Monday, August 24, 2020

Dhari's Research Paper Example | Topics and Well Written Essays - 2500 words

Dhari's - Research Paper Example All things considered, late endeavors in financial improvement like the high populace and work development and the increments in development, human services, oil and social help are lighting up the standpoint (Garcia and Paul, 2006). New Mexico has a little assembling base which in 2003 was 4.7% of the non-agrarian populace contrasted with the national normal of 11.2%. There has been a decrease in the quantity of homesteads over the most recent couple of decades and a coordinating increment of the size of ranches with the vast majority of the state’s agrarian endeavors concentrating on domesticated animals rather than produce. Previously, mining was viewed as a primary area; nonetheless, it decreasingly assumes a huge job in the state’s economy of just 1.8% in 2002 contrasted with 2.8% in 1988 and 5.5% in 1978. In view of the little work open doors in assembling and modern areas, the state verifiably has had a high pace of joblessness, even in non-recessionary occasions , the state experienced joblessness rates higher than the country’s normal. For example in 1987 joblessness was 8.9% contrasted with the national pace of 6.2%; in addition, in 2003, the state’s jobless rate was 6.4% contrasted with 6% of the national normal (Garcia and Paul, 20069). ... These differentiating midpoints point the variations in training in the state’s different populace gatherings; For example, poor people, Hispanics and Indians normal less instructive achievement than different gatherings in the state (Garcia and Paul, 2006). Hence, of the assessed 1,819,046 all out populace of New Mexico, 120,000 are legitimately recorded outsiders and 40,000 are undocumented; therefore, the undocumented populace is under 7% of the absolute state’s populace (Aparicio, Philip and Kalyani, 2004). Right now, more than seventy five percent of settlers admitted to New Mexico are from Mexico; despite the fact that, workers additionally originate from different countries like the Asian countries. Despite the fact that Hispanics make the biggest bit of outsider populace in the state, over 90% are local conceived, which is higher than the country’s normal of over64%. A considerable lot of the foreigners traverse the Mexico-New Mexico fringe without licens e as a result of monetary hardships and in the end wind up remaining in the state; in this manner, the purposes behind migrants staying are basically financial. For example, a migrant may choose to work for inconclusive period so as to set aside some cash and afterward return to their nation. Albeit undocumented foreigners enter New Mexico for financial chances, their pace of work is low; in this way, greater part of the undocumented Hispanics and different migrants live beneath destitution, which add to the neediness status of the state. Joblessness is fundamental wellspring of contemporary destitution; in addition, territorial monetary rebuilding concurs with social decent variety in America bringing about spatial imbalances in geographic territories (Aparicio, Philip and Kalyani, 2004; Esparza and Angela, 2008). This is reflected by the enormous contrasts in pay and

Saturday, August 22, 2020

Understanding Marketing Strategic Planning Processes (Marketing Idea Research Proposal

Understanding Marketing Strategic Planning Processes (Marketing Idea Product Plan) - Research Proposal Example Being separated from everyone else is fairly alarming to most senior residents (Sachteleben, 1) supporting therapists expressing that warm relational connections are the most principal of human needs (Singer, 28). Off 2 Gran Grans will give mental acclimation to its objective purchasers and furthermore fill a substantial need that need satisfying because of constrained versatility, absence of access to transportation, or absence of family and social help. The serious development, totally one of a kind in the serious market, is the establishment of a specialized gadget demonstrated after the Life Alert framework, a pendant/base unit framework that contacts the organization (Life Alert, 2012). Innovation is scaring to seniors (Sachteleben, 1) and this keeps up huge near favorable position to other comparative, low-profile contenders. Off 2 Gran Grans will furnish short-and long haul contracts with financed and prepaid components to guarantee income that incorporate gadget establishment, with expenses applied for early end. The business will be situated under quality and obligation with less accentuation on evaluating. Start-up costs will be higher than normal, however incomes will counterbalance the underlying

Saturday, July 25, 2020

The Psychology of Decision-Making Strategies

The Psychology of Decision-Making Strategies Inspiration Print The Psychology of Decision-Making Strategies By Kendra Cherry facebook twitter Kendra Cherry, MS, is an author, educational consultant, and speaker focused on helping students learn about psychology. Learn about our editorial policy Kendra Cherry Medically reviewed by Medically reviewed by Carly Snyder, MD on November 10, 2019 facebook twitter linkedin Carly Snyder, MD is a reproductive and perinatal psychiatrist who combines traditional psychiatry with integrative medicine-based treatments.   Learn about our Medical Review Board Carly Snyder, MD on November 10, 2019 Portra / Getty Images More in Self-Improvement Inspiration Happiness Meditation Stress Management Spirituality Holistic Health Brain Health Technology Relationships View All You have to make decisions both large and small throughout every single day of your life. What do you want to have for breakfast? What time should you meet a friend for dinner? What college should you go to? How many children do you want to have? When faced with some decisions, you might be tempted to just flip a coin and let chance determine your fate. In most cases, we follow a certain strategy or series of strategies in order to arrive at a decision. For many of the relatively minor decisions that we make each and every day, flipping a coin wouldnt be such a terrible approach. For some of the complex and important decisions, we are more likely to invest a lot of time, research, effort, and mental energy into coming to the right conclusion. So how exactly does this process work? The following are some of the major decision-making strategies that you might use. The Single-Feature Model This approach involves hinging your decision solely on a single feature. For example, imagine that you are buying soap. Faced with a wide variety of options at your local superstore, you decide to base your decision on price and buy the cheapest type of soap available. In this case, you ignored other variables (such as scent, brand, reputation, and effectiveness) and focused on just a single feature. The single-feature approach can be effective in situations where the decision is relatively simple and you are pressed for time. However, it is generally not the best strategy when dealing with more complex decisions. The Additive Feature Model This method involves taking into account all the important features of the possible choices and then systematically evaluating each option. This approach tends to be a better method when making more complex decisions. For example, imagine that you are interested in buying a new camera. You create a list of important features that you want the camera to have, then you rate each possible option on a scale of -5 to 5. Cameras that have important advantages might get a 5 rating for that factor, while those that have major drawbacks might get a -5 rating for that factor. Once you have looked at each option, you can then tally up the results to determine which option has the highest rating. The additive feature model can be a great way to determine the best option for a variety of choices. As you can imagine, however, it can be quite time-consuming and is probably not the best decision-making strategy to use if you are pressed for time. The Elimination by Aspects Model The elimination by aspects model was first proposed by psychologist Amos Tversky in 1972. In this approach, you evaluate each option one characteristic at a time beginning with whatever feature you believe is the most important. When an item fails to meet the criteria you have established, you cross the item off your list of options. Your list of possible choices gets smaller and smaller as you cross items off the list until you eventually arrive at just one alternative. Making Decisions in the Face of Uncertainty The previous three processes are often used in cases where decisions are pretty straightforward, but what happens when there is a certain amount of risk, ambiguity, or uncertainty involved? For example, imagine that you are running late for your psychology class. Should you drive above the speed limit in order to get there on time, but risk getting a speeding ticket? Or should you drive the speed limit, risk being late, and possibly get docked points for missing a scheduled pop quiz? In this case, you have to weigh the possibility that you might be late for your appointment against the probability that you will get a speeding ticket. When making a decision in such a situation, people tend to employ two different decision-making strategies: the availability heuristic and the representativeness heuristic. Remember, a heuristic  is a rule-of-thumb mental short-cut that allows people to make decisions and judgments quickly. The Availability Heuristic: When we are trying to determine how likely something is, we often base such estimates on how easily we can remember similar events happening in the past. For example, if you are trying to determine if you should drive over the speed limit and risk getting a ticket, you might think of how many times you have seen people getting pulled over by a police officer on a particular stretch of highway. If you cannot immediately think of any examples, you might decide to go ahead and take a chance, since the availability heuristic has led to you judge that few people get pulled over for speeding on your particular route. If you can think of numerous examples of people getting pulled over, you might decide to just play it safe and drive the suggested speed limit.The Representativeness Heuristic: This mental shortcut involves comparing our current situation to our prototype of a particular event or behavior. For example, when trying to determine whether you should spe ed to get to your class on time,  you might compare yourself to your image a person who is most likely to get a speeding ticket. If your prototype is that of a careless teen that drives a hot-rod car and you are a young businesswoman who drives a sedan, you might estimate that the probability of getting a speeding ticket is quite low. The decision-making process can be both simple (such as randomly picking out of our available options) or complex (such as systematically rating different aspects of the existing choices). The strategy we use depends on various factors, including how much time we have to make the decision, the overall complexity of the decision, and the amount of ambiguity that is involved. Problems in Decision-Making

