Saturday, August 31, 2019

Is Google Making Us Stupid? Essay

In the article by Nicholas Carr, â€Å"Is Google Making Us Stupid?†, Carr points out numerous drawbacks to today’s technology and as well as a useful tool to our society. Of course this topic of discussion has various opinions and viewpoints on whether technology is coming our aid or hurting us more in today’s world. I believe technology is in fact hurting us in some categories, but ultimately I believe that it is ultimately helping us grow as people and improving society as a whole. Nicholas Carr’s whole argument about how the internet is hurting us and making the use of our own knowledge become less of a factor is hard to believe looking at the resources it provides to us today. Google, Wikipedia, online databases, and school libraries are all being put on the internet to serve accessible information. Colleges are even using the internet for online courses and e-mail services to communicate with students. The internet is has also brought us the ability to research and communicate across various cultures without actually having to travel to those locations to see them first hand. Social media websites, such as Facebook and Twitter, are a very good examples of a communication tool if they are used in the correct fashion. Websites like these allow for people to read about a topic or issue and discuss it with people all over the world, even the people that are being affected. Blogs, discussion boards, and pictures are shared on the web with the rest of the world to see and act upon. Carr fails to mention the use of the web in this way in his article. What Carr doesn’t realize is that the internet is an endless pit of information and is available to everyone, just not always necessarily accessed by users. We are attracted to what we are interested in and what is the most useful to us on the internet. Carr mentions that â€Å"power browsing† is making us avoid the traditional way of online reading by giving us quick wins. The use of hyperlinks allow for us to access different resources by  helping a person gain more information and understand it better. This allows for users to access information quicker, allowing them to soak up information, and making them have more knowledge on the topic making them less stupid. Carr makes the argument that â€Å"society is continuously being shaped by new technology†. I agree with this statement, but I think it is more or less society adapts to the new technology being introduced to us and what it has to offer. Our brains don’t have to change for the internet, they tend to develop with it. Being brought up with technology, it is easy to understand and utilize what it has to offer. On the other hand, older generations may have a hard time with it due to it being to different to handle well. The amount of information may be too difficult to comprehend and may become a cohesive relationship. I have always been able to find the information that I’m seeking and use it to my liking. It’s just a matter of focus and not becoming overwhelmed. Although technology and the use of the web are useful, there are always downfalls to such great things. Carr mentions that â€Å"as we become more reliant on computers to meditate our understanding of the world, it is our own intelligence that flattens into artificial intelligence†, I agree with this statement in the fact that humans rely heavily on technology to communicate and entertain us. We have so much information at our fingertips that it almost seems silly to pick up a book and actually research something when you can just type it into a search engine and get results in lightning speed. My parents and elders have told me that technology is making us anti-social and deteriorating our communication skills. The use of text messaging seems to be the one that is most at fault for this. In today’s culture, talking on the phone and in person is becoming a struggle for most people, especially teens and young adults. We are so use to typing messages back and forth to one another that we lose the simple communication skills by not physically talking to them. There is a lot of things that a text message can’t convey to people like talking can such as emotion and clarity. In conclusion, it’s all about not becoming too overwhelmed, use resources  and the internet responsibly, and use them to our advantage. Carr misses the point in that our abilities for deep thinking are not ruined by the internet but expressed and improved. To learn about a certain subject, you don’t have to enroll into a college course. You don’t need a plane ticket to learn about different cultures. This is information at your fingertips with the use of the internet and it’s your responsibility and prerogative to use it wisely and to your advantage.

Friday, August 30, 2019

Outline and Evaluate Issues Surrounding the Classification and Diagnosis of Depression

Outline and Evaluate Issues Surrounding the Classification and Diagnosis of Depression Scheff’s Labelling Theory is a process which involves labelling people with mental disorders when they produce behaviour that does not fit with socially constructed norms and labelling those who reflect stereotyped or stigmatized behaviour of the ‘mentally ill’. A disadvantage of labelling an individual with depression is that labelling can accentuate and prolong the issue. In addition by labelling someone with depression who in fact is not depressed may in fact become depressed as a result.Another problem is that labelling an individual with depression means that they can have problems with getting a job and leading a life in the future because they are not treated as a normal person. Thus labelling has a large effect on individuals with depression. On the other hand labelling a person with depression means that they are enabled to seek help and find treatment for themselves. A lthough labels are stigmatizing, they can also lead those who bear them down the road to proper treatment and recovery.Another issue surrounding the diagnosis and classification is that there are different types of depression outlined in the different classification manuals. Sometimes clinicians are unable to distinguish between different types accept unipolar and bipolar. However, research has shown that 10% of people diagnosed with Major Depressive Disorder (MDD) develop bipolar episodes later. The same was found with dysthymic disorder which can develop in MDD later; this is known as double depression and is found in 25% of depressed patients.Other diagnostic tool is the Beck Depression Inventory This is a 21 item self-report questionnaire designed to measure the severity of symptoms in individuals diagnosed with depression. Each question is designed to assess a specific symptom common in people with depression for example the sense of failure, self-dislike, social withdrawal or suicidal ideas. Items 1 to 14 assess symptoms that are psychological in nature for example feelings of sadness. Items 15 to 21 then assess more physical symptoms for example the loss of energy and irritability.Each item is accompanied by four alternative responses, graded for severity and scored from 0 to 3. The implications of using different diagnostic tools on the classification and diagnosis of depression are that reliability of diagnosing depression may be affected. Just as with physical medical disorders mental illness diagnoses are also not always reliable. The practitioner uses mainly symptoms that the patient reports rather than physical signs to reach a decision.Moods often vary over time in most people and this can have implications when testing reliability. As well as different types, there are different subtypes of depression that are recognised in the manuals and clinicians have had to distinguish between the causes of depression in order to distinguish between the sub types. For example they distinguish between endogenous depressions which are biologically determined and reactive depressions which are determined by biological stressors.Even though distinctions between these two causes of depression are not conclusive, there is a reliable cluster of symptoms which can help differentiate between types of depression. For example, the endogenous types of depression usually have more severe symptoms and higher suicide rates. Another problem arises with the diagnostic criteria for children, even though depression can remain undiagnosed in children. Children sometimes have other disorders which include behavioural problems and disruptive behaviour; therefore depression may be overlooked in the diagnosis.As well, children tend to show anger, aggressiveness and irritability rather than low mood. Co-morbidity is the incidence of a disorder being coupled with another disorder. Depression can occur with other disorders such as Schizophrenia, eating disorder and alcohol addiction and substance abuse. This makes it difficult in the diagnosis of depression, it leads clinicians to have to determine which the primary disorder, schizophrenia is or depression, eating disorders or depression.There are also issues relating to reliability which may affect the diagnosis. One type is Test-retest reliability, which occurs when a practitioner makes the same consistent diagnosis on separate occasions from the same information. In terms of depression this can be applied if the same Doctor or Psychiatrist gives a patient a diagnosis of depression on two separate occasions. The other is Inter-rater reliability occurs when several practitioners make identical, independent diagnoses of the same patient.This can be applied to depression by confirming that the diagnosis of depression is accurate in a given situation. Issues of validity also arise in the diagnosis of depression. For example, Predictive validity occurs if diagnosis leads to successful treatme nt, then the diagnosis can be seen as valid. Under the heading of depression, there are a series of depressive disorders such as Major Depressive Disorder, Pre-Menstrual Disorder etc. In terms of depression predictive validity will occur if the right diagnosis is made followed by a subsequent correct course of action.Research by Sanchez-Villegas et al (2008) supports the ‘predictive validity’ of depression diagnosis. They assessed the validity of the Structured Clinical Interview to diagnose depression, finding that 74. 2% of those originally diagnosed as depressed had been accurately diagnosed, which suggests thus diagnostic method is valid. Cultural differences may impact an individual with depression because the DSM is used in West to diagnose depression. This criterion is biased towards people in the Western world.What is considered abnormal in one culture may be considered normal in another culture. Thus someone diagnosed in Europe with depression may not have been diagnosed with depression elsewhere. In addition treatment to the disorder can be very different in different cultures. Thus an individual in two different cultures may be treated differently for depression. So therefore despite the universality of the symptoms of depression clinicians must take into account cultural differences in diagnosing depression.For example, patients from non-western cultures tend to complain more of the physical symptoms such as loss of appetite and lack of sleep than personal distress. This is supported by a study done in New York in which 36 South Asian immigrants and 37 European Americans were given vignettes describing depressive symptoms. The Asian immigrants found more social and moral problems which could be dealt with by the individual whereas the Euro-Americans tended to find more biological explanations, that required professional intervention. Outline and Evaluate Issues Surrounding the Classification and Diagnosis of Depression Outline and Evaluate Issues Surrounding the Classification and Diagnosis of Depression Scheff’s Labelling Theory is a process which involves labelling people with mental disorders when they produce behaviour that does not fit with socially constructed norms and labelling those who reflect stereotyped or stigmatized behaviour of the ‘mentally ill’. A disadvantage of labelling an individual with depression is that labelling can accentuate and prolong the issue. In addition by labelling someone with depression who in fact is not depressed may in fact become depressed as a result.Another problem is that labelling an individual with depression means that they can have problems with getting a job and leading a life in the future because they are not treated as a normal person. Thus labelling has a large effect on individuals with depression. On the other hand labelling a person with depression means that they are enabled to seek help and find treatment for themselves. A lthough labels are stigmatizing, they can also lead those who bear them down the road to proper treatment and recovery.Another issue surrounding the diagnosis and classification is that there are different types of depression outlined in the different classification manuals. Sometimes clinicians are unable to distinguish between different types accept unipolar and bipolar. However, research has shown that 10% of people diagnosed with Major Depressive Disorder (MDD) develop bipolar episodes later. The same was found with dysthymic disorder which can develop in MDD later; this is known as double depression and is found in 25% of depressed patients.Other diagnostic tool is the Beck Depression Inventory This is a 21 item self-report questionnaire designed to measure the severity of symptoms in individuals diagnosed with depression. Each question is designed to assess a specific symptom common in people with depression for example the sense of failure, self-dislike, social withdrawal or suicidal ideas. Items 1 to 14 assess symptoms that are psychological in nature for example feelings of sadness. Items 15 to 21 then assess more physical symptoms for example the loss of energy and irritability.Each item is accompanied by four alternative responses, graded for severity and scored from 0 to 3. The implications of using different diagnostic tools on the classification and diagnosis of depression are that reliability of diagnosing depression may be affected. Just as with physical medical disorders mental illness diagnoses are also not always reliable. The practitioner uses mainly symptoms that the patient reports rather than physical signs to reach a decision.Moods often vary over time in most people and this can have implications when testing reliability. As well as different types, there are different subtypes of depression that are recognised in the manuals and clinicians have had to distinguish between the causes of depression in order to distinguish between the sub types. For example they distinguish between endogenous depressions which are biologically determined and reactive depressions which are determined by biological stressors.Even though distinctions between these two causes of depression are not conclusive, there is a reliable cluster of symptoms which can help differentiate between types of depression. For example, the endogenous types of depression usually have more severe symptoms and higher suicide rates. Another problem arises with the diagnostic criteria for children, even though depression can remain undiagnosed in children. Children sometimes have other disorders which include behavioural problems and disruptive behaviour; therefore depression may be overlooked in the diagnosis.As well, children tend to show anger, aggressiveness and irritability rather than low mood. Co-morbidity is the incidence of a disorder being coupled with another disorder. Depression can occur with other disorders such as Schizophrenia, eating disorder and alcohol addiction and substance abuse. This makes it difficult in the diagnosis of depression, it leads clinicians to have to determine which the primary disorder, schizophrenia is or depression, eating disorders or depression.There are also issues relating to reliability which may affect the diagnosis. One type is Test-retest reliability, which occurs when a practitioner makes the same consistent diagnosis on separate occasions from the same information. In terms of depression this can be applied if the same Doctor or Psychiatrist gives a patient a diagnosis of depression on two separate occasions. The other is Inter-rater reliability occurs when several practitioners make identical, independent diagnoses of the same patient.This can be applied to depression by confirming that the diagnosis of depression is accurate in a given situation. Issues of validity also arise in the diagnosis of depression. For example, Predictive validity occurs if diagnosis leads to successful treatme nt, then the diagnosis can be seen as valid. Under the heading of depression, there are a series of depressive disorders such as Major Depressive Disorder, Pre-Menstrual Disorder etc. In terms of depression predictive validity will occur if the right diagnosis is made followed by a subsequent correct course of action.Research by Sanchez-Villegas et al (2008) supports the ‘predictive validity’ of depression diagnosis. They assessed the validity of the Structured Clinical Interview to diagnose depression, finding that 74. 2% of those originally diagnosed as depressed had been accurately diagnosed, which suggests thus diagnostic method is valid. Cultural differences may impact an individual with depression because the DSM is used in West to diagnose depression. This criterion is biased towards people in the Western world.What is considered abnormal in one culture may be considered normal in another culture. Thus someone diagnosed in Europe with depression may not have been diagnosed with depression elsewhere. In addition treatment to the disorder can be very different in different cultures. Thus an individual in two different cultures may be treated differently for depression. So therefore despite the universality of the symptoms of depression clinicians must take into account cultural differences in diagnosing depression.For example, patients from non-western cultures tend to complain more of the physical symptoms such as loss of appetite and lack of sleep than personal distress. This is supported by a study done in New York in which 36 South Asian immigrants and 37 European Americans were given vignettes describing depressive symptoms. The Asian immigrants found more social and moral problems which could be dealt with by the individual whereas the Euro-Americans tended to find more biological explanations, that required professional intervention.

