Thursday, October 31, 2019

Anaylysis of business enviornment Assignment Example | Topics and Well Written Essays - 2000 words

Anaylysis of business enviornment - Assignment Example Some of the available techniques of promotion include using the print media and other media such as radio and TV. This is likely to catch the attention of many potential buyers. This will tend to increase demand of cars. The price of a car Affordability of cars will most certainly increase their demand. However, if the prices are not friendly, demand of cars will be less. This is the prime reason why a company that sells cars should fix the prices skilfully so as not to affect the sales (Frank, 2006, p. 57). Financing options A population found in a country where access to loans is easier will find it easier to buy a car than those who cannot access a loan. Banks and other financial institutions give loans to people who are employed or are doing businesses with returns that can pay off the loan. The income of the buyer Those buyers that earn a lot are able to buy more than one car. Those who earn little are not even able to afford a car. This is the reason why it is important to star t up a car selling business in places where people have good income. In such a place, demand will certainly be higher. New offerings With the introduction of a new model in the market, the demand of this car is usually higher. People tend to buy new models due to changes in the make. They may love the new colour, shape and speed of the new car and as such, they will be influenced to buy. Tastes and preferences If the customers change their taste and preference towards a particular type of car, its demand will most certainly go down. However, if the tastes and preferences of the consumer are in line with the available type of cars, then this will make demand higher. Economic conditions The most influential economic conditions include inflation and balance of payments. When there is inflation, the prices of goods and services tend to go high. In this case, consumers will pay higher for basic commodities than was the case initially. In this case, therefore, consumers’ ability to purchase is strained. They are not able to buy luxuries such as cars, hence their demand goes down. On the contrary, if the prevailing economic conditions are favourable, people will have money to spend, hence the demand for luxuries such as cars will be higher (Bade and Parkin, 2001, p. 43). 2. What product or service might have a highly positive cross elasticity of demand with the market for cars? Describe its impact on the market for cars. Cross elasticity of demand measures the effect of the demand of one good because of the change in the price of another good. The elasticity is measured because of the change in price of one good and how this will affect another commodity demand. The two goods are either compliments or substitutes. When the cross elasticity of demand is positive, it shows that the goods are substitutes. When it is negative, the two products are complements. In the market for cars, motorcycles are the products with a highly positive cross elasticity of demand. O ther substitutes are the public transport such as busses and trains. Many people are opting to buy motorcycles in place for cars due to the effective nature of motorcycles as compared to cars. Customers in a situation where substitutes have such a positive cross elasticity of demand, opt for the product with the highest advantage. In the market of cars, the main reason why people are moving to

Tuesday, October 29, 2019

Harley Davidson case analysis Essay Example for Free

Harley Davidson case analysis Essay This case focuses on the iconic motorcycle brand of Harley-Davidson. Harley-Davidson is an American motorcycle manufacturing company founded in Milwaukee, Wisconsin. Since Harley-Davidson was established in 1903, the manufacturer has experienced its ups and down. It especially encounters struggles like any other automobile industry during economic downturns. On the verge of bankruptcy around 1980, Harley-Davidson made a surprising comeback. This comeback was mainly a result of Harley-Davidson’s incorporation of customer services into its products, product differentiation through quality and design as well as focusing production on a consistently high level of quality. Today, the company’s annual worldwide sales total more than $4 billion worldwide and have an annual output of 200,000 motorcycles along 35 different models in seven product lines. With these results it is safe to say that Harley-Davidson dominates the U. S. motorcycle market and is also strong in Europe and Japan. Harley-Davidson does a very good job at differentiating its product. In fact, product differentiation is the main component of Harley-Davidson’s marketing strategy. They want to offer a motorcycle like no other motorcycle on the market at the highest quality. Harley-Davidson not only stresses its level of quality but its consistency of quality as well. Quality refers to the overall characteristic of a product that allows it to perform as expected in satisfying customer needs. Therefore quality can be used to differentiate products because not all products satisfy the needs of the consumer. Harley-Davidson offers many different lines of motorcycles including limited edition models as well as customization options. If the customer customizes the motorcycle then they should be getting exactly what they want at a high quality. Harley-Davidson emphasizes the consistency of quality as much as the level of quality because no matter how high the level of quality is, if it is not consistent then they will lose customers. For example, if you go to a restaurant that serves food the way you like it to be prepared only half of the time, it is likely that you will no longer go there. Then word spreads to others and they are less likely to go to that restaurant too. The same goes for Harley-Davidson. They want to ensure that every motorcycle has a high quality to keep the customers satisfied and bring forth even more customers. They also offer financing and insurance which helps differentiate them from competitors even more. Harley-Davidson believes that customer service is an important part of the product. They help differentiate their product by offering customers training, warrantees, guarantees, repairs and accessories. They want the customers to be comfortable with the employees and have a positive buying experience. Some dealers even take it a step further by offering a Rider’s Edge course. Since this course was offered at some dealerships, more than 150,000 people have graduated and earned a motorcycles license. This customer service section aims at the population of people who would like to buy a Harley-Davidson but do not know how to ride. They join these step-by-step courses with the employees and are on track to one day having their own Harley. They also offer a line of bikes for women and teach women how to ride bikes, pick them up, and assist them with any information they need in the buying process. They even have founded the Harley Owens Group in order to instill a sense of community amongst riders. There are over 1 million members. They have access to certain benefits, group rides, members only website, exclusive magazines, and a special customer service hotline. They even offer free tours at four of its factories, not to mention the museum. The Harley-Davidson museum is located in its headquarters in Milwaukee, Wisconsin. The museum features exhibits from the company’s past products such as sample boats, bikes, snowmobiles and golf carts, to today’s models. They also highlight the company’s latest technologies, and inner workings of its new product development process. This museum may play a role in influencing how customers perceive the company and its products because they are able to see where the company has been, where they are, and where they want to be. It also gives the potential customers a chance to experience what it would be like to be a Harley-Davidson owner. They even offer a virtual ride bike so that people can almost get a first hand glance at what it is like to own a bike. Harley-Davidson has a very wide marketing mix. They have bikes that attract people of different sizes, styles, age, and gender. They offer a very good bike at a price of $6,999 for beginners. They offer a line exclusively for women with smaller bikes and a wide variety of customizing products. They aim at creating a sense of individuality and freedom for the riders. As a rider gets more experienced they can trade their bike in for a more advanced one if they feel it is necessary. They also offer different styles of bikes for those who are experienced. They range from cruisers to choppers to sports bikes. In total there are seven product lines with 35 different models. Therefore the product depth is 7 and its length is 35. Below is a list going into greater detail about the marketing mix. If I had to invent a brand name for a line of luxury motorcycles I would call it the American Eagle. This brand name would especially appeal to the American market but would also be appealing worldwide. It implies a high American quality, which is luxurious and valuable and is consistent with the American lifestyle. Product   The major product is heavy weight motorcycle of 750 cc for working out on heavy roads.   A number of brands have been introduced in its century of age, and each one was very integrated, well equipped and up to date with respect to technological advancements (Johnstone, 1995). The hallmark productions of the company assisted it to acquire eagle mark for itself. An excellent customer service is provided in case of any ambiguity, and customers are thoroughly guided for the upcoming brands.   Deals in branded motor bikes and other limited sector of open market.   Also deal in used bikes, there usable parts being repaired and introduced in the market at lower price range   Spare part market has also got their name at the top of the list.   Twin Cam engine is its major innovatory product.   They also offer services for repairing. Revolution engine is also introduced on their innovation lists. Price Their prices are mostly maintained around a certain figure.   The major revenue sector is heavy bikes along with spare parts.   The company has been in crisis for few years as its market share dropped by 43 (%) percent.   The company is planning to eliminate its employees in the coming year for maintaining the company’s financial position (Wilson, 1993).   During the time of crisis the vehicle prices were suddenly increased but now it’s being hoped that they will be regulated. Place. The company has acquired 358,000 square foot plant in Kansas City for the production of Dyna Glide, Sportster, and V-Rod models.   For assisting Latin American expansion n Assemly plant is located in Brazil. By establishing manufacturing units, a vast production was achieved (Margie, 2009).   Harley Davidson is also moving forward to export bikes in India as well to increase its production and export sector as well. Harley Davidson also caters the motor bikes export in most parts of the world but it is not that much economical because of high custom duty for heavy machinery. Promotion   Different marketing policies are being applied for the promotion of the company. Lucky draws are timely introduced, while promoting its political frame.   Certain free services are announced for showing goodwill gestures on the new motor bikes sale.   Some times fares are also arranged for bulk sales, especially when there is low sale time. Very attractive commercials are placed on different channels.   Most of the magazines in U. S promote the company by its good coverage. References Pride, W. M.. , Ferrell, O.C. , (2012). Foundations of Marketing. Pg. 77. Australia Mason, OH: South-Western, Cengage Learning (2012, ). H-D1â„ ¢ Customization | Custom Motorcycles | Harley-Davidson USA. Retrieved. November 17, 2012, from http://www. harley-davidson. com/en_US/Content/Pages/H-D1_Customization/h-d1_cu stomization. html? locale=en_USbmLocale=en_US (2011, March 8). Harley Davidson Marketing Mix | Marketing Mixx. Retrieved November 17, 2012, from http://marketingmixx. com/marketing-basics/marketing-mix/159-harley-davidson-marketing-mix. html.