Friday, May 22, 2020

William Shakespeares Family

We know that William Shakespeare was born in 1564, but what else? Who was Shakespeare’s family? Did he have children? Are there direct descendants around today? Heres what we know about Shakespeares family history. Shakespeare’s Parents Father: John ShakespeareMother: Mary Arden There is no exact record of when John and Mary married, but it is estimated to have been in about 1557. It is widely recognized that John was a glove maker and whittawer (leather worker) in Stratford-upon-Avon, England. John was very active in Stratford-upon-Avon’s civic duties, and in 1568 he became mayor of the town (or High Bailiff, as he would have been called then). Shakespeare’s Siblings Sister: Joan Shakespeare (born in 1558)Sister: Margaret Shakespeare (born in 1562)Brother: Gilbert Shakespeare (born in 1566)Sister: Joan Shakespeare (born in 1569)Sister:Â  Anne Shakespeare (born in 1571)Brother:Â  Richard Shakespeare (born in 1574)Brother:Â  Edmund Shakespeare (born in 1580) John and Mary had a total of eight children, but infant mortality was common in Elizabethan England, and the first two children passed away within a year of being born. William, therefore, was the eldest of those who survived infancy. The other siblings all lived until they were adults, with the exception of Anne who died at the age of 8. Shakespeare’s Wife Wife: Anne Hathaway When he was just 18 years old, William married 26-year-old Anne Hathaway. Anne was the daughter of a farming family in the nearby village of Shottery. She became pregnant with their first child out of wedlock and the couple applied to the Bishops Court in Worcester to speed up their marriage proceedings, possibly to avoid scandal. There is no surviving wedding certificate. Shakespeare’s Children Daughter: Susanna Shakespeare (born in 1583)Daughter:Â  Judith Shakespeare (twin, born in 1585)Son: Hamnet Shakespeare (twin, born in 1585) The child conceived out of wedlock to William Shakespeare and Anne Hathaway was a daughter named Susanna. A few years later, the couple had twins, Judith and Hamnet. Sadly, in the summer of 1596, Hamnet died at age 11. It is thought that Williams grief over his only sons early death can be read in his characterization of Hamlet in the play written not long after. As for the other children, Susanna married a man named John Hall in 1607, and Judith married Thoman Quiney in 1616. Shakespeares Grandchildren Granddaughter: Elizabeth Hall (born in 1608)Grandson: Shakespeare Quiney (born in 1616)Grandson: Richard Quiney (born in 1617)Grandson: Thomas Quiney (born in 1619) William had only one grandchild from his eldest daughter Susanna. Elizabeth Hall married Thomas Nash in 1626 and, after his death, she remarried John Barnard in 1649. From William’s youngest daughter Judith there were three grandsons. The eldest was named Shakespeare because the family name had been lost when Judith married, but he died in infancy. Shakespeare’s Grandparents Grandfather (paternal): Richard ShakespeareGrandmother (maternal): Abigail (Webb) ShakespeareGrandfather (maternal): Robert Arden Above William’s parents in the family tree, information becomes a little sparse, especially for some of the women. We know that the Shakespeares were farmers—there is even a story of Williams grandfather getting in trouble for grazing too many cattle on common land. The Ardens, meanwhile, were a wealthy, noble family that owned some of the land Richard would have worked on. Shakespeare’s Living Descendants Wouldn’t it be great to discover that you are a descendant of the Bard? Technically, it is possible. The direct bloodline ends with William’s grandchildren who either did not marry or did not have children to continue the line. You have to look further up the family tree to William’s sister Joan, who married William Hart and had four children. This line continued and there are many of Joan’s descendants alive today. Could you be related to William Shakespeare?

Friday, May 8, 2020

The Effects Of Violence Against Women On North American...

Question: How do social norms contribute to the persistence of violence against women in North American society? Inter-disciplinary approach There are many factors that contribute to violence against women. There are obvious factors such as substance abuse by both the abused or the abuser that lead to violence. Cycles of poverty and the stresses that come with economic struggle are known factors in violence as well. Economic struggles inside and outside of the home are stresses and not only does violence happen in the household, but can also be present in the neighbour hood in general. These causes of violence are easily definable and readily researchable. If these situational issues were the only causes of violence against women, then there should be no instances of violence in educated, middle class society amongst people that do not have substance abuse issues. Since this is obviously not the case, what other factors cause violence to occur? To understand how the subtleties of social norms affect societies beliefs and behaviours an interdisciplinary approach is required to address all the areas affecting the attitudes of the population. We are a society that does not overtly condone violence against women and yet the problem persists. There is no one discipline that could cover the many facets of our social conscience that contributes to the underlying beliefs of society. To truly understand how a persons’ attitudes are developed and sustained we mustShow MoreRelatedDescribing Canada1135 Words   |  5 Pagesencountered many defining moments throughout its history. During the twentieth century women of Canada have undergone numerous moments that brought about significant changes for themselves. The most prominent moments, which brought about the most change and significance are: the persons case of 1928, the womens liberation movement throughout the 1960s and 70s and the ratification of the Treaty for Rights of Women (CEDAW) in 1981. These three events in Canadas history brought about many crucial changesRead MoreGulabi Gang and the Fight on Violence against Women1258 Words   |  5 PagesGulabi Gang and the Fight on Violence against Women In Uttar Pradesh, India, a group of women wearing pink saris and sticks called lathis (batons used by policemen) have been making news worldwide because of its radical method of beating abusive men / husbands to their wives with their sticks. This group of women is called the Gulabi or Pink Gang, and their objective is to provide justice to abused wives / women by beating their husbands with sticks (and in some instances, throwing chili to theirRead MoreHistory Of Violence Against Aboriginal Women1068 Words   |  5 PagesHistory of violence against Aboriginal women in Canada No analysis of violence against Indigenous women can be made without first looking at colonization as the antipasto of the conflict (Cooper Salomons 2010). â€Å"It is thus paramount to understand the context of colonisation in Canada in order to begin to understand the structural problems and barriers that lead to serious numbers of missing and murder Indigenous women in Canada.† (Cooper Salomons 2010, 31). When the Europeans first came to â€Å"turtleRead MoreThe Connection Between Western Capitalism And Mexican Femicide1614 Words   |  7 PagesGlobalized Violence: The Connection Between Western Capitalism and Mexican Femicide Globalization: a process of interaction between the social, economic and political systems of different nations, a process powered by international trade and investment. Some assert that globalization encourages the spread of more â€Å"enlightened and egalitarian† Western values and international tolerance, while others believe that this phenomenon harms more than it helps and fosters an uncontrolled and abusive economicRead MoreThe Lesson By Toni Cade Bambara1181 Words   |  5 PagesIn, The lesson by Toni Cade Bambara, Miss Moore, an African American women that lives in Harlem, takes a group of African American children who lives in her neighbourhood to a toy store called F.AO. Schwarz in Manhattan. Though Miss Moore teach the children many lessons, such as residential racial segregation, socio-economic inequality, and the children are apathetic of the severity of the effects of discrimination against African Americans as it is something that they do not notice due to thei r lackRead MoreMajor Causes And Consequences Of The American Civil War1443 Words   |  6 PagesEric Fung Mr. Ferretti APUSH 16 September 2015 1). Historical Causation (Cause and Effect): CE Explain the major causes and consequences of the American Civil War. In general, the American Civil War is thought to have started mostly because of a discrepancy on how to handle slavery. The difference in opinion is most likely a result of political, economic, and religious tension within the country. Before a civil war was even thought about, southern leaders spoke of freeing their slaves and manyRead MoreWomen s Shelter And North York Woman s Resource Centre1567 Words   |  7 PagesIntroduction In this paper, I compare and contrast two women-based organizations, Nellie’s Women’s Shelter and North York Women’s Resource Centre and provide a critical analysis of their structure through community engagement concepts. The paper focuses on critiquing the mandate of the two organizations, how they are similar and differ in their mandate, as well as identifying the problem that lies within. Additionally, I also critique the organizations’ source of funding and how it can be detrimentalRead MoreAmerican Society Today1717 Words   |  7 PagesThe society of America today is total different for most Americans then what it was during the 1950s , 1960s , 1970s and on into the 80s. America today is one were black people have the vote and have the same rites as white men and women. Today the leader of the free world is Black some thing that many though would never happen in there generation. But there are still inequality in America today. Urban ghettos are s till mostly full of uneducated black people. Black men in America are four times moreRead MoreSuffrage of African Americans in Red Summer written by Cameron McWhirter1113 Words   |  4 Pagessuffrage of African Americans after World War 1. At this time, blacks had been searching for peace and equality. Historian Cameron McWhirter in his book says, â€Å"many people—including black families with returning soldiers—fervently hoped 1919 would usher in a new epoch of peace, prosperity, and freedom.† Instead of getting what they wished for however, there was a series of violence such as lynchings and anti-black riots that swept around the country. World War 1 had a big effect on the life of blacksRead MoreGrand Theft Auto ( Gta )1496 Words   |  6 PagesTaylor Bernard Adam Junker English 101 SO3 5, May. 2016 Background: â€Å"Grand Theft Auto (GTA) is a long-running series of video games, published by Rockstar Games and developed by subsidiary companies. The games are primarily developed by Rockstar North (formerly DMA Design). There are currently sixteen games in the series, plus two expansion packs for the original and two expansions for GTA IV and including a multiplayer title. The games have been released for various platforms, including the PC

