Friday, November 29, 2019

Second Great Awakening Essay Example

Second Great Awakening Essay The Second Great Awakening was an enormous religious revival that swept the American nation in the beginning of the 19th century. A revival is defined by Webster Dictionary as the growth of something or an increase in the activity of some hint after a long period of no growth or activity. This revival caused an unfathomable amount of permanent change to the United States. The Second Great Awakening converted millions of Americans, resulted in several new denominations of faith, changed the the way the Name Rican people viewed religion, caused a long period of reform, and connected democracy an d religion. Between years 1765 and 181 5, an era called the American Enlightenment me phased reason, education, liberty, and tolerance over any divine power. This Enlighten moment, or Age of Reason, brought the New World ideas from the Old World, such as John Locke s social contract theory, ideas concerning democracy and liberty, and a vision of a stir Eng government that protected its citizens; these radical new political ideas rejected monarchy and ultimately caused the American Revolution in 1776. The American Enlightenment also re evolved around human control rather than spiritual control. For example Deism, a philosophy hat God created the universe with set natural laws and then left it completely in humanity co intro, began to grow in the U. S. This caused the new nation to drift from religion. However, in the 1 asss The Second Great Awakening ignited in Connecticut in order to counter the domino once of reason by emphasizing the importance of religion. The revival began with Congregation annalists (Puritan descendants), Anglicans (Episcopalian), and Quakers. Revivals were dominate deed by the educated, such as Yale president Timothy Dwight. We will write a custom essay sample on Second Great Awakening specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Second Great Awakening specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Second Great Awakening specifically for you FOR ONLY $16.38 $13.9/page Hire Writer As the revival continued to counter the American Age of Reason, it spread to the frontier. When it arrived in states us chi as Tennessee and Kentucky, it quickly evolved into a much different movement. The most successful revivalists ceased to be educated intellectuals and scholars, rather normal farmers, artisans, etc. Who had been converted themselves, such as the Eocene trick Lorenz DOD. The revival began to give way to camp meetings. These meetings were h age prolonged gatherings of hundreds of members of several denominations. Some meeting s had attendance that reached five figures such as the popular camp meeting that o occurred in Cane Ridge, Kentucky, which reached 20,000. The meetings were conducted in pope air camps and could last days. People were housed in tents and heated with campfires. Crowds sang, shouted, praised God, and listened to revivalists proclaim that the Second Co mining of Jesus was approaching and society must be improved immediately. The meetings e encouraged moral and social order that discouraged inappropriate behavior. Sometimes strange conversion activities would occur such as men and women barking like a dog, rolling around, and contorting their bodies. Critics of the revivals attacked the meetings for a advocating desire. Also preaching the gospel in the West were missionary groups such as the American Home Missionary Society, created in 1826. Many denominations grew as a result oft he revivalists, especially Baptists and Methodists. Methodists were undoubtedly the most successful religion Of the Second Great Awakening concerning sheer numbers and popularity. In 1800, Methodists possessed around 70,000 members, and in 1844 over 1 T his is partly due to the utilization of circuit riders, such as Peter Cartridge, who preached of benevolence to all who would listen . Circuit riders were young men that rode around the n action spoke the word of the Methodist church. Another reason for Methodist success, was the r appeal to the common man. Methodists emphasized the importance of emotion over Intel genre, moral order, and a strong work ethic, which beguiled the common man with little e education. The result of the growing Methodist church was a revival that was very emotional and encouraged social activism. Due to the immense success of the revival in the frontier it WA s inevitable that it would soon diffuse eastward. 2 This inevitable advance occurred in the sass in western New York. The area where revival was most popular was nicknamed Vote Overburden District. This regime on was situated ear the new Erie Canal, which had attracted numerous people in search of w lath. This area was additionally home to many Americans Of Puritan descent. A man by the n name of Charles G. Finned, better known as the father of modern revivalism, quit his studies to become a lawyer in 1821 after he underwent a religious conversion. He then became a Presbyterian minister and began preaching along the new canal, New York City, and Boost n. Finned used new techniques to increase the rate of conversions. Such techniques include t he anxious seat and the protracted meeting. These techniques were put into place at t e citywide revival of the canal city Rochester in 1 83031. This revival was Fineness largest, and was a primary source of his reputation. Adding to Fineness reputation was the coop aeration among different denominations during his revivals. Fineness utilization of the above d extinguish him from other revivalists of his time, and those of the First Great Awakening beef re him. Also distinguishing Finned from First Great Awakening revivalists such as Jonathan Edwards was his view on revivals and sin. Finned believed revivals were human creation who areas Edwards would argue they were Gods creations. Furthermore, Finned believed human s chose to sin and had the power to . He also rejected the Calvinist idea that God chooses who may enter heaven. Fineness ideas were labeled as evangelical Protestantism. S denomination focused on emotional conversions and the idea that humans a re in control of their own destinies. This appealed to most Americans because this was the ere a of the factory worker. Factory workers had miniscule control over the economy or the direct ion of their lives so Fineness promise of control that came with the Second Great Awakening en courage them to participate in the revival. US citizens wanted to hear that they were in count roll and could make anything of themselves. The last thing that set Finned apart from other revivalists was 3 his use of women. This contributed to his success because women outnumber red men 2 to 1. Finned often used mens daughters and wives to convert them. For example, a wife of a Rochester physician by the name of Melanie Smith, was converted and convince cede her religiously inactive husband to join a Presbyterian church. The American nation n had exploded with religious activism. Despite the popularity Of the overwhelmingly protestant Second Great Awake inning, it drew many critics. Many critics disliked the lack of tradition and sheer amount of change that emerged from the revivals. One group of critics called the Unitarians believed that Jesus was not the son of God, but a perfect, yet human, role model that man should stir eve to imitate. Unitarians, such as Unitarian leader William Chancing rejected the emotional encouragement of the Second Great Awakening and instead endorsed knowledge. Unitarians believed that character should be built over time and could not be received in a camp meet inning over the course of a few days or less. The critics were also composed of mainly wealth y and educated citizens, which sharply contrasted the typical convert in the Second Great Away kenning revivals. Unitarians did however share the belief with the revivalists that society can be perfected by the hands of humanity. In addition to critics, the Second Great Awakening pro educed Utopia communities due to the spirit of perfectionism. Utopian communities separate deed from society and attempted to create a perfect community. One of the most famous and s successful Utopian communities was the Shaker community. Founded by English Mother Ann Lee, the Shakers believed in close knit communities, a good work ethic, and celibacy. To expel temptations of sexual relations, Shakers Often danced, hence their name. At t heir peak, they had over 6,000 members. Another new religion resulting from the Second Greg at Awakening was the Church of Latterly Saints or Morons. Joseph Smith founded the re logion in 1827, in New York. The Book of Mormon states Jesus actually arrived in the New Woo RL and was 4 forgotten by the time Columbus arrived. These radical ideas caused the Peres auction of Morons and eventually led to their journey west to Utah, where they could e free of persecution. Today, the Mormon faith continues to grow. Despite the imports once of these new religions, this was only one outcome of the Second Great Awakening. Other effects of the the Second Great Awakening were vast and permanent. R elisions participation grew as shown by the Methodists increase in number by 15 fold, the 20,000 member attendance at Cane Ridge and the 12,000 baptized solely by Peter Ca airtight. God and religion became a bigger part of the common mans life. The Second Great t Awakening revolutionized the way the gospel was preached. Before the revivals, settled ministers in fixed arises was the standard of religion in America. After the revivals, people tray veiled place to place searching for people to preach to. The revivals resulted in several new d nominations, such as the Morons and the Shakers. The Second Great Awakening was also a significant cause of the Antebellum Reform, the period of social change that occurred thro ought the 19th century. The Second Great Awakening not only directly preached the neck assist of moral and social order, but also stated that the power of change is In humanity ha ends and it is humanity obligation to try and spiritually and morally perfect society. Men a ND women alike used religion to justify change to better their society. Complementing the Sec nod Great Awakening in its endeavor towards reform was a philosophy called Transcend mentalist. Transcendentalists, led by Ralph Wald Emerson, stated all humans were boor n good and all wrong stemmed from society. This philosophy encouraged people that they c loud perfect the world by perfecting society. Together, the Second Great Awakening and Trans sentimentalism initiated reform in the 19th century. For example, the war on liquor, known by many as the temperance movement, ensued in the 1 sass. In the movements beginning, re formers only spoke of moderation. At the time, annual alcohol consumption was relatively high; in 1825 it was a staggering 7 gallons for an adult male, which is three and a half times g rater than todays consumption. In 1825 Lyman Beechen abandoned moderation and De announced all use of alcohol beverages. In 1 826 the American Temperance Society was created. This was a group that completely rejected the use of alcohol and in 1834 5000 other socio ties supported them. Temperance leaders stated drunkenness was a sin and God disapprove d of the amazing evil. In order to support their cause, temperance revivalists spoke o f the sinfulness of domestic violence induced by alcohol. The religious revival also gave people e the confidence to change the sobriety of their society. The temperance movement t had great success. By 1840, alcohol consumption had dropped to less than half. Maine prohibited the manufacture and sale of alcohol in 1 851 and factories in Massachusetts stoop deed selling liquor to workers. This reform set the foundation for the Prohibition Era in 1 920, hi chi links the Second Great Awakening and the national ban on alcohol in the 20th century. Another reform resulting from the Second Great Awakening is abolition. Inspired by the feeling g control over society and the moral obligation encouraged by the Second Great Awakening men such as the white radical William Lloyd Garrison took a stand against slavery. Garrison viewed slavery as morally outrageous, even satanic. He once burned a copy of the U. S. Consist tuition saying it was a pact with the devil. Abolitionists used similar tactics as revivalists in the e Second Great Awakening such as large public speeches or pamphleteer, in order to con next religion and abolition. With this connection, abolitionists conveyed the idea that slavery w as a sin. After undergoing a massive religious revival, America depended more heavily on reel going, therefore the message hit home on many Americans. However, not all Protestant reform mere supported the abolition cause; Beechen himself attempted to suppress abolition activity i n 1 834 as the Cincinnati Lane Theological Seminary president As more and more northern earners supported the emancipation of all slaves, tension between the North and South grew ova ere the touchy 6 subject. By 1 843, 100,000 northerners were part of the American Antislavery Society. These tensions ultimately led to the civil war between the halves of the U. S. , hi chi connects the Second Great Awakening to the American Civil War. The final main reform ins paired by the Second Great Awakening was the Womens Rights movement. Womens paretic pupation in the revivals and the previously discussed reforms, eventually led to a reform Of the Eire own. During the Second Great Awakening women participation outnumbered mens two t o one. Finned and other revivalists spoke of empowerment and how one was in control of t heir own body and destiny. Women as a result were encouraged to participate in society. HTH is also the result of the social activism the Second Great Awakening caused. Both the Am Rican Temperance Society, one third to one half women, and the American Initials ere Society utilized substantial women participation. Women such as Angelina and Sarah Grime lectured men and women alike all over New England about the abolition cause in 1 837 , and when they were criticized for their gender, they responded by creating two essential word KS of feminism. These works were to explain the sisters desire for equal rights and are called Letters on the Condition of Women and the Equality of the Sexes and Letters to Catherine E. Beechen. Women became to become increasingly discontent lack of rights despite their participation in their community, encouraged by the Second Great Awakening, This movement t resulted in the Seneca Falls Convention, the first convention held concerning womens rights, in New York and set the quest for woman suffrage that lasted until 1 920 when the goal WA s accomplished. Women owe much of their success to the Second Great Awakening. On a political subject, the Second Great Awakening furthered Americas soups art Of Democracy. Since Finned repetitively and definitively established that humanity y is in control of he world and not a divine power.

