch with friends. Other researchers however, observed that there is no relationship between time spent on the use of social network and students academic performance. Hunley et al., (2005) opined that there is no significant between the time spent on the social networks and the Grade Point Average (GPA) of students. This finding is in agreement with Kolek and Saunders (2008) which observed that social network usage and the GPA of Users have no relationship. On the other hand, Verden Boogart, (2006), reported that social network users have lower GPAs more than non-users. This finding correlates with the report by Flad (2010) that 32% out of 35% of the students that use social network have poor academic performance, and concluded that social network is good for students socialisation but negatively impact on their academic performance. Barratt et al., (2009), observed that many students log onto Facebook many times in a day, thus spending valuable time, if spent on their studies would lead to excellent academic performance. It is necessary to examine whether or not social network involvement by students improves their academic works and social behaviour. How Social network Improves learning style? In the world today, higher institutions explore emerging technologies such as social network sites as a new or improved tool to enhance teaching and learning. Social network sites support student, and boost the integration in the higher education classes. Even though the infrastructures to support social network presently exist in most universities, instructors are slow in adapting to the tools as an educational one. Recently, Sadaf et al., (2012) studied pre-service teachers beliefs about their intent to use social network in their future classrooms. The results opined that half (51%) were committed to the new technology as an instructional tool because it increases student engagement. Brady et al., (2010) studied the use of social network at North Carolina State University. Seventy percent agreed with the notion that SNS made communication skill possible between peers than a comparable face-to-face class. Nearly (82%) indicated that SNS help them communicate outside the class as we ll. Most users (74%) also agreed that SNS allows them to reflect and comments on other peoples work more effectively than a face-to-face class. In addition, Ajjan and Hartshorne, (2008), reported that Social network sites are viewed as useful tools to improve students satisfaction (32%) and also increased student-student interaction (56%). For instance, SNS enables scholars and teachers to remain current in their research areas, and also to explore recent approaches to teaching through networking with colleagues, interacting with different individuals, discussing their research/or work, and also expose their work or research interest to greater audiences. For example scholars use SNS such as blogs to support their scholarly endeavours. Researchers have identified that blogs are used; i) as a debate platform for scholars who seeks a live public intellectuals, (ii) for recording or sharing logs of pure research, (iii) as a type of tongue-in-cheek i.e water cooler to which analytical discussions of only scholarly experience can occur (Kirkup, 2010). Blog usage extends beyond research to include teaching endeavours (Deng and Yue n, 2011). Cho et al., 2007 reported that early Twitter users used Twitter for making instructional information and provide students with opportunities to communicate with professional communities outside the classroom. Future usage of social network In the past few years, social network sites have attracted the interest of researchers which examine the role this technology plays in higher education. Few of the work have showed the affective outcomes of social network site integration. Some of the studies examined learning outcomes and students achievement as related to the educational usage of social sites in college courses. King et al., (2009) described the recent development of an inter-professional team work in the healthcare field that shows how to integrate social networking. The researchers stated that in future integration of an educationally structured social network sites will facilitated growth toward the concept of effective communication which will overcome barrier of distance in learning. Some researchers have also reported that in future social network sites could foster scholarship that is social (Chong, 2010; Greenhow, 2009), conversational and open (Oblinger, 2010; Pearce et al., 2010). Social scholarship is the practice in which the use of social tools is an integral part of the research and publishing process that is characterised by openness, fast conversation, and collaboration, accessible, sharing, cheaper and transparent revision (Pearce et al., 2010). Social network sites which provide digital scholarship is more than just using information technologies and communication skill to research for materials; teach students and collaborate with other, but also to embrace the open values, ideologies and potentials of technologies essential for peer-to-peer networking and also a way of working in order to profit both the academic work and society at large. Picking up the mantle, Greenhow et al., (2009) suggested that todays student experienced different online identities due to new digital technologies at hand (for example; role playing sites, and virtual worlds). They opined that this new development presents a fundamental shift from the non-SNS to SNS and concluded that in future learners participation will be evidenced by inter-connections, content creation and participation attitudes in and out of the classroom. QUESTIONNAIRES A modified questionnaire instrument designed will be used in other to arrive at a general perception as regards to students opinion to the use social networks, behaviour to academic pursuit and social behaviour (Goodson et al., 2005; Pascarella et al., 2009). Considering the advantages of the quantitative approach, the researcher uses questionnaires to get many responses on the students behaviour towards the use social networks during classes and library sessions. There are 18 questions designed to elicit the participants opinion on the use of social network during classes and library sessions, social behaviour and time spent using social networks. Figure 1. Basic model of social behaviour and academic performance of students using social network (Adapted from Paul et al., 2012) The questionnaires measuring each of the following constructs; time spent on social network, predictors of behaviour, time management skills, academic competency, attention Span, student characteristics and academic performance were developed from literature and discussions with supervisor. For example, questions that best describe the factors which explain