Wednesday, May 6, 2020

Beginners Guide for Zend Framework 2.0 Free Essays

Beginners Guide for Zend Framework 2. 0 When it comes to open source software and applications, Zend Framework is one of the most preferred platforms for web applications. Zend Framework 2. We will write a custom essay sample on Beginners Guide for Zend Framework 2.0 or any similar topic only for you Order Now 0 has been released to overcome the common issues of the previous version and provide an advanced framework for the development of web applications. You can expect a lot of new features including cloud computing, superior event management, and advanced features for event tracking. The Beginners Guide for Zend Framework 2. is a series which will help you in getting started with Zend Framework 2. 0. We are going to discuss each and every aspect of ZF2. 0 with practical example. What’s new in Zend Framework 2. 0 Before starting with ZF2. 0, let us find out what’s new in this version †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ New and refactored Autoloaders Improved Exception System Advance and refactored View Component New Cloud Infrastructure component New and advanced Event Manager component New Plugin Broker Strategy Rewritten Session Component New Dependency Injection Component Post 1 of series ——————————————————————————————————– How to setup Zend Framework 2. 0 Zend Framework 2. 0 is a whole new outfit for Zend Framework and you will find new components, renamed and changed components, and addition of advanced services for better web applications. You would be amazed with the bug fixes and error controlling components available with ZF2. 0. So you need a lot of modifications for this latest version and let us find out how to start working with ZF2. 0. Installing Zend framework 2. First of all you need to download the setup of ZF2. 0 and the best option is to download Zend Framework Minimal Package for Windows including PHP 5. 3 in it. Save the file in the library folder as library/zend. There are different methods f or installing ZF2. 0 on your machine: †¢ †¢ †¢ Installation Using Pear Installation Using Subversion (svn) Using Git Installation with Pear For the users having Pear enabled on their system, the best method of installing ZF 2. 0 is by using Pear and following two simple command as: pear channel-discover pear. zfcampus. org pear install zfcampus/zf Installation with Subversion (svn) Users having Subversion running on their system can download the software from public repository and you are not required to download the whole version, you can simply upgrade the frame work with new releases. Installing with Git Many programmers prefer Git for downloading the latest software upgrades and you can use Git for the latest version of ZF 2. 0. Getting ready for your first ZF Project Zend Framework has some specific system requirements like adding frame work in include_path and access to scripts located outside the document. You need to have a proper directory structure before starting with the project and let us find out the best directory structure for your first ZF project 1. docroot/ 2. index. php 3. application/ 4. 5. 6. 7. 8. 9. default/ controllers/ IndexController. php FooController. php models/ views/ 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. scripts/ index/ foo/ helpers/ filters/ blog/ controllers/ IndexController. php models/ views/ scripts/ index/ helpers/ filters/ news/ controllers/ IndexController. php ListController. hp models/ views/ scripts/ index/ list/ helpers/ Filters/ Each of the directories has a specific role and use, let us find out the importance of each of these directories Application: Application directory is meant for all the codes used for the application. Configs: This directory is responsible for the overall application. Modules: Modules are required for at different stages of development so make sure to create a di rectory for modules for any future requirements of the project. Data: Data directory is responsible for holding volatile and temporary data including sessions, logs, cache, and even the upload data. This directory will act as an easy to find data block for your application. Library: This directory is used for storing different libraries that are throughout the application. Add this directory in include_path for any reference and requirement. Scripts: Script directory is used for maintaining all the scripts including patches, command line, and cron scripts used in the application. Docs: This directory is created for storing data generated in the application and data directly used in the application. Setting Up bootstrap Bootstrap is the entry and exit point for all the command in any given applications including requests, response, route, and even dispatch commands. For setting up your Bootstrap, create index. php file and add the following code in your application. Background Process: First of all, you need to define all the main directories as contants for easy access and then initiate Zend/Application/Application for starting the application. The command bootstrap() is used for booting the application and then transfer the control to the original bootstrap of the application. For higher security, make sure to mention minimum details in index. php and try to keep all the logic in the bootstrap class created in your application directory. The next step in setting up ZF 2. 0 is to create the . htaccess file for handling and redirecting all the requests to bootstrap. Create . htaccess file for your project The main function of . htaccess file is redirect all the requests made in the project to the public bootstrap file. Before creating the file, you need to mention its global configuration like rewriting writes and similar permissions. You can do it by following method. Create a directive in your vhost file and provide permission for . htaccess to be parsed. allow override all none Now create public/. htaccess file with following code: Once you have created the . htaccess file for your application, you are ready to start with the project. Although there are some simple steps left in the process including setting up the application. ini file and then you can start with creating your first controller, how to input data from user, filter the data, validating data, and a lot of different things. Conclusion: ZF 2. 0 has a lot of quality upgrades as compared to the earlier version and the best way to use all of these features is to follow this guide step by step. There are many new features added in ZF 2. 0 which makes it a really powerful tool for developing impressive web applications. One of the most important additions is the advanced Event Manager and Cloud Infrastructure tool provided in ZF 2. 0. There is a lot to learn in this new feature packed Framework. Next Post Contents: †¢ †¢ Displaying information to user How to link pages together How to cite Beginners Guide for Zend Framework 2.0, Essay examples