Monday, November 25, 2019

Rene Descrates essays

Rene Descrates essays While the great philosophical distinction between mind and body in western thought can be traced to the Greeks, it is to the seminal work of Ren Descartes (1596-1650) [see figure 1], French mathematician, philosopher, and physiologist, that we owe the first systematic account of the mind/body relationship. Descartes was born in Touraine, in the small town of La Haye and educated from the age of eight at the Jesuit college of La Flche. At La Flche, Descartes formed the habit of spending the morning in bed, engaged in systematic meditation. During his meditations, he was struck by the sharp contrast between the certainty of mathematics and the controversial nature of philosophy, and came to believe that the sciences could be made to yield results as certain as those of mathematics. From 1612, when he left La Flche, until 1628, when he settled in Holland, Descartes spent much of his time in travel, contemplation, and correspondence. From 1628 until his ill-fated trip to Sweden in 1649 he remained for the most part in Holland, and it was during this period that he composed a series of works that set the agenda for all later students of mind and body. The first of these works, De homine [1] was completed in Holland about 1633, on the eve of the condemnation of Galileo. When Descartes' friend and frequent correspondent, Marin Mersenne, wrote to him of Galileo's fate at the hands of the Inquisition, Descartes immediately suppressed his own treatise. As a result, the world's first extended essay on physiological psychology was published only well after its author's death. The year 1641 saw the appearance of Descartes' Meditationes de prima philosophia, in quibus Dei existentia, corpore distinctio, demonstratur In 1649, on the eve of his departure for Stockholm to take up residence as instructor to Queen Christina of Sweden, Descartes sent the manuscript of the last of his grea ...

Thursday, November 21, 2019

Human Resources for Industry Essay Example | Topics and Well Written Essays - 2250 words

Human Resources for Industry - Essay Example Moreover, it has become a more complicated task to find and utilise workforce for highly specialised positions. Thus, there is more importance of human resource management in organisations than ever before. This paper will try to analyse the importance of HR management, the present day challenges faced by HR management in common, the different ways the HR managements usually adopt to cope up with the changes, the changing nature of workplace, and some modern studies into HR management. The Role and Importance of HR management One can undoubtedly say that the role of HR has increased tremendously in all organisations. The role of Human Resource Management in the 21st century starts from the board room to the market place. The challenges before HR managers in the twenty-first century, according to Bohlander and Snell (2007, p.5) are going global, embracing new technology, managing change, managing talent or human capital, responding to the market, and containing costs. In recent years, more attention is paid to how the human resource management affects organisation’s overall performance than to what practices are adopted in human resource management. ... For example, the Vodafone Company, started in England in 1982 has now operations in Europe, Asia-Pacific, Middle East, Africa, and the Americas. In addition, the GlaxoSmithKline has its origin and headquarters in UK, Consumer Products headquarters in Pennsylvania, and major centre for biopharmaceutical products in Germany, Canada, and USA. It sometimes becomes necessary to assess the skill of a foreign workforce, translation of some materials into regional languages, training for foreign workforce, and many a time, deciding the compensation for foreign employees. The onslaught of new technology The advent of technology made it possible for organisations to store, retrieve and analyse data easily. As a result, the nature of the workplace changed a lot. Instead of the large number of workforce of the past that required only little knowledge, today, the job positions require considerable amount of skill and the present jobs involve a lot of planning, decision making and problem solving. In addition, the present workplace more often requires retraining of employees when they are displaced. Human Resource Management too has changed considerably through the use of technology. The first and foremost development is the adoption of human resources information system (HRIS), thus making response times, decision making, and customer service faster and easier. In UK, the National Health Service has started implementing the Electronic Staff Record, a national, fully integrated payroll system. Many other UK firms too have same form of HRIS in use. The first advantage of this system is greater efficiency and reduced cost. For example, Cisco Systems have developed an intranet system which helps them save about

Wednesday, November 20, 2019

The story of an hour by Kate Chopin Research Paper

The story of an hour by Kate Chopin - Research Paper Example mmediate duty to grieve over her husband’s death as depicted in the line â€Å"She wept at once, with sudden, wild abandonment, in her sister’s arms.† Mrs. Mallard, however, escapes the face of agony right away upon entry to her room, as though it were a private world of all unseen hopes. Apparently, the room represents another dimension consisting of objects that symbolize what Mrs. Mallard has long yearned for and Chopin illustrates this in the phrases â€Å"new spring life†, â€Å"delicious breath of rain†, and â€Å"countless sparrows† twittering. While part of her consciousness has fully absorbed the thought that she is expected to mourn for a major loss, she is being spontaneously consumed by something that makes her exclaim â€Å"free, free, free!† and â€Å"Free! Body and soul free!† in a rather cautious mumbling gesture which is altogether understood by herself alone. In that realm, the moment of illumination leads the widow to cherish mixed conflicting emotions where she obtains a sense of certainty toward a much desired fate – the return to singlehood and freedom. Chopin proceeds to enumerate the attributes that recollect the state of youth of Mrs. Mallard, stating â€Å"She was young with a fair, calm face, whose lines bespoke repression and even a certain strength.† These details may be claimed as necessary in order for the character of Louise to emerge out of Mrs. Mallard and exhibit some sharper manifestation of hope for liberation despite lack of concrete evidences to support the idea that the passing away of Brently amounts to the happiness of Louise. This hope eventually shatters when Mr. Mallard comes back alive, contrary to the previous belief, so that his presence causes the irony of his wife’s diagnosis where â€Å"the joy that kills† is actually a metaphor that means â€Å"the joy that has been killed.† Women of the 1800s lived in societies that were sexist by nature. Most opportunities in and out of an industry employed men for a variety of

Monday, November 18, 2019

Sushi Digesting Genes Article Review Example | Topics and Well Written Essays - 1000 words

Sushi Digesting Genes Review - Article Example According to Ed Yong, microbes in their hundreds of trillion are found in Japanese bowels. He makes further findings that the cells are more than what humans have to the ratio of ten to one. Comparing ‘gut microbiome’ to an organ that aides the human body to breakdown molecules that the digestive system may not otherwise digest on its own. There is an observation that the molecules which are of carbohydrate nature are indigestible. He further comments that by consuming carbohydrates found in seaweeds and algae will help the digestive system to perform as they are rich in sulphur.Comparing the ability in the digestive tract to change genes, Ed Yong concedes that genes are not limited to the inheritance lineage. The human body has the capacity to change genes through transferring the horizontal gene. This involves to a large extent the genes kingdom that can be lent out to the preferred donor who receives Zobellia Galactanirorans a seagoing bacterium. In the Japanese cuisi ne, Nori which plays host to Zobellia is a common ingredient used in sushi wrapping and dish garnishing. The observation here is that upon consumption of the sushi, marine bacteria and algae are swallowed and become resident in the gut of the human body. The digestive system is tasked through genes to tackle the marine meals carbohydrates as well as the algae. There is an observation made that energy from an extra source prevails for the gut bacteria to break down the carbohydrates though there are some genetic remnants.

Saturday, November 16, 2019

Underwater Acoustic Sensor Network (UASN)