Saturday, October 26, 2019

Strategies to Counteract Online Radicalization

Strategies to Counteract Online Radicalization CHAPTER 2LITERATURE REVIEW The purpose of this study is to evaluate existing Bangladeshi efforts to counter radicalization through the internet, identify its weaknesses, and explore opportunities. This research will analyze the significant aspects of successful counter radicalization models of different countries, and suggest ways to incorporate those in Bangladesh to develop a coherent anti-radicalization strategy. Initially, this literature review will discuss the concept of radicalization through the cyberspace. It will allow the readers to follow the subsequent analysis and the suggestions to develop a mechanism in Bangladesh to counter this menace. The literature review is divided into three sections: understanding online radicalization, online radicalization from a Bangladeshi perspective, and significant aspects of successful international anti-radicalization programs. Understanding online radicalization will examine the potential power of the internet to influence people and the process of radicalization. The section on online radicalization from a Bangladeshi perspective will at first, briefly assess the relevant threats in Bangladesh and will then, identify and evaluate the existing programs of countering online radicalization. The final section will study the strategies adopted by Federal Bureau of Investigation (FBI), The U.S. National Counterterrorism Center (NCTC), and the current programs undertaken by Malaysia and Indonesia. These two countries of Southeast Asia have been selected due to religious and cultural similarities, and geographic proximity. Their programs appear to be effective against online radicalization. Understanding Online Radicalization The internet appears to create more opportunities to become radicalized. Many scholarly articles ascribe a role to the internet in promoting radicalization[1]. Those studies suggest that the internet acts as an accelerant, and has broken the traditional barriers to radicalize individuals[2]. In this regard, Gabriel Weimanns Terror on the Internet: The New Arena, The New Challenges counts the number of websites of terrorist groups and reviews their contents[3]. In his article, Weimann points to the proliferation of extremists web sites. He founds, by the end of 1999, almost all terrorist groups established their online presence. Different empirical studies suggest, there is a correlation between extremists web sites and online propaganda, and rapid radicalization. The internet enables the terrorists to reach otherwise unreachable individuals. The reach of the internet has blurred the geographic barriers, and connected the distant individuals in the virtual world. Peter Neumann in his research points that the internet allows the terrorists to reach those individuals who would not have been accessible in any other way[4]. For example, Anwar al-Awlaki[5] successfully created online contents such as Inspire that advocates jihad from home. Ines von Behr asserts, these kind of online materials have broaden the scope to reach any people, and their appealing contents create more chance to implant radical ideas among the individuals[6]. The internet creates opportunities to radicalize a wider range of people from all societies. Rachel and Strugnell identify, beside removing the geographic barrier, the internet has erased the social and gender barriers as well to spread extremist ideologies. They highlight on the internet created scope to reach and radicalize the women[7]. In many societies, it may be difficult for women to meet personally with male extremists or work with them; it may also be difficult for the women to express certain thoughts in public. However, the internet allows them greater anonymity[8]. Some authors opine, the internet benefits the introvert individuals who are seeking the radical ideas by creating a scope to access any content privately[9]. Jerome Bjelopera says,ÂÂ   the characteristics of the internet allows a relative advantage to the terrorists in the present days than their previous generations by fading the lines between countries, societies, and genders[10]. The internet provides s upposed anonymity and a degree of protection and security from detection[11]. The internet accelerates the process of radicalization. Bjelopera terms the internet as an echo chamber[12]. It means, people who are searching any radical ideas to support their sketchy thoughts are likely to get some reinforcing contents on the internet due to its massive storage. The internet is a kind of one-stop shop for all the information that an individual may seek to underline his radical ideas that expedites his radicalization process. The virtual world reduces the timeframe of radicalization process as opposed to the actual world. Anthony Bergin in his study refers the internet as a conveyor belt that accelerates the radicalization process by providing instantaneous and continuous connection to any violent idea[13]. Raffaello Pantucci further highlights the internets role in incubating and accelerating radicalization[14]. Robert Schmidle points that, the chat rooms in particular are effective for the extremists since they can exchange ideas with like-minded individuals 24/ 7 regardless of borders[15]. Therefore, the internet expedites the radicalization process of any individual by offering varieties of contents and continuous interaction. The internet allows radicalization to occur without physical contact. Yeap and Park explain, the internet enables any individual to access radical contents from their personal space instead of attending a radical religious gathering[16]. Therefore, an individual need only the internet connection, physical travelling to other location is no more essential. Though the internet reduces hurdles to interaction, few scholars may argue that human interaction is necessary for radicalization. However, Behr says, in a digital era the online activities may be considered as an extension of the real lives, and physical connection is no more essential[17]. Beside the actual world, personal relationship may grow in the virtual world as well. Thus, Mitchell Silber and Arvin Bhatt asserts, radicalization on the internet is not necessarily any different to what would happen with other more private and less visible sources[18]. Besides, the internet increases opportunities for self-radicalization. It i s a process where an individual gradually become radicalized by himself [19]. Hence, the internet creates opportunities of radicalization without human interaction. An individual move through several phases as he becomes radicalized through the cyberspace. In a New York Police Department radicalization case study, Silber and Bhatt identify four phases of radicalization: pre-radicalization, self-identification, indoctrination and jihadization[20]. The case study recognizes the impact of the internet on the radicalization process as an individual looking for an identity and a cause[21]. The internet facilitates in each of the stages to instruct, socialize, indoctrinate and recruit[22]. The FBI has also created a radicalization model similar to that of the NYPD. The FBI model has four stages: pre-radicalization, identification, indoctrination and action[23]. These categories are almost similar to NYPD. The diagram below illustrates the Moghaddams staircase to radicalization where the online contents play a complementary role: Moghaddam Staircase to Radicalization Source: Moghaddam, Fathali M. The Staircase to Terrorism, A Psychological Exploration, Vol. 60, No. 2, American Psychologist, 2005. Online Radicalization in Bangladeshi Perspective Terrorists Approach and their Target Audience In Bangladesh, few religion based terrorist organizations have gained capabilities to develop and spread their radical messages online. They have attracted public and media attention through their activities and propagation. Besides, few leftist political groups are also trying to develop their online capabilities. At present 13 terrorist organizations are operating actively and 29 others are operating covertly using fake credentials[24]. The Special Branch of Bangladesh Police has provided the names of eight terrorist organizations to Home Ministry who are very active on the internet: Ansarullah Bangla Team, Allahr Dal, Islamic Solidarity Front, Tamiruddin Bangladesh, Tawhidee Trust, Hizbut-Tawhid, Shahdat-e-Nabuwat and Jamat-as-Sadat. Five of these terrorist organizations have already been banned by the government, and eight more are yet to be banned[25]. These groups may have significant investment, both human and financial, to build their online capacities. The terrorist groups of Bangladesh appear to be active on the internet, particularly in Facebook and YouTube, to spread radical preaching. This is safer, and lower possibility of being tracked by the law enforcing agencies. Farooq opines, the online propaganda of the terrorists in Bangladesh have become more organized, and appealing to their targets[26]. Arman claims that the terrorists try to exploit the ethno-religious sentiment of the people while developing their messages, and appeal to their believes to embed their radical ideas[27]. Over the last few years, hate speeches and violent ideologies that spread through the internet triggered a number of terrorist attacks and communal violence in Bangladesh. This was evident in Ramu and Pabna incidents where mass attacks were carried out on religious minority people. In both cases, unidentified persons using pseudonyms posted doctored photos and messages on the Facebook defaming Islam that agitated people[28]. Social media have become the easiest means to spread radical ideas in Bangladesh. Bangladeshi youths are particularly vulnerable to online radicalization due to lack of cyber awareness. Farooq in his study opines, the terrorists seem to target the educated youths by spreading appealing messages on the Internet[29]. It is easier to radicalize the youths than the elders since they are more connected to the online world. Farooq also opines, many Bangladeshi youths at first just curiously run across radical contents, and gradually fall into the traps unconsciously. The concept of cyber awareness and related programs seem insufficient in Bangladesh. As a result, neither the youths nor their parents or guardians are aware about the online traps. Immediately after the terrorist attack at the Holey Artisan Bakery restaurant, RAB released a list of 261 missing youths across the country[30]. These missing youths are suspected to have joined various terrorist groups. The terrorists in Bangladesh attempt to build their radical narratives based on religious and socio-political contentious issues. Nirmal Ghosh opines, though Bangladesh is politically a secular country, the terrorist appeal to the Muslim majority population to make it an Islamic state under Sariah law[31]. They seem to exploit the religious sentiment of the people. These groups intentionally create fake photos with radical messages such as prosecution of Muslim Rohingyas and spread those on social media to instill communal violence in the country[32]. Furthermore, the extremists adeptly construct radical narratives on socio-economic disparity and political issues to create sympathizers. Bangladeshi Counter Radicalization Programs The Bangladesh government has implemented several plans and strategies to counter radicalization in the country. However, Abul Kalam argues that, the government has mostly implemented coercive approaches to minimize the terrorist threats[33]. Aynul Islam in his article, categorizes the government initiatives into two types: operational drives by the law and security forces, and legal initiatives[34]. The law enforcement agencies have achieved some success in disrupting few of the extremist groups. Many extremist leaders and activists have been arrested, put under trial. However, the terrorists online activities apparently remain undisrupted due to lack of government action. The National Monitoring Cell (NMC) monitors the suspicious online activities, but it has limited capacity and expert workforce. The government effort to shut down or censor few websites seem not very effective, because extremists innovate new ways to reach people. Moreover, it is difficult to identify and stop sec ret groups in social networking sites that contains radical ideas. Bangladesh government has enacted a few legislations to ensure the cyber security. Bangladesh Telecommunication Regulatory Act 2001, The ICT Act 2006, Digital Security Act 2016 (Draft) are at present the main legislations of Bangladesh to enforce cyber security. On 11 June 2008, the Anti-Terrorism Ordinance 2008 was approved by the government, and was amended in 2013[35]. The new counter terrorism legislation has kept maximum punishment a death sentence for terrorist activities. However, in most cases the laws have not been enforced against persons who carry out propaganda in the cyberspace. Bangladesh has number of agencies with counterterrorism cells. Islam opines, capabilities and activities of these agencies are not orchestrated[36]. Their roles are not specified, and efforts are fragmented. The Bangladesh Police, the Rapid Action Battalion (RAB), Bangladesh Rifles (BDR), armed forces and intelligence agencies are mainly responsible for fighting terrorism. All of these forces have counter terrorism cells, but they work separately. He further argues that, the police are not well equipped and trained to deal with the new trends of online terrorism. The intelligence agencies are essential apparatus in support of operational activities. The National Security Intelligence (NSI), the Directorate General of Forces Intelligence (DGFI), Special Branch (SB) of Police and the RAB intelligence wing have been working in Bangladesh to identify the potential threat sources. There is no set mechanism through which the forces can share intelligence and coordinate their collection eff orts. In May 2004, NSI constituted a separate body called counter terrorism cell to identify specific risk population and areas, and threat groups. The counter terrorism bureau of DGFI, has been working to evaluate, analyze, and frame counter terrorism policy at strategic and operational level[37]. Nonetheless, there is no overarching organization to synchronize these wide varieties of organizations in the country[38]. Islam in his article, Mapping Terrorism Threats in Bangladesh, identifies few key deficiencies of Bangladeshi programs to prevent radicalization[39]. First, Bangladesh has no set mechanism to monitor the internet for preventing radical ideas. He opines that there is a lack of knowledge and understanding of the threats that can spread through online. Neither the country has sufficient technological and organizational expertise, nor it has workable international cooperation for capacity building. Second, the law enforcement agencies do not have close link with the other service sectors or private sectors to identify suspicious activities. Third, the Bangladesh government is not sufficiently addressing strategic issues like de-radicalization and counter ideology. Fourth, there is a very limited initiative to educate professional groups like academics, media community, service sector officials, and political leaders to create general awareness. There is almost no community based programs in the country for developing cyber awareness. Fifth, the government overemphasizes coercive approaches in dealing with terrorism issues. There is no dedicated research institution in the government to provide forum for understanding and research on critical issues of terrorism like online radicalization. Although the counter terrorism bureau of DGFI is responsible for policy related activities, it is barely possible to formulate a viable strategy by a body of armed forces alone. Finally, he mentions that, in Bangladesh, strategies and policies are highly bureaucratic, ambiguous, and unaccountable[40]. References [1] Precht, Tomas. Homegrown Terrorism and Islamist Radicalisation in Europe: From Conversion to Terrorism. An Assessment of the Factors Influencing Violent Islamist Extremism and Suggestions for Counter Radicalisation Measures, Copenhagen: Danish Ministry of Defence, 2008. [2] Pantucci, Raffaello. A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists. Developments in Radicalisation and Political Violence, International Centre for the Study of Radicalisation and Political Violence, 2011. [3] Weimann, Gabriel. Terror on the Internet: The New Arena, The New Challenges. Washington, DC: United States Institute of Peace Press, 2006. [4] Neumann, Peter R. Options and Strategies for Countering Online Radicalization in the United States. Studies in Conflict Terrorism, 2013. [5] Anwar al-Awlaki was a spokesperson and recruiter for Al Qaida. [6] Ines von Behr, AnaÃÆ'Â ¯s Reding, Charlie Edwards, Luke Gribbon. Radicalisation in The Digital Era. RAND Corporation, 2103. 17. [7] Briggs, Rachel and Alex Strugnell. Radicalisation: The Role of the Internet. Policy Planners Network Working Paper, London: Institute for Strategic Dialogue, 2011. [8] Schmidle, Robert E. Positioning Theory and Terrorist Networks. Journal for the Theory of Social Behaviour, Vol. 40, No. 1, 2009, 65. [9] Torok, Robyn. Make a Bomb in Your Mums Kitchen: Cyber Recruiting and Socialisation of White Moors and Home Grown Jihadists. Edith Cowan University Research Online, 2010. [10] Bjelopera, Jerome P. American Jihadist Terrorism: Combating a Complex Threat. Congressional Research Service Report for Congress, Washington, DC: Congress Research Service, 2011, 101-102. [11] Weimann. Terror on the Internet: The New Arena, The New Challenges. [12] Bjelopera. American Jihadist Terrorism: Combating a Complex Threat. 101-102. [13] Bergin, Anthony. Countering Online Radicalisation in Australia. Australian Strategic Policy Institute Forum, 2009. [14] Pantucci, Raffaello. A Typology of Lone Wolves: Preliminary Analysis of Lone IslamistÂÂ   Terrorists. Developments in Radicalisation and Political Violence, International Centre for the Study of Radicalisation and Political Violence, 2011. [15] Schmidle, Robert E. Positioning Theory and Terrorist Networks. Journal for the Theory of Social Behaviour, Vol. 40, No. 1, 2009, 65. [16] Yeap, Su Yin and Jenna Park, Countering Internet Radicalisation: A Holistic Approach. S. Rajaratnam School of International Studies, 2010. 2. [17] Ines von Behr, AnaÃÆ'Â ¯s Reding, Charlie Edwards, Luke Gribbon. Radicalisation in the Digital Era. RAND Corporation 2013. P.20. [18] Silber, Mitchell D. and Arvin Bhatt. Radicalization in the West: The Homegrown Threat. New York: New York City Police Department, 2007. [19] Change Institute. Studies into Violent Radicalisation: Lot 2 The Beliefs Ideologies and Narratives. 2008. [20] Silber and Bhatt, Radicalization in the West: The Homegrown Threat. 6-7. [21] Silber and Bhatt, Radicalization in the West: The Homegrown Threat. 8. [22] Silber and Bhatt, Radicalization in the West: The Homegrown Threat. 8-9. [23] Silber and Bhatt, Radicalization in the West: The Homegrown Threat. 30. [24] Farooq Sobhan. The Role of Civil Society in Countering Radicalization in Bangladesh. Bangladesh Enterprise Institute, Dhaka 2014. P. 8. [25] Farooq Sobhan. The Role of Civil Society in Countering Radicalization in Bangladesh. Bangladesh Enterprise Institute, Dhaka 2014. P. 8. [26] Sobhan, Farooq. The Role of Civil Society in Countering Radicalization in Bangladesh. Bangladesh Enterprise Institute, Dhaka 2014. 13. [27] Tanbir Uddin Arman. New Media, Digital Radicalization and Social Security. The Bangladesh Today, 2015. [28] Arman. New Media, Digital Radicalization and Social Security. The Bangladesh Today, 2015. [29] Farooq Sobhan. The Role of Civil Society in Countering Radicalization in Bangladesh. Bangladesh Enterprise Institute, Dhaka 2014. 10. [30] Bdnews24.com. Web: http://bdnews24.com/bangladesh/2016/07/20/rab-releases-list-of-261-persons-missing-from-across-bangladesh. http://www.straitstimes.com/opinion/battle-for-bangladeshs-soul-as-islamic-radicals-push-for-power [32] Tuhin Shubhra Adhikary and Wasim Bin Habib, Fake photos trolling, http://www.thedailystar.net/frontpage/fake-photos-trolling-1320613 [33] Kalam, Abul. The Challenges of Terrorism: Bangladesh Responses. Moni, SD. (ed) Responding to Terrorism in South Asia, Monohar, New Delhi, 2006. [34] Islam, Aynul M. Mapping Terrorism Threats in Bangladesh. Bangladesh Institute of International and Strategic Studies, Dhaka, April 2008. P. 165. [35] The Daily Star, 18 June 2008. [36] Islam, Aynul M. Mapping Terrorism Threats in Bangladesh. Bangladesh Institute of International and Strategic Studies, Dhaka, April 2008. P. 165. [37] Hussain, Sakhawat M. Capacity Building of Law Enforcement and Intelligence Agencies. Farooq Sobhan, ed, Counter Terrorism in Bangladesh. University Press Limited, Dhaka, 2008, p. 70. [38] Islam, Aynul M. Mapping Terrorism Threats in Bangladesh. Bangladesh Institute of International and Strategic Studies, Dhaka, April 2008. P. 165. [39] Islam, Aynul M. Mapping Terrorism Threats in Bangladesh. Bangladesh Institute of International and Strategic Studies, Dhaka, April 2008. P. 167-168. [40] Islam, Aynul M. Mapping Terrorism Threats in Bangladesh. Bangladesh Institute of International and Strategic Studies, Dhaka, April 2008. P. 167-168.

