Thursday, October 31, 2019

Human resources management in practice Essay Example | Topics and Well Written Essays - 2000 words

Human resources management in practice - Essay Example Additionally, there are two types of feedback. Action feedback occurs when you can see by the other person's actions whether or not your communication has been understood. For example, when presenting an idea, the person who is receiving the information executes it. Your action feedback is the receiver executing your instruction, or advice. Person feedback, the second type however, can be more difficult. Oftentimes, people do not want to appear to be foolish or unintelligent. Accordingly, they will lie and say "I understand" when indeed they do not. Sir Jones offers an alternative manner of assessment one's understanding. He suggests that speaker ask "What would you do first" Jones outlines communication barriers and how to overcome them in way which is easy to understand. His charges are especially instructive. Jones instructs that there are various types of communication but of import to this lecture, focus is keenly on the nonverbal types of communication. This section is especially interesting because one is rather aware of the nonverbal communications in the social setting but not in the organisational setting. However, by noting the barriers and following Jones' instruction, communication within the organisational construct can be far more successful thus leading to effective leadership. Recruiting people who are wrong for the organisation c... A job vacancy provides the perfect opportunity to consider restructuring, or to reassess the requirements of the job (Pearn and Kandola 1993). A notification of a job vacancy should be clear. It should clearly and accurately set out the duties and responsibilities of the job and should include those items outlined within the article (Couwood 2005). Moreover, there is a detailed outline of suggested items to place in a job posting advertisement. Each of these items allow the employer and employee to come to the table with a clear description of what is expected and what is sought. Required abilities should be expressed in terms of the standards required, not just in terms of the task to be undertaken. The sifting stage can help the organisation by providing feedback on the advertising process and the suitability of the application form. It can also identify people who might be useful elsewhere in the organisation. To avoid any possibility of bias, such sifting should be undertaken by two or more people. If there are too many possible candidates, then they should be weighed up against the desirable qualities specified. Further, if the job involves practical skills, it may be appropriate to test for ability before or at the time of interview. This is generally acceptable for manual and word processing skills, but less useful for clerical and administrative posts. There are various tests that organisations can apply to prospective candidates. Finally, the most common process of recruitment is The most common type of interview used in the selection process is a structured interview with a traditional format. It usually consists of three phases. The introductory phase covers the greeting, small talk, and an overview of which

Tuesday, October 29, 2019

Compare and Contrast Essay Example | Topics and Well Written Essays - 500 words - 1

Compare and Contrast - Essay Example According to him, in racism, the oppressing people destroy the cultural values of the people (Fanon 33). To note, culture is an aspect showing one’s racial identity. In a sense, Fanon thinks that the main effect of racism is the debasement of one’s culture. Freire on the other hand, uses the term oppressed to refer to people who can easily be corrupted due to poor education. In a sense, he is concerned with intellectually oppressed people. Education is the key to stop this kind of oppression for him. If an individual is educated, he or she could liberate himself or herself out of the oppressive environment. He believes that education accords the oppressed an opportunity to regain honor and respect in the community which he or she belongs to (Freire 4). Also, Freire contends that through education, the oppressed could achieve a higher social status. For Freire, education opens the eyes of the oppressed to the truth and widens his or her horizons of opportunity in the soc iety. Second, Fanon and Freire’s literary works are both aimed at liberating the oppressed. In both of them, freedom is to be associated with the liberty to achieve the highest potential of human beings without any hindrances. For Fanon, the oppressed could be liberated through the grant of basic rights.