Thursday, August 29, 2019

Food is culture Essay

According to the Executive Director of the Washington International Center, Robert Kohls (1984), â€Å"the different behaviors of a people or a culture make sense only when seen through the basic beliefs, assumptions, and values of that particular group. † This legendary statement that was uttered more than two decades ago was intended to explain American values and to compare these values with those that belong to other cultures. But, as time went by, Khols insightful perception about culture has taken on international meaning and it was one of the fundamental concepts espoused by Montanari in his book entitled â€Å"Food is Culture. † Using historical reference to Hoppocrates, Montanari insisted that food has never been associated with nature and this contradicts the general idea advertised by people who campaign for organic foods. Montanari explains that food is the result of the efforts of a society to tame, transform, and interpret nature. This view can be supported by two related observations. First, societies all over the world encounter different environments. That is, societies in the Pacific region may find tropical climates whereas societies in the Mediterranean region have temperate climates. The differences in weather, together with the differences in geography, lead to the different ways that the members of the society learned to deal with their varied environments. Thus, the second observation is that the different societies have produced their own unique food and food culture. For example, Italian food reminds people of spaghetti, tiramisu, and other pasta dishes. Asian food, on the other hand, brings to mind bowls of rice. Kohls’ perception, when combined with Montanari’s view about the relationship of food and culture, evolves into something different then. That the different values of a people or a culture are revealed and understood when seen through the food culture of that particular group. Feedback from a reader: At first, it would take some stretch of imagination to associate food with culture. There are two major reasons for this difficulty. First, people eat food in order to survive and perhaps live a relatively healthy life. The desire to live and survive is so fundamental that all peoples possess this particular desire. And if all peoples and culture uphold this desire to live, then eating food is very common that it cannot be directly related to the uniqueness of culture. And second, food is almost always taken from nature. This means that food is obtained from farms and from forests. â€Å"Farm† and â€Å"forest† are two concepts that are associated with things natural. Food, therefore, is a natural resource. And despite the fact that most people in America consume processed food, food is definitely associated with nature. However, using a more critical thinking and a wider observation of the world, the statement that food is culture begins to make some sense. The values of a culture can be reflected in the kinds of food that people eat and the ways that people eat their food. For example, the Japanese culture carries out a tea ceremony, specializes in sushi, and usually serves food in small bite sizes. All these reflect the fact that the Japanese culture gives great importance to tradition. Thus, when Japanese encounters a problem, he turns to the knowledge of his ancestors for guidance. The typical American, on the other hand, rarely imitates the actions of his ancestors. When he encounters a problem, he tends to find help by himself and establishes some measure of control on his problem. The way that Americans value individuality and personal control over their environment can be seen in the way they wanted their food to be served individually. The Americans also wanted their foods to be served fast and this preference echoes the values of practicality and efficiency. Therefore, as a reader of Montanari’s ideas about the relationship of food and culture, I am convinced that food culture does reflect the values upheld by a society. Bibliography Kohls, R. (1984). The values Americans live by. Retrieved September 18, 2007 at http://omni. cc. purdue. edu/~corax/kohlsamericanvalues. html Montanari, M. (2006). â€Å"Introduction. † Food is Culture. A. Sonnenfeld (trans. ). New York: Columbia University Press.

Management in context Essay Example | Topics and Well Written Essays - 1250 words - 1

Management in context - Essay Example These damaging theories have made students to believe that managers cannot be trusted. I also noticed that the theories suggest that strict supervision and control of employees is the optimal manner of operating a business. The article showed that academic research associated with business and management conduct, influences management negatively in that students relinquish their moral responsibility by learning its theories (Ghoshal, 2005). Surprises in JA2 This article demonstrated that the theories taught in universities and business schools are to blame for the managers’ poor performance. This is because the managers underutilise the available resources when they follow incorrect channels that lead to bad decisions as a result having of inadequate knowledge. Possession of relevant knowledge was emphasized in this article, where Donaldson implies that managers do not make bad decisions intentionally, but it is because of inadequate knowledge that these errors arise. â€Å"T hese errors are not intended by the managers, and are due to deficiencies in their knowledge† (Donaldson, 2002:97). A new thought was introduced when Donaldson wrote that social theories taught in business schools have had contradictions with the assumptions made in management education. â€Å"There is contradiction between the views expressed by some major contemporary social science theories taught in management schools and the assumptions on which management education is founded† (Donaldson, 2002:97). The way Donaldson proved the incompatibility of the economic and finance, strategy theory, agency theory, institutional theory, and judgmental bias theory was so convincing that I come to completely agreed with the article. The evidence In the article, Ghoshal argued that the negative management and conduct of business have been influenced by academic research learnt in business school by students who later become managers. I observed that the argument on assumptions an d ideas that Ghoshal was talking about were indeed true. â€Å"Our theories and ideas have done much to strengthen the management practices that we are all now so loudly condemning† by â€Å"adoption of a particular theory and more at the incorporation†, which have â€Å" ideologically inspired amoral theories† that are taught in business school(Ghoshal, 2005:76-76). The ideology of pessimism also known as liberalism brought a gloomy vision in management where the owners of a business do not trust the managers as it is evident in the many companies across the globe. Looking into Donaldson’s article and how he had argued, the five theories he had highlighted really contradicted optimal management of business and what students learnt in business schools. In economics and finance, when information is made public it cannot help one firm as all the other firms will have it and use it to their advantage. â€Å"Thus research-based knowledge, once public, confer s no economic advantage in (even semi strong) efficient markets. Only knowledge that is kept private can confer an advantage to the investor† (Donaldson, 2002:96). This shows that the research done in business school once made public cannot give students an upper hand. In the theory of strategy, when a firm has unique resources, it cannot disclose them to the managers, as they can reveal them to rival firms. This in turn results to resources being underutilised; therefore, failing to realize the full potential of the

Wednesday, August 28, 2019

Compare Devices Essay Example | Topics and Well Written Essays - 1000 words

Compare Devices - Essay Example Thesis statement: The comparison based on the literary analysis on James Joyce’s stories named as Araby and Eveline proves that the author makes use of different literary devices, methods/techniques, and themes (development) to share his unique views on the relationship between vegetative growth and maturity (development) in human life with the readers. In the short story named as Arabi, the author depends upon personification to help the readers to pay attention on inanimate objects, including the street. For instance, the word ‘smobre’ denotes the silence in the street. The storyteller in the literary work by James Joyce makes clear that, â€Å"When we met in the street the houses had grown sombre† (16). Besides, the author makes use of personification to provide human like characteristics to the silent street and the houses. On the other side, the author totally neglects personification in the short story named as Eveline, but makes use of symbolism. To be specific, this short story is comparatively rich in symbolism and religious allusions. For instance, the priest’s image is symbolic of religious allusion, and the female protagonist’s name (say, Eveline) is symbolic of Eve. Besides, the female protagonist’s contemplation on her mother is symbolic of death because her mother is no more. The heroine reveals that, â€Å"Another day, when their mother was alive, they had all gone for a picnic to the Hill of Howth† (23). Similarly, imagery and metaphor are widely used in the first short story. For instance, sky is a strong imagery in the short story which denotes the protagonist’s loneliness. Besides, the front part of the houses is described as faces, which is symbolic of the usage of metaphorical language. Similar to the first story, metaphor is a noticeable literary element in the second story. For instance, the phrase ‘bell clanged’ is used as a metaphor which denotes the emotional turmoil faced by the female

Tuesday, August 27, 2019

Gastineau v. Gastineau, 151 Misc. 2d 813, 573 N.Y.S.2d 819 (1991) Essay

Gastineau v. Gastineau, 151 Misc. 2d 813, 573 N.Y.S.2d 819 (1991) - Essay Example Gastineau left his job as a result of this ailment (Aspen 2011) According to Ullah v. Ullah, 555 N.Y.S.2d 834 (2nd  Dep’t 1990) it is stated that both parties should gain an equitable share. The court found that Marcus dissolute the marital assets and the marital status were taken as if they existed. There has to be proof that the assets are not lost as part of marital purpose. The nature of the defendant in the football is said that in the year 1989 he tried to seek job in a few places with no success and the place where he worked previously also did not offer him a job (Thomas, 2013). The entire amount that was acquired when both parties were together would be shared by the couple after a divorce. The court argues that the defendant will still have an obligation to pay more as he continues to make a living (William 2012). The defendant claims that his name had gotten a negative connotation. The defendant did not appear in court for a number of court dates and so according to the domestic law 243 he got a fine of $ 83, 000. The domestic relations law 170 intervened and granted the plaintiff a divorce based on the inhuman and cruel treatment. The case was resolved fairly (William,