studentsonline networking behaviour were adopted from Cameron, (2010). Questionnaires that are related to factors such as academic competency, Information on GPA, time management skills, study strategies, student characteristics, etc. are adopted from Mizerski and Pettigrew, (2003); Sansqiry et al., (2004); Paul et al., (2012). The questionnaire adopted five point Likert scale of Strongly Agree, Agree, Undecided, Disagree, Strongly Disagree (Ary et al., 2000). The adaptation of this method is to provide correct and simple grammar in other to achieve the research objectives and also provide answers to the research questions. CATEGORIES OF SOCIAL NETWORK SITES There are many social network sites that exist today. The most popular sites such as Facebook, MySpace, Twitter, and LinkedIn are free registration. All that is required from the prospective users is to provide their profile picture. Social network sites have several categories which are available in the World Wide Web (WWW) (Brown, 2011). Social network categories are the class given to a large groups based on certain functions, features, forms and meaning. Each of the social network categories has their specific focus and functions but all have common characteristics. They have features such blogs, videos, records of members, journal and many more (Othman et al., 2011). Thelwall (2009), reported that social network tools have three main categories as regards to friendship connections, (Fig1.2). The first Category social network is for social communication among members. Facebook, MySpace, twitter, etc. have this feature. Category two, with LinkedIn as example aims at searching for new contacts. Category three is the social navigation network through which specific types of information or resources can be obtained. Figure 1.2 shows about 22 categories available in social network like discussion, education, and library. Most of the website falls into more than one category such as MySpace which can be categories into music and friendship category. Facebook Facebook was originally introduced in 2004 as an online Harvard social network site which allows students living on University residential halls or students from other faculties of the University to register as users and communicate with their fellow students (Zywicas and Danowski, 2008). In 2006, Facebook was made public for everybody (Urista et al., 2009); and in December 2006 it had over 12 million users and at the end of December 2009, the active users increased to 350 million (Hew, 2011). Today Facebook is the most populated social network site in the majority of the countries with more than 400 Million users. In March 2011, Europe had the highest number of Facebook users 234.6 million followed by 163.9 million in North America (Karpinski et al., 2012). Facebook is a social network site in which individuals or groups can share photographs, personal information, and communicate with friends (Hew, 2011). Facebook is also considered as the leading social network site used among college students. For example, Ellison et al., (2007) reported that in USA, 90% of the Undergraduate students Participate on Facebook. In British undergraduate students, Facebook has also become the most popular SNS used (Madge et al., 2009). Munoz and Towner, (2009) suggested that Facebook can have positive impact on college students life, and further stated that students can use Facebook to communicate with other students concerning their assignments, group work or project, or teachers communicating their students regarding useful information on a specific course links. On the other hand, researchers have shown concern in regards to possible negative impacts of Facebook usage among college students. For example, Kirschner and Karpinski, (2010) reported that students spending hours on Facebook may adversely affect their academic performance. Facebook profile can be classified into four main groups: i) control elements, ii) referents elements, iii) preference elements, iv) contact elements. Control elements are fields like the gender of the user, length/period of Facebook membership, and their institutional status. Referents elements include hometown, residence and high school which are based on profile fields or common points of contact among the users. Preference elements are simply based on expression of personal interest and self-descriptive information of the user. For example, About Me, my interests, my favourite Music, favourite movies, favourite TV-shows, favourite books, favourite quotes, and my political views. Contact elements are profile fields such as e-mail address, instant messenger screen name, and the relationship status (Cain, 2008; Lampe et al., 2007). Facebook users can also create groups and become a fan of a particular page of their interest organization such as football clubs, and celebrities thus allowing users with common goal to get together and support the organization or the celebrity. Facebook also serve as sources of entertainment because of the availability of games and other applications. Examples of such games and applications are Crazy Taxi, My Fairyland, and Facebook for iPhone (Hew, 2011). MYSPACE MySpace is one of the popular social networks sites in the world today. It was launched in California in 2003 to compete with other networks like Friendster and Xanga etc (Anderson, 2007). It grew rapidly by taking advantage of Friendsters mistake and failure. According to Anderson, (2007) Indie-rock bands that were expelled from Friendster because of profile problems; moved to MySpace network and began to attract users. There were several advertisements by most popular clubs in MySpace. It is believed that music was not only the key issue that attracted users of MySpace but rather there were symbiotic association between music bands and fans that helped to expand MySpace beyond expectation. MySpace is unique because it allows addition of features based on the users interest (Boyd, 2006). Boyd said that teenagers started using MySpace in 2004 to connect to their friends and not just for the reason that they belong to the bands. MySpace site achieved its highest growth rates with three different groups, namely, the musicians, teenagers and undergraduate students. Among SNS, MySpace gives greater self-expression than the popular Facebook and Twitter. It allows the users to customize their virtual space through an open format in which the designed elements, like text, video, music, graphics and photographs can be used to display their users online personality. With this feature users can create self-image that can be communicated to the mass audience. MySpace also gives the users more anonymity by providing the option of using a nickname. (Kane, 2008; Boyle and Johnson, 2010). Twitter Twitter is a free social network site and micro blogging service which enables the users