Underwater Acoustic Sensor Network (UASN) CHAPTER1: Introduction Most of the earth surface is composed of water including fresh water from river, lakes etc and salt water from the sea. There are still many un-explored areas for such places. This needs significant research efforts and good communication systems. Wireless sensor network in aqueous medium has the ability to explore the underwater environment in details. For all applications of underwater, a good communication system as well as an effective routing protocol is needed. This will enable the underwater devices to communicate precisely. Underwater propagation speed varies with temperature, salinity and depth. By varying the underwater propagation speed at different depth, two scenarios can be achieved accurately namely: shallow and deep water. Shallow water consists of depth less than 200m and cylinder spreading. Deep water consists of depth greater or equal to 200 m and spherical spreading. In both shallow and deep water, different ambient noise and different spreading factor is applied. CHAPTER 2: Study of Underwater Acoustic Sensor Network (UASN) Application of UASN Wireless sensor network in aqueous medium also known as underwater sensor network has enabled a broad range of applications including: Environmental Monitoring Underwater sensor network can be used to monitor pollution like chemical, biological such as tracking of fish or micro-organisms, nuclear and oil leakage pollutions in bays, lakes or rivers [1]. Underwater sensor network can also be used to improve weather forecast, detect climate change, predict the effect of human activities on marine ecosystems, ocean currents and temperature change e.g. the global warming effect to ocean. Under Ocean Exploration Exploring minerals, oilfields or reservoir, determine routes for laying undersea cables and exploration valuable minerals can be done with such underwater sensor network. Disaster Prevention Sensor network that measure seismic activity from remote locations can provide tsunami warning to coastal areas, or study the effects of submarine earthquakes (seaquakes) [2] Equipment Monitoring Long-term equipment monitoring may be done with pre-installed infrastructure. Short-term equipment monitoring shares many requirements of long-term seismic monitoring, including the need for wireless (acoustic) communication, automatic configuration into a multihop network, localization (and hence time synchronization), and energy efficient operation Mine Reconnaissance By using acoustic sensors and optical sensors together, mine detection can be accomplished quickly and effectively. Assisted Monitoring Sensor can be used to discover danger on the seabed, locate dangerous rocks or shoals in shallow waters, mooring position, submerged wrecks and to perform bathymetry profiling. Information collection The main goal of communication network is the exchange of information inside the network and outside the network via a gateway or switch center. This application is used to share information among nodes and autonomous underwater vehicles. Characteristic of UASN Underwater Acoustic Networks (UANs), including but not limited to, Underwater Acoustic Sensor Networks (UASNs) and Autonomous Underwater Vehicle Networks (AUVNs) , are defined as networks composed of more than two nodes, using acoustic signals to communicate, for the purpose of underwater applications. UASNs and AUVNs are two important kinds of UANs. The former is composed of many sensor nodes, mostly for a monitoring purpose. The nodes are usually without or with limited capacity to move. The latter is composed of autonomous or unmanned vehicles with high mobility, deployed for applications that need mobility, e.g., exploration. An UAN can be an UASN, or an AUVN, or a combination of both. Acoustic communications, on the other hands, is defined as communication methods from one point to another by using acoustic signals. Network structure is not formed in acoustic point-to-point communications. Sound travels best through the water in comparison with electromagnetic waves and optical signals. Acoustic signal is sound signal waveform, usually produced by sonar for underwater applications. Acoustic signal processing extracts information from acoustic signals in the presence of noise and uncertainty. Underwater acoustic communications are mainly influenced by path loss, noise, multi-path, Doppler spread, and high and variable propagation delay. All these factors determine the temporal and spatial variability of the acoustic channel, and make the available bandwidth of the Underwater Acoustic channel (UW-A) limited and dramatically dependent on both range and frequency. Long-range systems that operate over several tens of kilometers may have a bandwidth of only a few kHz, while a short-range system operating over several tens of meters may have more than a hundred kHz bandwidth. These factors lead to low bit rate. Underwater acoustic communication links can be classified according to their range as very long, long, medium, short, and very short links. Acoustic links are also roughly classified as vertical and horizontal, according to the direction of the sound ray. Their propagation characteristics differ consistently, especially with respect to time dispersion, multi-path spreads, and delay variance. Acoustic signal is the only physical feasible tool that works in underwater environment. Compared with it, electromagnetic wave can only travel in water with short distance due to the high attenuation and absorption effect in underwater environment. It is found that the absorption of electromagnetic energy in sea water is about 45Ãâ€" ?f dB per kilometer, where f is frequency in Hertz; In contrast, the absorption of acoustic signal over most frequencies of interest is about three orders of magnitude lower [40]. Hereafter the factors that influence acoustic communications is analyzed in order to state the challenges posed by the underwater channels for underwater sensor networking. These include: Path loss Attenuation is mainly provoked by absorption due to conversion of acoustic energy into heat, which increases with distance and frequency. It is also caused by scattering a reverberation (on rough ocean surface and bottom), refraction, and dispersion (due to the displacement of the reflection point caused by wind on the surface). Water depth plays a key role in determining the attenuation. Geometric Spreading is the spreading of sound energy as a result of the expansion of the wavefronts. It increases with the propagation distance and is independent of frequency. There are two common kinds of geometric spreading: spherical (omni-directional point source), and cylindrical (horizontal radiation only). Noise Man made noise is mainly caused by machinery noise (pumps, reduction gears, power plants, etc.), and shipping activity (hull fouling, animal life on hull, cavitations), especially in areas encumbered with heavy vessel traffic. Ambient Noise is related to hydrodynamics (movement of water including tides, current, storms, wind, rain, etc.), seismic and biological phenomena. Multi-path Multi-path propagation may be responsible for severe degradation of the acoustic communication signal, since it generates Inter-Symbol Interference (ISI). The multi-path geometry depends on the link configuration. Vertical channels are characterized by little time dispersion, whereas horizontal channels may have extremely long multi-path spreads. The extent of the spreading is a strong function of depth and the distance between transmitter and receiver. High delay and delay variance The propagation speed in the UW-A channel is five orders of magnitude lower than in the radio channel. This large propagation delay (0.67 s/km) can reduce the throughput of the system considerably. The very high delay variance is even more harmful for efficient protocol design, as it prevents from accurately estimating the round trip time (RTT), which is the key parameter for many common communication protocols. Doppler spread The Doppler frequency spread can be significant in UW-A channels, causing degradation in the performance of digital communications: transmissions at a high data rate because many adjacent symbols to interfere at the receiver, requiring sophisticated signal processing to deal with the generated ISI. The Doppler spreading generates: a simple frequency translation, which is relatively easy for a receiver to compensate for a continuous spreading of frequencies, which constitutes a non-shifted signal, which is more difficult for a receiver to compensate for. If a channel has a Doppler spread with bandwidth B and a signal has symbol duration T, then there are approximately BT uncorrelated samples of its complex envelope. When BT is much less than unity, the channel is said to be under spread and the effects of the Doppler fading can be ignored, while, if greater than unity, it is overspread. Most of the described factors are caused by the chemical-physical properties of the water medium such as temperature, salinity and density, and by their spatio-temporal variations. These variations, together with the wave guide nature of the channel, because the acoustic channel to be temporally and spatially variable. In particular, the horizontal channel is by far more rapidly varying than the vertical channel, in both deep and shallow water. CHAPTER 3: Network Architecture Underwater sensor nodes: The underwater sensor nodes are deployed on the sea floor anchored to the ocean bottom [32]. The sensors are equipped with floating buoys to push the nodes upwards, thus they are relatively stationary nodes [3]. Using acoustic links, they relay data to underwater sink directly or via multi-hop path. Underwater sink nodes: Underwater sink nodes take charge of collecting data of underwater sensors deployed on the ocean bottom and then send to the surface sink node. They may be equipped with vertical and horizontal acoustic transducers. The horizontal transceiver is used to collect the sensors data and the vertical transceiver provides transmitting link between underwater sink and the surface sink node. Surface sink node: Surface sink node is attached on a floating buoy with satellite, radio frequency (RF) or cell phone technology to transmit data to shore in real time. 2D Model A reference architecture for two-dimensional underwater networks is shown in Figure. 1. A group of sensor nodes are anchored to the deep of the ocean. Underwater sensor nodes are interconnected to one or more underwater gateways by means of wireless acoustic links. Underwater-gateways are network devices in charge of relaying data from the ocean bottom network to a surface station. To achieve this objective, they are equipped with two acoustic transceivers, namely a vertical and a horizontal transceiver. The horizontal transceiver is used by the underwater-gateway to communicate with the sensor nodes in order to: send commands and configuration data to the sensors (underwater -gateway to sensors); collect monitored data (sensors to underwater -gateway). The vertical link is used by the underwater -gateways to relay data to a surface station. In deep water applications, vertical transceivers must be long range transceivers. The surface station is equipped with an acoustic transceiver that is able to handle multiple parallel communications with the deployed underwater -gateways. It is also endowed with a long range RF and/or satellite transmitter to communicate with the onshore sink (os-sink) and/or to a surface sink (s-sink). In shallow water, bottom-deployed sensors/modems may directly communicate with the surface buoy, with no specialized bottom node (underwater -gateway). 3D Model Three-dimensional underwater networks are used to detect and observe phenomena that cannot be adequately observed by means of ocean bottom sensor nodes, i.e., to perform cooperative sampling of the 3D ocean environment. In three-dimensional underwater networks, sensor nodes float at different depths to observe a phenomenon. In this architecture, given in Figure 2, each sensor is anchored to the ocean bottom and equipped with a floating buoy that can be inflated by a pump. The buoy pushes the sensor towards the ocean surface. The depth of the sensor can then be regulated by adjusting the length of the wire that connects the sensor to the anchor, by means of an electronically controlled engine that resides on the sensor. Sensing and communication coverage in a 3D environment are rigorously investigated in [8]. The diameter, minimum and maximum degree of the reachability graph that describes the network are derived as a function of the communication range, while different degrees of cov erage for the 3D environment are characterized as a function of the sensing range. 3D Model with AUV The above figure represents the third type of network architecture which consist of sensor nodes and Autonomous Underwater Vehicles (AUV) which act as mobile sensor nodes for ocean monitoring, underwater resource study, etc. CHAPTER 4: Differences between underwater and terrestrial Sensor Network An underwater acoustic channel is different from a ground-based radio channel from many aspects, including: Bandwidth is extremely limited. The attenuation of acoustic signal increases with frequency and range [6] [10]. Consequently, the feasible band is extremely small. For example, a short range system operating over several tens of meters may have available bandwidth of a hundred kHz; a medium-range system operating over several kilometers has a bandwidth on the order of ten kHz; and a long-range system operating over several tens of kilometers is limited to only a few kHz of bandwidth [11]. Propagation delay is long. The transmission speed of acoustic signals in salty water is around 1500 meter/s [22], which is a difference of five orders of magnitude lower than the speed of electromagnetic wave in free space. Correspondently, propagation delay in an underwater channel becomes significant. This is one of the essential characteristics of underwater channels and has profound implications on localization and time synchronization. The channel impulse response is not only spatially varied but also temporarily varied. The channel characteristics vary with time and highly depend on the location of the transmitter and receiver. The fluctuation nature of the channel causes the received signals easily distorted. There are two types of propagation paths: macro-multipaths, which are the deterministic propagation paths; and micro-multipath, which is a random signal fluctuation. The macro-multipaths are caused by both reflection at the boundaries (bottom, surface and any object in the water) and bending. Inter- Symbol Interference (ISI) thus occurs. Compared with the spread of its ground-based counterpart, which is on the order of several symbol intervals, ISI spreading in an underwater acoustic channel is several tens or hundred of symbol intervals for moderate to high data rate in the horizontal channel. Micro-multipath fluctuations are mainly caused by surface wave, which contributes the most to the time variability of shallow water channel. In deep water, internal waves impact the single-path random fluctuations [12][13]. Probability of bit error is much higher and temporary loss of connectivity (shadow zone) sometimes occurs, due to the extreme characteristics of the channel. Cost. While