Monday, August 26, 2019

Nanotechnology Annotated Bibliography Example | Topics and Well Written Essays - 1250 words

Nanotechnology - Annotated Bibliography Example The purpose of the site is to explain the basic concepts related to nanotechnology and refer to the latest news, events and articles. The author Earl Boysen was a co-author of the book Nanotechnology for Dummies (Richard Booker & Earl Boysen, Wiley Publishing). He started the website with view to explaining the concepts in book in simpler understandable format. I am recommending this site because the website contains excerpts from the book Nanotechnology for Dummies further explaining the concepts in detail. It is a good resource for gaining a basic understanding of the field and to remain in touch with the latest research activities. It provides links to resources and articles for further reading, lists the descriptions of jobs available in the field. It even provides a simple lesson plan for the students of middle and high schools. The purpose of the site is to host a complete book related to the basics of nanotechnology online. The author Drexler, K. Eric, Ph.D., is an active researcher and author of a number of conference and journal articles besides this book. His work mainly focuses on the advanced nanotechnologies and the directions of the current research. He also served as Chief Technical Consultant to the Technology Roadmap for Productive Nanosystems and is currently working with World Wildlife Fund exploring nanotechnology-based solutions to global problems such as energy and climate change. I am recommending this site because the entire book is available online in html format. The book covers the basic context, concept and possible applications of nanotechnology and therefore can be used as a good creative study reference guide. The purpose of the site is providing latest research and development news, articles, resources and a blog on nanotechnology and its applications as well as any raised issues. The publisher, Foresight Institute is a

Sunday, August 25, 2019

Organizational Performance Assignment Example | Topics and Well Written Essays - 2250 words

Organizational Performance - Assignment Example Usually, upon observing the extrinsically motivated employees, even the intrinsically motivated people may start to improvise on their perfection for attaining such extrinsic benefits. A manager should understand the types of motivation he should employ according to the personality of the employee and behave accordingly. The same differences can be tabulated in Appendix 1. (Quinn. S., 2010) The point where intrinsic and extrinsic motivations get exchanged is the ultimate place for job satisfaction and performance. However, this goal can never be explained arbitrarily. It has to be explained in terms of processes which have been enumerated in the following theories: Maslow’s Need Hierarchy: Every human being has 5 levels of needs, one superior to the other as explained in Appendix 2: It is the tendency of every individual to try and satisfy the needs from the bottom of the triangle to the top. Once the physiological needs get satisfied, he moves on to the security oriented needs and so on. As he starts moving higher up, the extrinsic rewards for which he was earlier motivated should be accompanied by his intrinsic motivation to achieve job satisfaction and performance. There is a natural tendency to move up and down the triangle continuously according to the circumstances. Herzberg’s theory of hygiene and motivation: Factors of hygiene contribute to the extrinsic motivation and constitute of work conveniences like good relationships with peers, supervisors, salary etc.

Saturday, August 24, 2019

Introduction and conclusion section for report Essay

Introduction and conclusion section for report - Essay Example Simple to launch its products successfully in the South African market. The primary goal or objectives of the company are to increase its revenue generation through opening up of different retail garment stores in various feasible locations of South Africa. Various market entry modes that can be employed in case of entering the South African market and how it can be beneficial for the company have been discussed in this study. Identification of the target market in South Africa is also important and has been included in this study. The marketing mix strategy involving the appropriate products, places, prices and promotional strategies to be employed by the company has also been discussed in this study. The primary competitors of Mr. Simple Company have also been identified and the corresponding competitor analysis has been performed in this study. Mr. Simple Company has been successfully running its business in Australia, New Zealand and Vietnam. Its decision to expand its business in the South African market does not promise to be a good prospect for the company to help it increase its international presence and enhance its profitability in a significant manner. The primary objectives of the company are to increase brand awareness amongst the South Africans, increase its revenue and open up three retail garment stores in different parts of South Africa. The target customers have been identified to be males in the age group of 15 to 35 years. Fashionable and casual garment products would be offered to the targeted customers in South Africa. The market trend analysis performed in this study indicates that the youths in South Africa are attracted towards various clothing brands and with proper brand awareness the company can be successful in increasing its brand loyalty amongst the youth generation of the country. Various strat egies that are needed

Friday, August 23, 2019

UK's over-Reliance on Deregulation and Current Economic Crisis Essay

UK's over-Reliance on Deregulation and Current Economic Crisis - Essay Example Debt accumulated in the deregulated industry of the United Kingdom through the rising acknowledgment on the amount of bad debt in the system was much bigger than that it was previously presumed to be. Sequentially, confusion arose amongst the United States financial regulators concerning the approach to be used to react to the increasing number of borrowing defaults. Reluctantly driven to make mortgage corporations Fannie Mae and Freddie Mac public, they suddenly swapped to permitting prominent investment banks Lehman Brothers to fold (Kilmister, 2008). 3. Crisis in European banking system The European banking system deteriorated into a downturn in three ways. Firstly, the intensifying tide of bad balances put the banks at risk of bankruptcy. Secondly, the clear change in the Federal Reserve policy from the previous save from bear sterns formed a panic in the inert-bank borrowing market. The United Kingdom was doubtful on which banks could withstand the bad debts and stopped the lend ing services that they offered, leading to an entire market seize up. Thirdly, stock market financial speculators also dreaded losses, hence drawing back from their shares. Bank regulation is grounded on the notion of borrowings can just be a definite amount of bank capital and such a situation is bound to go through a substantial decline in shares and ultimately reduce capital by a great extent. Bank borrowing in the European market decreased significantly ending in further risks of the stability of the financial system in the United Kingdom. While these issues were mainly experienced the US and UK only, the real estate sector shot up, and bank deregulation had been particularly strong in continental Europe....This paper aims to establish set of necessary measures, that should be taken by the government in order to to battle the ramifications of the economic Crisis in the UK. It is argued in the paper, that the level of deregulation in the monetary sectors of the UK had aggravated the economic impacts of the crisis. Financial modernization has enhanced liquidity and facilitated investors to spread risk of venturing in the financial sector through intercontinental diversification. The disadvantage of the approach is that worldwide implications of the present crisis are more reflective of past economic depressions. The spending cutbacks by the government were observed to be essential by contrasting the economies’ of United Kingdom with Greece and Ireland. Outside the Euro market, the United Kingdom faces a much superior flexibility on other financial markets apart from the bond markets. It is apparent that the objective of the government was to have the least level of state participation in the economic sector and provide subsidies that could be used to reinstate commercial and central banks to profitability positions, in anticipation of a rapid sale of the government’s ventures. The new regulatory protections rushed by the UK`s government have been implemented with the aim of preventing the outburst of another financial crisis. The new policies enacted by the governments have established an economy not ready for a financial crisis. The policies have created room for perhaps a much worse crisis in the future.

Thursday, August 22, 2019

Analyzes of Richard Aldrich, Untitled and Tomma Abts, Fewe Essay

Analyzes of Richard Aldrich, Untitled and Tomma Abts, Fewe - Essay Example The essay "Analyzes of Richard Aldrich, Untitled and Tomma Abts, Fewe" discovers that two paintings. In terms of specific application of colors of painting by Pichard Aldrich to convey formal meaning there are a number of differing components. The bottom part of the work is covered in red with two yellow doors. The doors seem to function as an entranceway into a house. Still, there is the recognition that the abstract nature of the work is such that attributing a specific formal assumption to this doors is difficult. As one considers the middle part of the work there is the recognition that the artist is seemingly attempting to depict windows. In this way three grey rectangles are featured directly in the center of the picture. While the formal elements of these rectangles can potentially depict windows they additionally could be viewed as representing eyes. There then occurs an overarching meditation on the nature of shape as embodying formal qualities of expression. Another signifi cant formal quality of the work is the walls that seemingly form a house-like structure surrounding the earlier described elements. While walls outline the lower portions of the structure, there are also strong vertical lines that extend into the upper right portions of the image. These strong lines are accompanied by more rectangles and squares. In this way the artist is seemingly breaking the earlier pattern of a home structure and again meditating on the expressive potential of lines and shapes.

African American Essay Essay Example for Free

African American Essay Essay African American literature is captivating, powerful, spiritual, and emotional. The recurring theme is slavery but there are others such as inequality among sexes and races, injustice, resentment, and the strong belief in religion. These pieces of literature have been told by the individuals who went through the experience of slavery such as Frederick Douglass and others, like Jamaica Kincaid who have a passion for writing. The writers who experienced slavery themselves had differing views of their experience and relationship with their master. These pieces of literature share the pain, strength, heartache and will to go that each of these individuals experienced. The first reading is, To My Old Master, by Jourdan Anderson. This piece of literature is Anderson’s response to a letter he has received from his old master. It is a compelling story about how terrible and bad the Whites treated the African Americans. The master want’s Anderson and his family to come back and work for him. He reminds the master about how poorly they were treated while working for him. Anderson states, â€Å"Although you shot at me twice before I left you, I did not want to hear of your being hurt, and am glad you are still living. † (1865, p. 15). Anderson tells the master that he is making money and his family is living and doing well. He even expresses that his children are receiving an education now. It is very apparent to the reader that Anderson’s wife does not want to return and work for the master. â€Å"Mandy says she would be afraid to go back without some proof that you were disposed to treat us justly and kindly; and we have concluded to test your sincerity by asking you to send us our wages for the time we served you. † (1865, p. 16). Anderson remembers how horribly the woman and girls were treated, and he will never allow his daughters to go through that experience. â€Å"I would stay here and starve- and die, if it come to that- than to have my girls brought to shame by the violence and wickedness of their young masters. † (1865, p. 16) The end of the story the reader still feels Anderson’s resentment and bitterness toward the master. The next story and the one piece I enjoyed the most is, â€Å"White Folks Treated Us Good† by Marriah Hines. Hines states, â€Å"My white people treated us decent. † (p. 32). She goes onto further explain how her master feed, dressed, and kept them well. Hines explains how terrible master’s treated other slaves. â€Å"Some unfortunate individuals practically have nothing to eat. Why, the way their owners treated them was disgraceful treated them like felines and canines† (Hines, p. 32). Hines sounds fortunate and lucky to have worked for her master. The master gave the slaves Sunday off to rest and even allowed them to attend Church. Unlike other slaves Hines was never raped, beaten, or treated in a physical horrible way. The compelling part of this piece occured when the slaves were allowed to leave; most of them choose to stay. â€Å"Most of us stayed right there and raised our own crops. † (p. 34). Hines knew of her freedom but believed in her loyalty to her master and his family. The master provided her with assistance and support. A rare occurrence to read an African American piece of literature that speaks of a master in a positive and respectful manner. This master was a different man of his time. He did not take advantage of his slaves or treat them in a horrendous manner. This master used his slaves to care and run his property but treated them with respect and dignity, they deserved. Hines went onto, marry Benjamin F. Hines and give birth to five children. The last piece of literature is, â€Å"If We Must Die† by Claude McKay. This poem is about how horribly and disgusting Whites treated African Americans. It is written about the race riots in 1919. It describes the strength of the African Americans standing up to the Whites even if it ultimately meant dying. McKay states, â€Å"Like men we’ll face the murderous, cowardly pack, pressed to the wall, dying but fighting back! † (p. 378). This poem exemplifies the bravery and the will to fight for what is right otherwise these people would have been beaten and killed for the rest of their lives. There will always be a presence of racism in the world and specifically in the United States of America. Still today African Americans are treated equally as Whites. Although we as a country have come a very long way there is still work to be done. The more we educate people the less we will experience ignorance. The hate and the idea of inferiority will slow diminish if people become educated. I can end proudly stating that I am married to a Black man and we have two beautiful daughters, and I give an enormous amount of respect to those who fought for what was right. References Anderson, J. (1865). To my old master. In I. Reed (Ed. ), African American Literature. Abrief introduction and anthology (pp. 15-16). New York: The Longman LiteraryMosaic Series. [serial online]. December 2005;36(4):299-323. Available from:Academic Search Complete, Ipswich, MA. Accessed May 23, 2011. Hines, M. (n. d. ). My white folks treated us good. In I. Reed (Ed. ), African Americanliterature. A brief introduction and anthology (pp. 21-25). New York: TheLongman Literary Mosaic Series. [serial online]. December 2005;36(4):299-323. Available from: Academic Search Complete, Ipswich, MA. Accessed May 21,2011. McKay, C. (n. d. ). If we must die. In I. Reed (Ed. ), African American literature. Abriefintroduction and anthology (pp. 378). New York: The Longman LiterarySeries[serial online]. December 2005;36(4):299-323. Available from: AcademicSearchComplete, Ipswich, MA. Accessed Dec, 2011.