to read and post short text-based message that is not more than 140 words, called tweets. Some people tweet with micro-blog platform, while others regard it as a social networking site (Bake, 2009). A Web service which allows people to post brief messages to other users of the same service is micro-blogging. It derived its feature from Instant Relay Chat (IRC) including instant messaging and handsets. According to Bake (2009), Twitter is one of the social network web-based applications that allow its users to build their own profile either publicly or semi-publicly. Twitter uses the exact basic features like find people profile and uploading pictures on profile etc. The traditional contacts in twitter are followers and following categories. Twitter does not belong to only SNSs socializing category but also to networking with navigation, (Thelwall, 2007). This network allows you to follow users (following) and also followed by other users (followers) without any authorization. Messages sent are automatically published on the front page of the users (timeline) (Torreente et al., 2012). Any user may reply or retweet any tweet, which can generate public debate and conversation. Links can also be added to the tweets in order to create additional information beyond the 140 words. Some key potentials of Twitter are that it is a window to the unlimited source of information and can be regarded multi-focal. It gives the opportunity to create lists of manage tweets by themes, authors and tags which helps users to manage the information and also easier to follow a particular topic. It is an ideal tool to disseminate information and to broadcast live events such as conferences, and any event worldwide. Twitter is fast and viral i.e. anyone can tweet and the spread of information can be unstoppable. One of the features of Twitter is the ability to include links which makes it easier to move from particular content to another (Torreente et al., 2012). Influence of social network on social behaviour of students Social behaviour is a kind of influence from specific group of people which may positively or negatively affec

Saturday, July 20, 2019

Creatine for Athletic Performance Essay -- Drugs Sports

Creatine for Athletic Performance The Advantages of Creatine for Enhancing Athletic Performance If, about 5 years ago, you were to tell an athlete there was a supplement (which was not an anabolic steroid or other bodybuilding drug) that would help bodybuilders and athletes pack on as much as 10 rock-hard pounds of muscular bodyweight (which could lead to better performance for athletes) in less then 2 weeks; increase their bench press by 25 lbs. (which also would help in enhancing performance) in a mere 10 days; "get a pump like you were loaded on Dianabol"(Phillips 48) (a pump that last for hours and hours which helps in muscle development); and, all the while, help you run faster, jump higher, recover from exercise more quickly, they would probably tell you to get lost. Well all these facts and more have now been proven to be effective on athletes. "Creatine is the safest, most effective supplement out on the market today," says Ron Terjung, a physiology professor at the University of Missouri. Millions of men are buying the dietary supplement, hoping it is the magic pill that can transform them from scrawny to brawny. Creatine has made a strong impact on the athletic world giving many an edge on the competition and enhancing athletic performance. The discovery of Creatine leads back to 1832. A French scientist named Chevreul, identified a naturally occurring organic compound in meat and then was later found to be manufactured by the liver, kidneys and pancreas using three amino acids. The scientist named the compound Creatine after the greek word for flesh(Phillips 8). Creatine is a compound that is naturally made in our bodies to supply energy to our muscles. It is an energy rich metabolite that is found mainly in muscle tissue. It is responsible for supplying the muscle with energy during exercise. Chemically, it is called Methylguanido-acid. Creatine is formed from the three amino acids, argentine, methionine, and glycogen that undergo a chemical process to form Creat ine. Creatine is manufactured in the liver and may be produced in the pancreas and kidneys. It is transported through the blood and taken up by muscle cell, where it is converted into Creatine phosphate; also called phosphocreatine. This reaction involves the enzyme Creatine kinase that helps bond Creatine to a high-energy phosphate group. Once Creatine is bound to ... ...rcise." Scandinavian Journal of Medicine, Science and sports 3 (1993): 143-149. Bamberger, Michael. "The Magic Potion." Sports Illustrated 4 (1998): 58-61. Casey, A. "Creatine Supplementation Favorably Affects Performance and Muscle Metabolism During Maximal Intensity Exercise in Human." American Journal of Physiology 271 (1996): 31-37. Creatine. Available [online]. Address. http://www.vitamin-planet.com/nutrition/creatine.htm Creatine Monohydrate Frequently Asked Questions. Available [online]. Address. http://www.rnlist.utl.pt/~rmlbgs/atpfaq.tex Phillips, Bill. Sports Supplements Review. Golden, Colorado: Mile High Publishing, 1996 Kreider, B. Richard. "Creatine Supplementation." (Internet) http://www.afpafitness.com/Creatine3.html Silila, I. "Supplementary Creatine as a Treatment for Gyrate Atrophy of the Choroid and Retina." New England journal of Medicine 304 (1981): 867-870.(Internet) Timberline, David. "Muscles for Sale: Is Creatine Right for You?" (Internet) http://www.accenthealth.com/mh/intheknow/1999/creatine.html What is the Deal with Creatine? Available [online]. Address. http://www.powersupplement.com/creatine.htm

Friday, July 19, 2019

Essay examples --

Organizational changes have a potential failure rate of 70%, although this rate has been consistent for many decades there are many organizational changes that are successfully strategized and implemented (Maurer, 2010). An organizational change is when an organization goes through a renovation of altering business strategies (Organization change) to strengthen and expand their services to meet a demand of the economy (Ackerman, 1997). According to the chapter on Development, Transition, or Transformation: The Question of Change in Organization by Linda Ackerman in the book Organization Development Classics: The Practice and Theory of Change, there are three types of collective changes that are among organizations these changes are developmental change, transitional change, and transformational change (1997). In this paper I will further discuss the changes in details and will counteract the changes discussed by Ackerman through other approaches or reasoning for the changes. First, developmental changes in an organization consist of an improvement of a skill, method, or condition ...