terrestrial sensor nodes are expected to become increasingly inexpensive, underwater sensors are expensive devices. This is especially due to the more complex underwater transceivers and to the hardware protection needed in the extreme underwater environment. Also, because of the low economy of scale caused by a small relative number of suppliers, underwater sensors are characterized by high cost. Deployment. While terrestrial sensor networks are densely deployed, in underwater, the deployment is generally more sparse. Power. The power needed for acoustic underwater communications is higher than in terrestrial radio communications because of the different physical layer technology (acoustic vs. RF waves), the higher distances, and more complex signal processing techniques implemented at the receivers to compensate for the impairments of the channel. Memory. While terrestrial sensor nodes have very limited storage capacity, underwater-sensors may need to be able to do some data caching as the underwater channel may be intermittent. Spatial Correlation. While the readings from terrestrial sensors are often correlated, this is more unlikely to happen in underwater networks due to the higher distance among sensors. CHAPTER 5: Layered of UASN The underwater architecture network consists of five layers, application, transport, network, data link and physical layer as shown in the figure below. As typical underwater systems have limited processing capability, the protocol has been kept as simple as possible without significantly compromising performance. The underwater sensor network specifications currently do not include any recommendations for authentication and encryption. These may be easily implemented at the application layer or via a spreading scheme at the physical layer. Each layer is described by a SAPI. The SAPI is defined in terms of messages being passed to and from the layer. The clients (usually higher layers) of a layer invoke the layer via a request (REQ). The layer responds to each REQ by a response (RSP). Errors are reported via an ERR RSP with error codes. If the layer needs to send unsolicited messages to the client, it does so via a notification (NTF). A layer communicates logically with its peer layer via protocol data units (PDU). As the peer-to-peer communication is symmetric, a layer may send a REQ PDU to its peer layer at any time. It would optionally respond to such a PDU with a RSP PDU. This is logically depicted in Figure below It may be desirable in some cases, that non-neighboring layers communicate with each other to achieve cross-layer optimization. This may be implemented by allowing REQ and RSP PDUs between any two layers in the protocol stack. The underwater sensor network specifications define detailed message structures for all SAPI messages. These message structures include message identifiers, data formats to be used, parameters and their possible values Physical layer The physical layer provides framing, modulation and error correction capability (via FEC). It provides primitives for sending and receiving packets. It may also provide additional functionality such as parameter settings, parameter recommendation, carrier sensing, etc. At first underwater channel development was based on non-coherent frequency shift keying (FSK) modulation, since it relies on energy detection. Thus, it does not require phase tracking, which is a very difficult task mainly because of the Doppler-spread in the underwater acoustic channel. Although non-coherent modulation schemes are characterized by high power efficiency, their low bandwidth efficiency makes them unsuitable for high data rate multiuser networks. Hence, coherent modulation techniques have been developed for long-range, high-throughput systems. In the last years, fully coherent modulation techniques, such as phase shift keying (PSK) and quadrature amplitude modulation (QAM), have become practical due to the availability of powerful digital processing. Channel equalization techniques are exploited to leverage the effect of the inter-symbol interference (ISI), instead of trying to avoid or suppress it. Decision-feedback equalizers (DFEs) track the complex, relatively slowly varying channel response and thus provide high throughput when the channel is slowly varying. Conversely, when the channel varies faster, it is necessary to combine the DFE with a Phase Locked Loop (PLL) [9], which estimates and compensates for the phase offset in a rapid, stable manner. The use of decision feedback equalization and phase-locked loops is driven by the complexity and time variability of ocean channel impulse responses. Differential phase shift keying (DPSK) serves as an intermediate solution between incoherent and fully coherent systems in terms of bandwidth efficiency. DPSK encodes information relative to the previous symbol rather than to an arbitrary fixed reference in the signal phase and may be referred to as a partially coherent modulation. While this strategy substantially alleviates carrier phase-tracking requirements, the penalty is an increased error probability over PSK at an equivalent data rate. Another promising solution for underwater communications is the orthogonal frequency division multiplexing (OFDM) spread spectrum technique, which is particularly efficient when noise is spread over a large portion of the available bandwidth. OFDM is frequently referred to as multicarrier modulation because it transmits signals over multiple sub-carriers simultaneously. In particular, sub-carriers that experience higher SNR, are allotted with a higher number of bits, whereas less bits are allotted to sub-carriers experiencing attenuation, according to the concept of bit loading, which requires channel estimation. Since the symbol duration for each individual carrier increases, OFDM systems perform robustly in severe multi-path environments, and achieve a high spectral efficiency. Many of the techniques discussed above require underwater channel estimation, which can be achieved by means of probe packets [17]. An accurate estimate of the channel can be obtained with a high probing rate and/or with a large probe packet size, which however result in high overhead, and in the consequent drain of channel capacity and energy. Data link layer (MAC layer) The data link layer provides single hop data transmission capability; it will not be able to transmit a packet successfully if the destination node is not directly accessible from the source node. It may include some degree of reliability. It may also provide error detection capability (e.g. CRC check). In case of a shared medium, the data link layer must include the medium access control (MAC) sub-layer. Frequency division multiple access (FDMA) is not suitable for underwater sensor network due to the narrow bandwidth in underwater acoustic channels and the vulnerability of limited band systems to fading and multipath. Time division multiple access (TDMA) shows limited bandwidth efficiency because of the long time guards required in the underwater acoustic channel. In fact, long time guards must be designed to account for the large propagation delay and delay variance of the underwater channel in order to minimize packet collisions from adjacent time slots. Moreover, the variable delay makes it very challenging to realize a precise synchronization, with a common timing reference, which is required for TDMA. Carrier sense multiple access (CSMA) prevents collisions with the ongoing transmission at the transmitter side. To prevent collisions at the receiver side, however, it is necessary to add a guard time between transmissions dimensioned according to the maximum propagation delay in the network. This makes the protocol dramatically inefficient for underwater acoustic sensor network. The use of contention-based techniques that rely on handshaking mechanisms such as RTS/ CTS in shared medium access is impractical in underwater, for the following reasons: large delays in the propagation of RTS/CTS control packets lead to low throughput; due to the high propagation delay of underwater acoustic channels, when carrier sense is used, as in 802.11, it is more likely that the channel be sensed idle while a transmission is ongoing, since the signal may not have reached the receiver yet; the high variability of delay in handshaking packets makes it impractical to predict the start and finish time of the transmissions of other stations. Thus, collisions are highly likely to occur. Code division multiple access (CDMA) is quite robust to frequency selective fading caused by underwater multi-paths, since it distinguishes simultaneous signals transmitted by multiple devices by means of pseudo-noise codes that are used for spreading the user signal over the entire available band. CDMA allows reducing the number of packet retransmissions, which results in decreased battery consumption and increased network throughput. In conclusion, although the high delay spread which characterizes the horizontal link in underwater channels makes it difficult to maintain synchronization among the stations, especially when orthogonal code techniques are used [17], CDMA is a promising multiple access technique for underwater acoustic networks. This is particularly true in shallow water, where multi-paths and Doppler- spreading plays a key role in the communication performance. Network layer (Routing) The network layer is in charge of determining the path between a source (the sensor that samples a physical phenomenon) and a destination node (usually the surface station). In general, while many impairments of the underwater acoustic channel are adequately addressed at the physical and data link layers, some other characteristics, such as the extremely long propagation delays, are better addressed at the network layer. Basically, there are two methods of routing. The first one is virtual circuit routing and the second one is packet-switch routing. In virtual circuit routing, the networks use virtual circuits to decide on the path at the beginning of the network operation. Virtual-circuit-switch routing protocols can be a better choice for underwater acoustic networks. The reasons are: Underwater acoustic networks are typical asymmetric instead of symmetric. However, packet switched routing protocols are proposed for symmetric network architecture; Virtual-circuit-switch routing protocols work robust against link failure, which is critical in underwater environment; and Virtual-circuit-switch routing protocols have less signal overhead and low latency, which are needed for underwater acoustic channel environment. However, virtual-circuit-switch routing protocols usually lack of flexibility. In packet-switch routing, every node that is part of the transmission makes its own routing decision, i.e., decides its next hop to relay the packet. Packet-switch routing can be further classified into Proactive routing, Reactive and geographical routing protocols. Most routing protocols for ground-based wireless networks are packet-switch based. Proactive routing protocols attempt to minimize the message latency by maintaining up-to-date routing information at all times from each node to any other node. It broadcasts control packets that contain routing table information. Typical protocols include Destination Sequence Distance Vector (DSDV) [28] and Temporally Ordered Routing Algorithm (TORA). However, proactive routing protocols provoke a large signaling overhead to establish routes for the first time and each time the network topology changes. It may not be a good fit in underwater environment due to the high probability of link failure and extremely limited bandwidth there. Reactive routing protocols only initiate a route discovery process upon request. Correspondently, each node does not need to maintain a sizable look-up table for routing. This kind of routing protocols is more suitable for dynamic environment like ad hoc wireless networks. Typical protocol examples are Ad hoc On-demand Distance Vector (AODV) [23], and Dynamic Source Routing (DSR) [27]. The shortage of reactive routing protocols is its high latency to establish routing. Similar to its proactive counterpart, flooding of control packets to establish paths is needed, which brings significant signal overhead. The high latency could become much deteriorated in underwater environment because of the much slower propagation speed of acoustic signal compared with the radio wave in the air. Geographic routing (also called georouting or position-based routing) is a routing principle that relies on geographic position information. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. Geographic routing requires that each node can determine its own location and that the source is aware of the location of the destination. With this information a message can be routed to the destination without knowledge of the network topology or a prior route discovery. Transport layer A transport layer protocol is needed in underwater sensor network not only to achieve reliable collective transport of event features, but also to perform flow control and congestion control. The primary objective is to save scarce sensor resources and increase the network efficiency. A reliable transport protocol should guarantee that the applications be able to correctly identify event features estimated by the sensor network. Congestion control is needed to prevent the network from being congested by excessive data with respect to the network capacity, while flow control is needed to avoid that network devices with limited memory are overwhelmed by data transmissions. Most existing TCP implementations are unsuited for the underwater environment, since the flow control functionality is based on a window- based mechanism that relies on an accurate esteem of the round trip time (RTT), which is twice the end-to-end delay from source to destination. Rate-based transport protocols seem also unsuited for this challenging environment. They still rely on feedback control messages sent back by the destination to dynamically adapt the transmission rate, i.e., to decrease the transmission rate when packet loss is experienced or to increase it otherwise. The high delay and delay variance can thus cause instability in the feedback control. Furthermore, due to the unreliability of the acoustic channel, it is necessary to distinguish between packet losses due to the high bit error rate of the acoustic channel, from those caused by packets being dropped from the queues of sensor nodes due to network congestion. In terrestrial, assume that congestion is the only cause for packet loss and the solution lies on decreasing the transmission rate, but in underwater sensor network if the packet loss is due to bad channel then the transmission rate should not be decreased to preserve throughput efficiency. Transport layer functionalities can be tightly integrated with data link layer functionalities in a cross-layer module. The purpose of such an integrated module is to make the information about the condition of the variable underwater channel available also at the transport layer. In fact, usually the state of the channel is known only at the physical and channel access sub-layers, while the design principle of layer separation makes this information transparent to the higher layers. This integration allows maximizing the Underwater Acoustic