Sunday, October 27, 2019

Java and Bluetooth Technologies

Java and Bluetooth Technologies CHAPTER I INTRODUCTION 1.1 Project Background Wireless technologies are becoming more and more popular around the world. Consumers appreciate the wireless lifestyle, relieving them of the well known â€Å"cable chaos† that tends to grow under their desk. Nowadays, the world would virtually stop if wireless communications suddenly became unavailable. Both our way of life and the global economy are highly dependent on the flow of information through wireless mediums like television and radio. Cell phones have become highly available during the last decade. Now virtually everyone owns a cell phone, making people available almost wherever they are. Many companies are highly dependent on their employees having cell phones, some companies have even decided not to employ stationary phone systems but instead use cell phones exclusively throughout the organization. New wireless technologies are introduced at an increasing rate. During the last few years the IEEE 802.11 technologies have started to spread rapidly, enabling consumer s to set up their own wireless networks. This constitutes an important change in how wireless communications are made available to consumers. Wireless networks are no longer provided by big corporations alone, they can just as well be implemented by individuals. Our society is becoming more and more dependent on wireless communications as new areas of use are introduced. The Bluetooth wireless technology is also spreading rapidly. The number of Bluetooth chipsets shipped per year has doubled from 2002 to a total of 69 million chipsets in 2003. The majority of these Bluetooth chipsets are used in mobile phones. An interesting aspect is that consumers are highly dependent on having a cell phone, and the Bluetooth technology is included in the majority of new cell phones. The Bluetooth technology will therefore spread because of the general need for cell phones. As an increasing number of useful Bluetooth applications become available, many consumers will already have Bluetooth devices and be ready to start using Bluetooth PANs (Personal Area Networks) where all their Bluetooth devices communicate with one another. The number of Java enabled mobile phones worldwide is over 250 million and the number of Java enabled mobile phones will continue to increase. Java enabled mobile phones have already been on the market for some years. Due to the very resource constrained mobile phones available a few years ago, Java applications were not very sophisticated and did not hit the mass-market the way many had hoped. As seen in the rest of the software and hardware industry, games play an important role in driving the development of both hardware and software forward. It is therefore interesting to see that a large market has emerged lately for Java games targeting mobile devices. Processing power, available memory, screen size, and screen resolution are increasing as new Java enabled mobile devices enter the market. Newly released Java applications are accordingly sophisticated, and will help to spread the Java technology usage even further. The Java APIs for Bluetooth Wireless Technology (JABWT) ties the Java technology and the Bluetooth technology together. JABWT is made available in some of the latest smart phones and will probably be available also in low-end cell phones in the future. One can easily imagine different scenarios where JABWT would be useful, e.g. the functionality of existing Java games is extended to support multi-player games using Bluetooth connectivity. Other interesting scenarios emerge as well, such as a consumer using a Java Bluetooth enabled mobile phone to pay for a soda by connecting to a Bluetooth enabled soda vending-machine. A good prediction is that JABWT will first find its use in multi-player Java games, making the Java and Bluetooth technologies well-known to consumers. Thereafter we will probably see other types of Java Bluetooth applications, such as small-amount payment applications. This thesis gives a broad overview of Java and Bluetooth technologies, and a mobile peer-to-peer application that allows users to share their files such as text, images music within a small Bluetooth network in a synchronized way. 1.2 Aim of the Project This project is designed to develop a personalized mobile file sharing system that allow users to share their resources without the aid of any central server. 1.3 Motivation of the Project With the availability of peer-to-peer mobile services operating on content sets, the need for a personalized file sharing Application rises. This project overcomes the requirements specified above by designing a personalized file sharing system that not only allows people to share files to the strangers in a mobile peer-to-peer mobile network, but also identifies the secure mobile devices in an â€Å"ad-hoc mobile social network† which allows people to share and personalize the file sharing experience with the strangers in the network. 1.4 Expected outcome of the project The Outcome of this project is to design a system that provides methods to share their files within the users in an adhoc network by identifying the secure mobile devices. The user not only shares there files with known entities but also has provisions to share the image, text and music files with unknown entities. 1.5. Introduction to Bluetooth Bluetooth is a wireless communication protocol. Bluetooth is an always-on, short-range radio hookup that resides on a microchip. We can use Bluetooth to communicate to other Bluetooth-enabled devices. It was initially developed by Swedish mobile phone maker Ericsson in 1994 as a way to let laptop computers make calls over a mobile phone. Since then, several thousand companies have signed on to make Bluetooth the low-power short-range wireless standard for a wide range of devices. Industry observers expect Bluetooth to be installed in billions of devices by 2005. The concept behind Bluetooth is to provide a universal short-range wireless capability. Using the 2.4 GHz band, available globally for unlicensed low-power uses, two Bluetooth devices within 10 m of each other can share up to 720 Kbps of capacity. Bluetooth is intended to support an open-ended list of applications, including data (such as schedules and telephone numbers), audio, graphics, and even video. For example, audio devices can include headsets, cordless and standard phones, home stereos, and digital MP3 players. Following are some examples of the capabilities that Bluetooth can provide consumers: Make calls from a wireless headset connected remotely to a cell phone; Eliminate cables linking computers to printers, keyboards, and the mouse; Hook up MP3 players wirelessly to other machines to download music; Set up home networks so that a couch potato can remotely monitor air conditioning, the oven, and childrens Internet surfing; Call home from a remote location to turn appliances on and off, set the alarm, and monitor activity. 1.5.1 Applications of Bluetooth Bluetooth is designed to operate in an environment of many users. Up to eight devices can communicate in a small network called a piconet. Ten of these piconets can coexist in the same coverage range of the Bluetooth radio. To provide security, each link is encoded and protected against eavesdropping and interference. Bluetooth provides support for three general application areas using short-range wireless connectivity: Data and voice access points Bluetooth facilitates real-time voice and data transmissions by providing effortless wireless connection of portable and stationary communications devices; Cable replacement Bluetooth eliminates the need for numerous, often proprietary cable attachments for connection of practically any kind of communications device. Connections are instant and are maintained even when devices are not within line of sight. The range of each radio is approximately 10 m, but can be extended to 100 m with an optional amplifier; Ad hoc networking A device equipped with a Bluetooth radio can establish instant connection to another Bluetooth radio as soon as it comes into range. 