Evaluation of Dworkins and Habermass Approach to Civil Disobedience E

Evaluation of Dworkin's and Habermas's Approach to Civil Disobedience The following essay will attempt to evaluate the approach taken by Dworkin and Habermas on their views of civil disobedience. The two main pieces of literature referred to will be Dworkin?s paper on 'Civil Disobedience and Nuclear Protest?' and Habermas's paper on 'Civil Disobedience: Litmus Test for the Democratic Constitutional State.' An outline of both Dworkin's and Habermas's approach will be given , further discussion will then focus on a reflective evaluation of these approaches. Firstly though, it is worth commenting on civil disobedience in a more general context. Most would agree that civil disobedience is a 'vital and protected form of political communication in modern constitutional democracies' and further the 'civil disobedience has a legitimate if informal place in the political culture of the community.' Civil disobedience can basically be broken down into two methods, either intentionally violating the law and thus incurring arrest (persuasive), or using the power of the masses to make prosecution too costly to pursue (non persuasive). Dworkin takes a categorical approach to civil disobedience, by breaking it down into a number of different types then applying certain conditions to each type to assess wether the disobedience should be allowed or not. He states that there are three different types of disobedience based on the motivations behind the action. These are integrity based, justice based and policy based civil disobedience. Briefly, integrity based disobedience is motivated when the law requires people to do something that goes against their personal integrity and is usually a matter of urgency. Dworkin gives an example of this as the Northern American citizen who covertly harbours and shelters slaves from the Southern citizens in violation of the Fugitive Slave Act.# The second type of disobedience, justice based, is motivated by a peoples desire to oppose unjust policy in the hopes of reversing the policy, for example the civilian protest about the war in Iraq recently. Thirdly, policy based disobedience is somewhat different to the first two in that it is usually activated by minority groups who think a policy is dangerously unwise. As Dworkin puts it ?they think they know what is in the majority?s own interests.? Given these three types of disobedie... ...rity is not necessarily a clear majority and also that majority decisions are quite often made under the pressures of time and lack of resources. Both Dworkin and Habermas have the same general views on civil disobedience (they both believe it is an essential form of political communication in a democratic state) but when they begin to examine the issues more closely, the differences in justification begin to become apparent between the two writers as outlined above. Bibliography. 1. Articles/Books/Reports Ronald Dworkin, ?Civil Disobedience and Nuclear Protest? in A Matter of Principle (1985) 104-16. JÃ ¼rgen Habermas, ?Civil Disobedience: Litmus Test for the Democratic Constitutional State? (1985) 30 Berkeley Journal of Sociology 95-116. 2. Other Sources Andrew Calabrese, Virtual non-violence? Civil disobedience and political violence in the information age (2004) 6 Emerald Info 326 available at http://spot.colorado.edu/~calabres/Calabrese%20(civl%20dis).pdf William Smith, Democracy, Deliberation and Disobedience (Paper presented at the UK Association for Legal and Social Philosophy Annual Conference, University of Newcastle upon Tyne, April 2003).