Monday, April 27, 2020

Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen Essay Example

Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen Essay Research Proposal Why GSM Tech is more preferred than CDMA Tech in Yemen Prepared by: Khaled Al-Gahuri Prepared for: Dr. Murad Al-Nashmy Acknowledgement I am honored to prepare this research paper which titled â€Å"Why GSM Tech is more preferred than CDMA Tech in Yemen†. And I would like to pay my special thanks to Dr. Murad Abstract The cellular industry is in Yemen dominated by two technologies Global System for Mobile Communication (GSM) and Code Division Multiple Access (CDMA). This paper will provide an overview of the two different technologies and will focus on why people in Yemen preferred to use the GSM technology rather than CDM technology A even though CDMA technology introduced after GSM with a more privileges. 1 Table of Content ? ? Acknowledgement †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 Abstract†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 ? Chapter 1: Introduction ? ? ? ? ? Background †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3 Problem†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 Objectives†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Significance of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 Scope of study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4 ? Chapter 2: Literature Review ? ? ? ? ? Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 Consumer Choice†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 Perceived Service Quality†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 Choice of Handset†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 Hypothesis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 ? Chapter 3: Methodology ? ? ? ? ? ? ? ? Research Deign †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 Framework†¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Population An d Sampling†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 Data Collection†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 Data Analysis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 10 Time Schedule†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 Conclusion †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦15 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 2 Chapter 1 Background Introduction The mobile industry in Yemen is divided between the two technologies GSM and CDMA. While the earlier service providers had adopted the GSM technology, the new players have been using CDMA technology has notched up a significant share of the Yemen market. We will write a custom essay sample on Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The number of subscriber’s mobile industry has increased significantly since 2001. The first company lunched in Yemen introduced the GSM technology which was the only choose for Yemenis people to grant, but in 2005 other company has been lunched by the government introduced the CDMA technology which provide a better services for the clients with privileges to overcome the GSM technology. After around five years a big number of people have subscribed with CDMA, but GSM was still demonstrated the market with a bigger number of subscribers until nowadays. It is necessary for us to understand the basic differentiation of the two technologies as they may have an impact on the subscribers. GSM stand for Global System for Mobile Communications, one of the leading digital cellular systems. It uses narrow band TDMA, which allows eight simultaneous calls on the same radio frequency. GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency band. GSM was first introduced in 1991. As of the end of 1997, GSM service was available in more than 100 countries and has become the de facto standard in Europe and Asia. CDMA stand for Code-Division Multiple Access, a digital cellular technology that uses spread-spectrum techniques. Unlike competing systems, such as GSM, that use TDMA, CDMA does not assign a specific frequency to each user. Instead, every channel uses the full available spectrum. Individual conversations are encoded with a pseudo-random digital sequence. CDMA consistently provides better capacity for voice and data communications than other commercial mobile technologies, allowing more subscribers to connect at any given time, and it is the common platform on which 3G technologies are built. 3 Problem Statement The tendency of choosing The GSM technology over the CDMA in Yemen is very obvious. Thus, there is a need to identify the factors that can influence the choice patterns of either GSM technology or CDMA technology as well as why consumers prefer to choose GSM rather than CDMA even though CDMA is has more privileges and uses advanced techniques. Objectives Our main objectives of this study are as following: To identify and analyze the factors that can influence the choice patterns of either GSM technology or CDMA technology. To investigate the relationship between those factors. To find out why GSM is more preferred than CDMA. Significance of the Study This research will help to recognize the factors that lead to the lack of use CDMA technology in Yemen as well as this study can contribute to the body of knowledge by examining the different variables and implement them. Scope of study The scope of this study is basically limited to the consumers o the mobile industry in Yemen. 4 Chapter 2 Introduction Literature Review This chapter will bring a clear idea about the factors that can influence consumer choice such as perceived services quality, choice of handset as well as international roaming and their relationship. In addition some previous researches will be included. Consumer Choice The GSM Association is an international organization founded in 1987, dedicated to providing, developing, and overseeing the worldwide wireless standard of GSM. CDMA was established earlier and thus has a bit more coverage than GSM. However GSM networks continue to make inroads in Yemen. There are camps on both sides that firmly believe either GSM or CDMA architecture is superior to the other, Richard (2009) stated that there is no clear winner in the CDMA and GSM it all depends on your needs. There are many factors that could influence on consumer choice patterns, different factors have different influence on consumer, and these factors should be taken into consideration in order to formulate consumer choice patterns. Mobile sector must focus on customer satisfaction as serious marketing strategies (Lim, and Widdows, 2006). Nadine (2001) examined that attitude of the respondents using cell phones was not influenced by either education or occupation and income. Haque (2007) suggested that coverage, service quality, data transfer speed, and choice of handset play a main role during the time to choose either GSM or CDMA technology. Chris (2006) noted that in recent years the telecommunications market has witnessed major developments, with rapid expansion in access to telecommunications networks and a surge in the number of available services and applications. While many factors have contributed to the transformation of the telecommunications industry, competition has played a key role in driving telecom industry to develop new techniques, to innovate and to offer new services. 5 With the advent of cellular phones doing double and triple duty as streaming video devices, podcast receivers and email devices, Simon (2007) Stated that speed in data transfer is important to those who use the phone for more than making calls. Other thing advertisement can take a place when choosing technology Kalpana (2006) found that advertisement play a dominant role in influencing the customers. Perceived Service Quality Perceived service quality defined as a global judgment or attitude relating to the superiority of the service and it’s the rank to which the technology provides key customer requirement and how reliable those requirement are delivered(NQRC,2001). Basically consumers are adapted to the services that either GSM or CDMA could provide Kumar (2005), in his study analyzed that, services plays a major role in the telecom industry are the most active and attractive. In addition the quality of service is a driving of choice Seth et al (2006), in his study analyzed that there is relative importance of service quality attributes and showed that responsiveness is the most importance dimension followed by reliability, customer perceived network quality, assurance, convenience. The development of a reliable and valid instrument for assessing customer perceived service quality for cellular mobile services. (Backlund and Holmqvist, 2006) pointed that customer choice is achieved through good qualitative and quantitative services. Customer choice normally can indicate to customer response to the state of satisfaction and customer opinion of satisfied condition (Oliver, 2003). Palkar (2004) proposed that perceived services is an important factor that has greater influence on costumer choice. (Serkan 2005) determined that the balance of power between service quality and customer satisfaction with an emphasis on these two constructs is the concept that is different from the view of customer. Zeithaml and Bitner, 2002, indicated that both service quality and customer satisfaction have some things in common. Furthermore, Fornell et. al. ,(1998) reported that satisfaction is a consequence of service quality. 6 Choice of handset Liu (2002) found that the choice of a cellular phone is characterized by two attitudes: attitude towards the mobile phone brand on one hand and attitude towards the network on the other. Samuvel (2002) observed that most of the respondents consider coverage area, quality of services are an important factors for selecting the either GSM or CDMA while majority of the respondents are considered that choice if handset is the most important factor. Kalus stated that If you travel a lot to foreign countries, then GSM phone is better for you. Also santos(2006) indicated that GSM phones work more widely across the world than do CDMA models. International Roaming This is when you connect to an overseas network and calls are routed via that network provider instead of your home provider. Johson(2002) defined roaming as extension of connectivity service in a location that is different from the home location where the service was registered. Roaming ensures that the wireless device is kept connected to the network, without losing the connection. Roaming allows mobile wireless customers to automatically make and receive voice calls, send and receive data, or access other services, including home data services when they are outside of the area covered by their providers network regardless of their location. Forneil(2004) stated that roaming plays a major role in the quality of GSM/CDMA technology, Susan J. Campbell (2007) stated that there are number of different technology trends, but most significant is the rise of mobile roaming. Hypotheses The Hypotheses are developed based on Literature Review mentioned earlier to describe the relationship among these variables that influence on consumer choice. H1: There is positive/significant relationship between perceived services quality and consumer choice. H2: There is positive/significant relationship between international roaming and consumer choice. H3: There is positive/significant relationship between the choice of handset and consumer choice. 7 Chapter 3 Methodology - Source of Data The study undertaken to be mainly based on the primary data and secondary data. The primary data is collected directly from the target respondents through tructured questionnaire and personal interview. The secondary data for the study is collected from different sources such as technical and trade journals, articles, newspapers, magazines, internet, books, reports. RESEARCH DESIGN First and the most important phase in determining method of this research is designing phase. This phase should be given serious attention to make sure that the research can be done without mistakes. Designing includes choosing the best method for collecting, measuring, analyzing data. Quantitative method such as survey method has been used for collection data. Research Framework Perceive service quality Choice of Handset Choice of Technology International Roaming 8 Population and Sampling Research The population of this study is all the consumers who has cellular phone which a huge amount of number, in this case we use Exploratory and Random sampling to analyze data. ? Data Collection The data is collected randomly irrespective of the category of the people in the form of questionnaire and the sample size is 100 respondents. Because it is a pilot study and due to time constraint the sample size is small. ? Data Analysis From the questionnaires we have distributed we got the following results: Q1) which technology do you use? Technology GSM CDMA No. of respondents 78 22 90 80 70 60 50 40 30 20 10 0 GSM CDMA 9 Interpretation: Above data analysis shows that majority of the consumers that is approximately 78% are covered by GSM technology. Based on this result we trying to know why GSM is more preferred. Q2) Overall, how would you rate you both technologies? GSM CDMA EXCELLENT GOOD 40 25 18 22 AVERAGE 13 20 FAIR 10 20 40 35 30 25 20 15 10 5 0 excellent Good Avg Fair GSM CDMA Interpretation: From the graphic it depict that GSM is the most excellent technology. 10 Q3) Rank the following factors which influenced you the most: Roaming QoS Choice of handset 92 8 DATA SPEED 32 68 Range of coverage 41 59 GSM CDMA 67 22 62 38 100 90 80 70 60 50 40 30 20 10 0 roaming Service handset coverage GSM CDMA Interpretation: Above data analysis shows that GSM is being preferred because of its services, the choice of handset and the strength of roaming. Where CDMA is preferred because of its good range of coverage. 11 Q4) Rank the following Service which attracted you the most for tour choice either GSM or CDMA Brand GSM CDMA SMS Pack 60 40 Call rate 45 65 Internet 70 30 Other 67 33 70 60 50 40 GSM 30 20 10 0 SMS call rate Internet other CDMA Interpretation: from chart above it shows that GSM is more preferred from because of its aspects of the services. Where CDMA is preferred because of its call rate. 12 Q5) How satisfied are you with your choice of GSM/CDMA technology? Brand GSM CDMA Very satisfied 35 20 satisfied 60 30 Neutral 0 15 issatisfied 0 0 60 50 40 30 20 10 0 very satisfied satisfied Neutral dissatisfied GSM CDMA Interpretation: Above data analysis shows that the satisfaction rate of technology is leaded by GSM as not a single user of service is neutral or dissatisfy. In other hand CDMA seems to be good satisfied with zero dissatisfies but there are around 15 respondents who are neutral. 13 Conclusion As per my analysis I noti ced that the main factors that makes GSM technology more preferred are the mobile choice of handset and the quality of service regardless the range of coverage and the price rate. Other thing I noticed that are the mobile choice of handset and the value of service has a strong relationship Conclusion of the topic is that maturity of customers is using GSM technology because of its good network roaming availability and quality of services and the wide choice of handset. Mostly customers have considered GSM is one of the best services provided in Yemen because other factors and efficient services. ? Time Schedule 15th February, 2012 Data Collection Problem Statement Objectives Literature Review Methodology Whole report 30th February , 2012 13th March, 20th March, 2012 2012 1 April, 2012 ? ? ? ? 14 ? References 1. Jallet, Frederic, intelecommunications†,(http://www. emeraldinsight. com/Insight/viewContentItem. do; jsessionid=236E2B6B45CF101465D540FD4401AEB9? 