1.5.2 Protocol Architecture Bluetooth is defined as a layered protocol architecture consisting of core protocols, cable replacement and telephony control protocols, and adopted protocols. The core protocols form a five-layer stack consisting of the following elements: Radio Specifies details of the air interface, including frequency, the use of frequency hopping, modulation scheme, and transmit power. Baseband Concerned with connection establishment within a piconet, addressing, packet format, timing, and power control. Link manager protocol (LMP) Responsible for link setup between Bluetooth devices and ongoing link management. This includes security aspects such as authentication and encryption, plus the control and negotiation of baseband packet sizes. Logical link control and adaptation protocol (L2CAP) Adapts upper-layer protocols to the baseband layer. L2CAP provides both connectionless and connection-oriented services. Service discovery protocol (SDP) Device information, services, and the characteristics of the services can be queried to enable the establishment of a connection between two or more Bluetooth devices. RFCOMM is the cable replacement protocol included in the Bluetooth specification. RFCOMM presents a virtual serial port that is designed to make replacement of cable technologies as transparent as possible. Serial ports are one of the most common types of communications interfaces used with computing and communications devices. Hence, RFCOMM enables the replacement of serial port cables with the minimum of modification of existing devices. RFCOMM provides for binary data transport and emulates EIA-232 control signals over the Bluetooth base band layer. EIA-232 (formerly known as RS-232) is a widely used serial port interface standard. The adopted protocols are defined in specifications issued by other standards-making organizations and incorporated into the overall Bluetooth architecture. The Bluetooth strategy is to invent only necessary protocols and use existing standards whenever possible. These are the adopted protocols: PPP The point-to-point protocol is an Internet standard protocol for transporting IP datagrams over a point-to-point link; TCP/UDP/IP These are the foundation protocols of the TCP/IP protocol suite; OBEX The object exchange protocol is a session-level protocol developed by the Infrared Data Association (IrDA) for the exchange of objects. OBEX provides functionality similar to that of HTTP, but in a simpler fashion. It also provides a model for representing objects and operations. Examples of content formats transferred by OBEX are vCard and vCalendar, which provide the format of an electronic business card and personal calendar entries and scheduling information, respectively; WAE/WAP Bluetooth incorporates the wireless application environment and the wireless application protocol into its architecture. 1.5.3 Bluetooth Usage Models A number of usage models are defined in Bluetooth profile documents. In essence, a usage model is a set of protocols that implement a particular Bluetooth-based application. Each profile defines the protocols and protocol features supporting a particular usage model. Following are the highest-priority usage models: File transfer The file transfer usage model supports the transfer of directories, files, documents, images, and streaming media formats. This usage model also includes the capability to browse folders on a remote device; Internet bridge With this usage model, a PC is wirelessly connected to a mobile phone or cordless modem to provide dial-up networking and fax capabilities. For dial-up networking, AT commands are used to control the mobile phone or modem, and another protocol stack (such as PPP over RFCOMM) is used for data transfer. For fax transfer, the fax software operates directly over RFCOMM; LAN access This usage model enables devices on a piconet to access a LAN. Once connected, a device functions as if it were directly connected (wired) to the LAN; Synchronization This model provides a device-to-device synchronization of PIM (personal information management) information, such as phone book, calendar, message, and note information. IrMC (Ir mobile communications) is an IrDA protocol that provides client/server capability for transferring updated PIM information from one device to another; Three-in-one phone Telephone handsets that implement this usage model may act as a cordless phone connecting to a voice base station, as an intercom device for connecting to other telephones, and as a cellular phone; Headset The headset can act as a remote devices audio input and output interface. 1.5.4 Advantages Bluetooth has a lot to offer with an increasingly difficult market place. Bluetooth helps to bring with it the promise of freedom from the cables and simplicity in networking that has yet to be matched by LAN (Local Area Network). In the key marketplace, of wireless and handheld devices, the closest competitor to Bluetooth is infrared. Infrared holds many key features, although the line of sight it provides doesnt go through walls or through obstacles like that of the Bluetooth technology. Unlike infrared, Bluetooth isnt a line of sight and it provides ranges of up to 100 meters. Bluetooth is also low power and low processing with an overhead protocol. What this means, is that its ideal for integration into small battery powered devices. To put it short, the applications with Bluetooth are virtually endless. Disadvantages Bluetooth has several positive features and one would be extremely hard pressed to find downsides when given the current competition. The only real downsides are the data rate and security. Infrared can have data rates of up to 4 MBps, which provides very fast rates for data transfer, while Bluetooth only offers 1 MBps. For this very reason, infrared has yet to be dispensed with completely and is considered by many to be the complimentary technology to that of Bluetooth. Infrared has inherent security due to its line of sight. The greater range and radio frequency (RF) of Bluetooth makAe it much more open to interception and attack. For this reason, security is a very key aspect to the Bluetooth specification. Although there are very few disadvantages, Bluetooth still remains the best for short range wireless technology. Those who have tried it love it, and they know for a fact that Bluetooth will be around for years to come. 1.5.5 Chat In a Bluetooth Chat application, well develop a JABWT-based chat room application, called Chat, for mobile devices that must support the J2ME MIDP 1.0 profile. Users who have a JABWT-capable device can use this application to chat with their nearby friends in an IRC fashion. It searches and joins any existing chat room within the Bluetooth effective range, or creates a new chat room in the nearby Bluetooth range. We use the words chat room to represent a virtual chat room thats formed by a network of Chat applications. Users can start messaging with each other within the same virtual chat room when theres more than one party connected to each other. If one user sends a message over the air, all parties of the chat room will receive the message. Users can join and leave the chat room at anytime. For our