Monday, September 30, 2019

Income Poverty

The World Bank just updated its estimates of the number of people living in poverty to 1996 and 1998, using 1993 Purchasing Power Parities (PPP) and household survey data (see Table 1 and Table 2). The figures for 1998 are preliminary estimates, based on the most recent survey data available (only a few surveys are available for 1997 and 1998) and actual or estimated growth rates in real private consumption per capita; they will be firmed up as new survey data become available. What story do the new figures tell? First, both the share of opulation and the number of people living on less than a dollar a day declined substantially in the mid-1990s, after increasing in the early 1990s. The same is true for those living below two dollars a day. But the numbers rose again in the aftermath of the global financial crisis. The declines in the numbers are almost exclusively due to a reduction in the number of poor people in East Asia, most notably in China. But progress was partly reversed by the crisis, and stalled in China. In South Asia, the incidence of poverty (the share of the population living in poverty) did ecline moderately through the 1990s but not sufficiently to reduce the absolute number of poor. The actual number of poor people in the region has been rising steadily since 1987. In Africa, the share declined and the numbers increased as well. The new estimates indicate that Africa is now the region with the largest share of people living below $1/day. In Latin America the share of poor people remained roughly constant over the period, and the numbers increased. In the countries of the former Soviet bloc, poverty rose markedly-both the share and the numbers increased.