2. Debnath, Roma Mitra, â€Å"Benchmarking telecommunication service in India†, 2008(http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid=236E2 B6B45CF101465D540FD4401AEB 3 Rob ins, Fread, â€Å"The marketing of 3G†, vol 21, no 6, 2008 http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid=236E2B6B45 CF101465D540FD4401AEB9? 4. Kalwani, Banumathy, â€Å"Consumer’s Attitude towards Cell phone Services†, 2006 . Fernandez, Fronnie, Understanding Dynamics in an Evolving 2007(http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid=208652 7F0757A565F9A6CBAC8800F658? 6. Seth et, Etal, â€Å"Managing the Customer Perceived Service Quality for Cellular MobileTelephone: an Empirical Investigation†, 2008(http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid=208652 7F0757A565F9A6CBAC8800F658? 7. Tecor, Jha, Understanding Mobile Phone Usage Pattern among CollegeGoers†,2008(http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid= 2086527F0757A565F9A6CBAC8800F658? 15 Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen Essay Example Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen Essay Research Proposal Why GSM Tech is more preferred than CDMA Tech in Yemen Prepared by: Khaled Al-Gahuri Prepared for: Dr. Murad Al-Nashmy Acknowledgement I am honored to prepare this research paper which titled â€Å"Why GSM Tech is more preferred than CDMA Tech in Yemen†. And I would like to pay my special thanks to Dr. Murad Abstract The cellular industry is in Yemen dominated by two technologies Global System for Mobile Communication (GSM) and Code Division Multiple Access (CDMA). The number of subscriber’s mobile industry has increased significantly since 2001. The first company lunched in Yemen introduced the GSM technology which was the only choose for Yemenis people to grant, but in 2005 other company has been lunched by the government introduced the CDMA technology which provide a better services for the clients with privileges to overcome the GSM technology. After around five years a big number of people have subscribed with CDMA, but GSM was still demonstrated the market with a bigger number of subscribers until nowadays. It is necessary for us to understand the basic differentiation of the two technologies as they may have an impact on the subscribers. GSM stand for Global System for Mobile Communications, one of the leading digital cellular systems. It uses narrow band TDMA, which allows eight simultaneous calls on the same radio frequency. GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency band. We will write a custom essay sample on Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Why Gsm Tech Is More Preferred Than Cdma Tech in Yemen specifically for you FOR ONLY $16.38 $13.9/page Hire Writer GSM was first introduced in 1991. As of the end of 1997, GSM service was available in more than 100 countries and has become the de facto standard in Europe and Asia. CDMA stand for Code-Division Multiple Access, a digital cellular technology that uses spread-spectrum techniques. Unlike competing systems, such as GSM, that use TDMA, CDMA does not assign a specific frequency to each user. Instead, every channel uses the full available spectrum. Individual conversations are encoded with a pseudo-random digital sequence. CDMA consistently provides better capacity for voice and data communications than other commercial mobile technologies, allowing more subscribers to connect at any given time, and it is the common platform on which 3G technologies are built. 3 Problem Statement The tendency of choosing The GSM technology over the CDMA in Yemen is very obvious. Thus, there is a need to identify the factors that can influence the choice patterns of either GSM technology or CDMA technology as well as why consumers prefer to choose GSM rather than CDMA even though CDMA is has more privileges and uses advanced techniques. Objectives Our main objectives of this study are as following: To identify and analyze the factors that can influence the choice patterns of either GSM technology or CDMA technology. To investigate the relationship between those factors. To find out why GSM is more preferred than CDMA. Significance of the Study This research will help to recognize the factors that lead to the lack of use CDMA technology in Yemen as well as this study can contribute to the body of knowledge by examining the different variables and implement them. Scope of study The scope of this study is basically limited to the consumers o the mobile industry in Yemen. 4 Chapter 2 Introduction Literature Review This chapter will bring a clear idea about the factors that can influence consumer choice such as perceived services quality, choice of handset as well as international roaming and their relationship. In addition some previous researches will be included. Consumer Choice The GSM Association is an international organization founded in 1987, dedicated to providing, developing, and overseeing the worldwide wireless standard of GSM. CDMA was established earlier and thus has a bit more coverage than GSM. However GSM networks continue to make inroads in Yemen. There are camps on both sides that firmly believe either GSM or CDMA architecture is superior to the other, Richard (2009) stated that there is no clear winner in the CDMA and GSM it all depends on your needs. There are many factors that could influence on consumer choice patterns, different factors have different influence on consumer, and these factors should be taken into consideration in order to formulate consumer choice patterns. Mobile sector must focus on customer satisfaction as serious marketing strategies (Lim, and Widdows, 2006). Nadine (2001) examined that attitude of the respondents using cell phones was not influenced by either education or occupation and income. Haque (2007) suggested that coverage, service quality, data transfer speed, and choice of handset play a main role during the time to choose either GSM or CDMA technology. Chris (2006) noted that in recent years the telecommunications market has witnessed major developments, with rapid expansion in access to telecommunications networks and a surge in the number of available services and applications. While many factors have contributed to the transformation of the telecommunications industry, competition has played a key role in driving telecom industry to develop new techniques, to innovate and to offer new services. 5 With the advent of cellular phones doing double and triple duty as streaming video devices, podcast receivers and email devices, Simon (2007) Stated that speed in data transfer is important to those who use the phone for more than making calls. Other thing advertisement can take a place when choosing technology Kalpana (2006) found that advertisement play a dominant role in influencing the customers. Perceived Service Quality Perceived service quality defined as a global judgment or attitude relating to the superiority of the service and it’s the rank to which the technology provides key customer requirement and how reliable those requirement are delivered(NQRC,2001). Basically consumers are adapted to the services that either GSM or CDMA could provide Kumar (2005), in his study analyzed that, services plays a major role in the telecom industry are the most active and attractive. In addition the quality of service is a driving of choice Seth et al (2006), in his study analyzed that there is relative importance of service quality attributes and showed that responsiveness is the most importance dimension followed by reliability, customer perceived network quality, assurance, convenience. The development of a reliable and valid instrument for assessing customer perceived service quality for cellular mobile services. (Backlund and Holmqvist, 2006) pointed that customer choice is achieved through good qualitative and quantitative services. Customer choice normally can indicate to customer response to the state of satisfaction and customer opinion of satisfied condition (Oliver, 2003). Palkar (2004) proposed that perceived services is an important factor that has greater influence on costumer choice. (Serkan 2005) determined that the balance of power between service quality and customer satisfaction with an emphasis on these two constructs is the concept that is different from the view of customer. Zeithaml and Bitner, 2002, indicated that both service quality and customer satisfaction have some things in common. Furthermore, Fornell et. al. ,(1998) reported that satisfaction is a consequence of service quality. 6 Choice of handset Liu (2002) found that the choice of a cellular phone is characterized by two attitudes: attitude towards the mobile phone brand on one hand and attitude towards the network on the other. Samuvel (2002) observed that most of the respondents consider coverage area, quality of services are an important factors for selecting the either GSM or CDMA while majority of the respondents are considered that choice if handset is the most important factor. Kalus stated that If you travel a lot to foreign countries, then GSM phone is better for you. Also santos(2006) indicated that GSM phones work more widely across the world than do CDMA models. International Roaming This is when you connect to an overseas network and calls are routed via that network provider instead of your home provider. Johson(2002) defined roaming as extension of connectivity service in a location that is different from the home location where the service was registered. Roaming ensures that the wireless device is kept connected to the network, without losing the connection. Roaming allows mobile wireless customers to automatically make and receive voice calls, send and receive data, or access other services, including home data services when they are outside of the area covered by their providers network regardless of their location. Forneil(2004) stated that roaming plays a major role in the quality of GSM/CDMA technology, Susan J. Campbell (2007) stated that there are number of different technology trends, but most significant is the rise of mobile roaming. Hypotheses The Hypotheses are developed based on Literature Review mentioned earlier to describe the relationship among these variables that influence on consumer choice. H1: There is positive/significant relationship between perceived services quality and consumer choice. H2: There is positive/significant relationship between international roaming and consumer choice. H3: There is positive/significant relationship between the choice of handset and consumer choice. 7 Chapter 3 Methodology - Source of Data The study undertaken to be mainly based on the primary data and secondary data. The primary data is collected directly from the target respondents through tructured questionnaire and personal interview. The secondary data for the study is collected from different sources such as technical and trade journals, articles, newspapers, magazines, internet, books, reports. RESEARCH DESIGN First and the most important phase in determining method of this research is designing phase. This phase should be given serious attention to make sure that the research can be done without mistakes. Designing includes choosing the best method for collecting, measuring, analyzing data. Quantitative method such as survey method has been used for collection data. Research Framework Perceive service quality Choice of Handset Choice of Technology International Roaming 8 Population and Sampling Research The population of this study is all the consumers who has cellular phone which a huge amount of number, in this case we use Exploratory and Random sampling to analyze data. ? Data Collection The data is collected randomly irrespective of the category of the people in the form of questionnaire and the sample size is 100 respondents. Because it is a pilot study and due to time constraint the sample size is small. ? Data Analysis From the questionnaires we have distributed we got the following results: Q1) which technology do you use? Technology GSM CDMA No. of respondents 78 22 90 80 70 60 50 40 30 20 10 0 GSM CDMA 9 Interpretation: Above data analysis shows that majority of the consumers that is approximately 78% are covered by GSM technology. Based on this result we trying to know why GSM is more preferred. Q2) Overall, how would you rate you both technologies? GSM CDMA EXCELLENT GOOD 40 25 18 22 AVERAGE 13 20 FAIR 10 20 40 35 30 25 20 15 10 5 0 excellent Good Avg Fair GSM CDMA Interpretation: From the graphic it depict that GSM is the most excellent technology. 10 Q3) Rank the following factors which influenced you the most: Roaming QoS Choice of handset 92 8 DATA SPEED 32 68 Range of coverage 41 59 GSM CDMA 67 22 62 38 100 90 80 70 60 50 40 30 20 10 0 roaming Service handset coverage GSM CDMA Interpretation: Above data analysis shows that GSM is being preferred because of its services, the choice of handset and the strength of roaming. Where CDMA is preferred because of its good range of coverage. 11 Q4) Rank the following Service which attracted you the most for tour choice either GSM or CDMA Brand GSM CDMA SMS Pack 60 40 Call rate 45 65 Internet 70 30 Other 67 33 70 60 50 40 GSM 30 20 10 0 SMS call rate Internet other CDMA Interpretation: from chart above it shows that GSM is more preferred from because of its aspects of the services. Where CDMA is preferred because of its call rate. 12 Q5) How satisfied are you with your choice of GSM/CDMA technology? Brand GSM CDMA Very satisfied 35 20 satisfied 60 30 Neutral 0 15 issatisfied 0 0 60 50 40 30 20 10 0 very satisfied satisfied Neutral dissatisfied GSM CDMA Interpretation: Above data analysis shows that the satisfaction rate of technology is leaded by GSM as not a single user of service is neutral or dissatisfy. In other hand CDMA seems to be good satisfied with zero dissatisfies but there are around 15 respondents who are neutral. 13 Conclusion As per my analysis I noti ced that the main factors that makes GSM technology more preferred are the mobile choice of handset and the quality of service regardless the range of coverage and the price rate. Other thing I noticed that are the mobile choice of handset and the value of service has a strong relationship Conclusion of the topic is that maturity of customers is using GSM technology because of its good network roaming availability and quality of services and the wide choice of handset. Mostly customers have considered GSM is one of the best services provided in Yemen because other factors and efficient services. ? Time Schedule 15th February, 2012 Data Collection Problem Statement Objectives Literature Review Methodology Whole report 30th February , 2012 13th March, 20th March, 2012 2012 1 April, 2012 ? ? ? ? 14 ? References 1. Jallet, Frederic, intelecommunications†,(http://www. emeraldinsight. com/Insight/viewContentItem. do; jsessionid=236E2B6B45CF101465D540FD4401AEB9? 2. Debnath, Roma Mitra, â€Å"Benchmarking telecommunication service in India†, 2008(http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid=236E2 B6B45CF101465D540FD4401AEB 3 Rob ins, Fread, â€Å"The marketing of 3G†, vol 21, no 6, 2008 http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid=236E2B6B45 CF101465D540FD4401AEB9? 4. Kalwani, Banumathy, â€Å"Consumer’s Attitude towards Cell phone Services†, 2006 . Fernandez, Fronnie, Understanding Dynamics in an Evolving 2007(http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid=208652 7F0757A565F9A6CBAC8800F658? 6. Seth et, Etal, â€Å"Managing the Customer Perceived Service Quality for Cellular MobileTelephone: an Empirical Investigation†, 2008(http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid=208652 7F0757A565F9A6CBAC8800F658? 7. Tecor, Jha, Understanding Mobile Phone Usage Pattern among CollegeGoers†,2008(http://www. emeraldinsight. com/Insight/viewContentItem. do;jsessionid= 2086527F0757A565F9A6CBAC8800F658? 15