Wednesday, August 21, 2019

Passive and Active Security Attacks

Passive and Active Security Attacks Ans :- The difference between active and passive attacks in case of active attack involve the updating upon the data means the active attack access the data and then perform alteration upon the data and than data transmit on the network but in case of passive attack the attacker just access the message and the contents of the message without any alteration upon the data means just type attack just involve to read and access the message the content mean just observe the message . The active attack easy to detect but not easy to protect but passive attack difficult to detect easy to prevent Examples of the Active attack Replay Message modification Denial of service Example of the Passive attack Traffic Analysis Q2. List and briefly define categories of security services. Ans :- The various type secure services are :- Authentication Access Control (Authorization) Data Confidentiality Connection Confidentiality Connectionless Confidentiality 4. Data Integrity Connection Integrity with Recovery Connection Integrity without recovery Connectionless integrity Non Repudiation Authentication:- the service of authentication concern with the validate to the user before receiving the data at the receiving end . Means this service provide the way to authenticate the receiving of data after confirming the data coming from the valid user. Access Control :- after authentication the next task is access control means when user request to access the specific data then after perform authentication just next task to check the privileges of user what type of task user can be perform and what type of Resources can be access by the user . user can capable to read the contents of the data and Data Confidentiality:- This service basically refer to provide the confidence the data receive by the receiver not be access and read by any other person during data transmission mean the content of the msg not view by any other person. The type of data confidentiality:- Connection Confidentiality:- Refer to protect the data of all the during from read the content of the data on the connection. Connectionless confidentiality :- Refer to providing the protection from accessing the data of all the user on the Block of data. Data Integrity :- Refer to sure that the data receive by the receiver not be updating during the transmission by any other unrecognized person . mean the data receive by the receiver the actual data that is send by the sender. The following the types of the data integrity: Connection integrity with recovery:-Provide the integrity upon the data during transmission on the connection if there is any updation detect then also recover the message from the alteration and convert into the actual contents. Connection integrity without recovery:- refer to providing the integrity upon the data but not providing the recovery upon the data. Connectionless data integrity:- provide integrity upon the block of data also prevent if any alteration performed but not recover the message. Non repudiation :- refer to provide confidence to the sender the data receive by the receiver is the actual receiver and also provide confidence in the receiver side the data send by the actual sender. Q3. Is there any problem with the one-time pad cipher? Discuss the Problems. Ans :- yes there is problem with one time pad cipher :- Despite Shannons proof of its security, the one-time pad has serious drawbacks in practice: it requires perfectly random one-time pads, which is a non-trivial software requirement secure generation and exchange of the one-time pad material, which must be at least as long as the message. (The security of the one-time pad is only as secure as the security of the one-time pad key-exchange). careful treatment to make sure that it continues to remain secret from any adversary, and is disposed of correctly preventing any reuse in whole or part  Ãƒ ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬ hence one time. See data reminisce for a discussion of difficulties in completely erasing computer media. Q4. Define types of attacks based on what is known to the attacker. Ans:- The following are the typed of on the based on the known to the attacker Cipher Text Only Known Plaintext Chosen Plaintext Chosen cipher text Chosen Text Cipher Text Only :- in this type attack the attacker only know the algorithm used to encrypt the message from plaintext to cipher text .and also known the cipher text and try to be convert the cipher text into the plain text by using the brute forte attack if the key length if too large than this attack to be used no possible then require to be use the crypt analytical way . Known Plaintext :- in this attack attacker know the algorithm , cipher text and also know having idea and some of knowledge of the plain text and upon the bases of the knowing plain text generate the cipher text and contain the key to be use to convert the message from plaintext to cipher text. Chosen Pain text :- in this attack attacker know the algorithm , cipher text and also also having some of the chosen plain text and also having the cipher text of the plain text with the key used to convert the plain text into the cipher text Chosen cipher text :- in this attacker know the algorithm , cipher text and also known the cipher text that to be chosen and also having the plain text and also the key that use to convert the cipher text into the plain text. Chosen Text:- in this type of attack attacker know the algorithm , cipher text , and also some of plain text and also conversion into the cipher text included key and also having the some chosen cipher text pain with also having the plain text of all the message and also having key information. Q5. Write a Program to implement Play fair cipher? Ans :- /* Program to implemencryptiont ppfair cipher */ #includecryption #includecryption void main() { char pp[5][5],encryption[10],decryption[10],data1[10],kk[10],str[26]=abcdecryptionfghijklmnopqrstuvwxyz; int i,j,k=0,m=0,l,flag=0,lencryption,onx,ony,twx,twy; char on,tw,temp1,temp2; clrscr(); /* Reading the plain text */ printf(n encryptionter the data1 : ); gets(data1); /* Reading the kk */ printf(n encryptionter the kkword : ); gets(kk); /* Implemencryptionting the algorithm */ for(i=0;i { j=0; while(j { on=kk[j]; j++; tw=kk[j]; if(on==tw) { while(kk[j+1]!=NULL) { kk[j]=kk[j+1]; j++; } kk[j]=NULL; } } printf(n t modified kk is : ); puts(kk); for(i=0;i { for(j=0;j { if(kk[k]!=NULL) { pp[i][j]=kk[k]; k++; } else { pp[i][j]=NULL; } } } lencryption=strlencryption(kk); l=0; for(i=0;i { for(j=0;j { if(pp[i][j]==NULL) { flag=0; for(k=0;k { if((str[l]==kk[k])l { flag=1; break; } } if(flag==1) { l++; j; } else { pp[i][j]=str[l]; l++; } }} } printf(n); for(i=0;i { for(j=0;j { printf(t %c,pp[i][j]); } printf(n); } for(i=0;i { j=0; while(j { on=data1[j];j++; tw=data1[j]; if(on==tw) { data1[j]=x; temp1=data1[++j]; data1[j]=tw; while(data1[j]!=NULL) { temp2=data1[++j]; data1[j]=temp1; temp1=temp2; } data1[++j]=NULL; } } } printf(n t modifed data1 : ); puts(data1); i=0;j=0; while(data1[i]!=NULL) { on=data1[i]; i++; if(data1[i]!=NULL) { tw=data1[i]; i++; } else { tw=x; } for(k=0;k { for(m=0;m { if(pp[k][m]==on) { onx=k; ony=m; } if(pp[k][m]==tw) { twx=k; twy=m; } } } if(twx==onx) { encryption[j]=pp[onx][(ony+1)%5]; j++; encryption[j]=pp[twx][(twy+1)%5]; j++; } else if(twy==ony) { encryption[j]=pp[(onx+1)%5][ony]; j++; encryption[j]=pp[(twx+1)%5][twy]; j++; } else { encryption[j]=pp[onx][twy]; j++; encryption[j]=pp[twx][ony]; j++; } } encryption[j]=NULL; // encryptioncrypted data1 printf(n t encryptioncryted data1 is: ); puts(encryption); // decryptioncrypting the givencryption encryptioncrypted data1 i=0;j=0; while(encryption[i]!=NULL) { on=encryption[i]; i++; tw=encryption[i]; i++; for(k=0;k { for(m=0;m { if(pp[k][m]==on) { onx=k; ony=m; } if(pp[k][m]==tw) { twx=k; twy=m; } } } if(twx==onx) { ony=ony-1; twy=twy-1; if(ony==-1) { ony=4; } if(twy==-1) { twy=4; } decryption[j]=pp[onx][ony]; j++; decryption[j]=pp[twx][twy]; j++; } else if(twy==ony) { onx=onx-1; twx=twx-1; if(onx==-1) { onx=4; } if(twx==-1) { twx=4; } decryption[j]=pp[onx][ony]; j++; decryption[j]=pp[twx][twy]; j++; } else { decryption[j]=pp[onx][twy]; j++; decryption[j]=pp[twx][ony]; j++; } } } decryption[j]=NULL; // decryptioncrypted data1 printf(n t decryptionncryptioncryted data1 is: ); puts(decryption); getch(); } Q6. Given the speed of a current ordinary computer (for home or light office use), estimate the amount of time necessary to crack a DES encryption by testing all 256 possible keys. Make a similar estimate for a 128-bit AES key. Ans :- We assume that the household computer has a 2GHZ processor. Also we assume that a machine takes a hundred cycles per brute force against a single 56-bit DES key or 128 bit AES key. To crack a DES encryption, we need: (2^56 key)*100 cycles/60sec/60min/24hour/365days/2000000000hz = 114.246566  years To crack a AES encryption, we need: (2^128 key)*100 cycles/60sec/60min/24hour/365days/2000000000hz = 5.39514154 ÃÆ'- 1023 years