convenience we assumes like Theres only one chat room that exists within effective Bluetooth range. There is no security imposed when joining a chat room. Users run one instance of Chat on a device at any given time. Before we dig into the source code, lets look at some of the Bluetooth application design issues. JABWT does a good job of providing a familiar API to J2ME developers for accessing Bluetooth facilities. JABWT is integrated with the J2ME Generic Connection Framework. As a result, Bluetooth network programming is very similar to a stream-based connection model. Like many other network protocols, the Bluetooth connection model employs a client/server architecture. Our Chat application, on the other hand, operates in a peer-to-peer manner. Each running instance of Chat (or a node) can serve as a client and a server at the same time. It behaves as a client when Chat starts up; it searches and connects to existing running Chat devices. Once connected, it makes itself available for future clients to connect to. In such cases, it serves as a server for future client connections. To logically represent an active Chat node, we use the concept of endpoint to encapsulate all the connectivity attributes of a node. An endpoint represents a unique message delivery destination and source regardless of whether it is a server or a client. A Bluetooth connection differs from a regular socket connection by its unique device and service discovery processes. Bluetooth applications typically start the device discovery process to identify connectable devices, which is followed by a service discovery process to obtain a reference (URL) to suitable services. To hide these complexities from the Graphical User Interface (GUI) elements, a network layer is introduced to serve as a faà §ade to the Bluetooth API. This design is comparable to the Model-Viewer-Controller model where the Viewer component is decoupled from the Model component. The GUI can access Bluetooth connectivity via a simplified interface, which does all the discovery and connection establishment behind the scenes. This network layer also provides the functionality to send messages to and receive messages from other endpoints. A call back interface is in place to report any network activity back to the GUI. The Bluetooth Network is explain below. The communication channel between each connected Chat endpoint is a structured data stream connection. We put together a simple protocol to coordinate the activity between each endpoint. This protocol includes the following features: Initial handshake: Each point must handshake with each other when the connection is first established. This ensures that the connecting device is a Chat node rather than a mistakenly connected application. During the handshake, we also exchange the screen names of the users Delivery of text message: Each sent text message is delivered to all endpoints connected to the Chat network. Termination handshake: If the user quits the chat room gracefully, a termination token is sent to all the other endpoints to indicate its intention. We can clean up the necessary network and runtime resources associated with the leaving endpoint upon receiving this token. However, if the user walks away from effective range and becomes inaccessible, a termination token is not sent. Other active endpoints will discover the leaving party is inaccessible when the connections are lost, and they will clean up the resources. 1.5.5.1 Implementation Consideration The NetLayer class, which implements the Chat networking layer, does most of the Bluetooth-related work and provides the following functionality: Initializes the Bluetooth stack Registers Chat services to the Bluetooth device Searches for nearby devices Searches for Chat services on nearby devices Establishes endpoint connectivity for found Chat services Manages the life cycle of all endpoints The Bluetooth stack can be initialized by calling LocalDevice. getLocalDevice(). LocalDevice is a singleton that uniquely represents the underlying Bluetooth device implementation. You can use the LocalDevice instance to gain access to other Bluetooth features including: Discovery agent (via getDiscoveryAgent()) Bluetooth physical network address (via getBluetoothAddress()) SDDB (via getRecord() and updateRecord()) The Chat NetLayers initial work is to create and register a Chat service to a local device. A Bluetooth service is an entry point for other Bluetooth clients to access available functionalities. Since each Chat endpoint can serve as a server, it must register its service in order to make this server available to other Chat clients. JABWT utilizes the MIDP Generic Connection Framework to instantiate a server connection. A Chat application needs to instantiate a Serial Port Profile connection, basically a stream-based connection that allows two Chat applications to exchange data using Java input and output streams. A Chat server connection is created. After a server connection is created, the service is not yet available to external clients (it is not discoverable). What has happened is that JABWT created a corresponding ServiceRecord for this service. A ServiceRecord is a collection of attributes that describes our service, and these attributes are searchable by clients. We can use localDevice.getRecord( server ) to retrieve the newly created ServiceRecord. You may notice that the ServiceRecord is not empty at this point; it is already populated with some default values that are assigned by the JABWT implementation based on the connection string and the implementation configuration when we perform Connector.open(). The server.acceptAndOpen() method notifies the Bluetooth implementation that the application is ready to accept incoming connections and make the service available. This also instructs the underlying implementation to store the ServiceRecord object in the SDDB, which occurs when server.acceptAndOpen() is first invoked. Notice that only the attributes stored in the SDDB can be seen and queried by other Bluetooth clients. Any subsequent change to the ServiceRecord must be reflected in the SDDB by using localDevice.updateRecord(). Now our Chat application is ready to accept a connection. But what if your friends are already chatting prior to the start of your Chat? If there is an existing chat room available, Chat should join the existing network by searching for other Chat services on each individual device and connecting to their services. Three steps must be taken to perform this action. Search for an available device. For each available device, search for available and matching services. For each available and matching service, connect to the service and perform the initial handshake. DiscoveryAgent, another singleton in JABWT, can help us find other devices and services. There are two other options for retrieving connectable devices, a cached devices list and a pre known devices list. Cached devices are remote devices that have been discovered in a previous inquiry. Pre known are remote devices that are preconfigured in BCC. In our example, we choose to ignore both cached and pre known devices. We want to retrieve the most up-to-date list of active Chat devices at the moment Chat is launched. Therefore, our Chat application always initiates a new search for all surrounding devices. Devices can be searchable in two modes, General Inquiry Access Code (GIAC) and Limited Inquiry Access Code (LIAC). When a device is set to GIAC, it basically means I want to be discovered all the time. Devices that provide public and permanent services fall into this category. Printers and fax machines are examples of GIAC devices. On the other hand, LIAC discovery mode