Sensor Network (UASN) Underwater Acoustic Sensor Network (UASN) CHAPTER1: Introduction Most of the earth surface is composed of water including fresh water from river, lakes etc and salt water from the sea. There are still many un-explored areas for such places. This needs significant research efforts and good communication systems. Wireless sensor network in aqueous medium has the ability to explore the underwater environment in details. For all applications of underwater, a good communication system as well as an effective routing protocol is needed. This will enable the underwater devices to communicate precisely. Underwater propagation speed varies with temperature, salinity and depth. By varying the underwater propagation speed at different depth, two scenarios can be achieved accurately namely: shallow and deep water. Shallow water consists of depth less than 200m and cylinder spreading. Deep water consists of depth greater or equal to 200 m and spherical spreading. In both shallow and deep water, different ambient noise and different spreading factor is applied. CHAPTER 2: Study of Underwater Acoustic Sensor Network (UASN) Application of UASN Wireless sensor network in aqueous medium also known as underwater sensor network has enabled a broad range of applications including: Environmental Monitoring Underwater sensor network can be used to monitor pollution like chemical, biological such as tracking of fish or micro-organisms, nuclear and oil leakage pollutions in bays, lakes or rivers [1]. Underwater sensor network can also be used to improve weather forecast, detect climate change, predict the effect of human activities on marine ecosystems, ocean currents and temperature change e.g. the global warming effect to ocean. Under Ocean Exploration Exploring minerals, oilfields or reservoir, determine routes for laying undersea cables and exploration valuable minerals can be done with such underwater sensor network. Disaster Prevention Sensor network that measure seismic activity from remote locations can provide tsunami warning to coastal areas, or study the effects of submarine earthquakes (seaquakes) [2] Equipment Monitoring Long-term equipment monitoring may be done with pre-installed infrastructure. Short-term equipment monitoring shares many requirements of long-term seismic monitoring, including the need for wireless (acoustic) communication, automatic configuration into a multihop network, localization (and hence time synchronization), and energy efficient operation Mine Reconnaissance By using acoustic sensors and optical sensors together, mine detection can be accomplished quickly and effectively. Assisted Monitoring Sensor can be used to discover danger on the seabed, locate dangerous rocks or shoals in shallow waters, mooring position, submerged wrecks and to perform bathymetry profiling. Information collection The main goal of communication network is the exchange of information inside the network and outside the network via a gateway or switch center. This application is used to share information among nodes and autonomous underwater vehicles. Characteristic of UASN Underwater Acoustic Networks (UANs), including but not limited to, Underwater Acoustic Sensor Networks (UASNs) and Autonomous Underwater Vehicle Networks (AUVNs) , are defined as networks composed of more than two nodes, using acoustic signals to communicate, for the purpose of underwater applications. UASNs and AUVNs are two important kinds of UANs. The former is composed of many sensor nodes, mostly for a monitoring purpose. The nodes are usually without or with limited capacity to move. The latter is composed of autonomous or unmanned vehicles with high mobility, deployed for applications that need mobility, e.g., exploration. An UAN can be an UASN, or an AUVN, or a combination of both. Acoustic communications, on the other hands, is defined as communication methods from one point to another by using acoustic signals. Network structure is not formed in acoustic point-to-point communications. Sound travels best through the water in comparison with electromagnetic waves and optical signals. Acoustic signal is sound signal waveform, usually produced by sonar for underwater applications. Acoustic signal processing extracts information from acoustic signals in the presence of noise and uncertainty. Underwater acoustic communications are mainly influenced by path loss, noise, multi-path, Doppler spread, and high and variable propagation delay. All these factors determine the temporal and spatial variability of the acoustic channel, and make the available bandwidth of the Underwater Acoustic channel (UW-A) limited and dramatically dependent on both range and frequency. Long-range systems that operate over several tens of kilometers may have a bandwidth of only a few kHz, while a short-range system operating over several tens of meters may have more than a hundred kHz bandwidth. These factors lead to low bit rate. Underwater acoustic communication links can be classified according to their range as very long, long, medium, short, and very short links. Acoustic links are also roughly classified as vertical and horizontal, according to the direction of the sound ray. Their propagation characteristics differ consistently, especially with respect to time dispersion, multi-path spreads, and delay variance. Acoustic signal is the only physical feasible tool that works in underwater environment. Compared with it, electromagnetic wave can only travel in water with short distance due to the high attenuation and absorption effect in underwater environment. It is found that the absorption of electromagnetic energy in sea water is about 45Ãâ€" ?f dB per kilometer, where f is frequency in Hertz; In contrast, the absorption of acoustic signal over most frequencies of interest is about three orders of magnitude lower [40]. Hereafter the factors that influence acoustic communications is analyzed in order to state the challenges posed by the underwater channels for underwater sensor networking. These include: Path loss Attenuation is mainly provoked by absorption due to conversion of acoustic energy into heat, which increases with distance and frequency. It is also caused by scattering a reverberation (on rough ocean surface and bottom), refraction, and dispersion (due to the displacement of the reflection point caused by wind on the surface). Water depth plays a key role in determining the attenuation. Geometric Spreading is the spreading of sound energy as a result of the expansion of the wavefronts. It increases with the propagation distance and is independent of frequency. There are two common kinds of geometric spreading: spherical (omni-directional point source), and cylindrical (horizontal radiation only). Noise Man made noise is mainly caused by machinery noise (pumps, reduction gears, power plants, etc.), and shipping activity (hull fouling, animal life on hull, cavitations), especially in areas encumbered with heavy vessel traffic. Ambient Noise is related to hydrodynamics (movement of water including tides, current, storms, wind, rain, etc.), seismic and biological phenomena. Multi-path Multi-path propagation may be responsible for severe degradation of the acoustic communication signal, since it generates Inter-Symbol Interference (ISI). The multi-path geometry depends on the link configuration. Vertical channels are characterized by little time dispersion, whereas horizontal channels may have extremely long multi-path spreads. The extent of the spreading is a strong function of depth and the distance between transmitter and receiver. High delay and delay variance The propagation speed in the UW-A channel is five orders of magnitude lower than in the radio channel. This large propagation delay (0.67 s/km) can reduce the throughput of the system considerably. The very high delay variance is even more harmful for efficient protocol design, as it prevents from accurately estimating the round trip time (RTT), which is the key parameter for many common communication protocols. Doppler spread The Doppler frequency spread can be significant in UW-A channels, causing degradation in the performance of digital communications: transmissions at a high data rate because many adjacent symbols to interfere at the receiver, requiring sophisticated signal processing to deal with the generated ISI. The Doppler spreading generates: a simple frequency translation, which is relatively easy for a receiver to compensate for a continuous spreading of frequencies, which constitutes a non-shifted signal, which is more difficult for a receiver to compensate for. If a channel has a Doppler spread with bandwidth B and a signal has symbol duration T, then there are approximately BT uncorrelated samples of its complex envelope. When BT is much less than unity, the channel is said to be under spread and the effects of the Doppler fading can be ignored, while, if greater than unity, it is overspread. Most of the described factors are caused by the chemical-physical properties of the water medium such as temperature, salinity and density, and by their spatio-temporal variations. These variations, together with the wave guide nature of the channel, because the acoustic channel to be temporally and spatially variable. In particular, the horizontal channel is by far more rapidly varying than the vertical channel, in both deep and shallow water. CHAPTER 3: Network Architecture Underwater sensor nodes: The underwater sensor nodes are deployed on the sea floor anchored to the ocean bottom [32]. The sensors are equipped with floating buoys to push the nodes upwards, thus they are relatively stationary nodes [3]. Using acoustic links, they relay data to underwater sink directly or via multi-hop path. Underwater sink nodes: Underwater sink nodes take charge of collecting data of underwater sensors deployed on the ocean bottom and then send to the surface sink node. They may be equipped with vertical and horizontal acoustic transducers. The horizontal transceiver is used to collect the sensors data and the vertical transceiver provides transmitting link between underwater sink and the surface sink node. Surface sink node: Surface sink node is attached on a floating buoy with satellite, radio frequency (RF) or cell phone technology to transmit data to shore in real time. 2D Model A reference architecture for two-dimensional underwater networks is shown in Figure. 1. A group of sensor nodes are anchored to the deep of the ocean. Underwater sensor nodes are interconnected to one or more underwater gateways by means of wireless acoustic links. Underwater-gateways are network devices in charge of relaying data from the ocean bottom network to a surface station. To achieve this objective, they are equipped with two acoustic transceivers, namely a vertical and a horizontal transceiver. The horizontal transceiver is used by the underwater-gateway to communicate with the sensor nodes in order to: send commands and configuration data to the sensors (underwater -gateway to sensors); collect monitored data (sensors to underwater -gateway). The vertical link is used by the underwater -gateways to relay data to a surface station. In deep water applications, vertical transceivers must be long range transceivers. The surface station is equipped with an acoustic transceiver that is able to handle multiple parallel communications with the deployed underwater -gateways. It is also endowed with a long range RF and/or satellite transmitter to communicate with the onshore sink (os-sink) and/or to a surface sink (s-sink). In shallow water, bottom-deployed sensors/modems may directly communicate with the surface buoy, with no specialized bottom node (underwater -gateway). 3D Model Three-dimensional underwater networks are used to detect and observe phenomena that cannot be adequately observed by means of ocean bottom sensor nodes, i.e., to perform cooperative sampling of the 3D ocean environment. In three-dimensional underwater networks, sensor nodes float at different depths to observe a phenomenon. In this architecture, given in Figure 2, each sensor is anchored to the ocean bottom and equipped with a floating buoy that can be inflated by a pump. The buoy pushes the sensor towards the ocean surface. The depth of the sensor can then be regulated by adjusting the length of the wire that connects the sensor to the anchor, by means of an electronically controlled engine that resides on the sensor. Sensing and communication coverage in a 3D environment are rigorously investigated in [8]. The diameter, minimum and maximum degree of the reachability graph that describes the network are derived as a function of the communication range, while different degrees of cov erage for the 3D environment are characterized as a function of the sensing range. 3D Model with AUV The above figure represents the third type of network architecture which consist of sensor nodes and Autonomous Underwater Vehicles (AUV) which act as mobile sensor nodes for ocean monitoring, underwater resource study, etc. CHAPTER 4: Differences between underwater and terrestrial Sensor Network An underwater acoustic channel is different from a ground-based radio channel from many aspects, including: Bandwidth is extremely limited. The attenuation of acoustic signal increases with frequency and range [6] [10]. Consequently, the feasible band is extremely small. For example, a short range system operating over several tens of meters may have available bandwidth of a hundred kHz; a medium-range system operating over several kilometers has a bandwidth on the order of ten kHz; and a long-range system operating over several tens of kilometers is limited to only a few kHz of bandwidth [11]. Propagation delay is long. The transmission speed of acoustic signals in salty water is around 1500 meter/s [22], which is a difference of five orders of magnitude lower than the speed of electromagnetic wave in free space. Correspondently, propagation delay in an underwater channel becomes significant. This is one of the essential characteristics of underwater channels and has profound implications on localization and time synchronization. The channel impulse response is not only spatially varied but also temporarily varied. The channel characteristics vary with time and highly depend on the location of the transmitter and receiver. The fluctuation nature of the channel causes the received signals easily distorted. There are two types of propagation paths: macro-multipaths, which are the deterministic propagation paths; and micro-multipath, which is a random signal fluctuation. The macro-multipaths are caused by both reflection at the boundaries (bottom, surface and any object in the water) and bending. Inter- Symbol Interference (ISI) thus occurs. Compared with the spread of its ground-based counterpart, which is on the order of several symbol intervals, ISI spreading in an underwater acoustic channel is several tens or hundred of symbol intervals for moderate to high data rate in the horizontal channel. Micro-multipath fluctuations are mainly caused by surface wave, which contributes the most to the time variability of shallow water channel. In deep water, internal waves impact the single-path random fluctuations [12][13]. Probability of bit error is much higher and temporary loss of connectivity (shadow zone) sometimes occurs, due to the extreme characteristics of the