Thursday, March 19, 2020

Waking Up From A Midsummer Nights Dream Essays - Free Essays

Waking Up From A Midsummer Night's Dream Essays - Free Essays Waking Up From A Midsummer Night's Dream As with every play we read this quarter, we started A Midsummer Night s Dream with only a text. Reading the script is the foundation of Shakespeare, and the least evolved of the ways that one can experience it. There is no one to interpret the words, no body movement o!r voice inflection to indicate meaning or intention. All meaning that a reader understands comes from the words alone. The simplicity of text provides a broad ground for imagination, in that every reader can come away from the text with a different conception of what went on. The words are merely the puzzle pieces individuals put together to bring coherence and logic to the play. Although we all read generally the same words, we can see that vastly different plays arise depending on who interprets them. By interpreting the word-clues that Shakespeare wrote into the script to direct the performance of the play, we were able to imagine gestures, expressions, and movements appropriate to the intention of the playwright. An example of this can be seen in the different Romeo and Juliets: Luhrman clearly had a more modern vision after reading the script than did Zeffirelli did only 18 years before. The live performance at the CalPoly theatre also carried !with it a very different feel less intense, more child-like and sweet with nearly the same words. Reading also affects our experience in that without the text, we would most likely not be able to enjoy Shakespeare at all; having the text makes Shakespeare widely accessible (available for free on the web) to all that desire it. Once the script is obtained, anyone can perform Shakespeare even everyday, non-actor citizens put on Shakespeare whether it be in parks, at school, or in a forest. My experience reading Shakepearean plays has shown me that reading is necessary and fundamental part of grasping the fullness of the works. I had wanted to read A Midsummer Night's Dream for quite some time. Besides being a play by Shakespeare, I believe my desire to do so came from seeing bits and pieces of it done in Hollywood movies like Dead Poet's Society. I didn't realize how much small exposures like! those could cause me to prejudge the actual text; after I had read the play for myself I was surprised at how much the text differed from my expectations. Not knowing the whole of the plot, but rather only bits and pieces, I expected a play filled with fairy dust and pixy-women toe-dancing, laughing, with flowers everywhere, or something like Hylas and the nymphs. What I did not expect was a group of rag-tag laborers putting on a play, young females catfighting over their men, or Titania being enamored of an ass. (Act IV, Scene i, MND) Even with surprises, though, the text by itself held little detail and richness in my mind. I thought it a decent play, but certainly nothing like I had hoped, and I didn't feel involved in it or connected to it in any way. One of the things that did impressed me, though, was finding out for myself how accessible Shakespeare actually is. When it came time for me to learn my lines for Philostrate (MND), I copied them from a site on the internet which posted the text in its entirety. I realized the!n how lucky we are that plays like these survived through the ages, sometimes probably making it from one hand to the next in a form no better than the paperback I carried in my bag. Through my reading, the importance of the text was impressed upon me, and I feel that I have gained a new appreciation for the lasting and foundational qualities of pure script. Viewing Viewing a play adds a kind of second dimension to a textual reading. While our primary impressions of a Shakespearean play are established with the initial reading, those impressions are challenged when we come into contact with a play performed. At this point we have a first hand contrast between how we felt and how someone else felt about the same play. Once we have sampled another's interpretations we necessarily question ourselves on what we would have done differently, had we directed the play. Perhaps something we expected to see on stage was omitted; perhaps! something unusual was added. We might even sample the same play dozens of times, all performed by different companies; it is common, it is even expected, that none of the twelve interpretations will be much the same. Unlike

Tuesday, March 3, 2020

Battle of the River Plate - World War II

Battle of the River Plate - World War II The Battle of the River Plate was fought December 13, 1939, during World War II (1939-1945). With World War II looming, the German Deutschland-class cruiser Admiral Graf Spee was dispatched from Wilhelmshaven to the South Atlantic. On September 26, three weeks after hostilities commenced, Captain Hans Langsdorff received orders to begin commerce raiding operations against Allied shipping. Though classified as a cruiser, Graf Spee was the product the treaty restrictions placed on Germany after World War I which prevented the Kriegsmarine from building warships exceeding 10,000 tons. Utilizing a variety of new construction methods to save weight, Graf Spee was powered by diesel engines instead of the typical steam engines of the day. While this allowed it to accelerate more rapidly than most ships, it required the fuel to be processed and cleaned before use in the engines. The separation system for processing the fuel was placed aft of the funnel but above the ships deck armor. For armament, Graf Spee mounted six 11-inch guns making it much more powerful than a normal cruiser. This increased firepower led British officers to refer to the smaller Deutschland-class ships as pocket battleships. Royal Navy Commodore Henry Harwood1 heavy cruiser, 2 light cruisers Kriegsmarine Captain Hans Langsdorff1 pocket battleship Tracking Graf Spee Obeying his orders, Langsdorff immediately began intercepting Allied shipping in the South Atlantic and southern Indian Oceans. Having success, Graf Spee captured and sank several Allied vessels, leading the Royal Navy to dispatch nine squadrons south to find and destroy the German ship. On December 2, the Blue Star liner Doric Star succeeded in radioing a distress call before being taken by Graf Spee off South Africa. Responding to the call, Commodore Henry Harwood, leading the South American Cruiser Squadron (Force G), anticipated than Langsdorff would next move to strike the River Plate estuary. The Ships Clash Steaming towards the South American coast, Harwoods force consisted of the heavy cruiser HMS Exeter and the light cruisers HMS Ajax (flagship) and HMS Achilles (New Zealand Division). Also available to Harwood was the heavy cruiser HMS Cumberland which was refitting in the Falkland Islands. Arriving off the River Plate on December 12, Harwood discussed battle tactics with his captains and began maneuvers in search of Graf Spee. Though aware that Force G was in the area, Langsdorff moved towards the River Plate and was spotted by Harwoods ships on December 13. Initially unaware that he was facing three cruisers, he ordered Graf Spee to accelerate and close with the enemy. This ultimately proved a blunder as Graf Spee could have stood off and hammered the out-ranged British ships with its 11-inch guns. Instead, the maneuver brought the pocket battleship within the range of Exeters 8-inch and the light cruisers 6-inch guns. With the German approach, Harwoods ships implemented his battle plan which called for Exeter to attack separately from the light cruisers with the goal of splitting Graf Spees fire. At 6:18 AM, Graf Spee opened fire on Exeter. This was returned by the British ship two minutes later. Shortening the range, the light cruisers soon joined the fight. Firing with a high degree of accuracy the German gunners bracketed Exeter with their third salvo. With the range determined, they hit the British cruiser at 6:26, putting its B-turret out of action and killing all of the bridge crew except the captain and two others. The shell also damaged the ships communications network requiring conning instructions to be passed via a chain of messengers. Crossing in front of Graf Spee with the light cruisers, Harwood was able to draw fire off Exeter. Using the respite to mount a torpedo attack, Exeter was soon hit by two more 11-inch shells which disabled A-turret and started fires. Though reduced to two guns and listing, Exeter succeeded in striking Graf Spees fuel processing system with an 8-inch shell. Though his ship appeared largely undamaged, the loss of the fuel processing system limited Langsdorff to sixteen hours of usable fuel. Around 6:36, Graf Spee reversed its course and began laying smoke as it moved west. Continuing the fight, Exeter was effectively put out of action when water from a near miss shorted out the electrical system of its one functioning turret. To prevent Graf Spee from finishing off the cruiser, Harwood closed with Ajax and Achilles. Turning to deal with the light cruisers, Langsdorff returned their fire before withdrawing under another smokescreen. After diverting another German attack on Exeter, Harwood unsuccessfully attacked with torpedoes and suffered a hit on Ajax. Pulling back, he decided to shadow the German ship as it moved west with the goal of attacking again after dark. Following at a distance for the remainder of the day, the two British ships occasionally exchanged fire with Graf Spee. Entering the estuary, Langsdorff made a political error in making port at Montevideo in neutral Uruguay rather than the friendlier Mar del Plata, Argentina to the south. Anchoring a little after midnight on December 14, Langsdorff asked the Uruguayan government for two weeks to make repairs. This was opposed by British diplomat Eugen Millington-Drake who argued that under the 13th Hague Convention Graf Spee should be expelled from neutral waters after twenty-four hours. Trapped in Montevideo Advised that few naval resources were in the area, Millington-Drake continued to press for the ships expulsion publically while British agents arranged to have British and French merchant ships sail every twenty-four hours. This invoked Article 16 of the convention which stated: A belligerent war-ship may not leave a neutral port or roadstead until twenty-four hours after the departure of a merchant ship flying the flag of its adversary. As a result, these sailings held the German ship in place while additional forces were marshaled. While Langsdorff lobbied to for time to repair his ship, he received a variety of false intelligence which suggested the arrival of Force H, including the carrier HMS Ark Royal and battlecruiser HMS Renown. While a force centered on Renown was en route, in reality, Harwood had only been reinforced by Cumberland. Completely deceived and unable to repair Graf Spee, Langsdorff discussed his options with his superiors in Germany. Prohibited from allowing the ship to be interned by the Uruguayans and believing that certain destruction awaited him at sea, he ordered Graf Spee scuttled in the River Plate on December 17. Aftermath of the Battle The fighting off the River Plate cost Langsdorff 36 killed and 102 wounded, while Harwoods ships lost 72 killed and 28 wounded. Despite severe damage, Exeter made emergency repairs in the Falklands before undergoing a major refit in Britain. The ship was lost following the Battle of the Java Sea in early 1942. With their ship sunk, the crew of Graf Spee was interned in Argentina. On December 19, Langsdorff, seeking to avoid allegations of cowardice, committed suicide while lying on the ships ensign. Following his death, he was given a full funeral in Buenos Aires. An early victory for the British, the Battle of the River Plate ended the threat of German surface raiders in the South Atlantic. Sources Royal New Zealand Navy: Battle of the River PlateLangsdorff of the Graf Spee