means I want to be discovered for a short period of time, as requested by my user. Devices that provide on-demand connectivity will fall into this category. Examples are multiple player game consoles, mobile modems, and our Chat program. The device discovery and service discovery processes are performed in an asynchronous manner. A Bluetooth application must provide a callback object for the JABWT implementation to notify when devices or services are found. This callback object implements the DiscoveryListener interface. When a device is found, the deviceDiscovered() method is invoked. We do some basic filtering to narrow down the candidate devices for our Chat application and ignore other unrelated devices. When all candidate devices are discovered, the device search is completed and the searchCompleted() method is invoked. We initiate the service discovery process using DiscoveryAgent .searchServices(). This is where the ServiceRecord attributes become useful. ServiceRecord is not only a description of the services, but also a query of constraints during service discovery. The second parameter of searchServices() allows us to specify which attributes and values the services must have in order for us to discover them. We can provide the UUID for the service that we registered earlier and it narrows down the exact matching candidate services on a remote device. This mechanism not only improves the performance of the discovery process, but also reduces the possibility of conflict. Once the desired service (Chat service) is found, we can retrieve the corresponding connection URL and establish the physical connection. To further validate that the connected service is indeed a Chat service, we immediately perform a handshake with the other party by sending a handshake signal (SIGNAL_HANDSHAKE) and exchanging the user screen name. Receiving parties must respond with an acknowledgment (SIGNAL_HANDSHAKE_ACK) to confirm the request.. To logically represent all the parties in the chat room, we introduce class EndPoint. From the application-level perspective, an endpoint encapsulates information for each actively connected Chat user and device. Chat uses EndPoint to identify which user to send a message to, and from which user a message is received. This abstraction allows us to hide the JABWT complexity from the GUI application. Endpoints are created when a connection is established between two Chat devices. Once created, we attach a reading thread and sending thread to the endpoint to manage the traffic between two endpoints. From this point on, two endpoints exchange user-entered messages (using SIGNAL_MESSAGE) until a termination signal is received. Implementation of this protocol can be found in the Reader and Sender classes. When a user exits Chat, the application sends the last message a termination token (SIGNAL_TERMINATE) to all connected parties. This token signals that the endpoint is no longer active. All receiving parties must return an acknowledgment (SIGNAL_TERMINATE_ACK) and remove the leaving endpoint from the active endpoint list. An endpoint can also be removed when the connectivity is dropped, which suggests the user has left the chat room without an explicit exit command (possibly due to a users walking away from the Bluetooth effective range). Our GUI, based on the MIDP LCDUI API, provides a simple interface to send and receive messages. All received messages from all connected users are displayed sequentially on the screen, which creates a virtual chat room environment. When there are more messages to display than can fit onto one screen, older messages will roll off the upper edge. In this example application, users are not able to scroll back to see the past messages. Pressing the Write command takes users to a message-editing mode. Pressing the Send command sends the currently entered message to the chat room; all other connected users are able to see the message. To quit the chat room, pressing the Exit command sends a termination token to all other parties. 1.5 Literature Survey There are a number of related research projects related to the music sharing. Their similarities and differences from our project are described as follows. tunA [TUNA, 2004], researched by Media Lab Europe is probably the closest relative of our system. It explored the possibilities of a system which enables people to share their music and to communicate with others nearby while they are on the go. tunA focuses on synchronized music sharing while our system focuses on personalized music sharing. Soundpryer [SOUNDPRYER, 2002], made by the Mobility Studio of the Interactive Institute in Sweden which focuses on a shared music experience between nearby cars and focuses on personal mobile music uses in urban settings. Unlike our system, Soundpryer does not include tight synchronization of that shared audio as part of their concept and implementation, and users do not choose which cars they are connected to. Sotto Voce [SottoVoice, 2002], a Xerox PARC project, is an electronic guidebook which attempts to promote a shared activity between museum visitors by allowing them to ‘eavesdrop on the descriptive audio passages that another is listening to. The system is a ‘hack in that no content is streamed all devices have identical local content. Bubbles [Bubbles, 2003], a Telenor RD project, is a mobile audio player that allows users to exchange audio files with nearby peers. It functions much like a mobile file trading application: Users swap files over HTTP but there is no infrastructure to join the audio experience among those users. Push!music [PUSH, 2005], a software developed on PDAs, which focuses on the concept of ‘media ecology, using agents to make songs migrate from one device to another in accordance to users music consumption habits. The methodology in â€Å"A peer to peer network file sharing system in mobile phones† is going to focus on mobile file sharing system. The mobile file sharing system allows users to share their resources like images, text, audio files without any aid of the central server. This system not only allows people to share their files to stranger but also identified the mobile devices in the mobile social network. CHAPTER II OVERVIEW OF THE SYSTEM 2.1 System Preliminary Design The Wireless Service subsystem will let mobile phones communicate with each other when they are in range. Since the devices use Bluetooth protocol which is a radio communications system, so they do not have to be in line of sight of each other, and can even be in other rooms, as long as the received transmission is powerful enough. There are three types of power class dependent with different ranges: 1 metre, 10 metres, 100 metres. The model that the Wireless Service subsystem uses for communication is a Client-Host architecture illustrated in figure. The role of a Host can communicate with up to 7 devices playing the role of a Client using Wireless Service Subsystem. The Host refers to Tune-in Host subsystem and Client refers to Tune-in Client subsystem. This network with a group of up to 8 devices (1 Host + 7 Clients) is called a piconet. A piconet is an ad-hoc computer network of devices using Bluetooth technology protocols to allow one host device to interconnect with up to seven active client devices (because a three-bit MAC address is used). Up to 255 further Client devices can be deactivated, or parked, which the Host device can bring into active status at any time. At any given time, data can be transferred between the Host and one Client, but the Host switches rapidly from Client to Client in a round-robin fashion. To set up a connection, a Client can would perform an inquiry to find any available device