Thursday, July 18, 2019

Mobile telecommunication

Mobile phones are now seen as necessities rather than luxuries and market penetration (the percentage of the population owning mobile phones) Is very high and growing. A recent report put market penetration In the western E as a whole at 90 per cent In 2004 and predicted that this will rise to 100 per cent by 2007. In some European countries (including the ELK) penetration is in excess of 100 per cent as individuals have more than one mobile phone.This high level of market penetration in the developed world does not mean that the racket is saturated as the advent of 36 technology has opened up the market and will lead to people trading up to more expensive phones. In addition there is an explosion of demand In the developing world. Current competition It Is necessary to look at two aspects of the market as they are Inextricably linked together – the market for mobile handsets and the market for network operators. In both cases the market is oligopolies, as Tables 13. 13 and 13 . 4 show. The market leader for handsets is Monika. However, its position is under threat -its market share in the UK in 2002 was 52 per cent. Ionians main problem was the failure to recognize and meet the increased demand for camera flip-phones. It responded to this criticism by launching a new range of seven handsets in April 2005. The percentages shares of the other manufacturers remained fairly constant between 2002 and 2004, although LOG is a new entrant and the ‘others' group increased Its market share from 10 per cent to 18 per cent.The market for mobile phone handsets in the UK Manufacturer Monika Siemens Sony Ericson Samsung Motorola Others % share of the I-J market, 2004 36 10 18 Table 13. 3 The market for network operators in the UK Network Avoidance Orange 02 T-Mobile Virgin Mobile 3 Tests % share of the UK market, 2004 25 17 01 source: Minute, 2004 There are three large providers of mobile networks in the I-J, with very little between them in terms of market share . In 2002 Orange was the market leader with 27 per cent of the market while Avoidance accounted for 26 per cent of the market; 3 and Tests are new entrants to the market.The market for pay-as-you-go mobile phones is approximately twice the size of the contract market. Power of buyers Mobile phones are mainly for personal use (by 65. 2 per cent of adults) rather than business use (4. 8 per cent of adults). Statistically, the user of a mobile phone is most likely to be single, young and female. Figure 13. 3 shows the ownership of mobile phones in the I-J by age. Ownership is lowest in the 55 years and over age group and the handset manufacturers and network operators recognize this. 2 is working with Saga (the insurance group for the over ass) to launch a deal for the over-ass and Avoidance launched a new handset called Simply in May 2005 which is aimed at the older racket – it has an easy-to-read screen and larger buttons and does not carry many of the more complex features. F igure 13. 3 Source: Keynote, 2005 Although buyers cannot exert a great deal of market power, the high level of competition and easy availability of information on handset prices and network operators means that it is easy to shop around for the best deal.Threat of new entry The barriers to entry in this industry were very high and included access to networks, the cost of license purchase and the cost of brand building. In recent years these barriers have fallen dramatically. The advent of virtual networks has reduced the necessity for access to a network. Virgin is a mobile virtual network operator (NOVO) as it buys spare capacity from T-Mobile and sells it on to consumers. Tests and 02 have a similar relationship.At one time the handset manufacturers also had to manufacture the base stations (used to provide mobile phone coverage) which were very expensive to produce. This was a very effective cost barrier to entry for smaller handset producers. This is no longer necessary as radio chips and other software can increasingly be bought ‘off the shelf. Manufacture of handsets is being subcontracted by some of the larger handset manufacturers and these subcontractors themselves are starting to sell handsets under their own name.Been is an example of such a company. If this starts to happen on a large scale, there will be a threat to the position and market share of the incumbent market leaders. In Table 13. 13 the category of ‘others' grew from 10 per cent in 2002 to the 18 per cent shown in the table for 2004. A further threat to the position of handset manufacturers is the manufacture of handsets by the mobile operators themselves – Orange, for example, sells own brand handsets. This has the effect of tying the handset user into the operating network.In the ELK, there is evidence that there is room for new entrants – Sends for example, claims a 5 per cent market share in the I-J in 2005. Sends was founded in the UK in 1999 and initially supplied handsets to the network operators. It now supplies handsets under its own name through Internet sales and also through the giant retail supermarket Tests. Another barrier to entry which has fallen in recent years is the ‘switching cost' uncured by users when they change between networks.Although users of pay-as you- go still have to pay a fee for ‘unlocking the phone which can amount to as much as EYE. O, operators will provide handsets free to customers who take out a contract for 12 months. In addition, a major obstacle to changing networks – having to change your telephone number – now no longer exists. Although there are no obvious substitutes for the mobile phone, there a number of developments in this area. The advent of 36 technology which was launched in 2004 mainly for business customers will be extended to personal users by the end of 2005.This will offer better features like AD effects and faster access to the Internet and games. New pr oducts will offer the ability to watch films and sporting events as they happen. BIT has developed a hybrid phone – called BIT Fusion – which was launched in June 2005. Fusion operates as a mobile phone when outside the home but switches to the cheaper broadband line when the phone is inside the home. This reduces the cost of usage. Mobile email is seen as a growth area as Microsoft launched a new version of theWindows operating system designed specifically for mobile phones in May 2005. This is mainly used by business but could easily be extended into personal use. Power of suppliers The large manufacturers now subcontract much of their manufacturing to smaller subcontractors like Sends (mentioned above). On the one hand, this gives them increased flexibility in production but, on the other, it allows the subcontractors to enter the market and eventually to compete in their own right – what is there to stop the operators bypassing the handset manufacturers comp letely?It is likely that this development will change the power relations between the handset manufacturers and their suppliers and could possibly result in co-production and co-marketing of the handsets in the longer term. In the race for market share, manufacturers and operators have to offer maximum quality and range of services. The content becomes crucial. The exploitation of the G market requires the best range of content and handset manufacturers are negotiating deals with content suppliers; Avoidance has teamed up with Disney and Sony to provide content for their phones.These large organizations will undoubtedly have some degree of market power over the handset manufacturers simply because of their size and already established market power. From this analysis it can be seen that, although this market is one with very high market penetration, it is not a saturated market. There is scope for new entry to the market and for the development of new products and new markets. The m arket conditions which gave rise to domination by the large vertically integrated giants like Monika and Motorola have largely disappeared and smaller manufacturers are entering the market.

