Thursday, October 31, 2019

OSHA Term Paper Example | Topics and Well Written Essays - 1000 words

OSHA - Term Paper Example This memorandum contains information regarding the effective ways of handling this problem and outlines the most appropriate strategy to be used. The most effective course of action recommended is the execution of laws regarding chemical exposure in the workplace and activation of occupational health and safety programs in different companies. Background Hazards in the workplace have through time affected workers in different industries. These hazards could either be chemical, physical, biological or psychological. For example in the construction industry, statistics show that the rate of fatalities among the construction workers in three times that of all other workers in the US. Construction workers are mainly affected by physical accidents such as falls and inadequacy of proper safety equipment (Occupational Safety and Health Standards for the Construction Industry 18). Even in the availability of safety equipment, the collapse of building due to lack of proper inspection or the f oundations also increases fatalities. Workers in the agricultural sector are commonly affected by biological and chemical hazards. This takes place during the application of pesticides on the plants, due to noise and exposure to the sun excessively. They are also susceptible to physical hazards caused by machinery used in the farm. In America, fatal agricultural injuries are mainly caused by the rolling over of tractors. The rate of accidents in the workplace has increased over the years mainly due to the current use of machinery which easily injures workers. Key Issues to be Addressed One of the major issues to be addressed by the Occupational Safety and Health Administration is the absence of laws and regulations that ensure thorough inspection of the workplace in order to ensure that they are secure for individuals to work in. For example in the mining industry, inspections done on the land being mined are not enough to ensure that the mining field is not susceptible to fires cau sed by methane production (Mendeloff 58). The lands could also collapse in case of an earthquake and as such many fatalities are caused by such accidents. Equipment in different industries are inspect from time to time. However, the frequency of inspection should be increased to avoid losing more lives and more human capital to accidents in the work place. Another major issue to be addressed is the absence of occupation health and safety programs in different companies. This program is effective in training individuals on how to care for their safety and to avoid accidents in the workplace. Many companies avoid having this program as it involves the hiring of new employees thus increasing the cost of production. In the absence of the program, employees are not made aware of their employment rights and further than that they are not aware of how to act in case of accidents in the workplace. Employees further are not aware of what is expected of them in the work environment in relatio n to their safety and the general safety of the company. Solutions to these Issues A solution to the absence of laws and regulations is to design and enforce policies that address various problems faced by workers in different fields. For example, laws should be passed to ensure that frequent inspections are carried out in different industries depending on the frequency of accidents to take place in the particular area. Inspections

Tuesday, October 29, 2019

Security Essentials 1.5 Essay Example | Topics and Well Written Essays - 1000 words

Security Essentials 1.5 - Essay Example Contemporary society confronts security experts with distinct and frequently unprecedented security-associated concerns. The security sector was known as a growth sector even before 9/11 (Clifford, 2003). Affairs between civic law implementation agencies and private security experts in more recent years have been limited, even though it is purportedly transforming. History is full of cases where security purposes have been accomplished through the application of innovative minds, resourceful plans, and easily accessible solutions. Sectors evolve to meet these new social demands as society itself evolves. Exploration of artifacts offers evidence that shows attempts by the earliest communities to secure themselves from internal and external dangers. Particular communities discovered methods that were more dignified in an effort to assure security protection by building tools, starting agriculture, and settling in the long-term. These communities resided in regions with certain climates that presented particular security dangers as well as defenses (Clifford). Kangaroo justice was still a preferred option even after the establishment of formalized legislation in educated nations such as the United States. Historians commonly agree that tribal leaders or household members who represented the rest of the family determined security aims during eras that preceded recorded history and areas where legislations could not be implemented freely like the American Frontier. Archeological proof imply that civilizations dating as far back as five millennia BC designed and implemented laws to identify proper behavior. Ancient recorded attempts to build a series of criteria has been credited to the Sumerians as far back as five millennia BC. The Code of Hammurabi, 1750 BCE, is the later legal cannon that adopted Sumerian cannons, set up by King Hammurabi, and discovered in 1901. Draco’s Law applied to Athens in 621 BC and included punishments for numerous crimes that