Friday, October 25, 2019

Merging Social Work and Social Advocacy in Response to the Plight of Un

Merging Social Work and Social Advocacy in Response to the Plight of Unaccompanied Child Refugees in the United States Introduction More than any country in the world, the United States has been a haven for refugees fleeing religious and political persecution in their home countries. Linked forever to the phrase inscribed on the Statue of Liberty, "Give me your tired, your poor, your huddled masses yearning to breathe free," the United States, in the eyes of persecuted people throughout the world, has been idealized as a land of freedom and new beginnings. However, the changing face of refugees seeking asylum in the United States in the past several decades has exposed stark gaps in the legal, administrative, and social treatment of refugees. The majority of refugees in the early part of the twentieth century fled as families or in large groups. Recently, however, increasing numbers of children are fleeing their home countries alone. Currently, best estimates are that over one-half of the world's refugee population, or over 20 million, are children.1 Human Rights Watch, a watchdog non-governmental organization, estimated that in 1990 over 8,500 children, 70 percent of whom were unaccompanied, reached United States shores.2 While this figure is small relative to the total world estimate of child refugees, the lack of systemic or comprehensive United States governmental policies specifically geared toward assessing the asylum claims of children and their circumstances has become increasingly problematic. Continued human rights violations in China, worldwide genocide - as seen in Bosnia in the early 1990s and currently in Kosovo - and persistent civil wars in Sri Lanka and parts of Africa, have resulted in an increase of t... ...vler Center works with children and adults who are victims of torture, while a number of agencies, such as the Bosnian Refugee Center, provide support for specific ethnic groups. In terms of legal advocacy, the Midwest Immigrants Human Rights Center provides pro bono legal representation for adult and children asylum seekers. References Bhabha, J., & Young, W. (1998) Through A Child's Eyes: Protecting the Most Vulnerable Asylum Seekers. Interpreter Releases 75 (21), pp. 757-791. Center for the Study of Human Rights, Columbia University. (1994) Twenty-five Human Rights Documents. New York: Columbia University. Ehrenreich, R. (1997) Slipping Through the Cracks. New York: Human Rights Watch. Immigration and Naturalization Service, United States Department of Justice. (1998) Guidelines for Children's Asylum Claims. (File: 120/11.26).

Wednesday, October 23, 2019

Four year strategic plan for Erie Capsim Company Essay

The four year strategic plan will focus on key drivers of the industry, factors determining future of the company, industry attractiveness, and its competitive environment. Each section contains detailed subsections which clearly defines the strategic plan. The plan uses 2009 data and our four year plan runs up to 2013. 1.1   Driving Forces In this industry there are many driving forces. Our top management uses the concept of driving forces to reach consensus on what strategic area represents the industries current driving force. 1.1.1 Research and Development: Our company will be introducing a new High End product every year. In addition we will reposition our performance and size segment products into our initial targeted sections. This will enable a stream or products lined up along the High End, traditional, and Low end sections. In addition we will allow present traditional section products to become a Low End section product so as to create room for segment drift. The company will later introduce a new product to the High End and will finally have four products each in the Low, Traditional, and High end sections during those four years. This way the company will present to clients products in line with their perfect procedure for age, reliability, and positioning. Also the company endeavors to sustain its existing product line, ensure presence in each section, and strive to sustain its products in the next four years in spite high levels of automation. 1.1.2 Marketing: Marketing is another main driving force. At first our company will attempt to keep pace with the accessibility and awareness of immediate competitor’s products.   Ideally we will be revisiting our status every year for the next four years to determine whether promotion and sales budgets should be sized or if the company will continue matching that of competitors. Generally our company will offer products at reduced prices. Also for these four years our company is planning to spend aggressively in sales and promotion in targeted sections; Low, Traditional, and High sections. In this light every client will have known our superb designs for the next four years. Basically, we are planning simplify logistics involved in identifying products by customers. After defining the company’s cost leadership position, we will reconsider the company’s situation to explore alternatives to enhance accessibility and awareness. 1.1.3    Production: Significantly our company will significantly increase automation levels on all products in the next four years. Since automation limits the company’s ability to reposition its products in line with R&D, we will edge our automation process in the Low and Traditional sections in the next two years and then High end section during the last two years. Our company will ensure capacity building to meet the generated demand. In the first half we will reposition our brands. However, in the last half we will evaluate ways of increasing in automation levels to enhance margins as well as repositioning products and sustaining sections as they traverse the perceptual map. 1.1.4 Finance The nature of our industry allows it to draw funds from a wide source. During the first half the company will finance its investments mainly through bond issues supplementing with stock offers following an as needed basis. For last half, the company will develop a divided policy and start to retire stock. The company is not adverse to leverage and expectation is that we will sustain debt/equity ratio at 2.0-3.0. 1.2   Future key success factors Factors for success in our company include; 1.2.1 Concentration: Our company will concentrate on Low, Traditional, and High end sections. This will keep production costs, raw material costs, and R&D costs to a minimum. Also company product lifecycle concentration will enable us to reap sales for the next four years on each of the four new products to be introduced into High end section. 1.2.2 Brand recognition and awareness The company will maintain presence in every section. We will endeavor to ensure a competitive edge by differentiating our products. This will be done through excellent design, easy accessibility, and high awareness during first half. In the other half, the company will initiate a competent R&D that ensures fresh and exciting designs. Products will be in line with the market needs, presenting enhanced performance and size. 1.3   Attractiveness of industry and competitive environment 1.3.1       Factors making the industry attractive Several factors make our company to be attractive.   These are factors that will determine how far our company can remain still. These include;  ·    Reliable products: will ensure products which are reliable to mainstream clients and brands that offer value.  · Premium products: our company offers good products and brands that will stand the test of time.  ·    Low price: the company offers products at reduced prices. Its brands offer solid value.  ·    Easy technology: our products are reliable even to low technology customers 1.3.2 factors making the industry unattractive  · Funding: the market is unpredictable and there getting enough financial support is a problem  · Extensive research: product sustainability requires an extensive research. This adds to cost by way of experts and professionals. 1.3.3 special industry issues/problems  · Product presence: our company plans to maintain a competitive advantage by ensuring presence in every section.  · Unrelenting focus: concentration ensures brand recognition which leads to unique opportunity over competitors.  · Substitutes: the company is likely to suffer incase substitutes flood market, particularly during last half.  · New entrants: during the first two years the company will enjoy monopoly but in last two years entrants are likely to enter the market. 1.3.4 Profit outlook The company currently is enjoying a profit margin of 20%. This strategic plan aims to grow the profit by additional 10% for first two years and another 15% in the last two years.