Sunday, September 29, 2019

Drug Prevention Program

Business Concept Proposal| Drug Prevention Program For| Executive summary This report is a business concept proposal that will help us develop a business plan for our organization which is NBK and that eventually will benefit them. The CSR project that we have chosen is a â€Å"Drug Prevention Program† that will benefit both NBK and society.In this proposal we first gave a small introduction about the company and what other CSRs the company is doing and then we included our aim and purpose of this project which is to increase the awareness level about this problem and provide some possible solutions and also to break all the cultural and society barriers about this specific issue. Then we went on our 4 SMART objectives which are what exactly we are aiming to achieve by the end of the project.In order for us to analysis the market for our proposal we did a Macro and Micro analysis that will help us determine what is our strength and weakness points and what could be the opportu nities and threats that we are facing. Another important part of this proposal is the financial projections. We did an estimated budget including profit and loss account and cash flow. After that we mentioned the requirements considered to ensure our project can be implemented like the logistical and operational requirements and how this may impact on the success of our project.In the viability part we showed our costs and benefit to the organization and its return on investment. Last but not least we talked about the competitive and economic viability on how the different activities that we do will mark us as a strong competitor in the business and on an economic perspective this project is going to benefit the economy as it will provide new jobs for Kuwaiti people and even give them the opportunity to work at NBK. Introduction National Bank of Kuwait is holding an event called â€Å"Drugs Prevention program†. This program is nonprofit event.This event is setup to spread awa reness and take an actual action to people on drugs; or people that doesn’t know about drugs. Many people don’t release how it’s dangerous, serious issue and can cause death. Drug prevention program is will be arrange to give advices and nonprofit rehabs that can be beneficial for drug addicts. Those rehabs will be very helpful to the addicts we as the drug prevention program organizers will provides brochures with full details and contact information. Why we chose NBK? NBK is the oldest bank in Kuwait and it has a very good reputation.Also it has been through a lot of CSR events in various sectors. The campaigns NBK did are Support of National Labor is our first priority, environmental initiative, health care initiative, sport initiative and contributions, education initiative, social care and philanthropic initiative, and conferences and seminars. The activities lies under the support of National Labor are NBK Academy, which intensive training for fresh gradua te that joined the bank and High flier’s leadership program; this program is to develop future leaders.As for environmental initiatives activities are hand-in-hand to preserve our beaches, this campaign launch to clean the beaches of Kuwait and Put your energy into saving energy NBK commenced its energy saving awareness campaign: ‘Put your energy into saving energy’, with staff and summer interns from NBK giving away more than 10,000 long life energy-saving light bulbs at the Avenues Mall. Health care initiative campaigns are breast cancer awareness give discounts for female employees to have a checkups and lectures and seminars for awareness and blood donation; many NBK employees donated blood for the blood hospital in Kuwait.Sport initiative and contribution NBK organized walkathon to encourage people to have a better health and lifestyle. Whereas for education initiative; NBK has hosted high schools and universities to learn day to day operations. Social and p hilanthropic initiative events done by NBK are Do Good Deeds in Ramdan this campaign offer free ftr banquets and Somalia famine relief campaign was launched to donate money. The last but not least the conferences and seminars which were set to increase awareness about currents issue in the society.One of the seminars was on the Global Financial Crisis and its Impact on the Region; which discussed the international outlook. Aim of the project The aim of this project â€Å"Drug Prevention Program† is to benefit the society and this fits in with NBK's mission statement, which is to serve the national needs as a priority. This program will be good for the society as it will increase the awareness level by defining the problem, which is drug usage and then it introduces society to the ways they or the people they know can prevent it and help them find possible solutions and lead them to the right places where they can find treatments.After we make sure people have enough knowledge to prevent this problem, we can expect drug usage to decrease, because they have been introduced to this problem and know all the negatives effects drugs have on the human body. There are a lot of controversial issues in our society and drugs is one of them, so it is very important to bring this topic up to the public and let them know that there is no shame for a drug abuser to admit that they have a problem and that they need to seek therapy.There are also a lot of cultural and traditional barriers that could affect the processing of this program, so our goal is to breach and break all these barriers and expose a problem that is considered as a â€Å"Taboo† topic. It is essential to make a step now, because as we all see, it is a growing issue and the accessibility for drugs is really easy nowadays, that is why our society needs to open up their minds to these kind of problems or else it will affect our future generations. Key ObjectivesSetting objectives is really importa nt for any organization or a project because it will let us know what we are trying to achieve and it will increase our chances of success. Our objectives will deliver major benefits to this program and the most important one that it will define the purpose of this project. We set for our project 4 different objectives for our program (Operational, Marketing, Financial and CSR) and they are all SMART objectives. * Operational Objective: Conduct a seminar every two week in a different location each time while having diverse guest speakers in each location. Marketing Objective: To increase awareness and publicity of the program through sponsored events and media notifications by 20% within the next 3 months. * Financial Objective: To increase customer base of the firm by 7% by the end of the program as a result of the program's positive effect on society. * CSR Objective: Increase community welfare by decreasing level of society's drug administration 15% by the end of program. Having these objectives is like a powerful tool that will help us succeed and it will keep our team motivated and seeks more accomplishments. Feasibility Analysis MacroBefore venturing into a new project, it is important to assess the external environment of a business and what possible impacts can affect the project. The threats and opportunities are external factors that guide a project towards taking certain decisions over others. Social factors: Kuwait, as compared to the rest of the world, receives a generally higher average income. This shows that the majority of the population in Kuwait is on the higher side of the income range. Within the lifestyle changes are the increasing popularity of social media and its different usages within societies.It is a powerful tool to reach as many people within society as possible. Social trends in Kuwait can affect the way people look at the Drug Prevention Program (DPP). Since drug abuse is a taboo topic, tackling it publicly would face some kind of hesitance by the public. Ensuring that local positive public figures as a part of our program would change the attitudes of people in Kuwait. It would garner more publicity and receive more entrants within the program. Technological factors: The increasing usage of technology in these times means more coverage for the DPP.People surfing the net, using social media and/or browsing through the various forms of technologies can find (or be exposed to) items and events that are happening around them and more information about each finding. In order to reach a bigger range of people, the program needs to be technologically updated in terms of websites, social media and pop-up ads if necessary. Technology must also be used to enhance the quality of whatever is being presented and also to improve the organization and efficiency of what is being accomplished.There is no firm, program or organization deemed to be successful without the usage of thorough technology. The marketplace for wh atever that needs to be launched today needs strict technological requirements that need to be met so that it can connect to a wider audience. Environmental factors: There are many factors that influence industries and the industries affected by environmental factors (weather and climate changes) include tourism, agriculture and economic industries. However, there should not be much stress on what environmental aspects can affect the DPP because its nature is not affected by climate changes.As long as there will not be any significant hazard, the environmental factors can be considered as off the radar for this type of DPP. Economic factors: An economy affects the way a society behave and it obviously alternate their decisions depending upon how high or low it is. If the local economy has resulted in higher interest rates, this will mean that firms will be less likely to invest in what might seem like an unpredictable gamble. This DPP needs sponsorship and is based on fund-raiser ev ents to continue the progress of the program, and not much participation will happen if the economic times are low.Another factor of economy is the strength of the currency. Kuwait has a very strong currency and its affects import/export activities, but that will not be an issue because the program does not need much of these activities. If inflation occurs, staff will need higher salaries and this will affect the planned budget. The salaries need to be raised so that the staff can be satisfied when being compared to other raised salaries within the fields and industries. Political factors: When political factors are mentioned, one automatically thinks of the laws and regulations that restrict an action or a project from fully taking shape.Since drug abuse is a taboo topic, there are bound to be limits to what can be done through the project. The law in Kuwait prohibits the live showcase of drugs and substances that can be abused. This can somewhat hinder our performance because it will limit what the group can show a live audience to enlighten them on what needs to be stayed away from. If guest speakers in the form of previous users need to be brought in to enlighten the participants, there will be restrictions due to the law not allowing prisoners to exit their cells and talk about experiences only once their period is over.This means that only ex-abusers who have finished their trials and prison time can enlighten the participants, the newly caught addicts will not be able to. It must be noted that the DPP will not focus much on current abusers who were caught abusing rather than those who willingly wanted to quit drug and substance abuse. Before continuing further with this project, legal framework needs to be conducted so that the project is validated and under the microscopic view of the government ensuring that no illegal limits are surpassed. Legal factors:Laws banning against age and race discrimination will not affect the DPP heavily as the participa tion has no kind of restriction whatsoever. A participant does not even have to be an abuser, or even in contact with one. Since the jobs offered to the staff will not be permanent, there will not be a minimum wage assigned to what the individual salary amount is. There is a law in Kuwait that states: any Kuwaiti national working in the private sector will receive a fixed amount each month as an addition to what a firm is handing over as a salary.This law will not be applied to the DPP because the vacant jobs offered are not permanent positions; it is only in the duration of the events that the assigned staff will be a part of the program. Permission needs to be granted from the governmental censors to give the program the green light to go ahead with the project. After permission has been granted, the banquet hall owners need to be aware of the purpose and activities of the DPP. Macro SWOT Analysis Strengths: * Controversial * Good Cause * Society’s Benefit Weaknesses: * No monetary ROI Costly * Taboo Opportunities: * Program Expansion * Rehab Formation * Brand Image Threats: * Public Decline * Influential Competition * Insufficient funding to continue This drug prevention program has strengths and weakness. The strengths are it controversial many people might disagree to expose the idea or issue; which is currently available and increasing radically. The good cause is that it spreading awareness and leading drug addicts to the right direction. This will benefit the society by having a better living and health.The weakness are that there aren’t monetary ROI; zero profit and it cost a lot there will be a loss in return because this campaign is setup to have better youth to have better society. Its taboo because people in the Arab region see it as shame and don’t attempt that it exists. There are many opportunities for the program; which are to expand the program and format a rehab and boost brand image. The threats are the public decline w hich is the society not accepting the idea. Influential competition is another threat which other companies or banks can launch a campaign similar to ours.The last threat is the insufficient funding; not having enough money or if NBK stops funding us. NBK's CSR programs are successful due to the reason that it encompasses as many fields as it can possibly be a positive addition to. The strengths are the variety of areas that NBK is participating in to achieve and maintain an improved society. It has a diverse selection of activities: social, educational, philanthropic, sports-related and more. NBK has built a positive reputation for itself as a pioneer in merging its daily activities along with CSR activities for the improvement of society.Currently, a weakness is that NBK is not a part of any project or program that supports the fight against drug and substance abuse. The DPP is the right step and opportunity to turn this weakness into strength. Another weakness for the CSR of NBK is that it does not necessarily include the entire society. Without this program, people into drug and substance abuse are sidelined and not given any help or guidance. The opportunities resulting from external factors are that NBK can further push its CSR boundaries and continue in pursuing other untapped fields that need to be brought to the general public's eye.NBK releases a CSR annual report that showcases their social responsibilities towards society. It lists what NBK has done the previous year in terms of initiatives and activities. This shows how the private sectors in Kuwait are competing to be the best CSR champions with the most good done to society. This benefits the society more than it benefits the firms competing to help and improve. An opportunity in the form of program continual rises due to the strong need for initiatives upping society's standards. The next phase of the project can be adopted by NBK's rival if the program proves to be a success.Drug and substance abuse is a taboo topic in Kuwait even today. Not wholeheartedly knowing what the general public's reaction is means that a threat is opposing the DPP. There are bound to be people who do not want to associate themselves with taboo topics such as drugs which mean that there will be some kind of a decline from a section of the public. It is vital to assess how the threats and weaknesses fare against the strengths and opportunities of this program. Financial Projections Cash flow| |   | Year 1| Year 2| Year 3| | | | | |   | Net profit| | | 105,050 | 105,050 | 105,050 |Depreciation| | | 105,050 | 105,050 | 105,050 | Office Rent| | | 2,100 | 2,100 | 2,100 | Media costs| | | 93,500 | 93,500 | 93,500 | Staff| | | 11,000 | 11,000 | 11,000 | Transportation| | | 200 | 200 | 200 | Cash profits| | | 0 | 0 | 0 | Increase in CA| | | n/a| n/a| n/a| Net cash from operating activities| | | 0 | 0 | 0 | Renovations| | | 0 | 0 | 0 | change in FA| | | (850,000)|   |   | Net cash after investing activities| | | (850,000)| 0 | 0 | Capital induction| | | 105,050 | 0 | 0 | change in advance rentals| | | 6,300 | (417,600)| (104,400)| Net increase in cash| | | (738,650)| (417,600)| (104,400)| | | | | |   |Opening cash balance| | | 0 | (738,650)| (1,156,250)| Closing cash balance| | | (738,650)| (1,156,250)| (1,260,650)| | | | | | | | | | (745,350)| (1,281,750)| (1,831,890)| | | | | | | Net Profit| |   | 26,933 | 479,733 | 493,473 | Inv Capital|   | | 0| 0| 0| ROI|   | | #DIV/0! | #DIV/0! | #DIV/0! | | | | | | | Net cashflow from operations| | | 26,933 | 479,733 | 493,473 |   | | | | | | | | | | | | Requirements In order for the project to be implemented, there are a few requirements that need to be taken in to consideration. To further promote this program, it has been decided that seminars will be held at different schools and universities.To proceed with this we will need knowledgeable staff or speakers, and/or former addicts to speak at these seminars. Another requ irement would be setting up booths and banners in Avenues, Marina Mall, and 360. Also for spreading the word about this program in less expensive way we will be designing different brochures and handing them out at the seminars and booths. Some of the other activities that will be done are fundraisers and getting different sponsorship’s to boost the program. For this to be done operationally speaking we will need sufficient staff to arry out the tasks and/or guest speakers, money for printing and equipment, vehicles, and having meetings and presentations. The staff will need to be able to design the brochures and banners, set up booths, and be knowledgeable about the program to deliver the message in meetings and presentations. Like most projects money is a key factor to get the job done. We will need money for gas, staff, printing, and other equipment. Technically the program is going to require computers for emailing and organizing with school officials and NBK members also to stay financially organized with sufficient data.For this program to run smoothly we must also focus on logistics. Organization and planning are a must for determining which schools or universities and which dates are the most appropriate and effective. As mentioned earlier the three malls were chosen for the banners and booths, because they are the most popular and seem to be the most effective for reaching the target audience. Some good locations for the seminars could be reception halls and popular locations that can be rented, for the presentations and meetings on the other the NBK meeting room seems to be most suitable for our program.Viability In terms of Return on Investment Viability, our project will not be gaining any monetary returns directly since it is a non-profit program. For the ROI formula we will calculate zero (no profit) divided by 105,050 (for one year) which will be equal to zero percent financial gain. The total investment required is 315,150 for the three years of the program. Our ROI for the first year will be zero. Competitive Viability Like any project, the Drug program will need to be viable and sustainable with regards to competition.This means that our program can survive long-term and eventually gain profit while competing with similar programs in Kuwait. In Kuwait however, there is already some competition. One major competitor is the National Anti-Drug Committee. This committee was founded in 1989, and their main goals are similar to our program’s goals, which are to focus on the youth and the protection of the health of society. Also similar to our goals is the fact that they are trying to introduce some awareness amongst the education fields. Although there is some competition already in the market, we believe that program can become more competitive nce introduced, because we will be working with NBK which is a very popular bank, especially among the youth. The National Anti-Drug Committee is not well known in Kuwa it, yet has been around for many years. Although this is true about the National Anti-Drug Committee, our program will still have a competitive advantage working with NBK. Also we are going to be introducing many guest speakers at different seminars through different schools. We will be bringing people who have abused drugs and overcame these issues, which will have a great impact on people in a society like Kuwait.Another thing that our program is going to offer is setting up different fundraisers throughout Kuwait to raise awareness about the serious nature of drug abuse. These different activities that our project will be conducting will give our company and program a more competitive edge in the market. Economic Viability In order for our drug program to be viable economically, it will need to create different job opportunities and possibly attract people to work at NBK. This program is an extremely controversial activity in a society like Kuwait where the issue of drugs and dru g abuse is a taboo subject.By confronting the matter and showing people how serious and spread out this problem is in Kuwait already, we can show people that NBK cares about this and is not afraid to be associated with fighting it. The project for NBK will require staff and/or volunteers. This will create job openings for anyone interested. It may even attract people to work for NBK, because it shows that they care about and are giving back to society. This further promotes NBK’s vision to benefit the society where they function. References * Fattahova, N. (2012). Awareness campaign to prevent drug abuse . ttp://news. kuwaittimes. net/2012/08/22/awareness-campaign-to-prevent-drug-abuse/. Last accessed 11th Nov 2012. * Kuwait. nbk. (2012). About NBK. http://www. kuwait. nbk. com/about/disclosures/default_en_gb. aspx. Last accessed 10th Nov 2012. * Murray, J. (2012). Viability (of a business). http://biztaxlaw. about. com/od/glossaryv/g/viability. htm. Last accessed 9th Nov 201 2. * Vyakarnam, S . Writing a business plan, clarification and preparation – the market approach. http://https://docs. google. com/viewer/. Last accessed 14th Nov 2012 AppendixCashflow| |   | Year 1| Year 2| Year 3| | | | | |   | Net profit| | | 105,050 | 105,050 | 105,050 | Depreciation| | | 105,050 | 105,050 | 105,050 | Office Rent| | | 2,100 | 2,100 | 2,100 | Media costs| | | 93,500 | 93,500 | 93,500 | Staff| | | 11,000 | 11,000 | 11,000 | Transportation| | | 200 | 200 | 200 | Cash profits| | | 0 | 0 | 0 | Increasein CA| | | n/a| n/a| n/a| Net cash from operating activities| | | 0 | 0 | 0 | Renovations| | | 0 | 0 | 0 | change in FA| | | (850,000)|   |   | Net cash after investing activities| | | (850,000)| 0 | 0 | Capital induction| | | 105,050 | 0 | 0 | hange in advance rentals| | | 6,300 | (417,600)| (104,400)| Net increase in cash| | | (738,650)| (417,600)| (104,400)| | | | | |   | Opening cash balance| | | 0 | (738,650)| (1,156,250)| Closing cash balance| | | (738,650)| (1,156,250)| (1,260,650)| | | | | | | | | | (745,350)| (1,281,750)| (1,831,890)| | | | | | | Net Profit| |   | 26,933 | 479,733 | 493,473 | Inv Capital|   | | 0| 0| 0| ROI|   | | #DIV/0! | #DIV/0! | #DIV/0! | | | | | | | Net cashflow from operations| | | 26,933 | 479,733 | 493,473 |   | | | | | | | | | | | | | | | | | | ROI Calculation Amount of Financial Gain Total Investment Amount 0 0 105. 050