Sunday, October 27, 2019

Health Care Of Underprivileged Children Health And Social Care Essay

Health Care Of Underprivileged Children Health And Social Care Essay In September 2000, representatives from 189 member states of the United Nations met at United Nations headquarters in New York and adopted the Millennium Declaration, a series of collective priorities on peace and security, the eradication of poverty, the environment and human rights. Following this declaration, a set of eight goals, the Millennium Development Goals (MDGs) were drawn up as the blueprint to achieve noticeable results and improve the lives of people in developing countries by the target date of 2015. The eight MDGs include specific, measurable targets and timelines, for developing countries as well as for donor countries, civil society organizations and funding institutions such as the World Bank. All nations agreed to undertake specific follow-up measures to ensure that these goals were achieved in their own countries and commitments have been made to fund these initiatives. The MDGs Priorities for Children Each child is born with the right to survival, food and nutrition, health and shelter, an education, and to participation, equality and protection. The MDGs are especially important for the well-being of children: they promote health; quality education; protection against abuse, exploitation and violence. Our report pertains to the following millennium development goals: Goal 1: Eradicate Extreme Poverty and Hunger Extreme poverty hinders childrens access to nutrition, health care and education. Providing children with basic education, health care, nutrition and protection fulfills their rights, increasing their chances of survival and of a productive future. Goal 2: Achieve Universal Primary Education Educating children is a tool to achieve all the MDGs. Primary education also includes the education of health in which it is taught how to take care of health as prevention is better than cure. Especially because many children in Pakistan have the propensity to fall sick frequently and thus cannot continue their education. So for getting education the childs health should be safeguarded at all costs. Goal 6: Combat HIV / AIDS, Malaria and Other Diseases Diseases undermine the development in the third world countries malaria, measles, polio and tuberculosis cause the deaths of millions of children who do not have good nutrition, sanitation or healthcare. We can prevent this substantially by promoting long-term primary health education and providing them with health insurance to safeguard their futures. What is Primary Health Care? Primary health care is a vital and an indispensable care of your health and it is also a foundation of the health care system which involves providing several initial primary level services to individual families and communities, through a team of health professionals, consultants and various doctors. Primary Health Care is based on 4 Key Pillars: Teams PHC is about working in teams to provide beneficial health care facilities to communities and individual, and to improve the continuity of care. It also diminishes duplication by ensuring your access to proper health professionals. Information PHC provides enhanced adroitness of information between doctors and expanded access to information and using modern tools like electronic health records and diagnostic devices to advance the eminence, access and coordination of health information. Access PHC gives you greater access to the right services when and where you need them. Healthy Living PHC believes in your better care and focuses on prevention, chronic conditions, and encouraging support for self-care. What Is Health Insurance? Insurance is loss by illness or physical injury. It facilitates you with all kinds of expenses from Medicare to all kind of hospital expenses. Health insurance can be directly purchased or can be given to any respective employee. Importance of Health Insurance Health insurance provides health in an affordable way for you and your loved ones that include your Medicare and family protection from the lofty fee of healthcare. (Rarely medical bills can be monetarily devastating and families pull through from such debts in a certain long period). Protects Your Future When someone gets insurance of his car or home, they mean to protect their family and themselves from financial sufferers. Insuring your health is same as that. Health care is way much costly than an insurance of other things. Read the facts below: The average cost of a trip to the emergency room for an adult is about $700, not including any hospital facilities, which may increase the bill to well over $1,000 A broken leg can cost up to $7,500 Average expenses for childbirth are up to $8,800, and well over $10,000 for C-section delivery The total cost of a hip replacement can run a whopping $32,000 Above instances sound scary, but with the right plan, one can protect Himself from most of these and other types of medical bills. Gets You the Care You Need Many people who do not have health insurance fails to get the medical care they need. That is because they are worried about the best treatment expenses. The key of beneficial health insurance is access to a large network of doctors and hospitals. Read the H.I benefits below: Quick and easy access to desirable medical needs. Peace of mind during a hard time because one knows they are covered. Affordable access to care and health information to keep you glee and healthy Is There A Need For Health Insurance In Pakistan? In Pakistan and India, at least one third of the 1.3 billion lives in urban hubs and of this population estimated 400 million earn less than $3 a day. The Pakistani government use just 0.9% of its GDP on health and even India uses only 1.9% of its GDP on a woefully under-resourced, inundated public health sector. Thus 97% of all healthcare outlays occur from out-of-pocket and catastrophic medical costs and