Tuesday, August 20, 2019

One to One Communication :: Communication Body Language Health Care Essays

One to One Communication To practice one to one communication I spoke to someone who regularly attends the ‘Princess of Wales’ Hospital, Bridgend for physiotherapy on his knee after an operation 6 months ago. From this interaction I found that the service from the NHS was satisfactory and adequate, but could use some improvements. I spoke to the patient mainly about waiting times for appointments and operations, as that appeared to be the main cause for concern. I conducted the one to one interaction in the patient’s living room, so that the surroundings were familiar to him and he would feel more at ease. As the room was decorated in warm colours it created a welcoming and relaxed atmosphere, which contributed to making it easier to open up and talk freely. Skill Used ========== Comment ======= Body language I used open and friendly body language towards the client and didn’t cross my arms or anything so that I didn’t come across as intimidating. This is because body language makes a great impact on interaction. Gestures I regularly used hand gestures to put emphasis on what I was saying as gestures are a strong part of effective communication. Eye contact I regularly maintained eye contact with the client during my interaction. This helped to show that I was interested in what he had to say and also so that he knew when it was his turn to speak. Facial expressions I used appropriate facial expressions to match my topic of conversation so not to confuse the client, and to show interest in what he had to say. Open questions Open questions require extended answers and make the client feel that their opinions are valued. I tried to use mostly open questions to facilitate the conversation and so that the conversation flowed and did not feel like an interrogation. Closed questions I tried not to ask many closed questions, unless I needed more specific information, as they can make people feel uncomfortable and inhibit conversation. Probes and prompts I used probes and prompts to make the client give more in depth information and to help him to think more about the subject that I was questioning them on. I used prompts to help the client understand what I was asking by suggesting a possible answer. Paraphrasing To check that I had heard and understood the client properly I used paraphrasing as a way of reflecting back to him. Paraphrasing also helped him to clarify exactly what it is they were saying, because he had to listen to the paraphrase and work out whether that is what he meant to say. The particular individuals involved, the relationship between the individuals, the subject of the communication and the physical

Monday, August 19, 2019

Essay --

The Flea: Rhetoric and Poetry Mingling In John Donne’s poem, â€Å"The Flea†, Donne uses the conceit of the flea to contrast the insignificant size of the flea and the incredibly significant metaphor attached to the flea. The speaker of the poem is talking to a woman, trying to convince her into having sex with him outside of marriage. This poem can be broken into three stanzas, of nine lines each, utilizes the image of the flea to convey three main ideas: the first as a vessel where their essence mingles, second as the institution of marriage, and finally as an insignificant representation of honor which would have no effect on them. Donne’s hyperbolic use of the flea extends through the poem as a metaphysical conceit to convey a logical argument out of something seemingly unrelated to the situation at hand. The speaker starts his argument by first mentioning that the woman has denied the speaker something. However, it is initially unclear what was denied, all that is known is that by taking note of â€Å"†¦this flea, and mark in this,/How little that which [she] deniest [him] is†¦Ã¢â‚¬ , thus paralleling how the flea, just like whatever she denies him, is inconsequential (Donne lines 1-2). This idea of insignificant things meaning much more in the grand scheme of things becomes an underlying thread, which is sewn throughout the poem. The speaker then notes how â€Å"†¦in this flea [their] two bloods mingled be†¦Ã¢â‚¬ , alluding to an erotic mingling of their blood (Donne line 4). This symbolizes the very essence of these two intertwining and becoming one in a single vessel. The flea is a vessel that symbolizes union, in this case the physical union between the speaker and the woman through sexual intercourse and the exchange of bodily fluids. It is impo... ... mean nothing in the end. Essentially his argument boils down to proving that sex with the speaker would not be shameful or sinful, and that all her fears are unfounded. Donne uses the flea throughout his poem as an essential link between sexual conquest and union. The flea transcends its initial existence as an irritating bug and become an existence essential to their union. It is through this representation of the flea, which allows Donne to draw the reader into an argument of carnal desire trumping propriety. The flea is essential to this argument, without which there is nothing grounding the obvious leaps of logic made by the speaker and Donne. The conceit is a popular literary device Donne uses in his poetry, and in this particular case he uses it masterfully throughout the entire poem to create a love poem that straddles the line between poetry and rhetoric.

Sunday, August 18, 2019

Whaling in US compared to Japan Essay -- social issues

Whaling in US compared to Japan Did you know that in the last 50 years over two million whales have been killed? The United States views whaling very differently than Japan does. It is a complicated and controversial topic. Many people have opinions about whale hunting. However, everyone should know both sides of the whale hunting issues before they act on the issue. To start out I am going to tell you a little about whaling. The first whale hunters were in the prehistoric times. At first they would just kill and eat beached whales. That became such a habit that they started hunting them. Most whale hunters use harpoons, guns, lances, or bombs that blow up inside the whale. They use catcher boats, or kayaks. In 1925, whalers developed factory ships that could hold 12 catcher boats and a crew of about 400. These ships had radar under the boat that could detect where the whales were. These boats are what made it so easy to hunt whales. In 1931, the International Whaling Convention began. The major whaling countries formed the IWC to protect whales from being over hunted and to regulate the whaling industries. The main duty of the IWC is to keep under review and revise the measures laid down in the Schedule to Convention, which governs the conduct of whaling throughout the world. These measures provide for the protection of certain species; designate specified areas as whale sanctuaries; set limits on the numbers and size of whales which can be taken; have open and closed ... Whaling in US compared to Japan Essay -- social issues Whaling in US compared to Japan Did you know that in the last 50 years over two million whales have been killed? The United States views whaling very differently than Japan does. It is a complicated and controversial topic. Many people have opinions about whale hunting. However, everyone should know both sides of the whale hunting issues before they act on the issue. To start out I am going to tell you a little about whaling. The first whale hunters were in the prehistoric times. At first they would just kill and eat beached whales. That became such a habit that they started hunting them. Most whale hunters use harpoons, guns, lances, or bombs that blow up inside the whale. They use catcher boats, or kayaks. In 1925, whalers developed factory ships that could hold 12 catcher boats and a crew of about 400. These ships had radar under the boat that could detect where the whales were. These boats are what made it so easy to hunt whales. In 1931, the International Whaling Convention began. The major whaling countries formed the IWC to protect whales from being over hunted and to regulate the whaling industries. The main duty of the IWC is to keep under review and revise the measures laid down in the Schedule to Convention, which governs the conduct of whaling throughout the world. These measures provide for the protection of certain species; designate specified areas as whale sanctuaries; set limits on the numbers and size of whales which can be taken; have open and closed ...

Saturday, August 17, 2019

Film Genres Essay

Film genres hold a great influence on the type of music chosen to appear. Music must fit the theme and tone of films in order to convey emotions accurately. Between 1935 and 1939, films began to be widely segmented by genres. Many of the films didn’t fit just one genre, these films where categorized in two or more genres and their music reflected this hybrid quality. The film The Informers is categorized as being in a dramatic genre. The music of the film is greatly influenced by this genre. The main theme in the film is a very suggestive, creating drama about the characters future fate. The music builds up expectations and questions about what will happen in the rest of the film. The music in these types of dramatic films are usually toned lower to create mystique and the music is then sped up and heightened in the most climactic scenes of the film to create a great sense of drama as the genre entitles. One of the films during this time to have a hybrid genre was The Bride of Frankenstein, which shares a horror and comedic genre. The horror influenced music in the film can be heard over exaggerating the qualities of the characters. The music used to represent these horror aspects is simple, yet effective. The monster’s theme in this film only consisted of five notes which included harsh clashes. The use of two adjacent pitches creates a jarring effect in the music which develops into suspense. The comedic influence in the music of this film can be heard in the form of dance music played to create a light hearted mood to the characters. These comedic songs are very light without the harsh beats of the horror inspired ones. â€Å"The Adventures of Robin Hood† is a film included in the action genre. This film uses a full orchestration, emphasizing brass and percussion sounds to create the sense of action. Loud dynamics, passage of quick notes, and irregular and hard accents are tools in action films to create a hectic situation, suggesting a chaotic environment. These tools are used thoroughly in the fight scenes involving the main character, Robin Hood. The music emphasized the movements during these battle scenes and warns of the dangers the character are facing. The first feature film to fit in the animation genre was Snow White and the Seven Dwarfs. This genre of film consists of an abundance of continuously playing music through the film. The songs are very simple and brief which delighted the public who wanted to simply enjoy a film. These short and simple characteristics of these songs also made them quite catchy and easily  remembered by those who watched these types of film. The movements of the characters in Snow White and the Seven Dwarfs are also accentuated in a â€Å"Mickey Mousing† technique that provides a light hearted touch to the characters in the animation. A films genre will definitely dictate the music that can be used in the film. The right music for a film will allow the emotions of the film to easily move past to the audience. The right music for the film genre helps emphasize the genre and create a more enjoyable experience for those viewing the film.