Tuesday, October 22, 2019

How Total Fertility Rate Affects a Countrys Population

How Total Fertility Rate Affects a Countrys Population The term total fertility rate describes the total number of children the average women in a population is likely to have based on current birth rates throughout her life. The number ranges from more than six children per woman in developing countries in Africa to around one child per woman in Eastern European and highly developed Asian countries. Replacement Rate The concept of replacement rate is associated with total fertility rate.  The replacement rate is the number of children each woman needs to have to maintain current population levels, or what is known as zero population growth, for her and the father.   In developed countries, the necessary replacement rate is about 2.1. Since replacement cannot occur if a child does not grow to maturity and have their own offspring, the need for the extra 0.1 child (a 5 percent buffer) per woman is due to the potential for death and factors in those who choose or are unable to have children. In less developed countries, the replacement rate is around 2.3 because of higher childhood and adult death rates. World Fertility Rates Vary Widely Nonetheless, with total fertility rates of 6.01 in Mali and 6.49 in Niger (as of 2017), the resultant growth in these countries populations is expected to be phenomenal over the next few years, unless growth rates and total fertility rates drop. For example, Malis 2017 population was approximately 18.5 million, up from 12 million a decade prior. If Malis high total fertility rate per woman continues, the population will continue to explode. Malis 2017 growth rate of 3.02 means a doubling time of just 23 years. Other countries with high total fertility rates included Angola at 6.16, Somalia at 5.8, Zambia at 5.63, Malawi at 5.49, Afghanistan at 5.12, and Mozambique at 5.08. On the other hand, more than 70 countries had (as of 2017) a total fertility rate of less than 2. Without immigration or an increase in total fertility rates, all of these countries will have declining populations over the next few decades. Some of the lowest total fertility rates included developed as well as developing countries. Examples of countries with low fertility rates were Singapore at 0.83, Macau at 0.95,  Lithuania at 1.59, the Czech Republic at 1.45, Japan at 1.41, and   Canada at 1.6. The U.S. Fertility Rate Is Below Replacement The total fertility rate for the United States in 2017 was below replacement value at 1.87 and the total fertility rate for the world was 2.5, down from 2.8 in 2002 and 5.0 in 1965. Chinas one-child policy definitely shows in the countrys total low fertility rate of 1.6. Different cultural groups within a country can exhibit different total fertility rates. In the United States, for example, when the countrys total fertility rate was 1.82 (in 2016), the total fertility rate was 2.09 for Hispanics, 1.83 for African Americans, 1.69 for Asians, and 1.72 for whites, still the largest ethnic group. Total fertility rates are closely tied to growth rates for countries and can be an excellent indicator of future population growth or decline for a country or for a population within a country.

Monday, October 21, 2019

buy custom The Real World of Technology essay

buy custom The Real World of Technology essay Advancement in technology has occurred in the recent decade n the field of communication. Today, when we speak of human communication, we refer to technological innovations like the radio, television, internet and many more forms of communication. Communication technology, therefore, refers to the use of electronic devices and systems to pass information from one place to another or from one person to another. Technology has shaped human life and has made life easier with the introduction of communication instruments that have made human life immensely convenient. Characteristics of Modern Communication Technology grows each passing day. Very many human activities are happening because of technology. Generally, technology has profoundly shaped mans life in the sense that it controls his social, political and economic organization. Due to this, there are significant changes that have occurred in mans life including an improvement in the standards of living. There are many changes that have occurred in technology that were not there before, for instance man is now able to use technology in structuring and ordering. It is now possible to carry out tasks efficiently within a short period. Population data have been made possible through invention of technology. It is becoming difficult for man to do anything without being noticed. It is true that technology is working to the advantage of humankind, but at the same time, his privacy has vastly been infringed. Apart from this, man is becoming lazy because technology can be used to perform different tasks. Since science became part of man, it has slowly by slowly grow t become the prerequisite to technology. The scientific inventions have contributed to the growth of the technological aspect of life. Technology is the practical aspect of science. Therefore, theory expressed in science is what technology has practiced through various methods that are discussed under the advancement of technology. The relationships of people, culture and economic activity are all components of globalization. Globalization is a primary contributor to the economic growth in almost all enterprises. Technology in its development and eventual success has undergone the procedures and activities that have been brought about by globalization. Social responsibility demands that every organization has a constraint of reaching out and benefiting the community. This is done in order to balance between economy and the environment. Technology has been seen to create a balance between the economic position of its obligation and the ethical perspective. Technology has ensured a balance between society and the domain to ensure equilibrium exists between the two. This responsibility has avoided harmful acts. The goals that technology has achieved so far are purely social and economic goals. The Social Media The role of the media has become one of the fundamental roles in any country that believes in communication as the best way of reaching out to one another. In the past, communication did exist. Nevertheless, the difference is the structure of the communication process. It was not easy to give feedback to anyone who passed a message. However, today, communication has been nourished with the advancement of technology. The social media has contributed almost one hundred percentt of the communication role in nearly all countries. Images have become the basic component of communication today. This was not the case in the past because it was not easy to get out to a mass at one given time. However, with the advancement, images have been digitalized and it is easy to pass information to anyone at any given time. The internet has interconnected the earth into a small village where information flows ion seconds (Berlo, 1960). This is through the various interconnections that precede the intro duction of the computer and mobile phone. People are able to pass information to one another in various ways by just a click of a mouse. The letter In the middle ages, also known as the medieval period, communication was by means of the written document, the letter. Messages were written in various ways and sent through human messengers to their destination. Doves and pigeons were also used to deliver letters to people. However, there were also smoke signals in the same period. However, the use of the letter dominated throughout the medieval period and led to the advancement of writing. Conclusion Communication has witnessed a variety of changes that have led to the development in know-how and the introduction of various ways of passing information to a large number of people. In the past, people relied on the use of personal messengers such as the letter. Today, communication has experienced a growth that has introduced the media and the internet. People are able to relay messages at any time and are delivered instantly. This has led to the improvement of standards of living and the total wellbeing of humanity. Buy custom The Real World of Technology essay

Sunday, October 20, 2019

14 Quotes for a Funny Wedding Toast

14 Quotes for a Funny Wedding Toast If youve been asked to give a wedding toast, chances are youre taking your  role seriously. Perhaps too seriously! Often, the best wedding toasts start with a joke, even if they wind up with a sincere wish for the couples future happiness. Why Give a Funny Wedding Toast? Weddings  bring up complicated emotions. For the bride and groom, theres joy along with (in many cases) tremendous anxiety. Sometimes the anxiety is related to the very idea of a permanent commitment; other times its related to aspects of the wedding itself. Will the caterer show up? Will my divorced parents  get into a fight? Will Aunt Jane get drunk and fall into the wedding cake? Similarly, complex emotions come up for parents who are both thrilled and saddened as their child steps into a new role and a new stage of life. Siblings may be delighted, jealous, or even angry about some aspect of the wedding. Best friends may feel left behind. Humor is almost always the best way to break the ice, lower anxiety, and just have fun at a wedding. If youve been asked to give a  wedding toast, chances are you have a close relationship with either the bride, the groom, or both. That means you know which kinds of humor are likely to get a big laugh, and which wont. Funny Wedding Quotes to Choose From Not all of these famous quotes will be right for you, but youll almost certainly find one or two that connect with your particular wedding party! Henny YoungmanThe secret of a happy marriage remains a secret. John MiltonBiochemically, love is just like eating large amounts of chocolate. Henry KissingerNobody will ever win the battle of the sexes. There€s too much fraternizing with the enemy. Cathy CarlyleLove is an electric blanket with somebody else in control of the switch.​ SocratesBy all means, marry; if you get a good wife, youll be happy. If you get a bad one, youll become a philosopher. Rita RudnerI love being married. Its so great to find that one special person you want to annoy for the rest of your life. Mickey RooneyAlways get married early in the morning. That way, if it doesnt work out, you havent wasted a whole day. Henny YoungmanI take my wife everywhere I go. She always finds her way back. Ralph Waldo EmersonA mans wife has more power over him than the state has. Honore de BalzacThe majority of husbands remind me of an orangutan trying to play the violin. Anne Bancroft The best way to get most husbands to do something is to suggest that perhaps theyre too old to do it. Erma Bombeck Marriage has no guarantees. If thats what youre looking for, go live with a car battery! Anonymous A good marriage is one where each partner secretly suspects they got the better deal. Winston  Churchill My most brilliant achievement was my ability to persuade my wife to marry me.

Saturday, October 19, 2019

Failure of Chinas Cultural Revolution Essay Example | Topics and Well Written Essays - 2750 words

Failure of Chinas Cultural Revolution - Essay Example The Red Guards generation benefited from neither Maoist socialism nor Dengist reform. Mao's revolution abandoned them, sweeping them out of urban centers; Deng's reform left them on the sidelines when China moved to embrace the market. In Mao's era, the Red Guards generation was the poorest of all poor Chinese, living at the lowest income level. This poverty impeded they are exploiting the opportunities of Deng's reforms. The increasing costs of economic reform often started with them, further diminishing their capacity for competing in the market. Mao's revolution made them poor, forcing them to live a terrible life without economic liberty or any chance of improvement. It was even more painful when Deng's reform left them poor while Deng's regime glorified the rich (Tsou, 1996). Ever since they had been forced into society, they had been living on an income that only kept body and soul together. For those in the cities, working life began with an apprenticeship in factories, at 18 Yuan a month. When Deng's reform began, they had climbed to the second lowest grade of China's eight-grade salary system for workers, having a monthly salary of less than 40 Yuan. In the 1970s and early 1980s, this salary allowed them some small savings, but it often took them 1 or 2 years before they could buy a Shanghai-produced watch or bicycle, each priced at around 150 Yuan. Of those who went to the countryside, a minority was assigned to the military-imitated 'farming corps'. (Dutton, 2004)They first lived on a monthly subsidy of about 15 Yuan and later, when they had to pay for their own food, on a stipend system with '285 dimes' a month, as one sent-down youth mocked it. The majority had been forced into the villages and lived on a 'points system'  Ã‚  of people's communes. If a sent-down youth became a ten-points laborer (the highest rank), his (or her) 1-day work in most areas was valued at 30-50 cents on the village's account. If he worked over 330 days, at the end of t he year he might get 40-60 Yuan after the deduction of the costs of the grain and other agricultural products he had received during the year. In a few areas ten-points a day was worth over 1 Yuan, but in many areas ten-points a day was worth 20, 10 or only 7 cents. Even worse, the sent-down youths were often not regarded as ten-points laborers. (Yang, 1997) Those in the cities were among the poorest because they were at the bottom of the urban salary ladder that was framed on seniority. Those in the 'farming corps' were among the poorest because they were treated as the lowest ranked 'farming soldiers' (bingtuan Shashi), while others in their 'corps' were either 'farming officers' or 'farming workers', living on a slightly higher salary.