treating major diseases in low cost are a main precipitant of cohort poverty. Major Health Insurance Providers (Underwriters) In Pakistan Allianz EFU Health Insurance Adamjee Health Insurance IGI Health Insurance United Insurance Company of Pakistan Asia Care Pak Qatar Takkaful Health care for the underprivileged Developing nations are overwhelmed by effort of under nutrition and a host of viruses. Outbreaks of diarrhoeal diseases give a rough steer to the poor hygiene of the community (clean and safe drinking water is a dream for millions even now). In many nations health care is provided jointly by the government and the private sector, but the handful of public health institutions are the only hope for the needy people. The services of private hospitals are not up to the mark of the massive bulk of population belonging to the low-income zone. The private zone is apparently concerned only in remedial medicine and these hospitals and clinics are essentially run with a yield aim except for a handful of society that runs on charitable basis. We cannot blame the former group as it is not their duty to offer free health care to poor people. Many agendas aimed at the bar of transmissible diseases are run in under developed countries with the help of WHO, but even these agendas failed to give needed effect. The reasons for the failure of these national health agendas are multi factorial; the vital being is the lazy loom by the government officials implicated in implementing the agendas. (Rarely beneficiaries get less than 1% worth of what is imagined in the agenda). Consequently, the deprived of Pakistan are losing faith in the healthcare industry on the whole. The reasons can be summed up as follows: Lack of funds in the public health sector Lack of resources and equipment in government hospitals Lack of spur in government hospitals Lack of primary health education Poor utilization of services Improper staff recruitment in government hospitals Rampant illiteracy Inappropriate allocation of funds What is Naya Jeevan? NAYA JEEVANÂ ® is a not-for-profit social enterprise dedicated to enhancing the lives of low-income families. Naya Jeevan works in collaboration with corporate, academic, and non-profit institutions so that a new wave of social responsibility can be catalyzed that can then be leveraged to realize a positive sustainable outcome for all stakeholders. Naya Jeevan believes that philanthropy should not be a transient, ad-hoc event but be institutionalized as a fully integrated part of society. Vision To provide underprivileged children and their families throughout the emerging world with quality and affordable access to catastrophic healthcare. Objectives Reduction in poverty and mortality rates attributable to acute infectious diseases and lack of timely treatment. Reduction in disease outbreaks due to lack of preventive care. Reduction in the incidence of recreational/addictive substance abuse. Reduction in maternal mortality attributable to emergent pregnancy complications. Mitigation of urban child labor and child exploitation. Collective Social Responsibility through joint partnerships with the corporate, non-profit, academic and service sectors. Integrated social empowerment of the low income population. Business objectives to catalyze an ecosystem effect Poverty alleviation By reducing the financial impact of catastrophic medical expenses Reduction in maternal/child morality Through timely intervention and 24/7 access to ambulances, medical doctors, ERs, trauma centers, etc. Improvement in primary health outcomes Through preventive health education and behavioral change workshops Reduction in substance/drug abuse Through rehabilitation workshops and access to treatment centers Mitigation of child/labor/sexual/physical abuse Healthy breadwinners will enable children to remain in school and away from premature labor Naya Jeevan Value Added services: 24-hour medical hotline: 24/7 access to a qualified medical doctor Help with navigating the complex world of hospitals Help with claims management, settlement and trouble-shooting Beneficiary orientation (Training) Animated interactive presentation at client premise by a qualified medical doctor (same set of doctors who manage the helpline). Managing expectations what is covered, what is not, where to go, access to hospitals Case based claims scenarios Building of rapport and trust with beneficiaries Access to subsidized OPD and pharmacy network Quality checks on standard of treatment at the treating hospital Health awareness sessions (Workshops) Primary health care workshops on topics such as Healthy Heart Hand Hygiene Dental hygiene Nutrition and Weight Management Anti-smoking/ tobacco dental issues Annual health check-ups (Screening) Head to toe examination at clients premise No compromise on working hours Early diagnosis of diseases and management Aggregate Annual Health Report of employees (a health-o-meter of the organization) Targeted Preventive Health Workshops based on the findings Health insurance of underprivileged NGO schoolchildren project overview In February 2011, Naya Jeevan started on the innovative idea of insuring the health of children that fell under the umbrella of other NGOs. The idea was to provide quality healthcare to these children as they were willing to study but a disease or an injury incurred by them or a family member could potentially put an end to their dreams forever. Furthermore, most of these children did not have any awareness about primary health care, or about ways of preventing/ mitigating common ailments prevalent in their locality. Thus they would end up going to untrained professionals with inadequate or no qualifications for treatment of such ailments/ injuries, further exacerbating not only the medical problem at hand but also the unstable financial conditions of their families. Project Impact This project is designed to provide quality health care to underprivileged schoolchildren who cannot afford quality