Saturday, September 28, 2019

A College Graduate as a Candidate Assignment Example | Topics and Well Written Essays - 750 words

A College Graduate as a Candidate - Assignment Example Graduates are the ones who are more exposed to different areas and attained a specific level of knowledge. It gives you more confidence about the business and assigning them to a certain task. An exam and a face-to-face interview are some of the best ways to assess the qualities of the job seeker. The exam can come in different forms; written or oral, personality tests, academic and logical. Exams can be a good reference of the quality of their skills while an interview can give you a hint on what characteristics a candidate have through the flow of the conversation. It also gives you the chance to know his goals and emotional state, on how much he can carry responsibilities of his job. Specifically, skill assessments can be a powerful tool to enhance the jobseeker’s potentials and hidden talents for upcoming tasks. It will open the opportunities to both parties (job seeker and recruiter) and will eventually pay a great dividend. A recruiter may put the jobseeker in a mock situation where he could foresee what awaits in the position and through this, skills might be shown and the recruiter could have the chance to evaluate such skills. A high salary is important because it strengthens the productivity of an employee. Recruitment-wise, a high salary serves as the basis of how much standard a job has and how important the position in a company is treated. Of course, a potential hire would go for a job that pays well. It is necessary to treat money as the major compensation an employee gets a job well done. A salary should match the job description, as well as the qualities of the employee. It is a powerful motivator to affect the behavior of a person and reach through the incentives of his goals. Thus, potential hires should be offered a high salary to get the best quality of work and have a high productivity (Rynes et al., 2004). A great manager knows how to handle all the areas.

Friday, September 27, 2019

Choose the topic in the document Essay Example | Topics and Well Written Essays - 1000 words

Choose the topic in the document - Essay Example In addition, many of the music artists, despite the fact that they did most of the work, tended not to gain as much as the recording companies for which they worked. This created a situation where artists who were very talented often lived on a hand to mouth basis; where they barely kept themselves from being sucked into poverty. Song writing was done on an individual basis where the artists wrote and performed their own songs, mostly without any help from the companies with which they worked. In 1946, there were barely any companies dedicated to music and this is because of the fact that it was yet to be taken seriously as a many making venture. All this changed within the next decade as more music companies were formed as the music industry started becoming competitive and as new talent was discovered and nurtured (Garofalo 320). However, by 1956, all this had changed as the marketing of the music produced was not only done at a local level, but marketing campaigns were also done a t a regional, national, and international level. The diverse marketing of music by the various music producing companies ensured that the music of even less known artists reached a wider audience than it would normally have if marketing were done at only the local level, as was the case in 1946. The professionalism of the music production companies also increased and this made the latter to be able to compete effectively against other record companies attempting fight for the music market. The song writing was no longer the domain of musicians as many of them ended up singing songs that were written by other people. In addition, the production of music was done at a larger scale as more people became attracted to music that was not created in their own localities, and instead started looking far afield to gratify their tests. Furthermore, radio station played music on a larger scale than before and this was done because of the popular demand for music from the listeners. This create d a situation where it was much easier for the record companies involved to assess the fan base of all the songs that they produced and look for potential markets. This trend continued in the music industry for decades to come and it has become the norm as music has gained a worldwide audience. Q4 One of the greatest and most unappreciated roles that rock and roll music played was that of helping to undermine the power of the Soviet Union as well as that of its satellites. This form of music ensured that the west, which was demonized by the soviet bloc as being occupied by inhuman individuals whose only goal was the accumulation of personal wealth, was humanized. It created a situation where individuals in the soviet bloc began to look at the west differently, and it enabled rock and roll to be listened to even in the eastern bloc. The success of rock and roll was so great that it was able to have a wide audience in the soviet bloc even though this block had many political and socia l rivalries with the west. One would go as far as to say that rock and roll may have played a huge role in ensuring that the west was marketed as being a place where individuals could live in peace, enjoying all the freedom that was theirs from birth. This is perhaps the reason why despite living in rival states, the people of the west and of the east were brought together for the love of rock

Thursday, September 26, 2019

Enculturation research paper Example | Topics and Well Written Essays - 1500 words

Enculturation - Research Paper Example According to the dictionary Enculturation is the process by which people learn the requirements of their surrounding culture and acquire values and behaviors appropriate or necessary in that culture. As part of this process, the influences that limit, direct, or shape the individual (whether deliberately or not) include parents, other adults, and peers. If successful, enculturation results in competence in the language, values and rituals of the culture. Discussion Respecting one’s elders was highly emphasized, the family was of utmost importance and the Children are taught that no matter how old you are, respecting your parents is mandatory. The other respondent was Ann Clawson who grew in a culture where they were taught true blue American values like hard work and education, and her parents made sure that she came up knowing how important it was to work hard for my education. Her parents had been extremely strict in terms of school: anything less than an A was unacceptable, and that was definitely the way they were with me. From the interview it is evident that the Society and family plays an important role on personality. The self does not exist on its self but has a direct and continuous relation with others. From birth onward, the social surrounding shapes and defines individuals, whether it is through family, school or peers. Through the process of socialization, the person acquires a set of behaviors, values and perceptions passed on by her d culture, yet there is still debate as to what extent nurture may outdo nature. History of interviewees Sarwat was born in 1961 in Cairo town. He had both parents where Father was a carpenter, mother was a homemaker. His life was influenced by Local history/events that influenced life choices and Muslim vs. Christian politics affected desire to leave the country, despite having comfortable financial circumstances ,he also Wanted to get away from religious discrimination and come to a western country, in order to be able to practice his faith. In 20 years, he only worked for two companies. He respects his parents’ culture which resulted in a very strict upbringing. , He first worked at Burger King for two months then a friend offered him a job in southern California, and began working as a mechanic’s assistant. , and eventually applied at Amdahl Corporation due to his passion on engineering. . He realized that if he got an education he’d be able to progress in the company and went to college, acquiring an AS in the field of Electrical Engineering. Later He wanted to become a real estate agent, but didn’t excel in it because in his mind, good work is work that is both profitable and enjoyable, whereas bad work is work that he dreads going to. To him, enjoyable work is work you’re passionate about. He also believed that an ideal family cares about each other, and accepts each member for who they are, without judgment. They stand by one another and is cent ered around Go Anna Clawson was born May 7, 1964 in Johnson City, Tennessee was born in the error of intergration.her family was set up in a way that the mother was a stay at home mom, and my father was a banker. The father bordered on being a workaholic, and she didn’

Wednesday, September 25, 2019

Cybersecurity Coursework Example | Topics and Well Written Essays - 1750 words - 1

Cybersecurity - Coursework Example This is due to the reason that the privacy policies help the individuals belonging to any organization to maintain their autonomy as well as individuality which in turn enables them to adopt effective privacy policy related decisions in an efficient manner (Grant & Bennett, 1999). In this discussion, the comparison of privacy policies of Apple Inc., Microsoft Corporation and International Business Machines (IBM) along with a detailed analysis about their organizational mission will be taken into concern. Moreover, the possible changes in the privacy policies of the aforementioned organizations that could provide better protection to the customers and flexibility within their organization will also be discussed. Brief Description of the Organizations and their Mission Apple Inc. appeared in the business world during the period of early and middle part of seventies. The company came into existence with joint efforts of the founders named Steve Jobs and Steve Wozniak. It designs as well as sells various types of consumer electronics related products, personal computers and computer software to its large base of customers throughout the globe. The company successfully managed to generate significant value in this competitive business market due to its constant establishment of innovative products (Apple Inc., 2012). Apple is dedicated towards conserving the environment, health as well as security of its workforce and customers worldwide. The mission of the company is to produce and deliver technologically inventive products and services to its worldwide customers for the purpose of attaining significant competitive position over its chief business market competitors. Moreover, the other mission of Apple is to provide exceptional designed products and personalized services in order to increase its customer base levels by a significant level (Environmental Health and Safety Policy Statement, 2006). International Business Machines (IBM) is a multinational technology b usiness corporation which manufactures and sells broad assortment of computers, software and micro-processors to its huge customers around the globe. The company established in the year 1911 through the process of merger of various business entities namely The Tabulating Machine Company, The Computing Scale Company and The International Time Recording Company (IBM, 2011). The mission of IBM is to provide utmost value and dedication towards establishing innovative products and build effective interrelation as well as communication with the employees in order to raise organizational effectiveness by a greater extent. Furthermore, the other mission of the company is to develop its worldwide environmental management business approaches for the motive of safeguarding the environment and remain much committed towards environmental leadership (IBM, 2007). Microsoft Corporation is regarded to be another leading American based multinational business organization which was founded in the year 1975 by Paul Allen and Bill Gates. The corporation develops, produces, authorizes and assists broad assortment of products and services that are related to computing. The imperative products of the corporation include computer software as well as operating systems, smart phones

Tuesday, September 24, 2019

Liberal Arts Studies Essay Example | Topics and Well Written Essays - 250 words - 1

Liberal Arts Studies - Essay Example It is reasonable to see corporations and communities as benefiting from the struggle and competition that Darwin saw in the animal world and applied to humans as well. With a new job opening, for example, candidates will be determined as qualified or unqualified. The qualified applicants will get the interview for the chance to prove that they are up to the task and capable of doing what is required. Ideally, the best (or strongest) candidate based on the job description will be hired for the job. However, in the business world this is not always the case. Often the person hiring for the job will hire someone based on their personality or if they know them personally. So the most qualified or strongest applicant often does not get the job. However, ideally, a smart business person would hire the strongest and best qualified candidate. In modern society, certain jobs have been reduced or even eliminated. With the growth of technology, many professions were reduced in number while new professions were created. There are numerous examples of people who are professionals making a lot of money who are laid off and find themselves out of work and unable to get another job.