Wednesday, July 17, 2019

Automatic Room Light Controller with Didirectional Visitor Counter

CHAPTER - 1 extraneousise Overview 1. origin Of Project 1. 1 Project comment Project title is AUTOMATIC way of life LIGHT CONTROLLER WITH BIDIRECTIONAL visitant COUNTER . The tar cling atomic number 18aive of this project is to cast out a conditionler based cast to enumerate take of mortals visiting picky dwell and accordingly spark up the way. Here we posterior use sensing element and butt know present number of persons. In todays world, in that location is a continuous need for self-locking appliances with the increase in warning of living, at that place is a consciousness of urgency for growth rounds that would ease the complexity of life.Also if at in all in all angiotensin converting enzyme wants to know the number of flock present in dwell so as not to have congestion. This circle proves to be helpful. 1. 2 Project Overview This Project Automatic Room Light command with Visitor Counter victimisation Microcontroller is a reliable electrical ra cing circuit that takes over the occupation of controlling the room wakings as healthy us counting number of persons/ visitants in the room very accurately. When somebody enters into the room wherefore the counterpunch is developmented by adept and the light in the room forget be switched ON and when any star leaves the room past the counter is decremented by championness.The light give be sole(prenominal) switched OFF until all the persons in the room go out. The total number of persons wrong the room is similarly displayed on the sevensome segment displays. The microcontroller does the above job. It receives the sign of the zodiacs from the sensing elements, and this signal is operated nether the control of softw ar which is stored in ROM. Microcontroller AT89S52 infinitely monitor the Infr atomic number 18d Receivers, When any object pass with the IR Receivers then the IR Rays drop trapg on the liquidator be obstructed , this obstruction is perceived by the Microcontroller CHAPTER - 2 BLOCK plot AND ITS verbal description 2. 1Basic impede plot come in transcend pass engenderr A T 8 9 S 5 2 manoeuvre Conditioning Exit sensor Enter sensor Light steer Conditioning Power planning Fig. 2. 1 Basic Block Diagram 2. 2 Block Diagram interpretation The canonical plosive consonant diagram of the bidirectional visitor counter with automatic light controller is shown in the above figure. Mainly this block diagram consist of the following prerequisite blocks. 1. Power Supply 2. Entry and Exit sensor circuit 3. AT 89S52 micro-controller 4. electrical put across driver circuit 1. Power Supply- Here we used +12V and +5V dc effect grant. The master(prenominal) bleed of this block is to fork out the required amount of potency to inborn circuits. 12 voltage is condition. +12V is given to pass along race driver. To get the +5V dc agent supply we have used here IC 7805, which provides the +5V dc regulated bureau supply. 2. Enter and Exit locomotes- This is one of the main routine of our project. The main intention of this block is to sense the person. For sensing the person and light we atomic number 18 development the light dependent cross-file (LDR). By utilise this sensor and its link up circuit diagram we can count the persons. 3. 89S52 Microcontroller- It is a low-power, high performance CMOS 8-bit microcontroller with 8KB of flair Programmable and Erasable Read Only retention (PEROM).The bend is fabricate using Atmels high-density nonvolatile computer storage technology and is harmonious with the MCS-51TM instruction band and personal identification number out. The on-chip sporty allows the programme shop to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit mainframe with Flash on a big hip, the Atmel AT89S52 is a sinewy Microcontroller, which provides a exceedingly flexible and exist effective solution so some impla nt control applications. 4. put across Driver rope- This block has the potential to drive the several(a) controlled devices.In this block mainly we are using the junction transistor and the relays. One relay driver circuit we are using to control the light. Output signal from AT89S52 is given to the base of the transistor, which we are further arouse the bug outicular relay. Because of this appropriate device is selected and it do its allotted function. CHAPTER - 3 SCHEMATIC diagram transmitting Circuit- Fig. 3. 1 sender circuit Receiver Circuit- Fig. 3. 2 Receiver circuit * CIRCUIT DESCRIPTION There are devil main parts of the circuits. 1. Transmission Circuits (Infrared LEDs) 2. Receiver Circuit (Sensors) . Transmission Circuit Fig. 3. 3 sender circuit This circuit diagram shows how a 555 meterr IC is configured to function as a basic monostable multivibrator. A monostable multivibrator is a timing circuit that changes press out once triggered, but topics to its origin al solid ground after a certain sentence delay. It got its name from the fact that only one of its getup states is stable. It is in addition known as a one-shot. In this circuit, a negative pulse applied at fall 2 triggers an internal flip-flop that period of plays sour pin 7s discharge transistor, allowing C1 to charge up through R1.At the same eon, the flip-flop brings the siding (pin 3) level to high. When capacity C1 as charged up to about 2/3 Vcc, the flip-flop is triggered once again, this meter fashioning the pin 3 rig low and routine on pin 7s discharge transistor, which discharges C1 to ground. This circuit, in effect, produces a pulse at pin 3 whose width t is but the product of R1 and C1, i. e. , t=R1C1. IR Transmission circuit is used to generate the spiel 36 kHz IR signal. The IC555 in the transmitter side is to generate 36 kHz square wave. Adjust the planned in the transmitter to get a 38 kHz signal at the o/p. round 1. 