health which includes primary health care. Importance of Access Most children are healthy. Some may ask, therefore access to health care is important for children. In some important ways they are distinct in age groups. For health services they are entirely dependent on their adult caregivers, and are unaware from the advantages of health care and its benefits. Childrens health needs are also significantly different from those of adults. With the time children grown with a rapid change and it may cause them to get ill or get injured during their activities and if those diseases or injuries are not treated well so they can leave a huge affect on a childs physical and emotional development. The type, cruelty, and rate of health conditions that children practice also differ from adults. Childrens can experience a wider range of health issues if not have been taken care well and even though certain childhood conditions are quite mild in single instances, they have the tendency to lead to life-long disabilities. For example, chronic ear infections, if unchecked, can lead to hearing impairment, and possibly learning disabilities. The Limitations of Insurance Children have a beneficial impact on access when extending health insurance to low- income. This does not mean that children will inevitably have full access to health care, especially the deprived ones. Insured low-income children use fewer services than the richer, insured children. Moreover, poor children with insurance are less likely to go to a private physicians office and utilize community health centers, compared to their better-off counterparts. There are a number of reasons for these differences. The families of poor children with insurance face nonfinancial fences to health care that insurance cannot address, including transportation, child care, inconvenient location of services, and service hours that conflict with work. Children of immigrant families may face additional barriers, including an inability to speak in their primary language, fear of exile, and cultural conflicts with Western medicine. Therefore, providing insurance without developing a delivery system to serve the needs of low-income children does not have to produce the desired outcome of improved access to quality health care. NGO Schools under the Naya Jeevan health plan The project is a pilot to test out health insurance in NGO schools across Pakistan. In 2011 Naya Jeevan enrolled 8,334 NGO school children in the plan across the country. Participating Schools are Manzil School, Karachi Zindigi Trust, Karachi IISAR Foundation, Karachi DIL Schools, Khairpur Mashal School, Islamabad Manzil School (Karachi): Manzil is a Non-Profit Organization providing free education to children in the slum areas of Karachi. Starting with only 20 students in 2002, today Manzil has around 200 students who are being equipped with the highest quality of education, practical knowledge, skills and work ethics. It is situated in Quarter No1.Railway line near Bath Island Clifton. Manzil was started by a PhD student at CBM Ms. Shazia Mirza, after she observed the socio-economic divide in the region. She lived near the slum in a well off neighborhood and her house maid came from Raitee Line Bastee. Sensitized by the proximity of this other world, she started the school in a one room rent out from her pocket money. The majority of the community/bastee is ethnically conservative Pathans. The winning of the trust of this community has been one of the major successes of the initiative. Zindagi Trust Schools (Karachi): Zindagi Trusts program educates children who work in the urban slums of Pakistan. With nearly 2800 students, a 2.2-year accelerated primary education course is taught to the children who spend most of their days toiling in car-repair shops other general stores in Karachi, Lahore Rawalpindi. Permission is sought from the students parents and employers before enrolling them in the free schools to ensure success. The use of Government Buildings allows for a proper school experience with classrooms and blackboards. Right now Naya Jeevan is giving health plan to seven such schools in Karachi. IISAR Foundation (Karachi): IISAR was founded in 1990 by Prof. Dr. Ahmed Saleem Siddiqui, with an aim to impart promote quality education irrespective of differences. IISAR is a world class center having concentrations in teaching and research, revelation-based knowledge and technology-based learning across the full range of the social, political and economic sciences. Its a non-profit organization and has an outstanding reputation for academic excellence. Mashal school (Islamabad): Mashal is a self-funded school (i.e. registered trust), comprising of 406 children in classes ranging from nursery to class 8. These children face hardships at home, as well as at work, when selling items such as flowers, shopping bags and sweets, and washing cars on the streets. They have little choice, but to survive on their own in the company of gangs on the street. They are vulnerable to abuse and exploitations of all forms. Despite most of the childrens traumatic past experiences, through the assistance of Mashal School, they are able to overcome their inhibitions and eventually develop a sense of trust and dignity which allows them to finally live their lives as children and possess a deserved sense of belonging. DIL schools (Khairpur): Developments in Literacy (DIL) has been working in Khairpur District, Sindh, since 1998. DILs mission is to combat illiteracy in the remote, underdeveloped regions of Pakistan by opening non-formal primary and middle schools for girls. DIL hopes to break the entrenched social taboos against female literacy by working with the communities and gradually empowering young girls to improve their future prospects through education. However it is only possible for a child to concentrate on their studies when they are in good health. Education does not only include learning how to read and write but also