Friday, August 16, 2019

Project Report on K.W.H. Meters

A SUMMER TRAINING REPORT ON K. W. H. METERS Prepared by :- Devesh Kumar, 303956 (3rd year) CONTENTS * Certificate * Acknowledgement * Introduction of training * Company Profile * Products of BENTEX * Quality Policy and processes of BENTEX * Electricity meter * Direct current (DC) * Alternating current (AC) * Unit of measurement * Others Unit of measurement * Types of meters 1. Electromechanical meters 2. Electronic meters * Communication * Solid – state design * Multiple tariff (variable rate) meters * Domestic usage * United kingdom Commercial usage * Appliance energy meters * In – home energy use display * Smart meters * Prepayment meters * Time of day metering * Power export metering * Ownership * Location * Customer drop and metering equation * Tempering and security * Self evaluation ACKNOWLEDGEMENT I am very thankful to Mr. A. K. shrivastava (GM/ SPD) for providing Me the opportunity to undergo the practical training in the Systems Production Division (SPD) of SKN Bentex Limited under the Supervision of Mr. S. C. Gupta (CM). They all guided me from ime to time and gave me dynamic ideas and suggestions by which I am able to complete my training successfully. I also want to thank all the visible and non-visible hands, which helped me to complete the practical training with great success. Introduction of training Training is a process of learning. Training is an organized procedure during which people learn knowledge and skill for the definite purpose. It is a short-term process utilizing a systematic and organized procedure in which non-managerial personnel learn technical knowledge and skills for adefinite purpose.It refers to instruction in technical and mechanical  operations like operation of a machine. It is for a short duration and for a  specific job related purpose. Training is very difficult from education. Training is vocational where as education is general. Training is job-oriented whereas education is person-oriented. However, it is difficult in practice to differentiate between education and training because in many cases both of them occur  Ã‚  simultaneously. The two are complementary and both involve development  of talent and human potential. Generally, every level needs training.Training is not something that is done once to new employees; it needs to be done continuously. Importance of training †¢ Training leads to higher productivity. †¢ It leads to better quality of work. †¢   It leads to cost reduction. †¢ It leads to high motivation and morale of employees. †¢ The organizational climate gets improved. †¢Ã‚   It leads to self-satisfaction of the employees. †¢ Supervision gets reduced. †¢Ã‚   It leads to good cordial relation between employer and employee. †¢   It leads to development of new skills in the employees. Scope of summer trainingThis summer training programs are designed for the students to master their technical skills. this summer training should include the following objectives- * Correlate courses of study with the way industry or potential work place operates its business or work using technology. * work on implementing what has been learned in school or college. The engineering and professional courses including MCA, B. E. , B. TECH, BCA amongst other have undergraduates needing internship in fields of computer science, electrical and electronics, mechanical, civil, bio informatics, etc.The students for professional programs are required as a  part of courses to undergo a few weeks the individual's tastes by improving their experience and making them reach a  good enough company or workplace just in time. This training can result in learning of open source technology as a user of technology. That technology can be applied to improve the college infra-structure. The objective of training in Modern Office Practice is to  give a perspective about the organization and functioning of all the areas of ma nagement in an industrial unit. Company profileA journey that started 46years back at BENTEX – kelsons, today has reached new high in customer’s delight . During the Years ,it has achieved milestones one after the other and established its forte in Electrical Industry with widespread trust goodwill. Driven by the sheer passion , exceptional foresight and acumen, Bentex has become a name to reckon with the flawless performance of products like starters, meters, MCB's and switchgear etc. These Products are manufactured in state-of-the-art plant and passed through stringent quality control tests. Not to mention , Bentex products are rated among the best in industry.Little surprise that BENTEX – KELSONS products have crossed barriers to reach all corners of India and also Sri Lank, Bangladesh, Nigeria, Nepal etc. The Other Strength of the company is its vast presence through 750strong dealers network, which enables the company to meet demands of any magnitude. At BE NTEX – KELSONS , The relentless pursuit is to exceed all expectations of customers†¦. and that is indeed the inspiration behind its growth. Thriving on technology and innovation, we are an eminent manufacturer of premium quality precision components of plastic and rubber for tractors, automobile and engineering industry.We attribute our success to sharp business acumen and valuable experience of our work force. Durability, high precision, superior quality, consistent performance & smooth finish are the hallmark of our products. We have consistently increased our client base by meeting the client needs in terms of cost and performance goals. Our machine shop is equipped with fully automatic injection molding machines of gold coin, all plas and IHI make of various capacities. We have facilities for ultrasonic & hot plate welding having our own tool room with Electra spark erosion machine to make moulds in-house.We are O. E. M to many automobile, auto electrical, tractor an d other reputed manufacturers and wish to serve our clients by supplying custom molded rubber and plastic components of high precision and best quality. Name of CEO Mr. S. C. Gupta Year of Est. 1983 Primary Business Type Manufacturers & Exporters Products We Offer Impellers, Oil Seals, Plastic Automobile Components, Plastic Industrial Products, Plastic Tractor Parts, Rubber Bellows, Rubber Hose Pipes. Products of ‘BENTEX' Fly wheel * Reducton gear box * Pinion Stand| | | | | * Straightening machine * Mill stand * Gear coupling * Roll * Foundation rail * Pusher and ejector * V – belt pulley * Shearing machine * Rotary shear * Roller guide box and twist pipe * Bullet shearing * Pinch roll * Twisting machine * Gears * End cutting * Rotary shearing swivel * Universal couplings * Horizontal shearing Quality Policy / Processes â€Å"SKN-BENTEX† Group products are at the forefront of innovation in industrial and agricultural field for protection and control of Electric Motor.We are the pioneers and leaders in our field with latest international engineering products based on the world’s best technology since last four decades. â€Å"SKN-BENTEX † Group has a rich history of success, which has been achieved through dedication, teamwork and visionary thinking and sincere service of pride in result oriented performance. â€Å"SKN-BENTEX† Group has been continuously restructuring to set up state-of-the-art electrical products manufactured at their own plants under strict quality control standard.In this thrust , most of group companies adopted International Quality Standard and have been certified for ISO-9001 Certification and products are also available on ISI-Marked. The SKN-BENTEX Group of Companies engaged in wide range of products and has mainly three subgroups of electrical product range such as â€Å" SKN†, â€Å"SKN† Bentex Linger â€Å"BENTEX-Linger† with their separate products line and â€Å"SKN-BEN TEX † Group is a collection of smaller companies specialist in a specific range of products. Besides this â€Å"SKN-BENTEX † group engaged in the field of, LPG Home Appliances, LPG Regulators, Building Construction and Export Activities.The complete manufacturing operation, marketing and installation Services of the company are certified under ISO 9001: 2000. The company has Enunciated the following quality policy to meet customer needs and expectations Through supply of quality products and services. â€Å"BENTEX is committed to strive for leadership in the product marketed by the way of continuous improvements in the quality of its products and services and meeting the consumers needs in time and every time at a competitive Price.These shall be achieved through continuous upgrading of technology and process improvement by involving all the employees, vendors, dealers and customers†. â€Å"Quality is our basic business principle. † Fact chart :- Year of E stablishment 1983 Nature of Business Manufacturer, Exporter Number of Employees 51 to 100 People Major Markets Indian Subcontinent, East Asia, Middle East and South East Asia Quality objective :- * On time delivery of defect free products. Providing effective customer support. * Continual improvement of processes. * Improvement of infrastructure. * Development of human resources. Electricity meter An electricity meter or energy meter is a device that measures the amount of electric energy consumed by a residence, business, or an electrically powered device. Electricity meters are typically calibrated in billing units, the most common one being the kilowatt hour [kWh]. Periodic readings of electric meters establishes billing cycles and energy used during a cycle.In settings when energy savings during certain periods are desired, meters may measure demand, the maximum use of power in some interval. â€Å"Time of day† metering allows electric rates to be changed during a day, to record usage during peak high-cost periods and off-peak, lower-cost, periods. Also, in some areas meters have relays for demand response shedding of loads during peak load periods. (analog electricity meter Typical North American domestic) (Typical North American domestic digital electricity meter) Direct current (DC)As commercial use of electric energy spread in the 1880s, it became increasingly important that an electric energy meter, similar to the then existing gas meters, was required to properly bill customers for the cost of energy, instead of billing for a fixed number of lamps per month. Many experimental types of meter were developed. Edison at first worked on a DC electromechanical meter with a direct reading register, but instead developed an electrochemical metering system, which used an electrolytic cell to totalize current consumption.At periodic intervals the plates were removed, weighed, and the customer billed. The electrochemical meter was labor-intensive to read and not well received by customers. In 1885 Ferranti offered a mercury motor meter with a register similar to gas meters; this had the advantage that the consumer could easily read the meter and verify consumption. The first accurate, recording electricity consumption meter was a DC meter by Dr Hermann Aaron, who patented it in 1883. Hugo Hurst of the British General Electric Company introduced it commercially into Great Britain from 1888.Meters had been used prior to this, but they measured the rate of energy consumption at that particular moment, i. e. the electric power. Aaron's meter recorded the total energy used over time, and showed it on a series of clock dials. In the USA, Elcho Thomson perfected his ‘recording wattmeter' in 1889. Alternating current (AC) The first specimen of the AC kilowatt-hour meter produced on the basis of Hungarian Bath's patent and named after him was presented by the Ganz Works at the Frankfurt Fair in the autumn of 1889, and the first induct ion kilowatt-hour meter was already marketed by the factory at the end of the same year.These were the first alternating-current watt meters, known by the name of Blathy-meters. The AC kilowatt hour meters used at present operate on the same principle as Blathy's original invention, Also around 1889, Elihu Thomson of the American General Electric company developed a recording watt meter (watt-hour meter) based on an ironless commentator motor. This meter overcame the disadvantages of the electrochemical type and could operate on either alternating or direct current.In 1894 Oliver Shallenberger of the Westinghouse Electric Corporation applied the induction principle previously used, only in AC ampere-hour meters to produce a watt-hour meter of the modern electromechanical form, using an induction disk whose rotational speed was made proportional to the power in the circuit. The Blathy meter was similar to Shallenberger and Thomson meter in that they are two-phase motor meter. Althoug h the induction meter would only work on alternating current, it eliminated the delicate and troublesome commutator of the Thomson design.Shallenberger fell ill and was unable to refine his initial large and heavy design, although he did also develop a polyphase version. Unit of measurement (Panel-mounted solid state electricity meter, connected to a 2 MVA electricity substation. Remote current and voltage sensors can be read and programmed remotely by modem and locally by infra-red. The circle with two dots is the infra-red port. Tamper-evident seals can be seen) Panel-mounted solid state electricity meter, connected to a 2 MVA electricity substation. Remote current and voltage sensors can be read and programmed remotely by modem and locally by infra-red.The circle with two dots is the infra-red port. Tamper-evident seals can be seen. The most common unit of measurement on the electricity meter is the kilowatt hour [kWh], which is equal to the amount of energy used by a load of one kilowatt over a period of one hour, or 3,600,000 joules. Some electricity companies use the SI mega joule instead. Demand is normally measured in watts, but averaged over a period, most often a quarter or half hour. Reactive owner is measured in â€Å"thousands of volt-ampere reactive-hours†, (kvarh). By convention, a â€Å"lagging† or inductive load, such as a motor, will have positive reactive power.A â€Å"leading†, or capacitive load, will have negative reactive power. Volt-amperes measures all power passed through a distribution network, including reactive and actual. This is equal to the product of root-mean-square volts and amperes. Distortion of the electric current by loads is measured in several ways. Power factor is the ratio of resistive (or real power) to volt-amperes. A capacitive load has a leading power factor, and an inductive load has a lagging power factor. A purely resistive load (such as a filament lamp, heater or kettle) exhibits a power f actor of 1.Current harmonics are a measure of distortion of the wave form. For example, electronic loads such as computer power supplies draw their current at the voltage peak to fill their internal storage elements. This can lead to a significant voltage drop near the supply voltage peak which shows as a flattening of the voltage waveform. This flattening causes odd harmonics which are not permissible if they exceed specific limits, as they are not only wasteful, but may interfere with the operation of other equipment. Harmonic emissions are mandated by law in EU and other countries to fall within specified limits.Other units of measurement In addition to metering based on the amount of energy used, other types of metering are available. Meters which measured the amount of charge (coulombs) used, known as ampere-hour meters, were used in the early days of electrification. These were