Monday, September 23, 2019

Physician-assited suicide Essay Example | Topics and Well Written Essays - 750 words

Physician-assited suicide - Essay Example As a treatment of last resort, physician-assisted death becomes a legitimate option only after standard measures for comfort care have been found unsatisfactory by competent patients in the context of their own situation and values (Quill, 1993). In the cases of Vacco v Quill and Washington v Glucksberg, the U.S. Supreme Court ruled that there is no constitutionally protected right to physician-assisted suicide, its decision clearly endorsed the use of intensive palliative care and seemed to give a green light to experimentation at the state level so that this "earnest and profound debate" can continue (Burt, 1997). The injury suffered by actor Christopher Reeve (Reeve, 1998) and his response to his condition has been the subject of numerous news stories. The public sees a man who previously enjoyed a physically active lifestyle, but who now relies on a respirator to breathe, and on other people to provide for his every physical need. Rick Hansen (Hansen,1987) and Teny Fox (Scrivener, 1981) are examples of people who have not only contributed to the society in significant ways, but who have also captured the imagination of the public in their courageous journeys to help others suffering from spinal cord injuries and cancer respectively. The actions of Dr. Jack Kevorkian (Pfeifer, Brigham & Robinson, 1996), a doctor committed to aiding the terminally ill in their quest for death, continually places this issue about the value of life before the public and the courts in the United States. Flach (1988) defines mental health in terms of resilience. He proposes that when we experience disruption in our lives, it is through resilience that we are able to move through our experiences in good mental health. He argues that it is how well we are able to integrate each new experience and circumstance into our lives that leads to successful adaptation throughout our lives. In her book,

Sunday, September 22, 2019

Growing Up African American Essay Example for Free

Growing Up African American Essay I am a member of the African American group and I would like to tell you a bit about the group of when I am a part of. Let me start by saying that my African American group originated from Africa and growing up in America can be tough for people of my race, the African Americans. My group’s history is wide ranging spanning for many years and varying from region to region within the United States. I remember when I was young I use to talk to my mother a lot and asked her many questions like â€Å"Why am I called an African American? † She went on to explain that our race originally comes from Africa and we were part of a slave trade. From my mother I learned that we were slaves until a law was passed to give us freedom. I use to wonder when I was young if there were other people similar to me all over America. I also remember something my father told me once that African Americans live all over the country. My father told stories of how he used to go to an all black school could vote or sit in the front of buses. Being African Americans have faced several kinds of creation and consequence situations in the years they have been a part of the United States. In some places cheaper labor, longer work hours and terrible living conditions. Many people of the United States have made it almost impossible for groups of another race or Ethnicity to strive and live full happy lives. I have seen over the year’s situations of extermination in some parts, as well segregation, and expulsion. In school from some of my teachers, in social interactions like just walking through a store, and especially in the work place when they’ll even give me the chance to work because it doesn’t matter I go to get a job out here. There are some racist, even the Uncle Tom’s. I’ve done everything they ask and still I either get denied the job or they hire me and treat me like Growing up African American 3 trash until I quit, or they try to find a reason to get rid of me. Since, I don’t give them much reason to get rid of me due to my strong work ethic and performance; they usually try to break me down. Education plays an important role for most African Americans; however we are still way behind when compared to the White American which probably has a lot to do with the way some of us was brought up or our background. Regardless of the contributions made by the forefathers of black people, there is a hesitation of acceptance of the race that has been a focus of many groups the strive for freedom and justice for all, that has not yet been rectified. The same group of people was good enough to built the country is not always seen as good enough to live in the house next door. I believe because this country is made up of many different races and ethnic groups that are steadily growing in numbers. If different races are toco exist peacefully in the U. S. , it is vital that we all become educated on the history and culture of different races and ethnicities. According to the 2000 Census data for Lexington, MS the total population for 2000 were 2,025 male 965 and female 1,060 square miles 2. 45. Race: white (635); black or African American (1,362); American Indian and Alaska Native (1); Asian (13); and two or more races (14); and Hispanic or Latino (of any race) (40) (Fact finder Census 2000). Birthplace facts from the 2000 census data in Lexington born in the same state (1,706); born in another state (269); born outside the US (0); naturalized citizen (14); and foreign born, not US citizen (10). Some more 2000 census data in educational attainment population 25 and older was 1,206 in Lexington: high school graduates (299); some college, or associate’s degree (349); bachelor’s degree (111); and master’s, professional or doctorate degree (60). Some enrollment population 3 years and over Growing up African American 4 enrolled in school was 627: preschool and kindergarten (83); grades 1-12 (446); and college (98) (2000 census data). Growing up African American 5 References Factfinder Census 2000 Census data for Lexington, MS My mother and father.

Saturday, September 21, 2019

The Indian laying Essay Example for Free

The Indian laying Essay This story introduces the theme of masculinity. Hemingway turns a typically female act, set in a female space into a male-dominated situation. Although this story is about childbirth, it focuses on the experience of the doctor rather than the woman. After the birth, Uncle George and Nicks father have a playful, exuberant camaraderie over the job well done. Another theme introduced is racism or sexism, Uncle George says damn squaw bitch to the Indian woman. Depending on how your interpret this remark, it could be racist or sexist, with the fact being we arent told. Another emphasis to racism is from Nicks father saying, I dont hear them (screams from woman) because they are not important. This remark could be argued is racist. Simply by adding these themes, Hemmingway has included a true-life prospective life and enhanced the interest of the story; otherwise without some themes this story could have been uninteresting. The language in the statements is quite abusive and downgrading. Although it could be argued they were not racist comments and just aggravated words from Uncle George perspective as he was bitten! In Nicks fathers view, we cant really tell if or not he is racist, as his words are not as downgrading as Uncle Georges. We can interpret his words to mean anything, for example it could mean he concentrates on the job, instead of being put off by the screams or it could mean, as she is a poor woman he doesnt simple care. After Nicks dad had finished his small operation he conversed a lot, using a simile He was feeling talkative as football players are in the dressing room after a game. . Then came Nicks interrogations of his experience he has had, Do ladies always have such a hard time having babies Why did he kill himself, daddy Do many men kill themselves, daddy Do many women where did uncle George go the father responds back minimally not many Nick Hardly ever Hell turn up alright. Childish language is present from Nick. The father could be uninterested in what Nick has to say or simply unable to answer Nicks questions and just tries to evade them, hence the short answers. The only violent situation in this story shows quite a gruesome image. The Indian laying with his face towards the wall. His throat had been cut from ear to ear. The blood had flowed down into a pool where his body sagged the bunk. His head rested on his left arm. The open razor lay, edge up, in the blankets. . The language and style is fairly simple, there is nothing complicated to read, the language is more like everyday words. It creates a bloody mental image with the paragraphs sharp words Throat Cut Blood Pool Razor, to mind it looks like a story for a movie. There was no build up to the situation; it is just the way that Uncle George found the Indian. The paragraph read out, is fast paced due to the varied action words above, lacking descriptive adjectives that could slow it down. The ending of the Indian Camp is a strange ending, In the early morning on the lake sitting in the stern of the boat with his father rowing, he felt quite sure that he would never die. Ernest Hemmingway creates a simple effect. I feel the ending has an element of ambiguity like this, to make the reader ponder and think about what Nick is trying to say. It leaves the reader pondering several interpretations in their mind. He could suggest he will never die, because his Father is with him who is a safe surgeon, or after viewing of what he saw of the operation, he felt safe if he had to go for an operation. The fact is we would never know, which keeps the beauty in the simple effect. Comparing the stories, they are two very different stories in terms of language, sentence structure, beginnings and endings. The language is completely different in terms of complexity with To Build a Fire far more complex than Indian Camp. The Sentence structure is far longer in To Build a Fire than The Indian Camp, the beginning and endings to say the least is different in its own way and the tone is different with the Indian Camp, being fast dues to its simple words and To Build a Fire, slower due to more complex words. Londons language contains similes and metaphors richer in description of places, people and events. Hemmingway pushes the action story to its limit. He takes it as far as he can by allowing the action to drive the story. Hence the ambiguity, as he cant explain the thoughts, feelings or beliefs, when he hasnt allowed himself that option from the start. In conclusion, the storywriters have completely different styles in terms of writing a story. The feature, similar in both books are both sets of characters enter a strange world, with the characters trying to adjust to their location, using any means possible. Desperation from the man to survive and desperation to keep Nick away from the shocking observations, loneliness in a place not many foreigners go to, inquisition to himself (the man) and from Nick and reservations from the man about not having a partner with him and reservations on Nick coming. The mere fact is, if this were not a foreign place, the individuals would not be as circumspect as they were then. Actions are the key features of both stories. Moreover the authors describe to us vividly a world that we will never experience. If the man thought of his action and went with a partner, would he be dead? If Nicks father did not bring Nick along, would Nick have been introduced to poverty, operations or suicide? This just proves that if you think hard before you act, all will be successful in which neither responsible characters did. The most comparable factor is the language, of the weather is mentioned. Indian Camp is dark and gloomy and To Build a Fire is exceedingly cold and grey. This truly outlines the writers intentions, to build a lonely approach on the basis of descriptive words.