Saturday, February 15, 2020

Why is there a higher prevalence of lupus SLE found among females of Literature review

Why is there a higher prevalence of lupus SLE found among females of Afro Carribbean origins - Literature review Example These hormonal imbalances have the capability of changing the genetic makeup of an individual, resulting to the development of Lupus SLE. However, it is important to explain that genetics alone is not the factor responsible for the development of Lupus SLE amongst women. Another important factor is the environment. The environment plays a role in the development of Lupus SLE because of the ultra violet rays of the sun. Research indicates that women, who are heavily exposed to the ultra violet rays of the sun, are always vulnerable to developing Lupus SLE. In terms of ethnicity, Lupus is more common in people of African descent. One of the major reasons advanced, is because of the high rates of poverty amongst these people, making them to be unable to afford medical treatments in regard to the type of contraceptives to use. In as much as this is information that has been given, this fact is disputed, because hormonal changes are not the only factors responsible for the high rate of Lupus amongst women. This paper is a critical analysis of the ethnic and sex differences in the epidemiology and clinical course of lupus. This paper will analyze the ethnic and sex differences in the clinical and epidemiology course of Lupus. In meeting the objective of this paper, there will be a need of understanding the genetic predisposition of Lupus. This is important in helping us to understand why women and people of African origin are vulnerable to an attack by Lupus. Furthermore, for purposes of understanding this disease, and its epidemiological and clinical cause, there will be a need of identifying its causes. These are well explained in this paper. This paper would also identify and explain the neuropsychiatric consequences of lupus, and an example is the Lupus fog. It would further explain the epidemiology of this disease, and this is in relation to

Sunday, February 2, 2020

The ethics of whistle-Blowing Essay Example | Topics and Well Written Essays - 500 words

The ethics of whistle-Blowing - Essay Example These are people within the organization that see violations in business policies and report them to the relevant authorities. Many things are brought about by this behavior, ranging from honest business practices to mistrust among co-workers. There are certain considerations that have to be made when reporting malpractices in the business. Whistleblowing affects the way the business relates to its environment, and the way co-workers relate with each other. Whistleblowing is the act of reporting a malpractice, wrongdoing or risk to the police, employer, customer, or a regulator (Davis, 2006). There are many instances, such as these found in an article about ethics by Verschoor (2013). An example of a case found in the article is one where an employee reported his employer for malpractices. In New York, Mohanbhai Ramchandani reported his employer and celebrity tailor Ramchandani for not reporting all of his profits in sales and taxes. According to Verschoor (2013), the employee was paid $1.1 million dollars for whistleblowing. Based on the analysis of this case, whistleblowing was the correct decision. This is because no one else can identify fraud apart from the people in the organization (Bouville, 2007). There could be acts involving corruption affecting, honest business practices that go against the law. Therefore, it is necessary for people to monitor business practices and report unhealthy business forms. The act of whistleblowing is an act involving business ethics that has its benefits and demerits (Davis, 2006). A benefit of whistleblowing is that it protects investors of businesses from people that look to mismanage money for their own benefits. Unsuspecting customers also benefit from people who report malpractices in business. For example, a whistleblower protects patients from a doctor who overcharges for services and uses questionable means in administering