Friday, October 18, 2019

Design a management control system to measure the iphone's success as Essay

Design a management control system to measure the iphone's success as an established brand - Essay Example Current Apple Product Offering One area of business that Apple seems to concentrate a great deal of resources is Research and Development (R&D). As the source of many loyal consumers’ frustration about the company, Apple is always upgrading their products (Chamberlin, 2011), presenting iPad 2, for example, less than one year after April 3, 2010 release date of the original iPad (InfoSync World, 2010). The two newest product categories Apple has introduced are the iPad and iPhone (Apple Inc., 2011). Other product categories the company offers include the iPod, a music device that comes in various sizes, styles, and storage capacities, such as iPod Shuffle, iPod Nano, iPod Touch, and iPod Classic. Apple also manufactures laptop and desktop computers called the MacBook and iMac, which also have other styles, sizes, and names, such as MacBook Pro, MacBook Air, Mac Mini, and Mac Pro (Apple Inc., 2011). Shareholder Value or Financial Perspective The financial objectives identified i n this section focus on market share, profits, and utilization of current assets. A company with unsold inventory is losing money every day they do not sell the products (The Business Place, 2009). Tracking the sale of these products by store and moving unused inventory to geographic locations that have potential to sell, if the products are available, as opposed to being manufactured, it is an excellent starting point. Continuing to monitor the location of all inventory and keeping the products mobile will help the company to achieve both of the other objectives in this section, which are increasing market share and profits. Customer Value Perspective In the section focusing on the company’s current and potential customers, the objectives are enriching relationships with current customers, reducing paperwork completed by employees, and generating â€Å"buzz† about new products like the iPhone. Customers do not want to feel as though they are simply revenue for the org anization. Taking time out to focus on the customers, gives the company an opportunity to gain insight through feedback they offer (Walinskas, 2011). If the customer is having issues, the company is aware of them before the customer complains. With the vast amount of technology available as forums for product complaints such as Twitter, Facebook and other social networking sites, and YouTube, customer satisfaction is a top priority (Bensen, 2010). Reducing the amount of paperwork completed by employees, potentially frees up time for these groups to spend focusing on the customer; proactivity requires attention. Customers appreciate immediate notification if a foreseen problem exists. Process or Internal Operation Perspective The two focuses of the three objectives in this section are training and communication. Empowering and developing employees, makes them more of an asset to the company. Knowledge is power, and educated employees ultimately make customers happier (Hobbs, 2011). C ommunicating this knowledge is the second piece of the process. Trained employees are not effective if they do not share their education with peers, customers, management, and all who they interact with during the regular course of business. Customers want

Peyotism and the Native American Church Essay Example | Topics and Well Written Essays - 750 words

Peyotism and the Native American Church - Essay Example Peyotism is, essentially, the ingestion of the Peyote, a psychoactive, small, spineless cactus, for religious purposes. Peyote is native to certain parts of Texas and Mexico, and the tribes that settled there have been reported to use it for a long time. There are Inquisition cases that dealt with peyote usage as early as 1614 (Stewart 1980:300). Though there are many prevailing theories about the exact route through which peyote use came to the Native American tribes that were not settled in the regions were this cactus grows, however, this much is clear that the tribes that practiced peyotism taught the practice to either those they had captured, or took the religious practice with them even when they were displaced from their original settlements. According to Stewart, it was the Lipan who were primary contributors to the course that led to the founding of the Peyote Religion in Oklahoma (1974:218), and La Barre agrees (49). Slowly, but surely, peyotism spread; it took on many asp ects of both traditional religious rituals of the Native Americans, along with amalgamating Christian themes within. La Barre states that as early as 1876, the Oto and the Sac were learning a Christianized version of Peyotism from the Tonkawa directly (as cited in Stewart 1974:216). Peyotism evolved and became what is now the Native American Church: a Christian church, with many Native American rituals. Just where the syncretism originated is not quite clear, but the fact remains that the members of this Church consider themselves to be practicing something that â€Å"incorporates distinctly Christian teaching and practices† (Feraca 2001:60). But the fact that most of their practices are frowned upon by the Catholics and the Protestants alike (La Barre 1960) for being incompatible with their practices clearly shows that there are some distinct native rituals that are practiced by this Church. Feraca maintains that at first glance, the paraphernalia used during Church meetings , both of the Half Moon and the Cross Fire sects, looks non-Christian (2001:61). The traditional beaded staff, the single-headed metal drum with three legs of the Cross Fire, and the peyote all are seemingly alien to Christianity, however, to Church goers they represent the walking staff of Christ, the three legs the Trinity, and the peyote itself is the host (ibid.). Similarly, the eagle, the turtle and the water bird symbols used by the Half Moon are considered to be the Father, Son, and Holy Spirit respectively (Ruby 2010:59). All these symbols, paraphernalia and rituals were part of the traditional religions of the tribes, but have now been amalgamated into a new form of Christianity that is practiced by the Natives almost exclusively. Emerson Spider, Sr., who was a Reverend of the Native American Church, when talking about this fusion put it so, â€Å"We are Indian people, and we still have some of our traditional ways†¦There are traditional things that we still have†¦because we grew up with them and we’re Indians† (1987:207). In his article about revitalization movements, Anthony Wallace states that revitalization movements take place when there is dissatisfaction amongst most of the population with the cultural

Aviation Research Paper Scholarship Essay Example | Topics and Well Written Essays - 1250 words

Aviation Research Paper - Scholarship Essay Example Hence, patents are related with invention, trademarks relate to distinguish a company or good fro others and copyright is related to the originality and artistic creativity. All these forms are protected by specific laws. There are certain factors that a company has to consider for protecting its inventions doing business in multiple countries. These factors can be categorized by marketing factors and the legal factors. While considering the marketing factors, the company has to determine if it is better to diffuse the technology so the product rises to the position of dominance or to protect the invention so the competitors may not be able to copy it. At the legal front, the company has to consider the possibilities of real protection given by the host country. Every country has its own means and methods to protect the intentions. Thus, if the company find it difficult to protect the invention, it may consider relying on trade secrets instead. There are two distinct reasons why a company should consider protecting the product through trade secret laws instead of patent and copyrights. First, the company has to adopt the trade secret policy when the formula is not patentable. Second, the company should prefer trade secret when it finds it appropriate to expose the product to the public without apprehension of loosing the underlying technology to the competitors. Cloni Q # 4. Cloning is the form of imitating an invention or product which successfully utilizes the technology without violating the copyright, patents, trade secret and/or the trademarks legality. The example of Compaq imitating IBM's BIOS is a vivid illustration how a company skilfully imitate a technology and still no legal action can be taken against it. Q # 5. Microsoft Windows operating system is an example that lies on the continuum of wholly proprietary system. Q # 6. There are many factors that influenced Microsoft to adopt the wholly proprietary system. First, Microsoft wants to monopolize the market as it is the main controller of the software market. Second, there are numerous software companies producing their software running on different operating systems. Thus, if Microsoft decides for the wholly open system there is very likelihood that other software companies would develop modify the operating system to suit their own software. Chapter Ten Q. # 1 There are certain advantages of large companies over the small ones. The biggest difference between large and small companies is there budget and financial resources that allow the large companies to invest heavily for engaging their scientists and researchers for further innovations. Apart from financial resources, the human resources also contribute significantly for the success of large companies. Thus, the large companies can outperform small companies due to their extended resources. On the other hand, small companies also have some advantages over the large ones. Most importantly, they can concentrate more on their limited resources to achieve instant results of their research. Further, there is limited bureaucratic hindrances that undermine the efforts of large firms. Q # 2: Formalization can help the organization to facilitate and streamline their administrative works so the workers and customers can interact effectively and the organization work is carried out smoothly. Formalization also reduces the burden of too many

Thursday, October 17, 2019

WOTS UP Analysis and Company Capability Profile for Roche Essay

WOTS UP Analysis and Company Capability Profile for Roche - Essay Example The paper tells that throughout the years, Roche has followed a policy of making strategic acquisitions and divestures to position the company for growth and ensure it remains at the forefront of the health industry. It is important to provide a safe, quality, and cost efficient products in order to open up new avenues for growth. However, in order to build on these the company needs to overcome the strengths and weaknesses to have a strong stage for future growth. The Company Capability Profile, which examines a company's Strengths and Weaknesses by assess the degree of its Managerial, Competitive, Financial, and Technical Strength and Weakness. In order for this to happen, the establishment must perform a company capability profile to assess its internal environment for particular strengths and weaknesses that must be addressed. Finally, a strategic position and action evaluation takes into account the firm’s financial strengths and competitive advantages with respect to the strength of its industry and the overall environmental stability. WOTS-UP Analysis, short for as Weaknesses, Opportunities, Threats, and Strength, is a highly effective method used for information gathered via a funnel process. This will help the Planning Committee highlight major issues and then narrow them to the few that are most vital. These decisions will help create a mission statement, select priority roles, and identify goals and objectives. WOTS-UP Analysis captures the strengths and weakness within Roche and the opportunities and threats that exist in their surroundings. ... also be done to takes into account the firm's financial strengths and competitive advantages with respect to the strength of its industry and the overall environmental stability. WOTS-UPp Analysis By: Michelle Wong WOTS-UPp Analysis, short for as Weaknesses, Opportunities, Threats, and Strength, is a highly effective method used for synthesizing information gathered on aspects that may be internal or external to the company via a funnel process. This will helps the companyPlanning Committee highlight major issues and then narrow them to the few that are most vital. These decisions will help create a mission statement, select priority roles, and identify goals and objectives. WOTS-UPp Analysis captures the Sstrengths and Wweaknesses within Roche and the Oopportunities and Tthreats that exist outside in theirits surroundings. These analyses emphasize areas to be leveraged and stress areas for improvement within the firm and within their industry and market. iv Company Capability Profile: Roche Central Nervous System Segment Company Capability Profile: Central Nervous System By: Michelle Wong Managerial Factors By: Michelle Wong The key to reviving Roche's own drug development is new to emphasize value-based management, more consistent with the systematic "Winning For The Future" manifesto. Especially Wwithin the past decades especially, Roche played a much less significant role in the Central Nervous System segment of the pharmaceuticals market, which accounted for which accounted for .16% of the market share globally. Although, Rocheit is managesing to exceed its limitsobjectives in its Oncology and Diagnostic segments, but if Roche does not stand uptake action and start to learn how to balance in all segments then Roche's corporate image will be