Friday, September 20, 2019

Difference Between Memory And Data Storage Computer Science Essay

Difference Between Memory And Data Storage Computer Science Essay The terms memory and data storage are often confused. Both memory and data storage are means by which a computer keeps data used to perform tasks. Both of them are measured in bytes. The term memory refers to the amount of Random Access Memory (RAM) but also includes Read-Only Memory (ROM) installed in the computer, whereas the term storage refers to the capacity of the computers hard disk. Figure 12: Difference between Memory and Data Storage For example, in figure 12, the file cabinet represents the computers hard disk, which provides storage for all the files and information we need in your office. When we come in to work, we take out the files we need from storage and put them on our desk for easy access while we work on them. The desk is like memory in the computer. It holds the information and data we need to have handy while youre working. The main difference between memory and data storage is their function. Storage is used to hold all the computers information. Data stored in the hard disk is permanent and it is not lost when the computer is turned off. When we delete a file, only the access to that file is removed, not the information itself. To permanently delete a file, the hard disk must be formatted or overwritten. It is even possible that even though a disk has been formatted, an expert can still view the information. Memory and data storage can work together. When the computer does not have enough RAM to support its processes, it converts a portion of the hard disk into virtual memory. Virtual memory acts the same way RAM does. However, since it is a part of the hard disk, using virtual memory slows the computer down. 2.2 Internal Memory and External Memory Computer internal memory is used to store data that is used by the system at startup and to run various types of programs such as the operating system. Typically, internal memory is contained on small microchips that are either attached or connected to the computers motherboard. Computer memory can range from a couple of megabytes to several gigabytes. SRAM, DRAM, and ROM are the example of internal memory. External computer memory is technically any storage device that we can connect to our computer to record data. Flash drives, HDD with USB cable, any SD card are the example of external memory. 2.3 Hierarchy of Storage Generally, the lower a storage is in the hierarchy, the lesser its bandwidth and the greater its access latency is from the CPU. This traditional division of storage to primary, secondary, tertiary and off-line storage is also guided by cost per bit. Historically, memory has been called core, main memory, real storage or internal memory while storage devices have been referred to as secondary storage, external memory or peripheral storage. 2.3.1 Primary Storage In computer memory the term primary storage or primary memory is used for the information in physical systems which function at high-speed as a difference from secondary storage. Primary storage often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required. Main memory is directly or indirectly connected to the central processing unit via a memory bus. It is actually two buses, an address bus and a data bus. The CPU firstly sends a number through an address bus, a number called memory address that indicates the desired location of data. Then it reads or writes the data itself using the data bus. Additionally, a memory management unit (MMU) is a small device between CPU and RAM recalculating the actual memory address, for example to provide an abstraction of virtual memory or other tasks. 2.3.2 Secondary Storage Secondary storage or secondary memory is physical devices for program and data storage which are slow to access but offer higher memory capacity. It differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage. Secondary storage does not lose the data when the device is powered down because it is non-volatile. In modern computers, hard disk drives are usually used as secondary storage and it is typically about a million times slower than memory. Some other examples of secondary storage technologies are USB flash drives, floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives. 2.3.3 Tertiary storage Tertiary storage or tertiary memory provides a third level of storage. Typically it involves a robotic mechanism which will mount and dismount removable mass storage media into a storage device according to the systems demands, these data are often copied to secondary storage before use. It is much slower than secondary storage. This is primarily useful for extraordinarily large data stores, accessed without human operators. When a computer needs to read information from the tertiary storage, it will first consult a catalog database to determine which tape or disc contains the information and then the computer will instruct a robotic arm to fetch the medium and place it in a drive. When the computer has finished reading the information, the robotic arm will return the medium to its place in the library. 2.3.4 Off-line storage Off-line storage is computer data storage on a medium or a device that is not under the control of a processing unit. The medium is recorded, usually in a secondary or tertiary storage device and then physically removed or disconnected. It must be inserted or connected by a human operator before a computer can access it again. Unlike tertiary storage, it cannot be accessed without human interaction. Off-line storage is used to transfer information. Additionally, in case a disaster like a fire destroys the original data, a medium in a remote location will probably be unaffected, enabling disaster recovery. In modern personal computers, most secondary and tertiary storage media are also used for off-line storage. Optical discs and flash memory devices are most popular, and to much lesser extent removable hard disk drives. In enterprise uses, magnetic tape is predominant. Older examples are floppy disks, Zip disks, or punched cards. 2.4 Characteristics of Storage 2.4.1 Volatility Volatile memory is computer memory that requires power to maintain the stored information and non-volatile memory is computer memory that can retain the stored information even when not powered. That is why the contents of RAM are erased when the power of the computer is turned off but ROM holds its data indefinitely. The fastest memory technologies of today are volatile ones. Non-volatile memory is suitable for long-term storage of information. 2.4.2 Mutability Read/write storage or mutable storage allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage. Read only storage retains the information stored at the time of manufacture, and allows the information to be written only once at some point after manufacture. These are called immutable storage. Immutable storage is used for tertiary and off-line storage. Examples include CD-ROM and CD-R. Slow write, fast read storage is the read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and flash memory. 2.4.3 Accessibility In random access, any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access. In sequential access, the accessing of pieces of information will be in a serial order, one after the other, therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage. 2.4.4 Addressability In modern computers, location-addressable storage usually limits to primary storage. Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, secondary, tertiary and off-line storage use files addressable systems. Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. Content-addressable storage can be implemented using software or hardware, hardware being faster but more expensive option. Each individually accessible unit of information is selected based on the basis of the contents stored there. 2.4.5 Capacity The total amount of stored information that a storage device or medium can hold is raw capacity. Memory storage density is a measure of the quantity of information bits that can be stored on a given length of track, area of surface, or in a given volume of a computer storage medium. Generally, higher density is more desirable, for it allows greater volumes of data to be stored in the same physical space. Density therefore has a direct relationship to storage capacity of a given medium. 2.4.6 Performance Latency is a measure of time delay experienced in a system, the precise definition of which depends on the system and the time being measured. The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency, and in case of sequential access storage, minimum, maximum and average latency. In communication networks, such as Ethernet or packet radio, throughput or network throughput is the average rate of successful message delivery over a communication channel. In computer data storage, throughput is usually expressed in terms of megabytes per second, though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput. 2.5 Fundamental Storage Technologies The most commonly used data storage technologies are semiconductor, magnetic, and optical, while paper still sees some limited usage. Some other fundamental storage technologies have also been used in the past or are proposed for development. 2.5.1 Semiconductor Semiconductor memory is an electronic data storage device, often used as computer memory, implemented on a semiconductor-based integrated circuit. A semiconductor memory chip may contain millions of tiny transistors or capacitors. It is made in many different types and technologies. Semiconductor memory has the property of random access, which means that it takes the same amount of time to access any memory location. Semiconductor memory also has much faster access times than other types of data storage. A byte of data can be written to or read from semiconductor memory within a few nanoseconds, while access time for rotating storage such as hard disks is in the range of milliseconds. For these reasons it is used for main computer memory or primary storage, to hold data the computer is currently working on, among other uses. 2.5.2 Magnetic Magnetic storage uses different patterns of magnetization on a magnetically coated surface to store information. Magnetic storage is non-volatile. The information is accessed using one or more read/write heads which may contain one or more recording transducers. A read/write head only covers a part of the surface so that the head or medium or both must be moved relative to another in order to access data. 2.5.3 Optical Optical storage is a term from engineering referring to the Storage of data on an optically readable medium. Data is recorded by making marks in a pattern that can be read back with the aid of light, usually a beam of laser light precisely focused on a spinning disc. An older example, that does not require the use of computers, is microform. 2.5.4 Paper Paper data storage refers to the use of paper as a data storage device. This includes writing, illustrating, and the use of data that can be interpreted by a machine or is the result of the functioning of a machine. Paper data storage, typically in the form of paper tape or punched cards, has long been used to store information for automatic processing, particularly before general-purpose computers existed. Information was recorded by punching holes into the paper or cardboard medium and was read mechanically to determine whether a particular location on the medium was solid or contained a hole Apr 14 2 Computer Organization and Architecture Facebook Twitter Google Tumblr Computer Memory Chapter 1: Introduction to Computer Memory Figure 1: An Imaginary Computer Memory To know about the detail of computer memory, first of all we should know what is memory? and then what is computer memory?. As we know the memory is a power to remember things. In psychology, memory is the process by which information is encoded, stored, and retrieved. But in computing, memory refers to the physical devices used to store programs or data on a temporary or permanent basis for use in a computer or other digital electronic device. Computer data storage, often called storage or memory. It is a core function and fundamental component of computers. A computers memory can be said as a list of cells into which numbers can be placed or read. Each cell has a numbered address and can store a single number. In almost all modern computers, each memory cell is set up to store binary numbers in groups of eight bits. A bit is the basic unit of information in computing and telecommunications. A bit can have only two values, either 1 or 0. Eight bits form a byte. Each byte is able to represent 256 different numbers either from 0 to 255 or à ¢Ã‹â€ Ã¢â‚¬â„¢128 to +127. To store larger numbers several consecutive bytes typically two, four or eight may be used. When negative numbers are required they are usually stored in tows complement notation which is a mathematical operation on binary numbers. A computer can store any kind of information in memory if it can be represented numerically. The information stored in memory may represent practically anything. Letters, numbers, even computer instructions can be placed into memory with equal ease. A computer consists of at least one processing element, typically a central processing unit (CPU) and some form of memory. Since the CPU does not differentiate between different types of data, it is the softwares responsibility to give significance to what the memory sees as nothing but a series of numbers. Modern computers have billions or even trillions of bytes of memory. In computer architecture, the CPU contains a special set of memory cells which is called registers. A processor register can be read and written too much faster than the main memory area. Registers are used for the most frequently needed data items to avoid having to access main memory every time data is needed. 1.1 First Computer Memory The first computers were often very large, usually as big as a desk or even a room and had minimal processing capability. These early computers were built to work on specific problems or solve certain types of equations and not much more. The first computers used punch cards for input and had very limited memory for processing. The average memory in the first computers was between three and forty five kilo-bits Memory was used to store data in the processing of linear equations, and the results were then printed in binary. When compared to the computers available today, the first computers do not seem very technologically advanced, but at the time they were created these first computers were engineering masterpieces. Many of the concepts created when building early computers are still in use in modern computing technology. The Atanasoff Berry Computer (ABC) credited with being the very first computer. The ABC had a whopping 3000 bits of memory which allowed it to process sixty items at one time. Other early computers had more memory. Some has high as forty five kilobits, which allowed them to process several more words of data in a shorter amount of time increasing the overall processing speed of the system. Without the first computers and their ability to make simple calculations, the technology we use today might not be as advanced as it has become. 