Friday, October 25, 2019

Homecoming :: essays research papers

Homecoming â€Å"What kind of mother would leave her four kids in a parked car in a strange town and then just walk away? Maybe a mother who went a little crazy. But the Tilerman Kids—Dicey, James, Sammy, and Maybeth—couldn’t do anything to stop her. All they could do was watch as their mother blended into the Saturday morning mall crowd. It was their last glimpse they had of her. Now Dicey only thirteen would have to find an adult they could trust to take them ALL in so they wouldn’t end up in foster care. Those were Dicey’s hopes. But deep down Dicey was afraid that it was too much to hope for†¦Ã¢â‚¬  Dicey Tillerman: Strong, young, scared, and frustrated, but seems to stay completely sane and hopeful when all hopes are gone and reality is the only thing there is. Abigail Tillerman: Strong, stubborn, and confused. She wonders if she takes her grandchildren in will she be fit enough to handle them. Will they love her back if she loves them? The answer lies within her and she soon finds out its better to have someone than no one at all.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"People say she crazy†. Said Dicey   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"Crazy like a Fox†. James replied.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  (Describing their Grandmother) The conflicts in the book are a mixture of INTERNAL and EXTERNAL. Dicey has people she meets that don’t treat them very good but than she fights with herself to not give up and keep going, believing that there is someone out there that will take them in and love them. All of them. The theme the author develops about life is that not everything will work out but to keep looking and trying something eventually will work out. I would recommend this book because I found it to be very inspirational and comforting that there was someone who took them in and proved that there was still good to be had in the world.