the knowledge of how to look after ones self and make ones life better. Thus DIL has embarked on a journey to improve both the health and nutritional status as well as alleviate the levels of literacy in the children of Khairpur. PLI policy: In 2011 with co-operation and research we introduced Profit and Loss Insurance (PLI Policy). The difference between the PLI Policy and the regular insurance policy can be explained by analogy of credit and debit. In conventional health insurance for the price of the premium you get a binding promise from the insurance company to cover claims under the plan. A group may have paid 50,000 PKR in premiums but used services of up to 100,000 PKR. On the flip side they client may have not used any services and have lost all the money in the premium. A managed care/PLI model is similar to a debit card. You spend what you have and the insurance company charges a fee for that. However, if you have any money left over, it is carried over to the next year unlike the premiums. Also, because it is your money you can choose which claims you want to settle in spite of them being policy exclusions. During this pilot year of micro-health care for children Naya Jeevan has tried to assess the efficacy of both models. The total coverage limit for both was set at 50,000 PKR for the inpatient and the rest of the money used as a pool for outpatient expenses on a reimbursement basis. Pictorial Representation: Number of school children: Number of claims: Health Awareness Services provided by Naya Jeevan: Aga khan anti-tobacco workshop:- Naya Jeevan partnered with Aga Khan University and there team of doctors delivered an anti-tobacco workshop at the schools. Many of the children re addicted to some form of tobacco over there. Thus many have sub-mucosal fibrosis, which is an irreversible narrowing of the mouth cavity due to oral tobacco use. Two children were found to have pre-malignant oral lesions. AKU delivered this workshop free of cost. In-house preventive health workshops:- Naya Jeevan believes in primary healthcare prevention. Children cant be in the best health if they dont have information about the disease process. Healthcare workshops belong to a mini interactive lecture series in collaboration with other corporate partners and the topics chosen are based upon the feedback received. Examples of healthcare workshops held to date are hand washing, dental and smoking/drug addiction, etc. Several workshops were delivered by our Medical Services team, including Healthy Heart, Sad Teeth Happy Teeth, Dental Hygiene and Hand Hygiene at schools. Re-fresher trainings:- Trainings are also being given by Naya Jeevan to parents who come to attend regular parent-teacher meetings at the schools, and to the teachers/ administrative staff. We have been conducting refresher trainings in many of the NGO schools, and have come to realize, among many things, that it would be of great help if instead of visiting these schools and delivering the trainings in person, we could have these schools periodically play a video recording of our training whenever they had a substantial number of parents visiting the school. Challenges of the program Data files are especially cumbersome. They are on hard copy and had to be re-entered into electronic form. This takes a lot of time and effort. Even the cards distribution is a difficult area as they had to be delivered class wise. Problems of unaffordability (both time and monetary) of parents to reach the panel network hospitals according to existing protocols has been a major barrier. Many children only suffer minor medical problems and need outpatient treatment. Therefore, collaboration with reliable hospitals in their vicinity is in progress. Language barrier has resulted in poor retention of information so far. Therefore, repeated refresher trainings were given to parents and teachers so that they may know the proper use of card. The small number of rejected claims shows that re-fresher trainings were effective. Lack of trust from parents was also a challenge in the reimbursement process. Parents werent sure that we will reimburse the money and that too within a month. Other than this they were not comfortable in submitting original medical bills and receipts to us. Lack of availability of audio-visual equipment/ electricity/ adequate space in every school to accommodate large groups of parents and teachers. The lack of interest shown by the teachers has been a major barrier. This has been solved by making them a stakeholder in the health plan also, with the understanding that they will take responsibility of taking the lead on making the health plan more comprehensive for the children. The slow process of setting up funds in vicinity hospitals: So far, Islamic International Medical Complex has been set up for Mashal School in Islamabad with plans for this model to be replicated to all schools systems. Keeping a proper school wise backup of claims that can be shown to anyone who wants to access the information anytime. Why We Chose Naya Jeevan Naya Jeevan targets that need of the underprivileged population that is not fulfilled by any other NGO i.e. affordable healthcare. Therefore, by increasing awareness about the importance of health insurance, and prevention of basic medical and dental issues (that can cause devastating health-related and financial problems later), one can greatly impact the quality of life for many low-income people. Need assessment: Through Naya Jeevan we intended to visit schools and putting up a workshop regarding health to kid. From this guidance the schools were expecting that the children will adjust their routine that wuill help them to take care of their health. Less resource was obtainable to present them that did not help to make children go fully aware with their health knowledge. We as health students have a lot of health awareness and of facts related to it which can be effortlessly distribute to those kids who are ignorant of