dependent upon the supply voltage remaining constant for accurate measurement of energy usage, which was not a likely circumstance with most supplies. Some meters measured only the length of time for which charge flowed, with no measurement of the magnitude of voltage or current being made.These were only suited for constant-load applications. Neither type is likely to be used today. Types of meters Electricity meters operate by continuously measuring the instantaneous voltage (volts) and current (amperes) and finding the product of these to give instantaneous electrical power (watts) which is then integrated against time to give energy used (joules, kilowatt-hours etc. ). Meters for smaller services (such as small residential customers) can be connected directly in-line between source and customer.For larger loads, more than about 200 ampere of load, current transformers are used, so that the meter can be located other than in line with the service conductors. The meters fall into two basic categories, electromechanical and electronic. Electromechanical meters The most common typ e of electricity meter is the electromechanical induction watt-hour meter. The electromechanical induction meter operates by counting the revolutions of an aluminum disc which is made to rotate at a speed proportional to the power. The number of revolutions is thus proportional to the energy usage.The voltage coil consumes a small and relatively constant amount of power, typically around 2 watts which is not registered on the meter. The current coil similarly consumes a small amount of power in proportion to the square of the current flowing through it, typically up to a couple of watts at full load, which is registered on the meter. The metallic disc is acted upon by two coils. One coil is connected in such a way that it produces a magnetic flux in proportion to the voltage and the other produces a magnetic flux in proportion to the current. The field of the voltage coil is delayed by 90 degrees using a lag coil.This produces eddy currents in the disc and the effect is such that a force is exerted on the disc in proportion to the product of the instantaneous current and voltage. A permanent magnet exerts an opposing force proportional to the speed of rotation of the disc. The equilibrium between these two opposing forces results in the disc rotating at a speed proportional to the power being used. The disc drives a register mechanism which integrates the speed of the disc over time by counting revolutions, much like the odometer in a car, in order to render a measurement of the total energy used over a period of time.The type of meter described above is used on a single-phase AC supply. Different phase configurations use additional voltage and current coils. (Mechanism of electromechanical induction meter. 1 – Voltage coil – many turns of fine wire encased in plastic, connected in parallel with load. 2 – Current coil – three turns of thick wire, connected in series with load. 3 – Stator – concentrates and confines mag netic field. 4 – Aluminum rotor disc. 5 – rotor brake magnets. 6 – spindle with worm gear. 7 – display dials – note that the 1/10, 10 and 1000 dials rotate clockwise while the 1, 100 and 10000 dials rotate counter-clockwise)Three-phase electromechanical induction meter, metering 100 A 230/400 V supply. Horizontal aluminum rotor disc is visible in center of meter. The aluminum disc is supported by a spindle which has a worm gear which drives the register. The register is a series of dials which record the amount of energy used. The dials may be of the cyclometer type, an odometer-like display that is easy to read where for each dial a single digit is shown through a window in the face of the meter, or of the pointer type where a pointer indicates each digit.With the dial pointer type, adjacent pointers generally rotate in opposite directions due to the gearing mechanism. The amount of energy represented by one revolution of the disc is denoted by th e symbol which is given in units of watt-hours per revolution. The value 7. 2 is commonly seen. Using the value of , one can determine their power consumption at any given time by timing the disc with a stopwatch. If the time in seconds taken by the disc to complete one revolution is , then the power in watts is . For example, if , as above, and one revolution took place in 14. seconds, the power is 1800 watts. This method can be used to determine the power consumption of household devices by switching them on one by one. Most domestic electricity meters must be read manually, whether by a representative of the power company or by the customer. an odometer-like display that is easy to read where for each dial a single digit is shown through a window in the face of the meter, or of the pointer type where a pointer indicates each digit. With the dial pointer type, adjacent pointers generally rotate in opposite directions due to the gearing mechanism.Where the customer reads the meter, the reading may be supplied to the power company by telephone, post or over the internet. The electricity company will normally require a visit by a company representative at least annually in order to verify customer-supplied readings and to make a basic safety check of the meter. In an induction type meter, creep is a phenomenon that can adversely affect accuracy, that occurs when the meter disc rotates continuously with potential applied and the load terminals open circuited. A test for error due to creep is called a creep test. Three-phase electromechanical induction meter, metering 100 A 230/400 V supply. Horizontal aluminum rotor disc is visible in center of meter) Electronic meters Electronic meters display the energy used on an LCD or LED display, and can also transmit readings to remote places. In addition to measuring energy used, electronic meters can also record other parameters of the load and supply such as maximum demand, power factor and reactive power used etc. The y can also support time-of-day billing, for example, recording the amount of energy used during on-peak and off-peak hours. Basic block diagram of an electronic energy meter) Communication Remote meter reading is a practical example of telemetry. It saves the cost of a human meter reader and the resulting mistakes, but it also allows more measurements, and remote provisioning. Many smart meters now include a switch to interrupt or restore service. Historically, rotating meters could report their power information remotely, using a pair of contact closures attached to a KYZ line. A KYZ interface is a kind of quadrature encoder. In a KYZ interface, the Y and Z wires are switch contacts, shorted to K for half of a rotor's circumference.To measure the rotor direction, the Z signal is offset by 90 degrees from the Y. When the rotor rotates in the opposite direction, showing export of power, the sequence reverses. The time between pulses measures the demand. The number of pulses is total power usage. KYZ outputs were historically attached to â€Å"totalize relays† feeding a â€Å"totalize† so that many meters could be read all at once in one place. KYZ outputs are also the classic way of attaching electric meters to programmable logic controllers, HVACs or other control systems.Some modern meters also supply a contact closure that warns when the meter detects a demand near a higher electricity tariff, to improve demand side management. Some meters have an open collector output that gives 32-100 ms pulses for a constant amount of used electrical energy. Usually 1000-10000 pulses per kWh. Output is limited to max 27 V DC and 27 mA DC. The output usually follows the DIN 43864 standard. Often, meters designed for semi-automated reading have a serial port on that communicates by infrared LED through the faceplate of the meter.In some apartment buildings, a similar protocol is used, but in a wired bus using a serial current loop to connect all the meters to a single plug. The plug is often near the mailboxes. In the European Union, the most common infrared and protocol is â€Å"FLAG†, a simplified subset of mode C of IEC 61107. In the U. S. and Canada, the favored infrared protocol is ANSI C12. 18. Some industrial meters use a protocol for programmable logic controllers (Modbus). One protocol proposed for this purpose is DLMS/COSEM which can operate over any medium, including serial ports.The data can be transmitted by Zigbee, Wi-Fi, telephone lines or over the power lines themselves. Some meters can be read over the internet. Other more modern protocols are also becoming widely used. Electronic meters now use low-power radio, GSM, GPRS, Bluetooth, IrDA, as well as RS-485 wired link. The meters can now store the entire usage profiles with time stamps and relay them at a click of a button. The demand readings stored with the profiles accurately indicate the load requirements of the customer.This load profile data is processed at the utilities for billing and planning purposes. AMR (Automatic Meter Reading) and RMR (Remote Meter Reading) describe various systems that allow meters to be checked without the need to send a meter reader out. An electronic meter can transmit its readings by telephone line or radio to a central billing office. Automatic meter reading can be done with GSM (Global System for Mobile Communications) modems, one is attached to each meter and the other is placed at the central utility office. Solid-state designAs in the block diagram, the meter has a power supply, a metering engine, a processing and communication engine (i. e. a microcontroller), and other add-on modules such as RTC, LCD display, communication ports/modules and so on. The metering engine is given the voltage and current inputs and has a voltage reference, samplers and quantizes followed by an ADC section to yield the digitized equivalents of all the inputs. These inputs are then processed using a Digital Signal Processo r to calculate the various metering parameters such as powers, energies etc.The largest source of long-term errors in the meter is drift in the preamp, followed by the precision of the voltage reference. Both of these vary with temperature as well, and vary wildly because most meters are outdoors. Characterizing and compensating for these is a major part of meter design. The processing and communication section has the responsibility of calculating the various derived quantities from the digital values generated by the metering engine. This also has the responsibility of communication using various protocols and interface with other add-on modules connected as slaves to it.RTC and other add-on modules are attached as slaves to the processing and communication section for various input/output functions. On a modern meter most if not all of this will be implemented inside the microprocessor, such as the Real Time Clock (RTC), LCD controller, temperature sensor, memory and analog to di gital converters. (Solid state electricity meter used in a home in the Netherlands) Multiple tariff (variable rate) meters Electricity retailers may wish to charge customers different tariffs at different times of the day to better reflect the costs of generation and transmission.Since it is typically not cost effective to store significant amounts of electricity during a period of low demand for use during a period of high demand, costs will vary significantly depending on the time of day. Low cost generation capacity (base load) such as nuclear can take many hours to start, meaning a surplus in times of low demand, whereas high cost but flexible generating capacity (such as gas turbines) must be kept available to respond at a moment's notice (spinning reserve) to peak demand, perhaps being used for a few minutes per day, which is very expensive.Some multiple tariff meters use different tariffs for different amounts of demand. These are usually industrial meters. Domestic usage Dom estic variable-rate meters generally permit two to three tariffs (â€Å"peak†, â€Å"off-peak† and â€Å"shoulder†) and in such installations a simple electromechanical time switch may be used. Historically, these have often been used in conjunction with electrical storage heaters or hot water storage systems. Multiple tariffs are made easier by time of use (TOU) meters which incorporate or are connected to a time switch and which have multiple registers.Switching between the tariffs may happen via a radio-activated switch rather than a time switch to prevent tampering with a sealed time switch to obtain cheaper electricity. United Kingdom Radio-activated switching is common in the UK, with a nightly data signal sent within the long wave carrier of BBC Radio 4, 198  kHz. The time of off-peak charging is usually seven hours between midnight and 7. 00am GMT, and this is designed to power storage heaters and immersion heaters. In the UK, such tariffs are branded Economy 7 or White Meter.The popularity of such tariffs has declined in recent years, at least in the domestic market, due to the (perceived or real) deficiencies of storage heaters and the comparatively low cost of natural gas. An â€Å"Economy 10† meter is also available, giving five hours of heating overnight, with boosts in mid-morning and mid-afternoon. Most meters using Economy 7 switch the entire electricity supply to the cheaper rate during the 7 hour night time period, not just the storage heater circuit. The downside of this is that he daytime rate will be significantly higher, and standing charges may be a little higher too. For instance, normal rate electricity may be 9p per kWh, whereas Economy 7's daytime rate might be 14 to 17 p per kWh, but only 5. 43p per kWh at night. Timer switches installed on washing machines, tumble dryers, dishwashers and immersion heaters may be set so that they switch on only when the rate is lower. (Economy 7 Meter and Teleswitcher) Commercial usage Large commercial and industrial premises may use electronic meters which record power usage in blocks of half an hour or less.This is because most electricity grids have demand surges throughout the day, and the power company may wish to give price incentives to large customers to reduce demand at these times. These demand surges often correspond to meal times or, famously, to advertisements in popular television programmers. Appliance energy meters Plug in electricity meters (or â€Å"Plug load† meters) measure energy used by individual appliances. There are a variety of models available on the market today but they all work on the same basic principle.The meter is plugged into an outlet, and the appliance to be measured is plugged into the meter. Such meters can help in energy conservation by identifying major energy users, or devices that consume excessive standby power. A power meter can often be borrowed from the local power authorities or a local public library. In-home energy use displays A potentially powerful means to reduce household energy consumption is to provide convenient real-time feedback to users so they can change their energy using behavior. Recently, low-cost energy feedback displays have become available.A study using a consumer-readable meter in 500 Ontario homes by Hydro One showed an average 6. 