Thursday, October 24, 2019

Salvationist Governance

3. Explain how people (ministers, social workers, other employees, board members, volunteers) can be involved in governance in their day-to-day activities The organization of the Salvation Army calls for participation of key individuals in matters of governance. Being a registered charitable organization in many countries means adequate participation of concerned parties in religious denominations and international capacity. Participation of parties in matters of governance in the day to day activity serves a very important purpose of Salvation Army. The spread of gospel is a major concern of the ministers especially when dealing with society members. (Stephen, John, 2006, p. 6) Visiting the sick, providing food and other basic commodities to individuals serve a very important aspect of minister’s involvement. The congregation is a very important element that needs the support of ministers in evaluation of certain tasks. Serving the entire society or congregation calls for full participation of different stakeholders. Such individuals involved in Salvation Army include social workers, volunteers, employees and board members. These individuals are involved in various activities such taking care of the sick old and disadvantaged members of the society (Milkler, 1997, p. 21). For instance, volunteers participate in activities such as cleaning the sick, feeding the poor, providing clothes to the poor, and constructing houses for less disadvantaged especially the disabled. Social workers and other employees at Salvation Army organize social activities such as games that lead to socialization. The board members are involved in making decisions that keep the organization strong and going (Holktzman, 2003, p. 24). 4. In your opinion, what aspects of private sector organizations governance can be transferred to the Salvation Army? Governance in private sector calls for implementation of certain policies in the running affairs of the organization. Since Salvation Army is similar to private sector certain governance components can be adopted. Some of the leadership policies that can be borrowed from private sector include directors who are independent and diligence. This means that the board of directors is supposed to show signs of commitment to management and should not be given any other responsibility. In addition, the directors should be diligent in their governance models to ensure that affairs of Salvation Army are well addressed (Charities Review Council, 2010). Application of good leadership models such as proper channels of communication is another major governance policy that can be borrowed from private sector to Salvation Army. What aspects of the Salvation Army’s governance mechanisms can be transferred to other nonprofits and what is peculiar to this organization? The Salvation Army is a non-profit making organization that aims at serving its congregation and the entire society in matters of religion. This being the case, some non-profit making organizations can borrow certain governance models from Salvation Army. One outstanding mechanism is about auditing of accounts by qualified auditors a common practice in Salvation Army (Where Most needed, 2009). This involves preparation and presentation of strong, accountable and transparent financial statements reflecting the usage of funds and assets of the entity. The congregation support activities of Salvation Army through contributions and this call for preparation of financial statements which are subject to auditing by qualified auditors. Adopting this measure by non-profit making organization builds confidence of its stakeholders which leads to proper dissemination of duties to the entire society. Another possible mechanism that can be adopted by the private sector is participation in charitable activities like visiting the sick and old in the society (Siegel, 2007). These are peculiar activities carried on at Salvation Army and can be applied to non-profit making organizations for purpose of promoting the dignity of relevant stakeholders. Bibliography Charities Review Council 2010, Got Standards? So Do Charities, Viewed August 24 2010 from Holktzman, M 2003, Internal Control in the Talmud: the Jerusalem Temple, The Accounting Historians, Vol. 30, p. 23-25 Milkler, G 1997, Financial Accounting and Management in Governments, public Service and Charities, John Willey and Sons, New York Siegel, J 2007, Is There a Duty To Gentrify?: The Salvation Army As Real Estate Tycoon, Viewed August 24, 2010 from Stephen, G. & John, H 2006, Corporate Governance Consultants: the Issue of Qualifications. The CPA Journal, Vol.76, pp.1-15 Where most needed 2009, Salvation Army Embraces Centralized, Corporate Management, Viewed August 24 2010 from