diseases and health issues that need to be taken care of. Materials and equipment: Since these schools have no capital for organizing workshop we had to assemble every resource our self. All multimedia (speakers, projectors and screen) were organized by Naya Jeevan. We arranged pictorial illustration and miniature stories regarding health and distributed among kids. Our volunteer work As Naya Jeevan gives workshop to school children to improve the health education in and to increase awareness of how to take care of live. We volunteered with Naya Jeevan and visited one of the schools and gave workshops. This was quite an interactive session and we gave workshops in small groups so that they may understand well. This is quite a good learning for them and also for us. The following are the workshops we prepared and delivered for these schoolchildren: Hand Hygiene:Description: http://t2.gstatic.com/images?q=tbn:ANd9GcQvwd7yWW5ALmEZzijVQp0qSPcJA3RH57G9IRZevZXWqafhPy7B The Naya Jeevan Hand Hygiene workshop was developed to enlighten our valued beneficiaries about the importance of keeping your hands clean as our hands are the primary tools that enable us to accomplish various tasks. At the same time it also serves as a main mode of transmission of various infectious agents. The key learning objectives of the workshop include: When is it necessary to wash hands? What are the proper steps of hand washing? What is feco-oral route of transmission of germs? What are the important infections that can spread through feco-oral route and how can they be prevented? Duration: 60 minutes Infectious Diseases: In Pakistan, its the communicable diseases constitute the bulk of most illnesses. Just in recent years we have seen epidemics such as dengue fever. Description: C:UsersZaraDesktopimagesCAGJG6QU.jpg This workshop discusses at length, the prevention and combat strategies for infections such as typhoid, malaria, dengue, gastroenteritis, various forms of hepatitis and other most prevalent ones in Pakistan Duration: 50 minutes Dental Hygiene: Delivered by a dentist, this workshop deals with all the common teeth issues that result from poor oral hygiene. The dentist talks about the proper way of brushing teeth and the products like Paan, Gutka, betel nuts, cigarette etc that must be avoided in order to maintain oral hygiene. It also highlights some of the oral cancers that can result from use of addictive substances such as tobacco. Duration: 30 minutes Balanced Diet:Description: C:UsersZaraDesktopdiet imagesimagesCAQNOBSE.jpg A balanced diet is one that includes the Recommended Dietary Allowances, also called RDAs, for all the essential nutrients. These include proteins, fats, carbohydrates, vitamins and minerals. The physician discusses the nutritional requirements (in calories) for individuals based on gender, age, profession, physical activity and co-morbidities. Duration: 50 minutes Sustainability of results The project strongly inculcates the spirit of giving back and community engagement. Diffusion of a new idea goes through the following stages Knowledge Persuasion Decision Implementation Confirmation Problems faced: The Schools had problems like Non active involvement of teachers as of no personal benefit. Language fence. We have to speak in easy language Lack of partial resources Building faith in children Regulate in their ambiance. Schools were very keen on having their children screened, especially eye and dental screenings. Children cannot afford the taking care of their and were sad that they cant even buy a toothpaste and will continue with tooth powder The outcomes of these workshops: Children specifically big children started taking care of their health More calls started coming on helpline regarding basis health information These workshops created so much impact on the children that they also educated their family about health. There was a major issue in the panel hospital that hospital staff did not treated the poor children well considering it was a private hospital. We went to these hospitals and talked to those hospitals to treat these children well. After a week we got calls from schools that these workshop created a big impact and wanted us to design more workshop for the kids The school also reported us that these workshops created a big living difference and major difference were seen. The school children used to eat a lot of bubble gum and beetles. After the workshop the school noticed that 30% stopped eating it. It was also identified by the schools that there should be refresher workshop as the children memory forget the things soon. This is a new product that has required constant tweaking throughout the year and training and re-training of the schools. NGO schools currently require very close and regular contact throughout the year to encourage the uptake of services. The product has to be as simple as possible with cashless card based services for everything including out-patient services. Re-imbursement scenarios have to be kept at a minimum. Teachers have to be active stake-holders. Conclusion and recommendations All children need health care, whether for regular check-ups, for episodic health problems such as ear infections, or for chronic conditions. Because health services are relatively expensive, childrens access to care is largely dependent on whether or not they have health insurance. Unfortunately, far too many children are not covered and therefore, do not receive needed care. The health plan in the original format has not been successful. Naya Jeevan has quickly moved in to alter the original plan and make sure that the children benefit from their coverage. These include Insuring the teachers to make them a stakeholder in the childrens health. Most teachers are from the same community as the school and thus are the most important factor in increasing uptake of services. Depositing funds at a nearby identified network hospital is of essence. After the funds have been deposited, Naya