1.2 History of Computer Memory In 1940s memory technology mostly permitted few bytes capacity. The first electronic programmable digital computer the ENIAC (ElectronicNumericalIntegratorandComputer) using thousands of octal base radio vacuum tubes. In electronics, a vacuumtube is a device controlling electric current through a vacuum in a sealed container. The ENIAC could perform simple calculations involving 20 numbers of ten decimal digits which were held in the vacuum tube accumulators. The next significant advance in computer memory delaylinememory. It was a form of computer memory used on some of the earliest digital computers. Like many modern forms of electronic computer memory, delay line memory was a refreshable memory but it was opposed to modern random access memory. Delay line memory was sequential access. Delay lines could store bits of information within a quartz and transfer it through sound waves propagating through mercury. Delay line memory would be limited to a capacity of up to a few hundred thousand bits to remain efficient. In 1946 two alternatives to the delay line, the Williams tube and Selectron tube, both using electron beams in glass tubes for storage. The Williams tube would prove more capacious than the Selectron tube because the Selectron was limited to 256 bits, while the Williams tube could store thousands. It was also less expensive than Selectron tube. To find non-volatile memory Jay Forrester, Jan A. Rajchman and An Wang developed magnetic core memory in the late 1940s. It was allowed for recall of memory after power loss. Magnetic core memory would become the dominant form of memory until the development of transistor-based memory in the late 1960s. 1.2. 1 Historical Development of Computer Memory Computer memory is much more than DRAM or Flash. It has come a long way up until the origins of todays omnipresent memory technologies. If we take it more than 160 years back in time and revisit the milestones of computer memory technology then products we may have never heard of. 1.2.1.1 Punch Cards Figure 2: Punch Cards Apunched card is a piece ofstiff paper that contains digital information represented by the presence or absence of holes in predefined positions. Earlydigital computers used punched cards as the primary medium for input of bothcomputer programs anddata. In 1837 Charles Babbage first purposed the Analytical Engine, which was the first computer to use punch cards as memory and a way to program the computer. Punch cards also known as Hollerith cardsand IBM cardsare paper cards containing several punched holes that where originally punched by hand and later by computers that represent data. Hollerithspunchcardsused in the 1890 census had round holes, 12 rows and 24 columns. The IBMpunchedcard designed in 1928, had rectangular holes, 80 columns with 12 punch locations and each one character to each column. So 80 x 12 = 960, this gives us a maximum capacity of 960 bits or 125 bytes of data. The use of punch cards predates computers. They were used as early as 1725 in the textile industry f or controlling mechanized textile looms. From the 1900s, into the 1950s, punched cards were the primary medium for data entry,data storage, and processing in institutional computing. As of 2012, some voting machinesstill utilize punched cards to input data. During the 1960s, the punched card was gradually replaced by magnetic tape. 1.2.1.2 Drum Memory Figure 3: DrumMemory Drummemory is an obsolete magnetic data storage device. A drum is a large metal cylinder that is coated on the outside surface with a ferromagnetic recording material. It could be considered the precursor to the hard disk platter, but in the form of a drum rather than a flat disk. In most cases a row of fixed read-write heads runs along the long axis of the drum, one for each track. The drums of the Atanasoff-Berry Computer stored information using regenerative capacitor memory. Regenerativecapacitormemory is a type of computer memory that uses the electrical property of capacitance to store the bits of data. A difference between most drums and a modern hard disk drive is that on a drum there was a track per head so that the heads do not have to move to the track to access data. Head per track disks were used mostly for paging. Particularly while drums were used as main working memory, programmers often took to positioning code onto the drum in such a way as to reduce the amount of t ime needed to find the next instruction. In 1932 Austrian IT engineer Gustav Tauschek invented the first widely used computer memory, called drum memory. In 1942 John Atanasoff successfully tests the Atanasoff-Berry Computer (ABC) which was the first computer to use regenerative capacitor drum memory. It was widely used in the 1950s and 60s as the main working memory of computers. Tauscheks original drum memory had a capacity of about 500,000 bits or 62.5 kilobytes. One of the early mass-produced computers, IBM 650, had about 8.5 kilobytes of drum memory, which in a later model was doubled to about 17 kilobytes. Some drum memories were also used as secondary storage. Drums were later replaced as the main working memory by memory such as core memory. 1.2.1.3 Williams Tube Figure 4: Williams Tube Freddie Williams applies for a patent on his cathode-ray tube (CRT) storing device in 1946. The device that later became known as the Williams tube or Williams- Kilburn tube. It was used as a computer memory to electronically store binary data. It was the first random-access digital storage device. The Williams tube depends on an effect called secondary emission. When a dot is drawn on a cathode ray tube, the area of the dot becomes slightly positively charged and the area immediately around it becomes slightly negatively charged, creating a charge well which is unable to convert to another type of energy. The charge well remains on the surface of the tube for a fraction of a second, allowing the device to act as a computer memory. The charge well lifetime depends on the electrical resistance of the inside of the tube. By drawing a second dot immediately next to the first one the dot can be erased. Information is read from the tube by means of a metal pickup plate that covers the face of the tube. Each time a dot is created or erased, the change in electrical charge induces a voltage pulse in the pickup plate. There is no practical restriction in the order of positions so it is called à ¢Ã¢â€š ¬Ã‚ ³random-accessà ¢Ã¢â€š ¬Ã‚ ³ nature of the lookup. Reading a memory location creates a new charge well, destroying the original contents of that location, and so any read has to be followed by a write to reinstate the original data. Since the charge gradually leaked away, it was necessary to scan the tube periodically and rewrite every dot. Some Williams tubes were made from radar-type cathode ray tubes with a phosphor coating that made the data visible. Each Williams tube could store about 512-1024 bits of data. 1.2.1.4 Selectron Tube Figure 5: Selectron Tube Between 1946 and 1953 Jan Rajchman begins his work on developing the Selectron tube. The original 4096-bit Selectron was a large, 5 inch by 3 inch vacuum tube with a cathode running up the middle, surrounded by two separate sets of wires forming a cylindrical grid, a dielectric material outside of the grid, and finally a cylinder of metal conductor outside the dielectric, called the signal plate. The smaller capacity 256-bit system was constructed similarly, but built in a planar fashion rather than cylindrical,resulting in an even larger vacuum tube. The device used an indirectly heated cathode running up the middle, surrounded by two separate sets of wires and offered a storage capacity of 4096 bits to 256 in the proposed production device. The Williams tube was an example of a general class of cathode ray tube (CRT) devices known as storage tubes. The primary function of a conventional CRT is to display an image by lighting phosphor using a beam of electrons fired at it from an el ectron gun at the back of the tube. Like the Williams Kilburn tube, the Selectron was also a random access storage device. Because of the popularity of magnetic core memory at the time, the Selectron tube was never put into mass production. 1.2.1.5 Magnetic-core Memory Figure 6: Magnetic-core Memory Second major milestone in modern computer memory technology was magnetic core memory which was widely adopted. Core memory or magnetic core memory became a widespread form of random-access memory, relying on an array of magnetized rings and was invented in 1947 and developed up until the mid-1970s. It is said to be non-volatile and will not lose its contents when the power is removed. The term core comes from conventional transformers whose windings surround a magnetic core. The basic principle of core memory was using a core as a ring of ferrite that could be magnetized in one of two directions. As a result, the memory was able to store digital information either a 1 or 0. In core memory the wires pass once through any given core, they are single turn devices. The core can take two states, encoding one bit, which can be read when selected by a sense wire. When the core is read, it is reset to a zero which is known as destructive readout. Circuits in the computer memory system then r estore the information in an immediate re-write cycle. Magnetic core memory was initially very expensive to fabricate but prices dropped as the market developed. It was the standard form of memory system until displaced by solid-state memory in integrated circuits, starting in the early 1970s. 1.2.1.6 Random access Memory Figure 7: Random access Memory Random-access memory (RAM) is a form of computer data storage. A random-access device allows stored data to be accessed directly in any random order. Today, random-access memory takes the form of integrated circuits which is a set of electronic circuits on one small plate or chip of semiconductor material, normally silicon. One distinguishing characteristic of RAM is that it is possible both to read data from the memory and to write new data into the memory easily and rapidly. Both the reading and writing are accomplished the use of electrical signals. The other distinguishing characteristic of RAM is that it is volatile. A RAM must be provided with a constant power supply. If the power is interrupted, then the data are lost. Thus, RAM can be used only as temporary storage. The three main forms of modern RAM are static RAM (SRAM), dynamic RAM (DRAM) and phase-change memory (PRAM). In SRAM, a bit of data is stored using the state of a flip-flop. This form of RAM is more expensive to produce but is generally faster and requires less power than DRAM. In modern computers, it is often used as cache memory for the CPU. DRAM stores a bit of data using a transistor and capacitor pair which together comprise a memory cell. The capacitor holds a high or low (0 or 1) charge and the transistor acts as a switch that lets the control circuitry on the chip read the capacitors state of charge or change it. Phase-change memory is also known as PRAM, is a type of non-volatile random-access memory. PRAM can offer much higher performance in applications where writing quickly is important, both because the memory element can be switched more quickly and also because single bits may be changed to either 1 or 0 without needing to first erase an entire block of cells. PRAMs high performance, thousands of times faster than conventional hard drives, makes it particularly interesting in nonvolatile memory roles that are currently performance-limited by memory access timing. ECC memory, which can be either SRAM or DRAM, includes special circuitry to detect or correct random faults or memory errors in the stored data, using parity bits or error correction code. A parity bit or check bit is a bit added to the end of a string of binary code that indicates whether the number of bits in the string with the value one is even or odd. Parity bits are used as the simplest form of error detecting code. In information theory and coding theory with applications in computer science and telecommunication, error detection and correction or error control are techniques that enable reliable delivery of digital data over unreliable communication channels. Many computer systems have a memory hierarchy consisting of CPU registers, on-die SRAM caches, external caches, DRAM, paging systems and virtual memory or swap space on a hard drive. This entire pool of memory may be referred to as RAM by many developers. 1.2.1.7 Read Only Memory Figure 8: Read Only Memory Read-only memory (ROM) is a class of storage medium used in computers. Data stored in ROM cannot be modified, or can be modified only slowly or with difficulty. It is really only suitable for storing data which is not expected to need modification for the life of the device. When only a small number of ROMs with particular memory content is needed, a less expensive alternative is the programmable ROM (PROM). Like the ROM, the PROM is nonvolatile and may be written into only once. For the PROM, the writing process is performed electrically and may be performed by a supplier or customer at a time later than the original chip fabrication. Special equipment is required for the writing or programming process. Another variation on read only memory is the read mostly memory, which is useful for applications in which read operations far more frequent than write operation but for which nonvolatile storage is required. There are three common forms of read mostly memory, they are EPROM, EEPROM and flash memory. The optically erasable programmable read only memory (EPROM) is read and written electrically, as with PROM. However, before a write operation, all the storage cells must be erased to the same initial state by exposure of the packaged chip to ultraviolet radiation. Erasure is performed by shining an intense ultraviolet light through a window that is designed into the memory chip. This erasure process can be performed repeatedly. It has the advantage of the multiple update capability. A more attractive form of read mostly memory is electrically erasable programmable read only memory (EEPROM). This is a read mostly memory that can be written into at any time without erasing prior contents, only the byte or bytes addressed are update. The write operation takes considerably longer than the read operation, on the other of several hundred microseconds per byte. The EEPROM combines the advantage of nonvolatility with the flexibility of being updatable in place, using ordinary bus control, address, and data lines. It is suppor