Documentary Cinema Response Journals Movie Review

Documentary Cinema Response Journals - Movie Review Example Glass (1958) was a short documentary film of the Netherlands, which was directed by Bert Haanstra who was a Dutch director.The main plot of the film surrounded the glass industry of Netherlands. The film was allowed its viewers to reciprocate with handmade crystals of Dutch society, in contrary to the machine made a portion of Royal Leerdam Glass Factory with automated machines that facilitated bottle making. Haanstra’s strong stylistic interventions depicted the film through a polemical space. He has used essential origins of film language, which includes the image, sounds, and montage. My point of view regarding the documentary was largely focused on a diversified range of music jazz to techno. In the short segment of time in this documentary, artisans created various glass goods by their own hands and added up to the mass production of diversified glass product of Netherlands. According to the viewers, this short documentary film often acclaimed to be a perfect short docume ntary that successfully spun around the subject and aligned the overall basic plot of the movie. The House is Black (1962) was an Iranian short documentary film, directed by Forough Farrokhzad. The film reflected on the other side of life and suffering in a leper colony as well as focused on the human condition in reflection to the beauty of creation that has been depicted in the documentary. The director Farrokhzad, used some quotation from the Old Testament, as well as Quran along with her own poetry. This poetic feel gave this film a versatile dimension that was absent in the other similar types of documentary films. The artistic views of the poet also reflected from the unique selection of the name of the film that was aligned with the needs of the subject. The documentary based on the story of the â€Å"Behkadeh Rail colony†. The director has directed only one film throughout her life. Additionally, this particular film has been successful in developing an attention outside Iran, after its release, the film was successfully recognized as a milestone of Iranian film Industry. Many of

Wednesday, October 16, 2019

Aviation Research Paper Scholarship Essay Example | Topics and Well Written Essays - 1250 words

Aviation Research Paper - Scholarship Essay Example Hence, patents are related with invention, trademarks relate to distinguish a company or good fro others and copyright is related to the originality and artistic creativity. All these forms are protected by specific laws. There are certain factors that a company has to consider for protecting its inventions doing business in multiple countries. These factors can be categorized by marketing factors and the legal factors. While considering the marketing factors, the company has to determine if it is better to diffuse the technology so the product rises to the position of dominance or to protect the invention so the competitors may not be able to copy it. At the legal front, the company has to consider the possibilities of real protection given by the host country. Every country has its own means and methods to protect the intentions. Thus, if the company find it difficult to protect the invention, it may consider relying on trade secrets instead. There are two distinct reasons why a company should consider protecting the product through trade secret laws instead of patent and copyrights. First, the company has to adopt the trade secret policy when the formula is not patentable. Second, the company should prefer trade secret when it finds it appropriate to expose the product to the public without apprehension of loosing the underlying technology to the competitors. Cloni Q # 4. Cloning is the form of imitating an invention or product which successfully utilizes the technology without violating the copyright, patents, trade secret and/or the trademarks legality. The example of Compaq imitating IBM's BIOS is a vivid illustration how a company skilfully imitate a technology and still no legal action can be taken against it. Q # 5. Microsoft Windows operating system is an example that lies on the continuum of wholly proprietary system. Q # 6. There are many factors that influenced Microsoft to adopt the wholly proprietary system. First, Microsoft wants to monopolize the market as it is the main controller of the software market. Second, there are numerous software companies producing their software running on different operating systems. Thus, if Microsoft decides for the wholly open system there is very likelihood that other software companies would develop modify the operating system to suit their own software. Chapter Ten Q. # 1 There are certain advantages of large companies over the small ones. The biggest difference between large and small companies is there budget and financial resources that allow the large companies to invest heavily for engaging their scientists and researchers for further innovations. Apart from financial resources, the human resources also contribute significantly for the success of large companies. Thus, the large companies can outperform small companies due to their extended resources. On the other hand, small companies also have some advantages over the large ones. Most importantly, they can concentrate more on their limited resources to achieve instant results of their research. Further, there is limited bureaucratic hindrances that undermine the efforts of large firms. Q # 2: Formalization can help the organization to facilitate and streamline their administrative works so the workers and customers can interact effectively and the organization work is carried out smoothly. Formalization also reduces the burden of too many

Tuesday, October 15, 2019

Documentary Cinema Response Journals Movie Review

Documentary Cinema Response Journals - Movie Review Example Glass (1958) was a short documentary film of the Netherlands, which was directed by Bert Haanstra who was a Dutch director.The main plot of the film surrounded the glass industry of Netherlands. The film was allowed its viewers to reciprocate with handmade crystals of Dutch society, in contrary to the machine made a portion of Royal Leerdam Glass Factory with automated machines that facilitated bottle making. Haanstra’s strong stylistic interventions depicted the film through a polemical space. He has used essential origins of film language, which includes the image, sounds, and montage. My point of view regarding the documentary was largely focused on a diversified range of music jazz to techno. In the short segment of time in this documentary, artisans created various glass goods by their own hands and added up to the mass production of diversified glass product of Netherlands. According to the viewers, this short documentary film often acclaimed to be a perfect short docume ntary that successfully spun around the subject and aligned the overall basic plot of the movie. The House is Black (1962) was an Iranian short documentary film, directed by Forough Farrokhzad. The film reflected on the other side of life and suffering in a leper colony as well as focused on the human condition in reflection to the beauty of creation that has been depicted in the documentary. The director Farrokhzad, used some quotation from the Old Testament, as well as Quran along with her own poetry. This poetic feel gave this film a versatile dimension that was absent in the other similar types of documentary films. The artistic views of the poet also reflected from the unique selection of the name of the film that was aligned with the needs of the subject. The documentary based on the story of the â€Å"Behkadeh Rail colony†. The director has directed only one film throughout her life. Additionally, this particular film has been successful in developing an attention outside Iran, after its release, the film was successfully recognized as a milestone of Iranian film Industry. Many of

Maintaining Race and Ethnic Identity Essay Example for Free

Maintaining Race and Ethnic Identity Essay The world we are living is very dynamic and exhibits various types of movements for both plants and animals including humans. History insinuates that man practiced considerable movements from one place to another since its first existence. This movement from one locality to another is referred to as migration. Migration can be 1) internal which is within the country, state or continent and maybe 2) international which crosses boundaries to other country, state or continent. With the development of technology and globalization, international migration continues to increase over the past decades. In 1960, there were 76 million international migrants and increased to 191 million international migrants in 2006. It was noted that a relatively high migration rate is from 1985 to 1990. Generally, ethnic identity diversifies according to the length of distance and therefore international migration increases the gap of connectivity in relation to ethnicity. Human migration can be classified as permanent or semi-permanent depending on their reasons which maybe voluntary or involuntary. Voluntary migration is generally practiced in search for a â€Å"greener pasture† and satisfaction of one’s preferences. This includes employment, climate, food supply, self development like education, religion and family. Involuntary migration, on the other hand, includes migration due to calamity, political conditions like when in war or in exile, slave trades or human trafficking and ethnic cleansing. (Boyd, 2003) Refugees can eventually be immigrants. Based from Human Migration Guide of the National Geographic Society, â€Å"A refugee is a person who is residing outside the country of his or her origin due to fear of persecution for reasons of race, religion, nationality, membership in a particular social group, or political opinion. † (What is Human Migration? 2005) . This involuntary migration results to a hefty impact on self identity rather than voluntary migration. Human migration has taken a major participation in shaping and honing the present status of the population. It allows the diffusion and combination of the structures, cultures, beliefs, ideas, principles, religion, and other traits which results to the modification of each others traits. Rejection of the integration, however, sometimes results to conflict that may cause decline of socio-cultural capital and values. Although immigrants tend to maintain their ethnic identity and cultures at home, the children of the second, third generation is common or comparable with generations of the host country. This means that these generations are highly acculturated to the host community and country. Intentional or not intentional, this is in response to their quest for belongingness. On the other hand, some immigrants give high regard to their culture which is linked to nationalism. Some may even believe that there is no other culture than theirs and fail to recognize cultures of other immigrants within the community. Some host countries like Western European nations and Japan are deeply concern about the effect of these immigrants on their culture and ethnic identity which can be compromised. Oftentimes, conflict such as racial discrimination exist and become the subject of debates. Different countries have their own policies regarding immigration. Other countries begin to recognize immigrants with different race and cultures. They are respected in preserving their respective cultures and interact peacefully within one nation. This official policy is known as multiculturalism and can be seen in Canada, Australia and the U. K. It is also called as the cultural mosaic of different ethnic groups. Nevertheless, immigrant groups are still encouraged to learn the language of the host country and participate in the activities of the major society including labor force. However, this policy gained many criticisms such as it divides the people even there is a need to be united on certain social issues and justices. Debates on immigration law and racism are still on-going issues of every host country.