4K we get a 38 kHz signal. t the reof you picture it over the sensor and its o/p will go low when it senses the IR signal of 38 kHz. 2. Receiver Circuit Fig. 3. 4 Receiver circuit The IR transmitter will emit spiel 38 kHz IR signal and at the receiver we use TSOP1738 (Infrared Sensor). The outfit goes high when the there is an wearion and it return back to low after the succession period determined by the capacitor and resistor in the circuit. I. e. some 1 second. CL100 is to trigger the IC555 which is configured as monostable multivibrator. commentary is given to the Port 1 of the microcontroller.Port 0 is used for the 7- component display purpose. Port 2 is used for the relay work On and Turn off Purpose. LTS 542 (Common Anode) is used for 7-Segment display. And that time Relay will get voltage and triggered so light will get voltage and it will turn on. And when counter will be 00 that time Relay will be turned off. define button will reset the microcontroller. CHAPTER - 4 HARDWARE DESIGN DESCRIPTION S Hardware cast- Infrared Sensor TSOP1738 Microcontroller AT89S52 Relay 7-Segment introduction Timer IC 555 Fig. 4. 1 hit of the entire circuit 4. 1 routine Followed While DesigningIn the antecedent I knowing the circuit in DIPTRACE software. Dip trace is a circuit designing software. After completion of the designing circuit I prepared the layout. Then I programmed the microcontroller using KEIL software using hex file. Then joining serve was done. After completion of the soldering execute I tested the circuit. Still the sought after output was not obtained and so troubleshooting was done. In the process of troubleshooting I found the circuit aptly soldered and connected and hence came to cultivation that there was error in programming section which was later rectified and the want results were obtained. . 2 List of Components Following is the tilt of components that are necessary to build the fictionalisation of the tropeal Speedometer Cum milometer * Microcontro ller AT89S52 * IC 7805 * Sensor TSOP 1738 (Infrared Sensor) * Transformer 12-0-12, 500 mA * Preset 4. 7K * Disc capacitor 104,33pF * determine button switch * Rectifier diode IN4148 * electronic transistor BC 547, CL 100 * 7-Segment break 4. 3 exposition of Components 4. 3. 1 Microcontroller AT89S52 The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory.The device is manufactured using Atmels high-density nonvolatile memory technology and is matched with the Industry-standard 80C51 instruction set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory pro- grammar. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-efficient solution to many embedded control applications.The AT89S52 provides the followin g standard features 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, ii information cursors, three 16-bit timer/counters, a six-vector two-level let on architecture, a full duplex accompanying port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with nonoperational logic for operation down to nought frequency and supports two software selectable power saving sense modalitys. The Idle Mode boodle the CPU while allowing the RAM, timer/counters, concomitant port, and interrupt system to continue functioning.The Power-down sensory system saves the RAM con- tents but freezes the oscillator, disabling all opposite orthogonal chip functions until the next interrupt or hardware reset. FEATURES- * 8 KB Reprogrammable flash. * 32 Programmable I/O lines. * 16 bit Timer/Counter3. * 8 Interrupt seminal fluids. * Power epitome 4V 5. 5V * endurance 1000 Writes / Erase cycles * Fully smooth operation 0 Hz to 33 MHz * Three level pro gram memory lock * Power off flag * Full duplex UART consequent channel * modest power uncivilised and power down modes * Interrupt recuperation from power down modes * 256 KB internal RAM * Dual selective information pointer 4. 3. 2TSOP1738 (INFRARED SENSOR)Fig. 4. 2 Infrared Sensor Description The TSOP17.. Series are miniaturized receivers for infrared international control systems. PIN diode and preamplifier are assembled on lead frame, the epoxy megabucks is designed as IR filter. The demodulated output signal can directly be decoded by a microprocessor. TSOP17.. is the standard IR remote control receiver series, supporting all major transmission codes. Features * word-painting detector and preamplifier in one tract * Internal filter for PCM frequency * break away shielding against electrical field disorder * TTL and CMOS compatibility * Output active low down(p) power consumption * High resistance against ambient light * Continuous data transmission possible (up t o 2400 bps) * Suitable sever length . 10 cycles/burst Block Diagram Fig. 4. 3 Block Diagram of TSOP 1738 drill Circuit Fig. 4. 4 masking circuit 4. 3. 3 555 ( TIMER IC) Fig. 4. 5 Timer IC(555) Description The LM555 is a highly stable device for generating accurate time delays or oscillation. Additional terminals are provided for triggering or resetting if desired. In the time delay mode of operation, the time is precisely controlled by one outside(a) resistor and capacitor.For astable operation as an oscillator, the free running frequency and affair cycle are accurately controlled with two external resistors and one capacitor. The circuit whitethorn be triggered and reset on falling waveforms, and the output circuit can source or sink up to ccmA or drive TTL circuits. Features * Direct replacement for SE555/NE555 * quantify from microseconds through hours * Operates in both astable and monostable modes * adjustable duty cycle * Output can source or sink 200 mA * Output and sup ply TTL compatible * Temperature stability better than 0. 