Friday, October 25, 2019

Symbolism in The Great Gatsby, written by F. Scott Fitzgerald Essay

Symbolism in The Great Gatsby, written by F. Scott Fitzgerald The Great Gatsby is a classic American novel, written by F. Scott Fitzgerald in 1927 about corruption, murder and life in the 1920’s. The true purpose for a writer to compose any piece of literature is to entertain the reader, and this writer does this to the best of his ability. In this well-crafted tale, Fitzgerald presents a fast moving, exciting story, and to any typical reader it can be enjoyed; however, if the reader takes the time to analyze his words and truly understand his symbolism used, it can transform this account into a completely different entity. In The Great Gatsby, it is apparent that Fitzgerald uses these symbols to provide representations of what life was like during that time, and to help advance the thematic interests in his novel. According to the Merriam-Webster Online Dictionary, symbolism is defined as â€Å"The practice of representing things by means of symbols or of attributing symbolic meanings or significance to objects, events, or relationship s,† and the author uses all varieties of symbol’s in the text to coax the reader into the true lives and personalities of the characters. Symbolism often allows the reader to better understand the theme and mood that the author is trying to portray. Fitzgerald uses this to show details that cannot be revealed by words alone. Through symbolism, he allows the reader to refer to other, more tangible aspects of life. Throughout this novel, the types of symbolism vary from object to object, but some of the most notable examples of symbolism include the color green, the overall setting, and the eyes of Doctor T.J. Eckleburg. The use of symbolism throughout this novel not only helps to give the reader insight into the true identities of the characters, but also further accentuates the themes portrayed throughout the novel. One of the more obvious examples of symbolism in this novel is the color green. This is evident from the beginning of the novel, when there is a small, flickering green light across the Manhasset Bay, separating the Manhasset Neck, also known as the East Egg, from the Great Neck, also known as the West Egg. One assumption can be made that the green hue of the light represents the envy that Gatsby has of Tom for being married to Daisy. Gatsby wishes that he was still with Daisy, and this light represents his hopes for... ...ovel, The Great Gatsby. By using specific examples of symbolism, he is enabled to give insight into the characters involved in the events which take place in the story, as well as the events that were taking place during that time period. Fitzgerald made references in this novel that will cause people in years to come to remember the 1920’s for what they truly were, and regardless of if this was his purpose in writing the tale, he will be remembered for this. The novel is awash with symbolism which enhance the themes portrayed in the novel, but a few specific symbols are the color green, the entire setting of the story, and the eyes of Doctor T.J. Eckleburg. All of these symbols help the reader to draw conclusions about the time period, as well as further understand the personalities and attitudes of the characters. By causing the characters to have multi-faceted characteristics and dispositions, Fitzgerald causes the reader to feel like they are involved in the book, whic h leads the reader to become involved in the novel and actually feel like he is one of the characters. Symbolism enhances any piece of literature, but this piece in particular utilized symbolism to flawlessness.

Thursday, October 24, 2019

DBQ Immigration Essay

Prompt: For the years 1880 to 1925, analyze both the tensions surrounding the issue of immigration and the United States government’s response to these tensions. Thesis: Tensions were mainly due to racism and unsatisfied workers that felt that immigrants were taking over the American work environment and politics led to increasingly stricter government regulations on immigration. Body Paragraph 1: During the 19th century federal government supported business interest instead of interests of the workers. Immigrants w/o a job were often willing to work for less pay can citizens were. Businesses were content with paying lower wages to immigrants and often exploited them. However the working class felt as if the Immigrants were forcing them out of the work force. These sentiments led to ant-immigration plank of the Populist Party ‘s 1892 platform. In this platform the National People his stealing of jobs was the greatest reason for tensions surrounding immigration. Body Paragraph 2: No immigrants were gaining political power.  Boston 1908 men of Irish descent filled positions such as police commissioner. â€Å"Members of Congress: O’Connell†¦Hoar† (DOC F) This led to tension concerning immigration due to the fact that minorities were running politics and citizens felt that it was led by foreigners Other tensions between African Americans and immigrants Booker T. Washington felt that immigrants were destroying the opportunities for African American economic Empowerment. Many blacks felt that many of the rights granted to immigrants that were not granted to blacks was unjust. Proposed to allow blacks to fill jobs that immigrants were filling. Washington advocated, â€Å" Casting down†¦you know.† (DOC D). Touching upon 2 arguments in his speech in Atlanta; promotion of blacks and racist sentiments in America during the 1880s to 1925 Body Paragraph 3: The Passing of the Great Race by Madison Grant promoted the idea that the Anglo Saxon race was the prime race and that America, â€Å"Must chiefly depend on leadership† upon the white man (DOC G) Riots in big cities between blacks and immigrants. His led to the resurrection of the KKK who was both anti-immigrant and anti-foreigner. Government responds by limiting immigration. Before the 1880s immigrants were largely welcomed in the U.S. First of these acts was the Chinese Exclusion Act- forbade Chinese immigration to America, it was widely accepted by public Commissioner General of immigration announced in 1908 that an understanding with Japan was reached, â€Å"discouraging immigration of its subjects,† (Doc E). This policy existed before 1908 as well and was continued and enforced by both the Japanese and American Governments. Final act against immigration by the federal government was after the First World War when a quota system was created. This system greatly lowered the number of immigrants accepted into the U.S and promoted white immigrants over Eastern- European immigrants. (DOC H) The Literary Digest published a cartoon showing a funnel to represent the quotas and labeled the Cartoon, â€Å"The only way to handle it,† This act was supported by the public and was apart of the isolationist movement of the 1920s. Conclusion: In conclusion the racial tensions and anger at lost jobs led to strict government control of immigration throughout the 1880’s and the post 1920’s