Monday, October 14, 2019

Examining The Sound Navigation Technique Of Sonar Engineering Essay

Examining The Sound Navigation Technique Of Sonar Engineering Essay Sonar means sound navigation and ranging is a technique that uses sound propagation (usually underwater, as in Submarine navigation) to navigate, communicate with or detect other vessels. Two types of technology share the name sonar: passive sonar is essentially listening for the sound made by vessels; active sonar is emitting pulses of sounds and listening for echoes. Sonar may be used as a means of acoustic location and of measurement of the echo characteristics of targets in the water. Acoustic location in air was used before the introduction of radar. Sonar may also be used in air for robot navigation, and SODAR upward looking in-air sonar) is used for atmospheric investigations. The term sonar is also used for the equipment used to generate and receive the sound. The acoustic frequencies used in sonar systems vary from very low (infrasonic) to extremely high (ultrasonic). The study of underwater sound is known as underwater acoustics or hydro acoustics History Although some animals (dolphins and bats) have used sound for communication and object detection for millions of years, use by humans in the water is initially recorded by Leonardo Da Vinci in 1490: a tube inserted into the water was said to be used to detect vessels by placing an ear to the tube.[citation needed] In the 19th century an underwater bell was used as an ancillary to lighthouses to provide warning of hazards. The use of sound to echo locate underwater in the same way as bats use sound for aerial navigation seems to have been prompted by the Titanic disaster of 1912. The worlds first patent for an underwater echo ranging device was filed at the British Patent Office by English meteorologist Lewis Richardson a month after the sinking of the Titanic, and a German physicist Alexander Behm obtained a patent for an echo sounder in 1913. Canadian Reginald Fessenden, while working for the Submarine Signal Company in Boston, built an experimental system beginning in 1912, a system later tested in Boston Harbor, and finally in 1914 from the U.S. Revenue (now Coast Guard) Cutter Miami on the Grand Banks off Newfoundland Canada. In that test, Fessenden demonstrated depth sounding, underwater communications (Morse Code) and echo ranging (detecting an iceberg at two miles (3 km) range). The so-called Fessenden oscillator, at ca. 500 Hz frequency, was unable to determine the bearing of the berg due to t he 3 meter wavelength and the small dimension of the transducers radiating face (less than 1 meter in diameter). The ten Montreal-built British H class submarines launched in 1915 were equipped with a Fessenden oscillator. During World War I the need to detect submarines prompted more research into the use of sound. The British made early use of underwater hydrophones, while the French physicist Paul Langevin, working with a Russian immigrant electrical engineer, Constantin Chilowski, worked on the development of active sound devices for detecting submarines in 1915 using quartz. Although piezoelectric and magnetostrictive transducers later superseded the electrostatic transducers they used, this work influenced future designs. Performance factors The detection, classification and localization performance of a sonar depends on the environment and the receiving equipment, as well as the transmitting equipment in an active sonar or the target radiated noise in a passive sonar. Sound propagation Sonar operation is affected by variations in sound speed, particularly in the vertical plane. Sound travels more slowly in fresh water than in sea water, though the difference is small. The speed is determined by the waters bulk modulus and mass density. The bulk modulus is affected by temperature, dissolved impurities (usually salinity), and pressure. The density effect is small. The speed of sound (in feet per second) is approximately: 4388 + (11.25 ÃÆ'- temperature (in  °F)) + (0.0182 ÃÆ'- depth (in feet)) + salinity (in parts-per-thousand ). This empirically derived approximation equation is reasonably accurate for normal temperatures, concentrations of salinity and the range of most ocean depths. Ocean temperature varies with depth, but at between 30 and 100 meters there is often a marked change, called the thermo cline, dividing the warmer surface water from the cold, still waters that make up the rest of the ocean. This can frustrate sonar, because a sound originating on one side of the thermo cline tends to be bent, or refracted, through the thermo cline. The thermo cline may be present in shallower coastal waters. However, wave action will often mix the water column and eliminate the thermo cline. Water pressure also affects sound propagation: higher pressure increases the sound speed, which causes the sound waves to refract away from the area of higher sound speed. The mathematical model of refraction is called Snells law. If the sound source is deep and the conditions are right, propagation may occur in the deep sound channel. This provides extremely low propagation loss to a receiver in the channel. This is because of sound trapping in the channel with no losses at the boundaries. Similar propagation can occur in the surface duct under suitable conditions. However in this case there are reflection losses at the surface. In shallow water propagation is generally by repeated reflection at the surface and bottom, where considerable losses can occur. Sound propagation is affected by absorption in the water itself as well as at the surface and bottom. This absorption depends upon frequency, with several different mechanisms in sea water. Long-range sonar uses low frequencies to minimize absorption effects. The sea contains many sources of noise that interfere with the desired target echo or signature. The main noise sources are waves and shipping. The motion of the receiver through the water can also cause speed-dependent low frequency noise. Scattering When active sonar is used, scattering occurs from small objects in the sea as well as from the bottom and surface. This can be a major source of interference. This acoustic scattering is analogous to the scattering of the light from a cars headlights in fog: a high-intensity pencil beam will penetrate the fog to some extent, but broader-beam headlights emit much light in unwanted directions, much of which is scattered back to the observer, overwhelming that reflected from the target (white-out). For analogous reasons active sonar needs to transmit in a narrow beam to minimize scattering. Target characteristics The sound reflection characteristics of the target of an active sonar, such as a submarine, are known as its target strength. A complication is that echoes are also obtained from other objects in the sea such as whales, wakes, schools of fish and rocks. Passive sonar detects the targets radiated noise characteristics. The radiated spectrum comprises a continuous spectrum of noise with peaks at certain frequencies which can be used for classification. Countermeasures 1) Active countermeasures may be launched by a submarine under attack to raise the noise level, provide a large false target, and obscure the signature of the submarine itself. 2) Passive countermeasures include: There is a mounting noise-generating device on isolating devices. We use a sound-absorbent coating on the hulls of submarines, for example anechoic tiles. Active sonarà   Active sonar uses a sound transmitter and a receiver. When the two are in the same place it is monostatic operation. When the transmitter and receiver are separated it is bistatic operation. When more transmitters (or more receivers) are used, again spatially separated, it is multistate operation. Most sonars are used monostatically with the same array often being used for transmission and reception. Active son buoy fields may be operated multistatically. Active sonar creates a pulse of sound, often called a ping, and then listens for reflections (echo) of the pulse. This pulse of sound is generally created electronically using a sonar Projector consisting of a signal generator, power amplifier and electro-acoustic transducer/array. A beam former is usually employed to concentrate the acoustic power into a beam, which may be swept to cover the required search angles. Generally, the electro-acoustic transducers are of the Tonpilz type and their design may be optimized to achieve maximum efficiency over the widest bandwidth, in order to optimize performance of the overall system. Occasionally, the acoustic pulse may be created by other means, e.g. (1) Chemically using explosives (2) Air guns (3) Plasma sound sources. To measure the distance to an object, the time from transmission of a pulse to reception is measured and converted into a range by knowing the speed of sound. To measure the bearing, several hydrophones are used, and the set measures the relative arrival time to each, or with an array of hydrophones, by measuring the relative amplitude in beams formed through a process called beam forming. Use of an array reduces the spatial response so that to provide wide cover multibeam systems are used. The targets signal (if present) together with noise is then passed through various forms of signal processing, which for simple sonars may be just energy measurement. It is then presented to some form of decision device that calls the output either the required signal or noise. This decision device may be an operator with headphones or a display, or in more sophisticated sonar this function may be carried out by software. Further processes may be carried out to classify the target and localize it, as well as measuring its velocity. The pulse may be at constant frequency or a chirp of changing frequency (to allow pulse compression on reception). Simple sonars generally use the former with a filter wide enough to cover possible Doppler changes due to target movement, while more complex ones generally include the latter technique. Since digital processing became available pulse compression has usually been implemented using digital correlation techniques. Military sonars often have multiple beams to provide all-round cover while simple ones only cover a narrow arc, although the beam may be rotated, relatively slowly, by mechanical scanning. Particularly when single frequency transmissions are used, the Doppler effect can be used to measure the radial speed of a target. The difference in frequency between the transmitted and received signal is measured and converted into a velocity. Since Doppler shifts can be introduced by either receiver or target motion, allowance has to be made for the radial speed of the searching platform. One of the useful small sonar is similar in appearance to a waterproof flashlight. The head is pointed into the water, a button is pressed, and the device displays the distance to the target. Another variant is a fish finder that shows a small display with shoals of fish. Some civilian sonars approach active military sonars in capability, with quite exotic three-dimensional displays of the area near the boat. When active sonar is used to measure the distance from the transducer to the bottom, it is known as echo sounding. Similar methods may be used looking upward for wave measurement. Active sonar is also used to measure distance through water between two sonar transducers or a combination of a hydrophone (underwater acoustic microphone) and projector (underwater acoustic speaker). A transducer is a device that can transmit and receive acoustic signals (pings). When a hydrophone/transducer receives a specific interrogation signal it responds by transmitting a specific reply signal. To measure distance, one transducer/projector transmits an interrogation signal and measures the time between this transmission and the receipt of the other transducer/hydrophone reply. The time difference, scaled by the speed of sound through water and divided by two, is the distance between the two platforms. This technique, when used with multiple transducers/hydrophones/projectors, can calculate the relative positions of static and moving objects in water. In combat situations, an active pulse can be detected by an opponent and will reveal a submarines position. A very directional, but low-efficiency, type of sonar makes use of a complex nonlinear feature of water known as non-linear sonar, the virtual transducer being known as a parametric array. Project ARTEMIS Project ARTEMIS was one-of-a-kind low-frequency sonar for surveillance that was deployed off Bermuda for several years in the early 1960s. The active portion was deployed from a World War II tanker, and the receiving array was a built into a fixed position on an offshore bank. Transponder This is an active sonar device that receives a stimulus and immediately retransmits the received signal or a predetermined one. Passive sonar Passive sonar listens without transmitting. It is often employed in military settings, although it is also used in science applications, e.g., detecting fish for presence/absence studies in various aquatic environments see also passive acoustics and passive radar. In the very broadest usage, this term can encompass virtually any analytical technique involving remotely generated sound, though it is usually restricted to techniques applied in an aquatic environment. Identifying sound sources Passive sonar has a wide variety of techniques for identifying the source of a detected sound. For example, U.S. vessels usually operate 60 Hz alternating current power systems. If transformers or generators are mounted without proper vibration insulation from the hull or become flooded, the 60 Hz sound from the windings can be emitted from the submarine or ship. This can help to identify its nationality, as most European submarines have 50 Hz power systems. Intermittent sound sources (such as a wrench being dropped) may also be detectable to passive sonar. Until fairly recently, an experienced trained operator identified signals, but now computers may do this. Passive sonar systems may have large sonic databases, but the sonar operator usually finally classifies the signals manually. A computer system frequently uses these databases to identify classes of ships, actions (i.e. the speed of a ship, or the type of weapon released), and even particular ships. Publications for classification of sounds are provided by and continually updated by the US Office of Naval Intelligence. Noise limitations Passive sonar on vehicles is usually severely limited because of noise generated by the vehicle. For this reason, many submarines operate nuclear reactors that can be cooled without pumps, using silent convection, or fuel cells or batteries, which can also run silently. Vehicles propellers are also designed and precisely machined to emit minimal noise. High-speed propellers often create tiny bubbles in the water, and these cavitations have a distinct sound. The sonar hydrophones may be towed behind the ship or submarine in order to reduce the effect of noise generated by the watercraft itself. Towed units also combat the thermo cline, as the unit may be towed above or below the thermo cline. The display of most passive sonars used to be a two-dimensional waterfall display. The horizontal direction of the display is bearing. The vertical is frequency, or sometimes time. Another display technique is to color-code frequency-time information for bearing. More recent displays are generated by the computers, and mimic radar-type plan position indicator displays. Performance prediction Unlike active sonar, only