05% per C * unremarkably on and normally off output * Available in 8-pin MSOP package Applications * clearcutness timing * thump contemporaries * sequent timing * Time delay generation * Pulse width modulation * Pulse position modulation * Linear act generator 5. 3. 4 LTS 542 (7-Segment Display) Description The LTS 542 is a 0. 52 inch digit crown whiz digit seven-segment display. This device utilizes Hi-eff. inflamed LED chips, which are made from GaAsP on GaP substrate, and has a red facet and red segment. Fig. 4. 6 7 Segment Features * Common Anode * 0. 52 Inch Digit Height * Continuous Uniform Segments Low power Requirement * Excellent Characters visual aspect * High Brightness High stock * Wide Viewing Angle 5. 3. 5 LM7805 (Voltage Regulator) Fig. 4. 7 Voltage Regulator Description The KA78XX/KA78XXA series of three-terminal positive regulator are available in the TO-220/D-PAK package and with some(prenomina l) fixed output voltages, reservation them multipurpose in a wide range of applications. Each type employs internal electric current limiting, thermal shut down and gumshoe operating area protection, do it fundamentally indestructible. If adequate heat sinking is provided, they can deliver over 1A output current.Although designed primarily as fixed voltage regulators, these devices can be used with external components to obtain adjustable voltages and currents. Features * Output current up to 1A * Output Voltages of 5, 6, 8, 9, 10, 12, 15, 18, 24V * Thermal choke tax shelter * Short Circuit Protection * Output Transistor Safe operating(a) Area Protection 5. 3. 6 pass on CIRCUIT Fig. 4. 8 Relay A single pole dabble degenerate (SPDT) relay is connected to port RB1 of the microcontroller through a driver transistor. The relay requires 12 volts at a current of around 100ma, which cannot provide by the microcontroller.So the driver transistor is added. The relay is used to oper ate the external solenoid forming part of a locking device or for operating any other electrical devices. Normally the relay carcass off. As soon as pin of the microcontroller goes high, the relay operates. When the relay operates and releases. Diode D2 is the standard diode on a robotic relay to prevent back electromotive force from damaging Q3 when the relay releases. LED L2 indicates relay on. CHAPTER - 5 SOFTWARE DESIGN escape CHART Start Infrared Signal Transmission Interrupted from Sensor1 Interrupted from Sensor 2 Turn On Relay Counter Incremented Counter DecrementedCounter set to 0 Relay Turn send off Turn On Light Turn Off Light Fig. 4. 7 Flow chart * If the sensor 1 is disrupt premiere then the microcontroller will come across for the sensor 2. And if it is interrupted then the microcontroller will increment the count and switch on the relay, if it is branch time interrupted. * If the sensor 2 is interrupted depression then the microcontroller will look for the sensor 1. And if it is interrupted then the microcontroller will decrement the count. * When the last person leaves the room then counter goes to 0 and that time the relay will turn off. And light will be turn off. CHAPTER - 6 TESTING AND RESULTSTesting And Results We started our project by making power supply. That is easy for me but when we turn toward the main circuit, there are many problems and issues associate to it, which we faced, like component selection, which components is better than other and its feature and cost wise a We started our project by making power supply. That is easy for me but when I turn toward the main circuit, there are many problems and issues related to it, which are I faced, like component selection, which components is better than other and its feature and cost wise also, then refer the data books and other materials related to its.I had issues with better or correct result, which I desired. And also the software problem. I also had some soldering i ssues which were resolved using continuity checks performed on the hardware. We had issues with better or correct result, which we desired. And also the software problem. We also had some soldering issues which were resolved using continuity checks performed on the hardware. We started testing the circuit from the power supply. There we got over first trouble. After getting 9V from the transformer it was not born-again to 5V and the circuit received 9V.As the solder was shorted IC 7805 got burnt. So we replaced the IC7805. also the circuit part around the IC7805 were completely damaged.. with the help of the solder we made the necessary paths. CHAPTER - 7 proximo EXPANSION FUTURE EXPANSION * By using this circuit and proper power supply we can implement various applications Such as fans, tube lights, and so forth * By modifying this circuit and using two relays we can achieve a task of opening and closing the door. CHAPTER - 8 APPLICATION, ADVANTAGES DISADVANTAGES APPLICATION, A DVANTAGES DISADVANTAGES Application * For counting purposes * For automatic room light control * Advantages * Low cost * loose to use * Implement in single door * Disadvantages * It is used only when one single person cuts the rays of the sensor hence it cannot be used when two person cross simultaneously. CHAPTER - 8 BIBILOGRAPHY Bibliography * Reference Books * computer programming in ANSI C E BALAGURUSAMY * The 8051microcontroller and embedded systems MUHAMMAD ALI MAZIDI JANICE GILLISPIE MAZIDI * The 8051 microcontroller KENNETH J. AYALA * Website * www. datasheets4u. com * www. 8051. com