Saturday, January 25, 2020

Personal Identity and Its Effect on Pre-procedural Anxiety

Personal Identity and Its Effect on Pre-procedural Anxiety 1.0 Introduction In contemporary healthcare systems, one of the key ways of diagnosing and treating medical conditions is through invasive and minimally invasive procedures on patients. Some of these procedures are accessing the intravenuous system for treatment (venipunctures), blood collection for investigations (phlebotomy), lumbar punctures and biopsies. Regardless of age, sex or ethnicity, patients endure anxiety and pain associated with these invasive procedures (American Pain Society, 2001). In spite of minimal tissue damage in these procedures, anxiety about the procedure and associated pain, may cause considerable distress in patients. This may affect the coping mechanism, even in a well functioning individual. This has been studied by McCleane and Cooper (1990), Augustin and Haynes (1996) and Garbee (2000). A number of researches have been conducted to determine and control anxiety in patients who are subjected to such procedures. Based on these studies, patient education programs (McDonald and Green, 2002), alternative therapies (Noreed, 2000), pharmaceutical therapies (Smith and Pittaway, 2002) and musical therapies (Elliot, 2004) have been proposed to a varying extent. An important point to note is that musical therapies, education programs and patient educational programs may be time-consuming and may be of limited practicality in a busy hospital environment. On the other hand, pharmaceutical therapies may cause side-effects associated with drugs. Therefore, a simplistic approach, which could provide comfort and relieve the pre-procedural anxiety, is the need of this surgical era. No research has been found on invoking personal identity and its effect on pre-procedural anxiety. Therefore, this research aims to fulfill this gap. Hospitals and health care institutions are unpleasant environments with a general appearance of illness and death. It is an environment where one is separated by friends and family and is surrounded by strangers. A person who is being subjected to a procedure at a hospital may already contemplate on the potential illness that the person may be subjected to. This may lead to a temporary feeling of anxiety (Coyle, 1999). According to Spielberger et al (1970) anxiety is divided into two factors, state anxiety (also known as somatic anxiety) and trait anxiety. State anxiety is temporary or circumstantial arousal and trait anxiety is the permanent change of personality characteristics associated with anxiety. According to Kent (1998), state anxiety may cause physiological arousal, and activation of the sympathetic nervous system and the hypothalamic pituitary adrenal axis. This is characterized by increased pulse rate, blood pressure, respiratory rate and increase cardiac output (Bally et al, 2003). Research by Hayes et al (2003), asserts that reducing the state anxiety is important before a diagnostic procedure to promote relaxation and to prevent possible complications; such as procedure becoming more painful, difficult, prolonged and increased probability of after effects. When a procedure becomes difficult to administer, doctors may also postpone or cancel the procedure, placing the patient at a dis advantage. Addressing patients’ emotions through an evidence-based management is important for nurses to increase the patient outcome. Psychosocial nursing interventions, emotional presence and establishment of trust between the nurses and the patient, has the potential to mitigate patient’s fear and anxiety or stress to a greater level. 1.1 Pain and Anxiety Associated with Invasive Procedures Studies have concluded that pain associated with a procedure may be severe than that actual illness that needs investigation (Finley and Scheter, 2003). The procedure itself may have an effect on the pain that is experienced by the patient, which is based on the patient’s perception, which in turn, can be influenced by factors including past experience, psychological state, hearsay knowledge and the patient’s level of understanding (Rawe et. al., 2009). According to Brennan, Carr and Cousins (2007), effects of pain can be short and long-term, which are not gender, age or ethnicity-specific. A number of studies have confirmed the psychological effects of pain, which include anxiety, anger and fear as well as physical effects, such as changes in metabolic functions, heart functions and functions related to blood (Ferrell, 2005; Gordon et al., 2005; Mertin, et.al., 2007). Most common long-term effects of pain are, insomnia and depression (Berenholtz, et. al., 2002). Several studies have noted that there is a positive relationship between anxiety and pain, in a clinical setting (Sternbach, 1968; Melzack, 1973). According to Kain et. al. (2001), severity levels of pain are directly proportionate to anxiety levels due to activities in the hippocampal network, which causes behavioural conflict in the brain. This is resolved by sending and amplification signal to the neural representation of the painful event, which causes anxiety in the pe rson. This was verified by Ploghaus et. al. (2001) using a series of event-related functional magnetic resonance imaging (FMRI) studies, which concluded that anxiety-induced hyperalgesia is associated with activation in the entorhinal cortex of the hippocampal formation. Van den Broek, Hejimans and Van Assen (2012) focused on the emotional distress caused by the procedure of implanting a cardioverter defibrillator (ICD), an invasive procedure, in 343 patients.. All subjects demonstrated distress through anxiety and depression immediately after the procedure as well as during follow-up timelines. 1.2 Psychological Techniques used to Reduce Pre-procedural Anxiety Healthcare personnel have discovered a number of methods to reduce anxiety of patients through psychological intervention techniques. One of the methods employed by clinical nurses is through therapeutic touch. Cox and Hayes (1997) performed a quasi-experimental study based on patients at a district General Hospital in East London, which concluded that therapeutic touch aids in reducing anxiety of the patients. Another method which has been researched is, on the effect of music as an intervention for reducing the pre-procedural anxiety in hospitalized adult patients (Gillen, Billey Allen, 2008). This was performed through Randomized Controlled Trials (RCTs) of 832 adult patients The researchers concluded that psychological outcomes show anxiety was reduced to a greater extent as a result of music listening interventions, demonstrated by reduction of blood pressure, respiration rate and heart rate. A study performed by Hawley (2009), explored nurse strategies which were perceived as comforting by patients. The sample size was 14 patients in the emergency department of a hospital in New York. The study concluded that positive talk, vigilance and attending to physical discomforts were among the top five factors that reduced anxiety. Hawley (2009) concluded that the study â€Å"supports the provision of comfort as an integral part of emergency nursing practice and a critical aspect of care.† A research with 580 mentally alert adults were selected for a study by Whelchel (2004) to identify the effect of caring behaviour by nurses on ED patients. At the end of the study and data analysis, the researchers reported that treating the patients like an individual, was considered to be the most important trait in reducing the anxiety of emergency room patients, followed by knowing what they were doing, being kind and considerate, treating the patient with respect, giving the patient their full attention, knowing how to administer injections and insert intravenous catheters. 1.3 Self Esteem and Anxiety From the beginnings of scientific psychology, the idea that people wish to maintain high levels of self-esteem has been a central theme in many studies (Horney, 1937; James, 1890). The idea of self-esteem generally means one’s own evaluation of him or herself. Self-esteem is also seen as a critical function for social and mental well-being of a person. Self-esteem induces and maintains personal goals and motivations and according to a study by Mann et. al. (2001), conclusive evidence exists that self-esteem leads to better mental health. Mann et.al. (2001) assert that a series of psychological problems, both internalizing and externalizing can be caused by poor self-esteem. The researchers conclude that self-esteem acts as a protective factor and is a core element in the promotion of mental health. Greenberg, Pyszczynski and Solomon (1986) argue that self-esteem provides a buffer against anxiety, focusing primarily on the fear of human beings towards mortality. Through empirical evidence, the researchers have concluded high-level of self-esteem reduces anxiety and behaviour that relates to anxiety. Three studies were conducted by Greenberg, et. al. (1992:1, 1992:2, 1993) to identify the direct evidence for the effect of self-esteem on anxiety. In the first study (Greenberg et. al., 1992:1), participants received positive and negative feedback about their personality, which was false. Then one group was shown a video which threatens of death, whereas the second group was shown a neutral video. The dependent variable in this study was state anxiety and the hypothesis was that bolstering self-esteem would reduce anxiety in response to the threat. The study concluded that participants with low self-esteem had the highest anxiety. A second study was partaken with participants being given bogus feedback on an intelligence test (Greenberg el. Al. , 1992:2). Following the feedback, participants were told that they would receive an electric shock or a neutral stimulation. The dependent variable was physiological arousal and the hypothesis was that the participants with bolstered self-esteem would experience reduced physiological arousal in anticipating electric shocks. The conclusion of the study was that neutral self-esteem-threat the participants having highest anxiety. A third study by Greenberg et. al. (1993) was with participants, who were provided with either positive or neutral feedback regarding their personality and a emotionality scale test, where the dependent variable was emotionality and the hypothesis was high self-esteem would reduce the participants’ anticipation of a short life-expectancy. The study concluded that participants with negative feedback information led to low self-esteem. Based on these studies, researchers Greenberg et. al. (1992:1, 1992:2, 1993) developed anxiety-buffer hypothesis which led to the conclusion that self-esteem provides protection against anxiety and one who has an increased self-esteem becomes less-prone to anxiety when exposed to threatening situations later. 1.4 Personal Identity and Name Personal Identity deals with oneself and issues that arise by the virtue of being an individual and it has its own attributes that make a person unique and different from the rest. Personal identity has its own properties, such as name, appearance, preferences which make a person unique. At present, an estimated 120 million babies are born on earth in a year (Deluzain, 1996). Sooner or later, they undergo the process of receiving a name. Names are part of all cultures and they are equally important to the person who receives the name as well as the society which the person lives in. The most important part of a person’s identity is the name. It is of important for the individual and the society as a whole. Inspite of its importance, not many people know or interested in knowing the effect of name on us and our children in this world although we are considered as the â€Å"consumers of names†. Researches show that one of the reasons for couples to have children is to perpetuate the family name (Arnold and Kuo, 1984; Callan and Kee, 1981; Ramu and Tavuchis, 1986). A research by Howard et. al. (1997) concluded that students felt proud when professors in their university remembered them by the name. A century ago, anthropologists identified that there has never been an ancient civilization, which did not allocate first names to people, in the recorded history. Many ancient cultures believed that not having a name is equivalent to not having an identity or honour (Frommer, 1982). At present, in most countries, parents are required to register the birth of a child through the child’s name. This is a legal requirement, which is the first time a child is given a legal identity. The birth certificate received by the parents becomes an essential document for admitting a child to school, obtaining healthcare and other basic services from the society. The existence of a name of a person is not only important to the person psychologically, but it is also of religious, social and legal importance because our identities are associated intuitively through the name. When one’s name is mispronounced, it may sound resentful to the person. Most people, especially when communicating with persons of different cultures, take extreme care to ensure the names are not mispronounced. Studies have revealed that mispronunciation of the name amounts to distortion of one’s identity (Deluzain, 1996). Freud identified the psychological effects of distortion of one’s name, deliberately or accidentally. According to Freud’s observations, people of aristocratic class, who wielded economic and political power tended to mispronounce their doctors’ names (Deluzain, 1996). The explanation for this was the aristocrats’ psychological need to show their superiority over the doctors, who wielded the power of one’s life and death. A similar event is seen in Shakespeare’s play, King John, where the character Philip Faulconbridge was found to be the illegitimate son of Richard the Lionheart, which made him King John’s half-brother. In the aftermath, King John orders Philip Faulconbridge’s name to be changed to Richard Plantagenet and deliberately refers to Philip as Peter (Shakespeare, 1623). This is a clear example of how Shakespeare presented the idea that mis-representation of a person’s name amounts to mis-representation of the person. The psychological significance of names are so high, that two separate researches have concluded that people have a strong affiliation with letters of the alphabet in their own names than ones which are not in their names (Koole, Dijksterhuis, and van Knippenberg, 2001; Nuttin, 1985; Greenwald and Banaji, 1995). The research by Greenwald and Banaji (1995) concluded that people positively associate themselves with letters in their names, as they are considered to direct reflection of the person, although there doesn’t appear to be any pragmatic reason for this association. This positive association of one’s name and even the letters of the name with oneself has a general tendency to make a person feel good (Greenwald and Banaji, 1995; Hetts and Pelham, 2001). The connection between name and identity is also emphasized by research that portrays changing of one’s name leading to changing of one’s personal identity (Lawson, 1984; Kang, 1972). In certain villages in China, men are allocated an additional name based on the social transitions, such as marriage. On the contrary, women do not receive additional names, which imply that they never attain complete personhood (Watson, 1986). A research by Howard et. al. (1997) concluded that students felt proud when professors in their university remembered them by the name. A century ago, anthropologists identified that there has never been an ancient civilization, which did not allocate first names to people, in the recorded history. Many ancient cultures believed that not having a name is equivalent to not having an identity or honour (Frommer, 1982). 1.5 Self-Esteem and Personal Identity The idea that people strive to keep a high level of motivation maintain high-level of self-esteem is widely accepted and is considered as a postulate or an accepted fact. Theories suggest that behaviours such as aggression, love, deviance and even altruism are due to ultimate belief that humans wish to be seen as valuable (Heine et al, 1999). Studies have been done only recently to determine whether this is always true and whether it is universal (Baumeister, 1998; Heine et al, 1999). However, still, a significant majority of psychological theories consider the need of humans to maintain high-levels of self-esteem as a postulate. Coyle (1999), presented a concept called personal identity threat in healthcare settings which is one of the key concepts of patient dissatisfaction in healthcare. According to Coyle’s research, people who were generally unhappy with the overall healthcare experience they receive, is mainly due to them being treated as non-persons, which is also termed dehumanization. This study asserts that the person’s name has a significant effect on one’s own identity. According to Coyle’s research (1999), people who were generally unhappy with the overall healthcare experience they receive, is mainly due to them being treated as non-persons, which is also termed dehumanization. 40 out of 41 patients interviewed by Coyle stated that they were treated as, an ‘object’ and on deep exploration, Coyle identified that the patients were referred by numbers on a file (such as patient number 49) instead of the name, which gave the patient the notion of being dehuma nized. This study asserts that the person’s name has a significant effect on one’s own identity. The above studies indicate that self-esteem is connected with personal identity, where invoking personal identity increases one’s self-esteem. One of the most key attributes of personal identity of an individual is the name. A number of studies, particularly by Greenberg et. al. (1992:1, 1992:2, 1993, 1996) concluded that self-esteem acts as an anxiety buffer. The aim of the present study is to investigate the effect of addressing a patient by name on pre-procedural anxiety level of in-ward patients, who are undergoing basic blood investigations in a large private hospital in Colombo. The hypothesis tested in this research was, talking to patients by addressing them by name, before an invasive procedure, reduces the pre-procedural anxiety level of hospital patients, than talking to them without referring by name or not talking to them at all.