channel. Cost. While terrestrial sensor nodes are expected to become increasingly inexpensive, underwater sensors are expensive devices. This is especially due to the more complex underwater transceivers and to the hardware protection needed in the extreme underwater environment. Also, because of the low economy of scale caused by a small relative number of suppliers, underwater sensors are characterized by high cost. Deployment. While terrestrial sensor networks are densely deployed, in underwater, the deployment is generally more sparse. Power. The power needed for acoustic underwater communications is higher than in terrestrial radio communications because of the different physical layer technology (acoustic vs. RF waves), the higher distances, and more complex signal processing techniques implemented at the receivers to compensate for the impairments of the channel. Memory. While terrestrial sensor nodes have very limited storage capacity, underwater-sensors may need to be able to do some data caching as the underwater channel may be intermittent. Spatial Correlation. While the readings from terrestrial sensors are often correlated, this is more unlikely to happen in underwater networks due to the higher distance among sensors. CHAPTER 5: Layered of UASN The underwater architecture network consists of five layers, application, transport, network, data link and physical layer as shown in the figure below. As typical underwater systems have limited processing capability, the protocol has been kept as simple as possible without significantly compromising performance. The underwater sensor network specifications currently do not include any recommendations for authentication and encryption. These may be easily implemented at the application layer or via a spreading scheme at the physical layer. Each layer is described by a SAPI. The SAPI is defined in terms of messages being passed to and from the layer. The clients (usually higher layers) of a layer invoke the layer via a request (REQ). The layer responds to each REQ by a response (RSP). Errors are reported via an ERR RSP with error codes. If the layer needs to send unsolicited messages to the client, it does so via a notification (NTF). A layer communicates logically with its peer layer via protocol data units (PDU). As the peer-to-peer communication is symmetric, a layer may send a REQ PDU to its peer layer at any time. It would optionally respond to such a PDU with a RSP PDU. This is logically depicted in Figure below It may be desirable in some cases, that non-neighboring layers communicate with each other to achieve cross-layer optimization. This may be implemented by allowing REQ and RSP PDUs between any two layers in the protocol stack. The underwater sensor network specifications define detailed message structures for all SAPI messages. These message structures include message identifiers, data formats to be used, parameters and their possible values Physical layer The physical layer provides framing, modulation and error correction capability (via FEC). It provides primitives for sending and receiving packets. It may also provide additional functionality such as parameter settings, parameter recommendation, carrier sensing, etc. At first underwater channel development was based on non-coherent frequency shift keying (FSK) modulation, since it relies on energy detection. Thus, it does not require phase tracking, which is a very difficult task mainly because of the Doppler-spread in the underwater acoustic channel. Although non-coherent modulation schemes are characterized by high power efficiency, their low bandwidth efficiency makes them unsuitable for high data rate multiuser networks. Hence, coherent modulation techniques have been developed for long-range, high-throughput systems. In the last years, fully coherent modulation techniques, such as phase shift keying (PSK) and quadrature amplitude modulation (QAM), have become practical due to the availability of powerful digital processing. Channel equalization techniques are exploited to leverage the effect of the inter-symbol interference (ISI), instead of trying to avoid or suppress it. Decision-feedback equalizers (DFEs) track the complex, relatively slowly varying channel response and thus provide high throughput when the channel is slowly varying. Conversely, when the channel varies faster, it is necessary to combine the DFE with a Phase Locked Loop (PLL) [9], which estimates and compensates for the phase offset in a rapid, stable manner. The use of decision feedback equalization and phase-locked loops is driven by the complexity and time variability of ocean channel impulse responses. Differential phase shift keying (DPSK) serves as an intermediate solution between incoherent and fully coherent systems in terms of bandwidth efficiency. DPSK encodes information relative to the previous symbol rather than to an arbitrary fixed reference in the signal phase and may be referred to as a partially coherent modulation. While this strategy substantially alleviates carrier phase-tracking requirements, the penalty is an increased error probability over PSK at an equivalent data rate. Another promising solution for underwater communications is the orthogonal frequency division multiplexing (OFDM) spread spectrum technique, which is particularly efficient when noise is spread over a large portion of the available bandwidth. OFDM is frequently referred to as multicarrier modulation because it transmits signals over multiple sub-carriers simultaneously. In particular, sub-carriers that experience higher SNR, are allotted with a higher number of bits, whereas less bits are allotted to sub-carriers experiencing attenuation, according to the concept of bit loading, which requires channel estimation. Since the symbol duration for each individual carrier increases, OFDM systems perform robustly in severe multi-path environments, and achieve a high spectral efficiency. Many of the techniques discussed above require underwater channel estimation, which can be achieved by means of probe packets [17]. An accurate estimate of the channel can be obtained with a high probing rate and/or with a large probe packet size, which however result in high overhead, and in the consequent drain of channel capacity and energy. Data link layer (MAC layer) The data link layer provides single hop data transmission capability; it will not be able to transmit a packet successfully if the destination node is not directly accessible from the source node. It may include some degree of reliability. It may also provide error detection capability (e.g. CRC check). In case of a shared medium, the data link layer must include the medium access control (MAC) sub-layer. Frequency division multiple access (FDMA) is not suitable for underwater sensor network due to the narrow bandwidth in underwater acoustic channels and the vulnerability of limited band systems to fading and multipath. Time division multiple access (TDMA) shows limited bandwidth efficiency because of the long time guards required in the underwater acoustic channel. In fact, long time guards must be designed to account for the large propagation delay and delay variance of the underwater channel in order to minimize packet collisions from adjacent time slots. Moreover, the variable delay makes it very challenging to realize a precise synchronization, with a common timing reference, which is required for TDMA. Carrier sense multiple access (CSMA) prevents collisions with the ongoing transmission at the transmitter side. To prevent collisions at the receiver side, however, it is necessary to add a guard time between transmissions dimensioned according to the maximum propagation delay in the network. This makes the protocol dramatically inefficient for underwater acoustic sensor network. The use of contention-based techniques that rely on handshaking mechanisms such as RTS/ CTS in shared medium access is impractical in underwater, for the following reasons: large delays in the propagation of RTS/CTS control packets lead to low throughput; due to the high propagation delay of underwater acoustic channels, when carrier sense is used, as in 802.11, it is more likely that the channel be sensed idle while a transmission is ongoing, since the signal may not have reached the receiver yet; the high variability of delay in handshaking packets makes it impractical to predict the start and finish time of the transmissions of other stations. Thus, collisions are highly likely to occur. Code division multiple access (CDMA) is quite robust to frequency selective fading caused by underwater multi-paths, since it distinguishes simultaneous signals transmitted by multiple devices by means of pseudo-noise codes that are used for spreading the user signal over the entire available band. CDMA allows reducing the number of packet retransmissions, which results in decreased battery consumption and increased network throughput. In conclusion, although the high delay spread which characterizes the horizontal link in underwater channels makes it difficult to maintain synchronization among the stations, especially when orthogonal code techniques are used [17], CDMA is a promising multiple access technique for underwater acoustic networks. This is particularly true in shallow water, where multi-paths and Doppler- spreading plays a key role in the communication performance. Network layer (Routing) The network layer is in charge of determining the path between a source (the sensor that samples a physical phenomenon) and a destination node (usually the surface station). In general, while many impairments of the underwater acoustic channel are adequately addressed at the physical and data link layers, some other characteristics, such as the extremely long propagation delays, are better addressed at the network layer. Basically, there are two methods of routing. The first one is virtual circuit routing and the second one is packet-switch routing. In virtual circuit routing, the networks use virtual circuits to decide on the path at the beginning of the network operation. Virtual-circuit-switch routing protocols can be a better choice for underwater acoustic networks. The reasons are: Underwater acoustic networks are typical asymmetric instead of symmetric. However, packet switched routing protocols are proposed for symmetric network architecture; Virtual-circuit-switch routing protocols work robust against link failure, which is critical in underwater environment; and Virtual-circuit-switch routing protocols have less signal overhead and low latency, which are needed for underwater acoustic channel environment. However, virtual-circuit-switch routing protocols usually lack of flexibility. In packet-switch routing, every node that is part of the transmission makes its own routing decision, i.e., decides its next hop to relay the packet. Packet-switch routing can be further classified into Proactive routing, Reactive and geographical routing protocols. Most routing protocols for ground-based wireless networks are packet-switch based. Proactive routing protocols attempt to minimize the message latency by maintaining up-to-date routing information at all times from each node to any other node. It broadcasts control packets that contain routing table information. Typical protocols include Destination Sequence Distance Vector (DSDV) [28] and Temporally Ordered Routing Algorithm (TORA). However, proactive routing protocols provoke a large signaling overhead to establish routes for the first time and each time the network topology changes. It may not be a good fit in underwater environment due to the high probability of link failure and extremely limited bandwidth there. Reactive routing protocols only initiate a route discovery process upon request. Correspondently, each node does not need to maintain a sizable look-up table for routing. This kind of routing protocols is more suitable for dynamic environment like ad hoc wireless networks. Typical protocol examples are Ad hoc On-demand Distance Vector (AODV) [23], and Dynamic Source Routing (DSR) [27]. The shortage of reactive routing protocols is its high latency to establish routing. Similar to its proactive counterpart, flooding of control packets to establish paths is needed, which brings significant signal overhead. The high latency could become much deteriorated in underwater environment because of the much slower propagation speed of acoustic signal compared with the radio wave in the air. Geographic routing (also called georouting or position-based routing) is a routing principle that relies on geographic position information. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. Geographic routing requires that each node can determine its own location and that the source is aware of the location of the destination. With this information a message can be routed to the destination without knowledge of the network topology or a prior route discovery. Transport layer A transport layer protocol is needed in underwater sensor network not only to achieve reliable collective transport of event features, but also to perform flow control and congestion control. The primary objective is to save scarce sensor resources and increase the network efficiency. A reliable transport protocol should guarantee that the applications be able to correctly identify event features estimated by the sensor network. Congestion control is needed to prevent the network from being congested by excessive data with respect to the network capacity, while flow control is needed to avoid that network devices with limited memory are overwhelmed by data transmissions. Most existing TCP implementations are unsuited for the underwater environment, since the flow control functionality is based on a window- based mechanism that relies on an accurate esteem of the round trip time (RTT), which is twice the end-to-end delay from source to destination. Rate-based transport protocols seem also unsuited for this challenging environment. They still rely on feedback control messages sent back by the destination to dynamically adapt the transmission rate, i.e., to decrease the transmission rate when packet loss is experienced or to increase it otherwise. The high delay and delay variance can thus cause instability in the feedback control. Furthermore, due to the unreliability of the acoustic channel, it is necessary to distinguish between packet losses due to the high bit error rate of the acoustic channel, from those caused by packets being dropped from the queues of sensor nodes due to network congestion. In terrestrial, assume that congestion is the only cause for packet loss and the solution lies on decreasing the transmission rate, but in underwater sensor network if the packet loss is due to bad channel then the transmission rate should not be decreased to preserve throughput efficiency. Transport layer functionalities can be tightly integrated with data link layer functionalities in a cross-layer module. The purpose of such an integrated module is to make the information about the condition of the variable underwater channel available also at the transport layer. In fact, usually the state of the channel is known only at the physical and channel access sub-layers, while the design principle of layer separation makes this information transparent to the higher layers. This integration allows maximizing the