one way propagation is involved. Because of the different signal processing used, the minimum detectable signal to noise ratio will be different. The equation for determining the performance of passive sonar is: SL à ¢Ã‹â€ Ã¢â‚¬â„¢ TL = NL à ¢Ã‹â€ Ã¢â‚¬â„¢ DI + DT where SL is the source level, TL is the transmission loss, NL is the noise level, DI is the directivity index of the array (an approximation to the array gain) and DT is the detection threshold. The figure of merit of passive sonar is: FOM = SL + DI à ¢Ã‹â€ Ã¢â‚¬â„¢ (NL + DT). Warfare Modern naval warfare makes extensive use of both passive and active sonar from water-borne vessels, aircraft and fixed installations. The relative usefulness of active versus passive sonar depends on the radiated noise characteristics of the target, generally a submarine. Although in WW II active sonar was used by surface craft-submarines avoided emitting pings which revealed their presence and position-with the advent of modern signal-processing passive sonar became preferred for initial detection. Submarines were then designed for quieter operation, and active sonar is now more used. In 1987 a division of Japanese company Toshiba reportedly sold machinery to the Soviet Union that allowed it to mill submarine propeller blades so that they became radically quieter, creating a huge security issue with their newer generation of submarines. Active sonar gives the exact bearing to a target, and sometimes the range. Active sonar works the same way as radar: a signal is emitted. The sound wave then travels in many directions from the emitting object. When it hits an object, the sound wave is then reflected in many other directions. Some of the energy will travel back to the emitting source. The echo will enable the sonar system or technician to calculate, with many factors such as the frequency, the energy of the received signal, the depth, the water temperature, the position of the reflecting object, etc. Active sonar is used when the platform commander determines that it is more important to determine the position of a possible threat submarine than it is to conceal his own position. With surface ships it might be assumed that the threat is already tracking the ship with satellite data. Any vessel around the emitting sonar will detect the emission. Having heard the signal, it is easy to identify the sonar equipment used and its position. Active sonar is similar to radar in that, while it allows detection of targets at a certain range, it also enables the emitter to be detected at a far greater range, which is undesirable. Since active sonar reveals the presence and position of the operator, and does not allow exact classification of targets, it is used by fast (planes, helicopters) and by noisy platforms but rarely by submarines. When active sonar is used by surface ships or submarines, it is typically activated very briefly at intermittent periods to minimize the risk of detection. Consequently active sonar is normally considered a backup to passive sonar. In aircraft, active sonar is used in the form of disposable son buoys that are dropped in the aircrafts patrol area or in the vicinity of possible enemy sonar contacts. Passive sonar has several advantages. Most importantly, it is silent. If the target radiated noise level is high enough, it can have a greater range than active sonar, and allows the target to be identified. Since any motorized object makes some noise, it may in principle be detected, depending on the level of noise emitted and the ambient noise level in the area, as well as the technology used. To simplify, passive sonar sees around the ship using it. On a submarine, nose-mounted passive sonar detects in directions of about 270 °, centered on the ships alignment, the hull-mounted array of about 160 ° on each side, and the towed array of a full 360 °. The invisible areas are due to the ships own interference. Once a signal is detected in a certain direction (which means that something makes sound in that direction, this is called broadband detection) it is possible to zoom in and analyze the signal received (narrowband analysis). This is generally done using a Fourier transform to show the different frequencies making up the sound. Since every engine makes a specific sound, it is straightforward to identify the object. Databases of unique engine sounds are part of what is known as acoustic intelligence or ACINT. Another use of passive sonar is to determine the targets trajectory. This process is called Target Motion Analysis (TMA), and the resultant solution is the targets range, course, and speed. TMA is done by marking from which direction the sound comes at different times, and comparing the motion with that of the operators own ship. Changes in relative motion are analyzed using standard geometrical techniques along with some assumptions about limiting cases. Passive sonar is stealthy and very useful. However, it requires high-tech electronic components and is costly. It is generally deployed on expensive ships in the form of arrays to enhance detection. Surface ships use it to good effect; it is even better used by submarines, and it is also used by airplanes and helicopters, mostly to a surprise effect, since submarines can hide under thermal layers. If a submarines commander believes he is alone, he may bring his boat closer to the surface and be easier to detect, or go deeper and faster, and thus make sounder. Examples of sonar applications in military use are given below. Many of the civil uses given in the following section may also be applicable to naval use. Anti-submarine warfare Variable Depth Sonar and its winch until recently, ship sonars were usually with hull mounted arrays, either amidships or at the bow. It was soon found after their initial use that a means of reducing flow noise was required. The first were made of canvas on a framework, and then steel ones were used. Now domes are usually made of reinforced plastic or pressurized rubber. Such sonars are primarily active in operation. An example of conventional hull mounted sonar is the SQS-56. Because of the problems of ship noise, towed sonars are also used. These also have the advantage of being able to be placed deeper in the water. However, there are limitations on their use in shallow water. These are called towed arrays (linear) or variable depth sonars (VDS) with 2/3D arrays. A problem is that the winches required to deploy/recover these are large and expensive. VDS sets are primarily active in operation while towed arrays are passive. An example of a modern active/passive ship towed sonar is Sonar 2087 made by Thales Underwater Systems. Torpedoes Modern torpedoes are generally fitted with active/passive sonar. This may be used to home directly on the target, but wake following torpedoes are also used. An early example of an acoustic homer was the Mark 37 torpedo. Torpedo countermeasures can be towed or free. An early example was the German Sieglinde device while the Pillenwerfer was a chemical device. A widely used US device was the towed Nixie while MOSS submarine simulator was a free device. A modern alternative to the Nixie system is the UK Royal Navy S2170 Surface Ship Torpedo Defense system. Mines Mines may be fitted with a sonar to detect, localize and recognize the required target. Further information is given in acoustic mine and an example is the CAPTOR mine. Mine countermeasures Mine Countermeasure (MCM) Sonar, sometimes called Mine and Obstacle Avoidance Sonar (MOAS), is a specialized type of sonar used for detecting small objects. Most MCM sonars are hull mounted but a few types are VDS design. An example of a hull mounted MCM sonar is the Type 2193 while the SQQ-32 Mine-hunting sonar and Type 2093 systems are VDS designs. See also Minesweeper (ship) Submarine navigation Submarines rely on sonar to a greater extent than surface ships as they cannot use radar at depth. The sonar arrays may be hull mounted or towed. Information fitted on typical fits is given in Yoshiro class submarine and Swift sure class submarine. Aircraft Helicopters can be used for antisubmarine warfare by deploying fields of active/passive son buoys or can operate dipping sonar, such as the AQS-13. Fixed wing aircraft can also deploy son buoys and have greater endurance and capacity to deploy them. Processing from the son buoys or dipping sonar can be on the aircraft or on ship. Helicopters have also been used for mine countermeasure missions using towed sonars such as the AQS-20A Ocean surveillance For many years, the United States operated a large set of passive sonar arrays at various points in the worlds oceans, collectively called Sound Surveillance System (SOSUS) and later Integrated Undersea Surveillance System (IUSS). A similar system is believed to have been operated by the Soviet Union. As permanently mounted arrays in the deep ocean were utilized, they were in very quiet conditions so long ranges could be achieved. Signal processing was carried out using powerful computers ashore. With the ending of the Cold War a SOSUS array has been turned over to scientific use. Underwater security Sonar can be used to detect frogmen and other scuba divers. This can be applicable around ships or at entrances to ports. Active sonar can also be used as a deterrent and/or disablement mechanism. One such device is the Cerberus system. Hand-held sonar Limpet Mine Imaging Sonar (LIMIS) is hand-held or ROV-mounted imaging sonar designed for patrol divers (combat frogmen or clearance divers) to look for limpet mines in low visibility water. The LUIS is imaging sonar for use by a diver. Integrated Navigation Sonar System (INSS) is small flashlight-shaped handheld sonar for divers that display range. Intercept sonar This is sonar designed to detect and locate the transmissions from hostile active sonars. An example of this is the Type 2082 fitted on the British Vanguard class submarines. Uses in daily life Fisheries Fishing is an important industry that is seeing growing demand, but world catch tonnage is falling as a result of serious resource problems. The industry faces a future of continuing worldwide consolidation until a point of sustainability can be reached. However, the consolidation of the fishing fleets are driving increased demands for sophisticated fish finding electronics such as sensors, sounders and sonars. Historically, fishermen have used many different techniques to find and harvest fish. However, acoustic technology has been one of the most important driving forces behind the development of the modern commercial fisheries. Sound waves travel differently through fish than through water because a fishs air-filled swim bladder has a different density than seawater. This density difference allows the detection of schools of fish by using reflected sound. Acoustic technology is especially well suited for underwater applications since sound travels farther and faster underwater than in air. Today, commercial fishing vessels rely almost completely on acoustic sonar and sounders to detect fish. Fishermen also use active sonar and echo sounder technology to determine water depth, bottom contour, and bottom composition. Cabin display of fish finder sonar Companies such as Ray marine UK makes a variety of sonar and acoustic instruments for the deep sea commercial fishing industry. For example, net sensors take various underwater measurements and transmit the information back to a receiver onboard a vessel. Each sensor is equipped with one or more acoustic transducers depending on its specific function. Data is transmitted from the sensors using wireless acoustic telemetry and is received by a hull mounted hydrophone. The analog signals are decoded and converted by a digital acoustic receiver into data which is transmitted to a bridge computer for graphical display on a high resolution monitor. Echo sounding An echo-sounder sends an acoustic pulse directly downwards to the seabed and records the returned echo. The sound pulse is generated by a transducer that emits an acoustic pulse and then listens for the return signal. The time for the signal to return is recorded and converted to a depth measurement by calculating the speed of sound in water. As the speed of sound in water is around 1,500 meters per second, the time interval, measured in milliseconds, between the pulse being transmitted and the echo being received, allows bottom depth and targets to be measured. The value of underwater acoustics to the fishing industry has led to the development of other acoustic instruments that operate in a similar fashion to echo-sounders but, because their function is slightly different from the initial model of the echo-sounder, have been given different terms. Net location The net sounder is an echo sounder with a transducer mounted on the headline of the net rather than on the bottom of the vessel. Nevertheless, to accommodate the distance from the transducer to the display unit, which is much greater than in a normal echo-sounder, several refinements have to be made. Two main types are available. The first is the cable type in which the signals are sent along a cable. In this case there has to be the provision of a cable drum on which to haul, shoot and stow the cable during the different phases of the operation. The second type is the cable less net-sounder such as Marports Trawl Explorer in which the signals are sent acoustically between the net and hull mounted receiver/hydrophone on the vessel. In this case no cable drum is required but sophisticated electronics are needed at the transducer and receiver. The display on a net sounder shows the distance of the net from the bottom (or the surface), rather than the depth of water as with the echo-sounders hull-mounted transducer. Fixed to the headline of the net, the footrope can usually be seen which gives an indication of the net performance. Any fish passing into the net can also be seen, allowing fine adjustments to be made to catch the most fish possible. In other fisheries, where the amount of fish in the net is important, catch sensor transducers are mounted at various positions on the cod-end of the net. As the cod-end fills up these catch sensor transducers are triggered one by one and this information is transmitted acoustically to display monitors on the bridge of the vessel. The skipper can then decide when to haul the net. Modern versions of the net sounder, using multiple element transducers, function more like sonar than an echo sounder and show slices of the area in front of the net and not merely the vertical view that the initial net sounders used. The sonar is an echo-sounder with a directional capability that can show fish or other objects around the vessel good Ship velocity measurement Sonars have been developed for measuring a ships velocity either relative to the water or to the bottom. Scientific applicationsà   Biomass estimation Detection of fish, and other marine and aquatic life, and estimation their individual sizes or total biomass using active sonar techniques. As the sound pulse travels through water it encounters objects that are of different density or acoustic characteristics than the surrounding medium, such as fish, that reflect sound back toward the sound source. These echoes provide information on fish size, location, abundance and behavior. Data is usually processed and analyzed using a variety of software such as Echo view. Wave measurement An upward looking echo sounder mounted on the bottom or on a platform may be used to make measurements of wave height and period. From this statistics of the surface conditions at a location can be derived. Water velocity measurem