5% drop in total electricity use when compared with a similarly sized control group. Hydro One subsequently offered free power monitors to 30,000 customers based on the success of the pilot. Projects such as Google Power Meter, take information from a smart meter and make it more readily available to users to help encourage conservation. Smart meters Smart meters go a step further than simple AMR (automatic meter reading).They offer additional functionality including a real-time or near real-time reads, power outage notification, and power quality monitoring. They allow price setting agencies to introduce different prices for consumption based on the time of day and the season. These price differences can be used to reduce peaks in demand (load shifting or peak lopping), reducing the need for additional power plants and in particular the higher polluting and costly to operate natural gas powered piker plants. The feedback they provide to consumers has also been shown to cut overall energy consumption.Another type of smart meter uses nonintrusive load monitoring to automatically determine the number and type of appliances in a residence, how much energy each uses and when. This meter is used by electric utilities to do surveys of energy use. It eliminates the need to put timers on all of the appliances in a house to determine how much energy each uses. Prepayment meters The standard business model of electricity retailing involves the electricity company billing the customer for the amount of energy used in the previous month or quarter.In some countries, if the retailer believes that the customer ma y not pay the bill, a prepayment meter may be installed. This requires the customer to make advance payment before electricity can be used. If the available credit is exhausted then the supply of electricity is cut off by a relay. (Prepayment meter and magnetic stripe tokens, from a rented accommodation in the UK. The button labeled A displays information and statistics such as current tariff and remaining credit. The button labeled B activates a small amount of emergency credit should the customer run out)In the UK, mechanical prepayment meters used to be common in rented accommodation. Disadvantages of these included the need for regular visits to remove cash, and risk of theft of the cash in the meter. Modern solid-state electricity meters, in conjunction with smart cards, have removed these disadvantages and such meters are commonly used for customers considered to be a poor credit risk. In the UK, one system is the Pay Point network, In some cases, prepayment meters have not be en accepted by customers.There are various groups, such as the Standard Transfer Specification (STS) association, which promote common standards for prepayment metering systems across manufacturers. where rechargeable tokens (Quantum cards for natural gas, or plastic â€Å"keys† for electricity) can be loaded with whatever money the customer has available. Recently smartcards are introduced as much reliable tokens that allows two way data exchange between meter and the utility. (A prepayment key) In South Africa, Sudan and Northern Ireland prepaid meters are recharged by entering a unique, encoded twenty digit number using a keypad.This makes the tokens, essentially a slip of paper, very cheap to produce. Around the world, experiments are going on, especially in developing countries, to test pre-payment systems. In some cases, prepayment meters have not been accepted by customers. There are various groups, such as the Standard Transfer Specification (STS) association, which p romote common standards for prepayment metering systems across manufacturers. Prepaid meters using the STS standard are used in many countries. Time of day meteringTime of Day metering (TOD), also known as Time of Usage (TOU) or Seasonal Time of Day (SToD), metering involves dividing the day, month and year into tariff slots and with higher rates at peak load periods and low tariff rates at off-peak load periods. While this can be used to automatically control usage on the part of the customer (resulting in automatic load control), it is often simply the customers responsibility to control his own usage, or pay accordingly (voluntary load control). This also allows the utilities to plan their transmission infrastructure appropriately.See also Demand-side Management (DSM). TOD metering normally splits rates into an arrangement of multiple segments including on-peak, off-peak, mid-peak or shoulder, and critical peak. A typical arrangement is a peak occurring during the day (non-holida y days only), such as from 1 pm to 9 pm Monday through Friday during the summer and from 6:30 am to 12 noon and 5 pm to 9 pm during the winter. More complex arrangements include the use of critical peaks which occur during high demand periods. The times of peak demand/cost will vary in different markets around the world.Large commercial users can purchase power by the hour using either forecast pricing or real time pricing. Prices range from we pay you to take it (negative) to $1000/MWh (100 cents/kWh). Some utilities allow residential customers to pay hourly rates, such as Illinois, which uses day ahead pricing. Power export metering Many electricity customers are installing their own electricity generating equipment, whether for reasons of economy, redundancy or environmental reasons. When a customer is generating more electricity than required for his own use, the surplus may be exported back to the power grid.Customers that generate back into the â€Å"grid† usually must have special equipment and safety devices to protect the grid components (as well as the customer's own) in case of faults (electrical short circuits) or maintenance of the grid (say voltage potential on a downed line going into an exporting customers facility). This exported energy may be accounted for in the simplest case by the meter running backwards during periods of net export, thus reducing the customer's recorded energy usage by the amount exported.This in effect results in the customer being paid for his/her exports at the full retail price of electricity. Unless equipped with a detent or equivalent, a standard meter will accurately record power flow in each direction by simply running backwards when power is exported. Such meters are no longer legal in the UK, but instead a meter capable of separately measuring imported and exported energy is required. Where allowed by law, utilities maintain a profitable margin between the price of energy delivered to the consumer and the rate credited for consumer-generated energy that flows back to the grid.Lately, upload sources typically originate from renewable sources (e. g. , wind turbines, photovoltaic cells), or gas or steam turbines, which are often found in cogeneration systems. Another potential upload source that has been proposed is plug-in hybrid car batteries (vehicle-to-grid power systems). This requires a â€Å"smart grid,† which includes meters that measure electricity via communication networks that require remote control and give customers timing and pricing options.Vehicle-to-grid systems could be installed at workplace parking lots and garages and at park and rides and could help drivers charge their batteries at home at night when off-peak power prices are cheaper, and receive bill crediting for selling excess electricity back to the grid during high-demand hours. Ownership Following the deregulation of electricity supply markets in many countries (e. g. , UK), the company responsible for an electricity meter may not be obvious.Depending on the arrangements in place, the meter may be the property of the meter Operator, electricity distributor, the retailer or for some large users of electricity the meter may belong to the customer. The company responsible for reading the meter may not always be the company which owns it. Meter reading is now sometimes subcontracted and in some areas the same person may read gas, water and electricity meters at the same time. Location The location of an electricity meter varies with each installation. Possible locations include on a utility pole serving the property, in a street-side abinet (meter box) or inside the premises adjacent to the consumer unit / distribution board. Electricity companies may prefer external locations as the meter can be read without gaining access to the premises but external meters may be more prone to vandalism. (Current transformers used as part of metering equipment for three-phase 400 A electricity supply. The fourth neutral wire does not require a current transformer because current cannot flow in this wire without also flowing in one of the three phase wires) Current transformers permit the meter to be located remotely from the current-carrying conductors.This is common in large installations. For example a substation serving a single large customer may have metering equipment installed in a cabinet, without bringing heavy cables into the cabinet. Customer drop and metering equation Since electrical standards vary in different regions, â€Å"customer drops† from the grid to the customer also vary depending on the standards and the type of installation. There are several common types of connections between a grid and a customer. Each type has a different metering equation. Customer supplies may be single-phase or three-phase.In the United States and Canada, three-wire single phase is common for residential and small commercial customers. Three phase supplies may be thr ee wire, or four wire (with a system neutral). Blondel's theorem states that for any system with N current-carrying conductors, that N-1 measuring elements are sufficient to measure electrical energy. This indicates that different metering is needed, for example, for a three-phase three-wire system than for a three-phase four-wire (with neutral) system. In North America, it is common for electricity meters to plug into a standardized socket outdoors, on the side of a building.This allows the meter to be replaced without disturbing the wires to the socket, or the occupant of the building. Some sockets may have a bypass while the meter is removed for service. The amount of electricity used without being recorded during this small time is considered insignificant when compared to the inconvenience which might be caused to the customer by cutting off the electricity supply. Most electronic meters in North America use a serial protocol. In many other countries the supply and load termina ls are in the meter housing itself. Cables are connected directly to the meter.In some areas the meter is outside, often on a utility pole. In others, it is inside the building in a niche. If inside, it may share a data connection with other meters. If it exists, the shared connection is often a small plug near the post box. The connection is often EIA-485 or infra-red with a serial protocol such as IEC 62056. In 2010, networking to meters is rapidly changing. The most common schemes seem to combine an existing national standard for data (e. g. ANSI C12. 19 or IEC 62056) operating via the internet protocol with a small circuit board that does either power line communication, or ties to a digital mobile phone network. A commercial power meter) Tampering and security Meters can be manipulated to make them under-register, effectively allowing power use without paying for it. This theft or fraud can be dangerous as well as dishonest. Power companies often install remote-reporting meters specifically to enable remote detection of tampering, and specifically to discover energy theft. The change to smart power meters is useful to stop energy theft. When tampering is detected, the normal tactic, legal in most areas of the USA, is to switch the subscriber to a â€Å"tampering† tariff charged at the meter's maximum designed current.At US$ 0. 095/kWh, a standard residential 50  A meter causes a legally collectible charge of about US$ 5,000. 00 per month. Meter readers are trained to spot signs of tampering, and with crude mechanical meters, the maximum rate may be charged each billing period until the tamper is removed, or the service is disconnected. A common method of tampering on older meters is to attach magnets to the outside of the meter. These magnetically saturate the coils or current transformers, preventing the alternating current from forming eddy currents in the rotor, or inducing voltages in the current transformer.Rectified DC loads cause mechanica l (but not electronic) meters to under-register. DC current does not cause the coils to make eddy currents in the disk, so this causes reduced rotation and a lower bill. Some combinations of capacitive and inductive load can interact with the coils and mass of a rotor and cause reduced or reverse motion. The owner of the meter normally secures the meter against tampering. Revenue meters' mechanisms and connections are sealed. Meters may also measure VAR-hours (the reflected load), neutral and DC currents (elevated by most electrical tampering), ambient magnetic fields, etc.Even simple mechanical meters can have mechanical flags that are dropped by magnetic tampering or large DC currents. Newer computerized meters usually have counter-measures against tampering. AMR (Automated Meter Reading) meters often have sensors that can report opening of the meter cover, magnetic anomalies, extra clock setting, glued buttons, A common method of tampering on older meters is to attach magnets to the outside of the meter. These magnetically saturate the coils or current transformers, preventing the alternating current from forming eddy currents in the rotor, or inducing voltages in the current transformer.When tampering is detected, the normal tactic, legal in most areas of the USA, is to switch the subscriber to a â€Å"tampering† tariff charged at the meter's maximum designed current. At US$ 0. 095/kWh, a standard residential 50  A meter causes a legally collectible charge of about US$ 5,000. 00 per month. Meter readers are trained to spot signs of tampering, and with crude. inverted installation, reversed or switched phases etc. (A Duke Energy technician removes the tamper-proof seal from a electricity meter at a residence in Durham, north Carolina)Some tampers bypass the meter, wholly or in part. Safe tampers of this type normally increase the neutral current at the meter. Most split-phase residential meters in the United States are unable to detect neutral curr ents. However, modern tamper-resistant meters can detect and bill it at standard rates. Disconnecting a meter's neutral connector is unsafe because shorts can then pass through people or equipment rather than a metallic ground to the generator. A phantom loop connection via an earth ground is often much higher resistance than the metallic neutral connector. Even in hese cases, metering at the substation can alert the operator to tampering. Substations, interties and transformers normally have a high-accuracy meter for the area served. Power companies normally investigate discrepancies between the total billed and the total generated, in order to find and fix power distribution problems. These investigations are an effective method to discover tampering. In North America power thefts are often connected with indoor marijuana grow operations. Narcotics detectives associate abnormally high power usage with the lighting such operations require.Indoor marijuana growers aware of this are particularly motivated to steal electricity simply to conceal their usage of it. Self evaluation This 42 days Industrial Training has led me to understand the various designing, assembling and the manufacturing processes of equipments in the industry, BENTEX. It has also enhanced my knowledge about the functioning and management of an industry, which I am sure, will be beneficial to me in my career. Regards, Name – Devesh Kumar Roll no. – 303956 Branch – Digital electronics (3rd year) Institute – C. R. R. I. T.