Wednesday, October 23, 2019

England During the Reign of Mary Essay

To what extent was England dominated by Spain and the serving of Spanish interests during the reign of Mary? Mary I had widespread popular support throughout England and made a triumphal entry into London once she was made Queen. She was determined to re-impose Catholicism and marry Philip II of Spain, which caused some controversy amongst the public. Philip was Spanish and therefore distrusted, and many in England now had a vested interest in the prosperity of the Protestant church, having received church lands and money after Henry dissolved the monasteries. Marys firm catholic beliefs instilled to her when she was a minor were very strong when she took the throne; however it is questionable how much her marriage alliance with the Spanish Prince affected her policies and decision making, thus allowing Spain to dominate England between 1553-58. At age 37, Mary turned her attention to finding a husband and producing an heir. Her cousin Charles V suggested she marry his only son, Prince Philip of Spain. Philip had a son from a previous marriage, and was heir apparent to vast territories in Continental Europe and the New World. Prince Phillip was Catholic, heir to the Spanish throne and related to Catherine of Aragon, Mary’s mother. Mary wanted to marry him. Lord Chancellor Gardiner and the House of Commons unsuccessfully petitioned her to consider marrying an Englishman, fearing that England would be relegated to a dependency of the Habsburgs. The Catholic marriage was unpopular with the English; Gardiner and his allies opposed it on the basis of patriotism, while Protestants were motivated by a fear of Catholicism. When Mary insisted on marrying Philip, protests broke out. Thomas Wyatt led a force from Kent to depose Mary in favour of Elizabeth, as part of a wider conspiracy now known as Wyatt’s rebellion. Although the alliance gave way to a relationship with France, it gave Spain a large influence in how the country would be run and Mary’s want for a marriage affected her decision making for England. Gardiner and Paget worked together to limit Philip’s powers in England. Although he was to be given the title of King, he would have no power to appoint Spaniards to English offices, to dictate foreign policy, or to retain any power after Mary’s death. Philip stayed in England for fourteen months. He pursued a role within the English government, but was disliked within the Privy Council. Mary, however, often took advice from outsiders such as Charles V’s ambassador Simon Renard and this tended to reduce the importance of the  Privy Council in policy matters. During this time it became clear that Mary was besotted with Prince Phillip which suggests Spain were becoming increasingly involved in England’s relations. Phillip could influence Mary at any poin t which may have affected her authority as Queen. During Mary’s reign from 1556, Philip tried to overcome the resistance of the Privy Council and involve England in war with France. Philip’s cause was helped by the invasion of Thomas Stafford – a Protestant exile in France. In April 1557, he landed at Scarborough was almost immediately defeated and was executed in May. Once persuaded, Mary sent 7000 troops to assist the French war, who were also Catholic after news they were to depose Mary. Although Henry II of France denied initiating the raid, England declared war on France. The English navy lent Spain important support at sea. Although the troops succeeded in the capture of St. Quentin, the war was regarded as disastrous because in January 1558, England lost Calais; the last English territorial possession in France, held by England since 1347. St. Quentin was handed over to Spain and it became clear there had been no gain for England in supporting Spain which aggravated the Public. However, Mary did not join the War with France until June. It had broken out in January and Mary had originally denied Phillip her help as she saw no threat. It was not until the plot against Mary was established that she got involved in the war, which suggests her marriag e did not dominate her decision in protecting the Monarchy and Catholicism. Moreover, Mary had successfully made improvements to the English Army. She had increased ship building and developed the Militia with the Militia Act which was passed in 1558, the foundation for Elizabeth’s Armies, and national defences were built up. An Arms Act was later introduced in providing weaponry to the Army for any attacks. The English navy was reorganised and re-equipped. The main aim was to help Philip in his war against the French, but the improvements were important in helping Elizabeth to defeat Philip’s own Armada thirty years later. However, In January 1554, Sir Thomas Wyatt raised a rebellion in Kent. The rebels marched on London intending to capture Mary and prevent her marrying Philip of Spain. The government discovered the plot, and exiled Courtenay. Wyatt’s plot was strengthened when many of the Government troops led by Thomas Howard deserted to Wyatt. The combined force advanced to Southwark but could go no further because London Bridge was strongly held.  Wyatt and his followers revolted after small fights. About sixty men died in the rebellion and 100 more were executed. The rebellion was a direct cause of Mary’s marriage alliance to Phillip. It had been hugely unpopular and many felt she had allowed Spain to dominate the Country to pursue her want for a Catholic England. Moreover, many believed the marriage led to a decline in the Wool Trade, which increased unemployment and encouraged dislike towards Mary. On the other hand, the marriage treaty was Philip was highly favourable to the English, since it would give the future King of England born to Mary and Philip possession of the Netherlands, even perhaps the whole Spanish Empire. Although Mary was besotted with Philip and her want for an heir, it can be argued her need for a Catholic England and strengthening the English Empire was more important. During her reign, Mary looked to return to a Catholic England, but her Privy Council was divided. William Paget and Mary’s supporters wanted to return to the situation at the death of Henry VIII, a church Catholic in doctrine but independent of Rome. At the cost of her religion, Mary burnt Protestants at the stake, which arguably suggests religion dominates her final decisions throughout her time as queen. Her marriage alliance and the war with France indicate Mary was solely trying to restore Catholicism in England. In conclusion, Mary I was completely in love with Philip II. Her marriage to him allowed the Spain to influence English foreign policy making, in particular the French War which benefitted Spain and cost large amounts of money for England. The public quickly became angry towards the queen because of the unpopular alliance and her want for a Catholic England over the protection of the Empire. Overall, Spain did dominate England in pursing their interests during Mary’s reign as seen by her involvement in the French War which ultimately led to the loss of Calais.