Wednesday, November 13, 2019

George Orwells 1984 Essay -- George Orwell 1984 Nineteen Eighty-Four

George Orwell's 1984   Ã‚  Ã‚  Ã‚  Ã‚  War is Peace. Freedom is slavery. Ignorance is strength. These are the beliefs that the citizens of Oceania, in the novel titled 1984, written by George Orwell, live by. In this novel, Oceania, one of the three remaining world super powers, is a totalitarian, a society headed by 'Big Brother' and his regime, known as the ministries of Truth, Love, and Peace. A totalitarian government is defined as a government characterized by a political authority which exercises absolute and centralized control, and in which the state regulates every realm of life. This is the type of world that the citizens of Oceania must live in, ruled by fear and under force every day. The names of the different ministries for example, are quite ironic because the are actually the exact opposite of what they profess to be, the Ministry of Love torturing members of the party and so on. Historically, no such type of totalitarian society has ever been actually achieved. In the past, even though fascist and communist states have risen up and tried to achieve such a world, there has never been enough technology or a means by which a government could truly regulate every aspect of life, and thus there has been failure in every attempt at creating a truly totalitarian society. However, in this modern day, new technologies of every kind have made the possibility of such a society to arise a pending reality. Through things such as censorship of the media, new advances in spy technology, and the disintegration of the family in our world today, the world described by Orwell seems ever more a possibility. There are factors that exist in this book that pertain not only to the totalitarian regime of 1984, but apply directly to the democratic republic society in which United States citizens live today.   Ã‚  Ã‚  Ã‚  Ã‚  To begin with, the ability of governments to censor media in the world today is a primary factor in the ability of a totalitarian regime to arise. In the society of Oceania, all of the citizens? thoughts and beliefs are fed to them directly from the government. All of the information about production figures, current wars, and other current events all are filtered and approved by the government. The people do not hear or know anything that the government does not want them to know. In addition, the citizens of Oceania take what they hear as absolute truth, never ... ... Party members devalued it in Oceania. Although there do remain many strong family units throughout the world today, the increasing rate at which family units are disintegrating, democratic society or not, could aid in giving rise to a totalitarian power.   Ã‚  Ã‚  Ã‚  Ã‚  In sum, the possibility of a totalitarian regime, like the one of Big Brother in 1984, seems more possible today than it ever has before. Many factors add to the possibility of such a thing happening, such as the censorship of media, new technology, and the disintegration of the family unit. These factors abound in every society today, regardless of being a democracy. The United States in particular, regardless of being one of the strongest powers in the world and a democratic republic, is not immune to these problems that would give rise to a totalitarian government. In the end, to prevent a totalitarian government from arising, it all comes down to the voice of the people, and that they need to be strong, and not let the government take over the powers that are rightfully theirs BIBLIOGRAPHY 1)  Ã‚  Ã‚  Ã‚  Ã‚  Orwell, George. 1984. Harcourt Brace Javonovich, Inc., 1949. 2)  Ã‚  Ã‚  Ã‚  Ã‚  www.wordreference.com/definition/totalitarian.

Monday, November 11, 2019

Play dough activity Essay

I DISCUSSED WITH MY MANAGER THAT I WAS GOING TO CARRY OUT A PLAY ACTIVITY. THE PROJECT I HAVE CHOSEN TO DO IS THE MAKING OF PLAY DOUGH. I HAVE CHOSEN THIS ACTIVITY BECAUSE I FEEL THIS IS A GREAT PASTIME AND A GREAT EXPERIENCE BETWEEN ME AND THE CHILDREN. I SAY THIS BECAUSE THE CHILDREN CAN ACTUALLY TAKE PART IN THE MAKING OF THE PRODUCT. I THINK THIS ACTIVITY WILL HELP THEM TO LEARN ABOUT COLOURS, SHAPES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. MY MANAGER CONFIRMED THE ACTIVITY AND SHE WAS REALLY PLEASED WITH IDEA AND SHE ALSO THOUGHT THIS WOULD BE A GREAT LEARNING EXPERIENCE FOR THE CHILDREN. I  ALREADY HAVE A RECIPE ON HOW TO DO PLAY DOUGH, BUT MY MANAGER CONFIRMED ONE MORE TIME ALL THE INGREDIENTS: FLOUR, FOOD COLOURING, SALT, OIL AND WATER. I MAKE THE PLAY DOUGH ACTIVITY WITH FOUR MONTESSORI CHILDREN. THE FIRST THING I DID IT WAS TO GET ALL MY MATERIALS READY: SMALL BASIN, LARGE SPOON, FLOUR, SALT, OIL, WATER, PAINT, SHAPE CUTTERS, ROLLING PIN. IN THIS ACTIVITY CHILDREN CAN DEVELOP MOTOR SKILLS -USING PLAY DOUGH HELPS A CHILD PRACTICE USING CERTAIN PHYSICAL SKILLS WITH THE HANDS WHEN THEY MANIPULATE THE DOUGH WITH THEIR FINGERS. CHILDREN CAN PRACTICE SKILLS SUCH AS PINCHING, SQUEEZING OR POKING WHILE THEY  PLAY WITH THE DOUGH. COGNITIVE DEVELOPMENT-USING PLAY DOUGH HELPS A CHILD PRACTICE USING IMAGINATION AND OTHER COGNITIVE ABILITIES SUCH IMITATION, SYMBOLISM AND PROBLEM SOLVING. THIS HELPS THE CHILD LEARN MORE ABOUT HIS ENVIRONMENT AS HE MAKES AND MIMICS EVERYDAY OBJECTS WITH THE PLAY DOUGH. EMOTIONAL DEVELOPMENT-USING PLAY DOUGH MAY HELP A CHILD TO CALM DOWN WHEN FRUSTRATED OR ANGRY. HOLDING AND SQUEEZING THE PLAY DOUGH CAN PRODUCE A CALMING EFFECT ON THE CHILD AND IS USEFUL FOR TEACHING ANGER MANAGEMENT SKILLS. ADDITIONALLY, CHILDREN MAY FEEL MORE COMFORTABLE EXPRESSING THEMSELVES  IN OTHER WAYS WHILE THEIR HANDS ARE BUSY. SOCIAL DEVELOPMENT-USING PLAY DOUGH MAY HELP A CHILD DEVELOP SOCIAL SKILLS AS SHE PLAYS ALONG WITH OTHER CHILDREN WITH THE DOUGH. ADDITIONALLY, MAKING PLAY DOUGH IS AN OPPORTUNITY FOR A CHILD TO PRACTICE COOPERATION AND SHARING WITH A CAREGIVER. PHYSICAL DEVELOPMENT. USING PLAY DOUGH MAY HELP A CHILD TO DEVELOP MOTOR SKILLS NEEDED FOR WRITING AND DRAWING. LANGUAGE DEVELOPMENT. BECAUSE OF THE INTERACTIVE NATURE OF PLAY DOUGH USE, CHILDREN NEED TO LISTEN, UNDERSTAND THE COMMUNICATION OF OTHERS, SPEAK, AND  PRACTICE THEIR ORAL COMMUNICATION SKILLS AS THEY MOLD AND MANIPULATE THEIR PLAY DOUGH CONSTRUCTIONS. SCIENCE UNDERSTANDINGS. THE TACTILE EXPERIENCE OF MANIPULATING PLAY DOUGH HELPS CHILDREN DEVELOP A DEEPER UNDERSTANDING OF HOW MATTER CHANGES (PHYSICS) AND ENCOURAGES THEM TO USE SCIENTIFIC THINKING AS THEY OBSERVE CHANGES, MAKE PREDICTIONS, AND TALK THROUGH DIFFERENCES IN THE MATERIALS THEY ARE USING. MATHEMATICS CONCEPTS. MIXING UP A NEW BATCH OF PLAY DOUGH WITH ADULTS IS ONE WAY IN WHICH PLAY DOUGH ENGAGES CHILDREN IN MATHEMATICAL LEARNING AS THEY MEASURE AND COUNT RECIPE INGREDIENTS. DISCUSSIONS ABOUT SHAPE, RELATIVE SIZE (GREATER THAN, EQUAL TO, OR LESS THAN), HEIGHT, LENGTH, AND WEIGHT PROVIDE ADDITIONAL OPPORTUNITIES FOR CHILDREN TO DEVELOP MATHEMATICAL UNDERSTANDINGS. LITERACY LEARNING. WHEN PAPER AND WRITING UTENSILS ARE ADDED TO THE PLAY DOUGH AREA, CHILDREN CAN MAKE SIGNS, LABELS, AND CREATE STORIES RELATED TO THEIR PLAY EFFORTS. EXPLORING AND THINKING- CHILDREN USED THEIR SENSES, THEIR MINDS AND THEIR BODIES TO FIND OUT ABOUT AND MAKE SENSE OF WHAT THEY SEE. THEY USED THE IMAGINATION TO CREATE NEW SHAPE OR DIFFERENT MONSTERS FROM PLAY DOUGH; THEY  ARE IMITATING IN SPECIAL THE MOTHERS IN THE KITCHEN WHEN ARE COOKING; ARE MAKING GESTURES AS ADULTS ;ARE PLAYING AND TALKING ABOUT THE EXPERIENCE. IDENTITY AND BELONGINGS-CHILDREN BUILD RESPECTFUL RELATIONSHIPS WITH OTHERS; THEY EXPRESS THEIR OWN IDEAS, PREFERENCES AND NEEDS, AND HAVE THESE RESPONDED TO WITH RESPECT AND CONSISTENCY; THEY FEEL THAT THEY HAVE A PLACE AND A RIGHT TO BELONG TO THE GROUP; WELL-BEING-IN THE PLAY ACTIVITY CHILDREN WERE HAPPY AND PLAYFUL; THEY WERE INTERACTING TO EACH OTHER; THE GROUP ACTIVITY MAKE THEM FEEL COMFORTABLE AND CONTENTS. COMMUNICATION-CHILDREN USED A RANGE OF BODY MOVEMENTS, FACIAL EXPRESSIONS, AND EARLY VOCALISATIONS TO SHOW FEELINGS AND SHARE INFORMATION; THEY INTERACT WITH OTHER CHILDREN BY LISTENING, DISCUSSING AND TAKING TURNS IN CONVERSATION; CHILDREN USED LANGUAGE WITH CONFIDENCE AND COMPETENCE FOR GIVING AND RECEIVING INFORMATION, THEY ASKED QUESTIONS AND REQUEST TOO. THROUGH THIS ACTIVITY I FOUND THE CHILDREN HAD GREAT FUN. CHILDREN WERE VERY EXCITED ABOUT THE FACT THAT THEY WERE GOING TO HELP ME MAKE THE PLAY DOUGH. THEY WERE FULL OF ALL DIFFERENT QUESTIONS. OVER ALL I FELT THE ACTIVITY WENT VERY WELL