Thursday, September 19, 2019

Burr, Hamilton, & Jefferson: A study in character :: essays research papers

This is a controversial book that is well worth the read. The author comes at his subject from outside academe, albeit with impeccable credentials. Although he has authored nine books, has served as Director of the National Park Service and Director of the Smithsonian Institution's National Museum of American History, and was once a White House correspondent for NBC, his approach remains outside the mainstream of history or journalism. To begin, it is refreshingly place-oriented and rich with detail of physical surroundings and personal relationships involving the nation's founders. The work is less successful in terms of the context of time. Roger Kennedy's study is not presented in strict chronological narrative, because it is a study in "character." Its analytical framework, however, is too value-laden, sometimes obscuring the political and social context of early nineteenth-century America. Kennedy sets up his straw men to praise and destroy, which is an easy feat from the vantage point of twenty-first-century morality. The book is, nonetheless, intellectually honest (the author admits his biases upfront and in the appendix), provocative, and ultimately instructive. He blasts certain points of historical consensus and bias through the skillful use of both evidence and conjecture. He utilizes firsthand accounts of friends and associates, as well as rascals and enemies, to convey multidimensional impressions of Burr, Hamilton, Jefferson, Washington, and others. There are no flat images here. Kennedy uncovers motivations that drove these men to do great (and not-so-great) things, which is definitely not an easy feat, especially in a prosopographical study that links the lives of its main characters. When the smoke dears, Burr comes away looking quite a bit better than reputation would have it; Hamilton emerges from a mixed review about the same; but Jefferson now looks decidedly worse--not at all the guy you think of smiling on that brand-new, shiny nickel. Burr and Hamilton were local rivals in New York politics. They had a sometimes close, but complex, relationship. When Hamilton played dirty politics (yet again) to keep Burr from becoming New York's governor, Burr uncharacteristically lost his self-control, called Hamilton out for a duel, and shot him dead in 1804. It is quite possible that Hamilton actually committed suicide, using Burr as the instrument. Afterwards, Burr took to referring to "my friend Hamilton, whom I shot." At any rate, Burr was vilified nationally for his deed, and Hamilton was less-than-deservedly martyred. Burr and Jefferson, on the other hand, were national political rivals.

Wednesday, September 18, 2019

Human Gene Therapy :: Biology Genetics Essays

Human Gene Therapy Everybody carries about half a dozen defective genes. Many don't know this, unless someone they know is affected by a genetic disorder.(1) The genetics of many diseases are passed from one generation to the next by inheriting a single gene, such as Huntington's disease. Many other diseases and traits are influenced by a collection of genes.(4) About one in ten people has, or will develop, an inherited genetic disorder. Approximately 2,800 specific conditions are known to be caused by defects, or mutations, in just one gene. Most of us don't suffer any harmful effects from our defective genes because we carry two copies of nearly all genes. In most cases one normal gene is enough to avoid all the symptoms of disease. If the affected gene is recessive, and we inherit two copies of the gene, the disease will develop. If the affected gene is dominant, only one copy is enough produce the disease. There are also X-chromsome linked genetic diseases.(1) A potential approach to the treatment of genetic disorders in humans is gene therapy. Gene therapy is the delivery of a correct version of a mutated gene to a cell, where its expression will produce the normal protein and restore normal cellular function. The mutated gene must be delivered to the nucleus of the cell.(2) There are essentially two forms of gene therapy, somatic gene therapy and germline gene therapy. Somatic gene therapy involves the manipulation of gene expression in cells that will be corrective to the patient but not inherited by the next generation.(4) Germline gene therapy involves the replacement of defective genes in the germline cells, which contribute to the genetic heritage of the offspring. It has the potential to affect not only the individual being treated, but also his or her children. Germline therapy would change the genetic pool of the entire human species, and future generations would have to live with that change. It is not likely germline therapy will be tried on humans in the near future due to ethical problems and technical difficulties.(1) In vivo gene transfer is the introduction of genes to cells at the site at which they are found in the body. Ex vivo gene transfer is the transfer of genes into viable cells that have been temporarily removed from the patient and are then returned following treatment.(6) Foreign DNA can be injected into the cell, or its entry can be facilitated by various chemical or electronic ways, but these methods aren't very efficient.

Tuesday, September 17, 2019

Mine Sweeping System Using Image Processing

MINE SWEEPING SYSTEM USING IMAGE Processing Abstractions: Mine sweeping system is entirely designed for observing mines in peculiar user defined country. It uses a Java application from the user country and besides it consists of automaton which plays a cardinal function in the full system. The Java application and the automaton system works together to give an efficient system. The Java application is besides known as waiter and the automaton system communicate each other through wireless transmittal. In this system the human contact with the automaton is non required. The Java application is used to command the full mine sensing procedure. The optical flow vector, the automaton alliance and practical map of the location of the automatons are displayed on the screen of the waiter computing machine. Besides, the antecedently consequences that is the automatons that has searched for mines will besides be available or displayed for the user. So, that no demand of hunt for mines once more and once more in same country or practical grid. The ob tained database consequences are so uses to optimise thee mine brushing procedures in the hereafter through a LRU ( Least late used ) algorithm. The Robot system is aligned with a camera and uses a self-navigating algorithm with the obstruction turning away implemented utilizing optical flow. The optical flow which is produced within the milieus of the automaton system is registered utilizing the on board camera and by utilizing image processing methods like Image cleavage, Edge sensing and grouping, average filtrating thresholding procedure and by the vector computations, the hacking can be obtained. The automatons will work in a spontaneous practical grid and a existent clip map of the mine sweeping operation is displayed on the waiter system. Actually, the automatons will cipher the really shortest way within the grid while seeking and observing for the mines. The automatons commune with each other utilizing swarm engineering in order to carry through the undertaking. Introduction: The robotic usage of this mine sensing is a new procedure whereas the procedure of mine sensing is chiefly carried over by the worlds itself. They used to have on some protective cogwheel and some instruments with which they detect mines. There is a batch of hazard involved in this manner of mine sensing as no 1 can think the happening or the appendage of the blast. Hence so the usage of manual automatons in which they are guided by a user to observe or study a peculiar 1 for a mines therefore came into being. But these manner of observing mines was non much helpful as the manual navigate of the automaton of a certain country becomes tiresome largely over a big terrain. Therefore the demand for automatic automaton comes over when the user is non all required in voyaging the automaton. The robot hunt in a given country for the mines and the co-ordinates of their places are often sent to the waiter system. These automatons are plotted of a practical grid which is produced on the waiter system and their location can be tracked down. When a mine is detected the co-ordinate is sent back to the sever system and the symbol is marked on the practical grid denominating the sensing of mine such as co-ordinates, topographic point, clip, country all stored in the database. The user can so analyze the database to acquire the necessary information narrow down the hunt country. We used methods such as shortest way algorithm and chiefly image processing for obstruction turning away. Engagement of homo in the full sensing is non at all needed or zero. CONCEPTS AND FEATURES Optical flow Optical flow or ocular flow is the form of evident gesture of objects, surfaces and borders in a ocular scene caused by the comparative gesture between an perceiver and the scene [ 1 ] Optical flow computation utilizing Lucas cascade method The gesture of borders, surfaces and objects in a scene which raised by the gesture between an perceiver and scene is known as optical flow. The optical flow can be applied is obstacle turning away and self-alignment of driving circuit of the automaton. Calculation of optical flow Let us see two frames of clip T and a?† t at a place. The optical flow is calculated between this frames with the aid of a Taylor series method by utilizing partial derivation based on spacial and temporal coordnates. For a 2D+Tdimensional instance ( 3D orN-D instances are similar ) a voxel at locationwith strengthwill hold moved by,andbetween the two image frames, and the followersbrightness stability restraintcan be given: Assuming the motion to be little, the image restraint atwithTaylor seriescan be developed to acquire: H.O.T. From these equations it follows that: or which consequences in whereare theandconstituents of the speed or optical flow ofand,andare the derived functions of the image atin the corresponding waies.,andcan be written for the derived functions in the followers. Therefore: or [ 1 ] & A ; [ 2 ] This is an equation in two terra incognitas and can non be solved as such. This is known as theaperture problemof the optical flow algorithms. To happen the optical flow another set of equations is needed, given by some extra restraint. All optical flow methods introduce extra conditions for gauging the existent flow. In the mine sensing procedure optical flow is used for chiefly observing the object, hacking and besides for the robot pilotage. IMAGE SEGMENTATION Image cleavage is the procedure of partitioning a digital image into multiple sections which are sets of pels, besides known as ace pels. The end of cleavage is the simplify and/or alteration the representation of an image into something that is more pregnant full and easier to analyse. Image cleavage is typically used to turn up objects and boundaries which include lines, curves. In image more exactly image cleavage is the procedure of delegating a label to every pel in an image such that pels with the same label portion certain features. The basic measure for image retrieval by mercantile establishment is the computation of the ocular characteristics. The necessity to observe the object as a whole and non merely portion of it has been approved utilizing a intercrossed cleavage technique based on border sensing, part growth and optical flow processs. Image cleavage proves to be an of import measure in ciphering the navigational consequences of the automaton system. [ 1 ] & A ; [ 2 ] . Detection is based on object colour or strength contrast with the environing background. Regardless of the type of detector noise is ever present for cut downing these types of noises we use assorted types of filters. Median Filter Medium filter is a nonlinear method used to have noise from images. It is widely used as it is really effectual at taking noise while continuing borders. The average filter plants by traveling through the image pel by pel, replacing each value with the average value of vicinity pels. The form of neighbours is called the window, which pixel by pel over the full image. The median is calculated first screening all the pel values from the window into numerical over, and so replacing the pel being considered with the in-between pel value [ 3 ] Threshold Method It is besides known as image threshold. In this method, we introduce a new mechanism for observing the landmine. We merely convert the grayscale and cold images into binary or block/white images with specific threshold value or may be varies. Atmega 32 microcontroller The microcontroller we use in the mine sensing procedure for cryptography is the Atmega 32 which has characteristics such as.High public presentation, low power Atmel 8-bit micro accountantAdvanced RISC architecture133 powerful instructions- most signal clock rhythm executing32Ãâ€"8 general intent working registry + peripheral control registryFully inactive operation [ ]The microcontroller along with the L298 will be used to run the automaton automatically. Figure: Atmega 32 Microcontroller constellation Xbee pro communicating faculty The interaction between the automaton system and waiter system is formed through a Xbee faculty which acts as a trans receiver by procuring consecutive communicating utilizing the UART [ ] . Consecutive Communicationss The Xbee/Xbee-pro RF faculties interface to a host device through a logic – degree asynchronous consecutive port. Through its consecutive port the faculty can interact with any logic and electromotive force compatible VART ; or through a degree transcriber to any consecutive device. UART informations flow Devicess that have a vart interface can link straight to the pins of the RF faculty. Figure: UART environment Xbee pro system Flow Control DI ( Data In ) Buffer When the consecutive information enters RF faculty through the DI pin, the information is stood in the DI buffer until it can be processed. Hardware flow control ( CTS ) when the DI buffer is 17bytes off from being full ; by default, the faculty assert CTS to signal to the host device to halt directing informations CTS is re – asserted after the DI buffer has 34 bytes of memory available. Flow control DO ( Data Out ) When the RF information is received, the informations so enters the DO buffer and is sent out the consecutive point to a host device. Once the DO buffer reduces capacity, any extra entrance RF information is lost. Hardware flow control ( RTS ) : If RTs is enabled for flow control, informations will non be sent out the DO buffer every bit long as RTS is de- asserted. Therefore in this manner Xbee pro faculty questions to be an efficient trans receiver which initiates a 2nd VART channel. We create a templet foremost to carry through the papers processing demands. The others services will merely necessitate individual clip activation. SYSTEM DESIGN: The full mine sweeping system is categorized into three parts. They are:Waiter with Java ApplicationRobot system with drove engineeringWireless communicating system Figure: Block diagram system of Mine brushing Figure: Microcontroller and architecture communicating Figure: On Board camera and system communicatingWith the aid of net beans application the user controls the full system. At first the user writes a â€Å"start† bid in the Java application. Data will be send to the UART channel through wireless consecutive communicating.The start bid is received by the GB Xbee faculty on the automaton system and it triggers the micro accountant.After triping the micro accountant it invariably transmit a signal to the driving circuit with the aid of UART channel which portray the practical grid.The alterations are deciphered by the Java application and it was created on GEY at the same clip.This methodological analysis proceeds the circuit until the automaton achieves at the terminal of the self-created practical map.When the micro accountant is triggered it sends informations non merely to the drive circuit but besides to on board IP camera through a radio web device ( router ) to get down the image processing faculty.After triping of the IP c amera it captures the images of the practical grid and so it sends the information to the image processing faculty in which image cleavage optical flow consequences are generated.After finishing of the cringle the automaton sends a â€Å"stop† bid to the waiter.Software demands specification To put to death the mine sweeping system the user foremost enter the applicationThe automaton starts its procedure of seeking when it receives bid from the waiterThe automaton more over follows a optical flow which can be obtained by utilizing the on board IP camera. With the aid of optical flow method the automaton can avoid the obstructions and it itself align a practical map.The automaton so selects a shortest way on the practical grid to observe the mines.In this procedure the camera gaining control the image and the informations will be send to the image processing faculty in which mines can be detected by image cleavage procedure.After the image cleavage the information will be send to the waiter and shop in a information base.Here LRU algorithm is used to better the mine searching, observing and efficiency.Premises The distance between the client and the automaton should non be exceeded more than 500mtrs for good consequences. Dependences The connexion strength of UART is changeless. The automaton system must hold a changeless power supply all the times for accurate consequences. System characteristics The system consists of different characteristics to individual the operations. They are chiefly divided into: – Database Storage In this system this database storage plays a chief function. This storage system is used to hive away the images which was taken by on board camera. Here SQL database is developed and used to hive away consequences the automaton system and with the aid of JDBC connexion it was connected to java application Precedences With the aid of database the information will be stored manipulate and updated all the informations performed by the automaton is on the constituents. The illustrations are mine figure, location or country, count of mines etc. FunctionalRequirements The functional demands are nil but characteristics which are provided to stop users the full system has 3 bomber faculties they areJava application facultyImage processing facultyRobot facultyJava application faculty Java faculty is chief portion in the system from this lone the user starts the procedure by come ining the country of practical grid with this application we can besides see the full map with the aid of UART in which automaton performs operations. After finishing operations the applications shows the consequence for users java beans 7.0 is used to develop this application. Image processing faculty This faculty plays an of import key in the full system. By this the designation and localisation of mines was done. Here by utilizing image cleavage the mark is identified by the size form and visual aspect, this procedure is done by labelling procedure. In the image cleavage at first the gaining control image is labeled in to parts and so it converted in to black and white image so it subdivide the image harmonizing at that place sizes, forms and constructions. By utilizing these features the mark can be estimated of a mark assurance degree. Image cleavage is non sufficient for placing the mines so we use different mine field forms which can be find in survived part. Robot system faculty Thisconsists of micro accountant which generates the map and performs the operation when user gives a bid. Safety and Security RequirementsDue to connexion failures and micro accountant lapses the system may be crashed to over this state of affairs the robot resets and show approximately message to the user.The radio web is based on SSID user and watchword, which consists of unafraid connexion.ApplicationsIt consist of user friendly GUI.Known human contact is needed.All the communicating is through radio and web.The user can manually overrule the system.Conclusion The chief of the research is to develop a system which has a capableness of finding an object or mine. Here we used feeling techniques image cleavage and acknowledgment and faculties