Friday, November 8, 2019

Distinction between Business Intelligence, Knowledge Management, Sales Forecasting, Market Research, and Common Sense in Business

Distinction between Business Intelligence, Knowledge Management, Sales Forecasting, Market Research, and Common Sense in Business One of the most important tasks undertaken in the business world is that of decision-making. Majority of the decisions made in the modern marketplace are aimed at maximizing profitability within a firm. In order to gain sufficient understanding on the decisions to be undertaken, businesses rely on the information technology; indeed, knowledge management and business intelligence are some of the study areas spawned to aid in business decision-making (Anon, n.d).Advertising We will write a custom essay sample on Distinction between Business Intelligence, Knowledge Management, Sales Forecasting, Market Research, and Common Sense in Business specifically for you for only $16.05 $11/page Learn More Prior to designing the marketing plan, sales forecast are normally undertaken in order to determine the potential of the market; hence, numerous kind of information from various sources are used (Longenecker, et al, 2006, p.154). According to Hague (1996), market resea rch is undertaken in various kinds of markets where both the buyer and the seller come together for the sole purpose of exchanging and increasing value. In this case, the buyer benefits by gaining profits while the seller achieves satisfaction (Hague, 1996, p.4). It is suggested by O’Connell (2003) that, despite one having expertise, experience, skills, and smartness, one might be lacking common sense. This is proven by the fact that, despite having smart people around, many dumb activities are normally accounted for, which in the first place ought not to happen, as they require the use of common sense (O’Connell, 2003). Distinctive nature of business intelligence, knowledge management, sales forecasting, market research, and common sense in business The various concepts used in decision-making are mainly distinguished by their definitions, as well as activities and processes associated with each concept. Business intelligence has numerous definitions; for instance, it has been defined as a wide area of technology where data is gathered, stored, accessed, and analyzed for the sole purpose of aiding business users in making better decisions. In addition to this, business intelligence has also been defined as systems that provide a background data that has been directed together with tools of reporting in order to aid in the process of decision-making. According to Williams and Williams (2007), a decision process is a type of business processes. In addition to this, businesses and companies tend to use business intelligence to bring about consistency in decision making, emphasize on incorporation of business information and analytical technique into tactical decisions and strategic processes and increase accountability, transparency and traceability of main decisions (Williams and Williams, 2007, p.186) According to Bergeron, knowledge management is characterized as a strategy in a business that is optimized in order to identify, organize, and pack age information that is important to the business of the firm, thus improving competitiveness among corporations and increasing employee performance (Bergeron, 2003, p. 89).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More From the definition, knowledge management is depicted as a way of introducing sense that results to a procedural management of intellectual assets and quality information for the sole purpose of providing a company with competitive advantage (Bergeron, 2003, p. 9). In spite of knowledge management being considered as an optimization strategy, its limits are not confined to one particular technology or a specific source of information. A key role played in knowledge management technology initiative results from the wide scope of information technologies (Bergeron, 2003, p. 9). In knowledge management practices, it is almost impossible for one to capture the belief s, behavior, and thoughts of the managers in the sense that one can provide quality information to another person (Bergeron, 2003, p. 8). The major differences between knowledge management business concept and business intelligence is brought about by the fact that in knowledge management, new knowledge is created and dispersed while in business intelligence there isn’t any dispersion or creation of knowledge. Sales forecasting according to Longenecker et al (2006) is defined as a prediction of the amount of product or service that can be purchased in a market for specific period. The market description should be defined accurately as it forms the prediction boundary (Longenecker, et al, 2006, p.154). In the construction of a business plan, the time has to be identified as short term or long term, as sales forecast implies on a specified period. In the assessing of the feasibility of a new venture, sales forecast is considered one of the essential components. Moreover, the sa les forecast is also useful in personnel decisions, inventory policies, and production schedules. Sale forecast is considered as a multi-step process mainly because it is a composite of various individual forecasts that have been merged accordingly. The forecasting process is categorized in two major dimensions 1) the starting point of a process 2) the nature used in predicting the variable (Longenecker, et al, 2006, p.156). Market research is normally applied in markets where the sellers and buyers come together to increase value and exchange. The nature of the market determines the techniques and approach to be used by the market researcher. Some of the techniques used in market research include qualitative technique that investigate the complex consumer perception and quantitative technique whose basis is formed on rigorous sampling (Hague, 1996, p.4).Advertising We will write a custom essay sample on Distinction between Business Intelligence, Knowledge Management, Sales Forecasting, Market Research, and Common Sense in Business specifically for you for only $16.05 $11/page Learn More Resources to be used are of outmost importance for the collection of valid data especially in the consumer market research (Hague, 1996, p.5). Information technology has had a great impact in the data processing sector of the market research. In addition to this, information technology is now finding its way in the data collection sector of the marketing research (Hague, 1996, p.12). Market research is hence applied in order to identify a business opportunity, problem identification, and commercial risks to be identified (Hague, 1996, p.14). In its application, market research aids in establishing a need for a service or product, assist in new product marketing and improve already existing product (Hague, 1996, p.14). In establishment of a new product a lot of expectations should not be expected as it offers an understanding of the surroundings upon w hich the new product will be sold and nothing more (Hague, 1996, p.18) In businesses, common sense is vital; this is because overly complicated regulations have become problematic. In order for the markets to work, O’Connell suggests that simplification of institutions should be encouraged together with innovative programs that promote existing systems that are formal (O’Connell,2003, p.6). In the business environs, the proposal, problem or solution should be written down and if you result in a complex idea, you might be heading in the wrong direction and hence one should retract the initial steps used in order to arrive at a simple direction. Lateral thinking has also been emphasized as the way the mind works and should be learned and implemented. In lateral learning, old ideas are done away with and new ones are generated by recognizing the wisdom gained from old ideas and searching for alternative ways (O’Connell, 2003, p.6). Conclusion Differences between th e various concepts used in decision-making are subtle and only minimal distinctions results can be noted due to similarity in their processes. Some of these concepts of the business studies are ascertained by the various existing business firms that provide them. These firms sell their decision support services to executives who make the decisions and implement them by way of manipulation so as to create reports to, show trends or even predict future events. Sale forecasting concept entails a specific period of time in which certain amount of products and services will have been purchased. It is a critical process especially while undertaking a new venture. The period in sale forecasting will be either short term or long term.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More In market research, there is no prediction but contrarily actual data is collected in order to ascertain the difficulties, risks, and opportunities facing a particular market in question. The techniques used in data collection of marketing research can be either qualitative or quantitative depending on the data to be collected. Common sense in business simplifies the complex situations encountered in businesses. Common sense is not very common; this can be depicted by the way different people tackle and solve various problems. While tackling a problem basic steps are to be followed and on resulting into a complex idea, the steps earlier followed are to be retracted to arrive on a simple and a less complex idea. In knowledge management, creation and dispersion of new knowledge is significant as compared to business intelligence where the creation and dispersion of knowledge is lacking. References Anon. (N.d). Business Intelligence and Knowledge Management Differences. Web. Bergeron, B.P. (2003). Essentials of knowledge management. NJ: John Wiley and Sons. Hague, P.N. (1996). Market research: a guide to planning, methodology, evaluation. London: Kogan Page. Longenecker, J.G, et al. (2006). Small business management: an entrepreneurial emphasis. OH: Cengage Learning. O’Connell, E. (2003). The competitive advantage of common sense: using the power you already have. NJ: FT Press. Williams, S. and Williams, N. (2007). The profit impact of business intelligence. Oxford: Morgan Kaufmann.