Wednesday, October 23, 2019

Phoenix Jackson and the Modern Day Woman Essay

A phoenix is a mythical bird of great beauty fabled to live 500 or 600 years in the Arabian wilderness, to burn itself on a funeral pyre, and to rise from its ashes in the freshness of youth and live through another cycle of years: often an emblem of immortality or of reborn idealism or hope; a person or thing of peerless beauty or excellence; a person or thing that has become renewed or restored after suffering calamity or apparent annihilation; A person or thing regarded as uniquely remarkable in some respect. Eudora Welty, in her character Phoenix Jackson, creates humanity’s counterpart of the phoenix firebird from oriental tradition (Wampler 4 June 2013). Although Phoenix Jackson can not lay claim to the immortality manifested by consuming fiery rebirths (as does the mythological bird), she possesses a fiery spirit and is consumed by love for her grandchild (Wampler 4 June 2013). Phoenix Jackson is wise, confident, fearless, tenacious, courageous, and has a clear goal in mind, which is to get her grandson’s medicine despite any obstacle that she may face. Phoenix Jackson can be summed up in one word which is noble. All women should have the characteristics of Phoenix Jackson but some of those characteristics are being lost with the evolving society. Phoenix Jackson is an elderly African American woman walking into town on a cold winter morning to get medicine for her sick grandson. One aspect of Phoenix’s likeness to the mythical phoenix is their journey before they die. The Natchez Trace is an old highway that runs from Nashville, Tennessee, to Natchez, Mississippi (Natchez Trace 27 May 2013). By 1800 it was the busiest in the American South (Natchez Trace 27 May 2013). Phoenix lives â€Å"a way back off the Old Natchez Trace,† which indicates that the journey along with the fact that it is December is difficult for her (A Worn Path n. d. ). The obstacles she faces shows how deeply she cares and sacrifices for her grandson. At the end, when we are told she â€Å"began on the stairs, going down† it indicates that she is faced with a return journey as difficult as the one she has just completed (A Worn Path n. d. ). She is also between 80-100 years old which further magnifies the intensity of her journey and the tragic situation of her grandson’s dependence on her. Like many people who have lived to be Ms. Jackson’s age, they gain strength from the years of trials and experiences in their lives. Ms. Jackson was unschooled, black and a woman who grew up during the depression and slavery years. This along with her many years on earth have made her cautious, strong willed and driven. Phoenix’s appearance is yet another aspect of her likeness to the phoenix. At the beginning of the story, Phoenix is described as having a â€Å"golden color [running] underneath [her skin], and the two knobs of her cheeks were illuminated by a yellow burning under the dark† (A Worn Path n. d. ). Welty further describes Phoenix’s hair as being tied back in a â€Å"red rag† (A Worn Path n. d. ). These images cannot be taken to be a mere coincident as the phoenix from the ancient Egyptian legend is described as having a beautiful red and gold plumage. Furthermore, Phoenix’s eyes are said to be â€Å"blue with age† (A Worn Path n. d. ). This description is the first of many that give an indication of her age. The phoenix is a bird that matures to an extreme age before it bursts into flame and is reborn from the ashes. Welty also employs some rather unusual imagery, in which she describes Phoenix’s skin as having â€Å"a pattern all its own of numberless branching wrinkles as though a whole little tree stood in the middle of her forehead† (A Worn Path n. d. ). All of these ties back in with the age the phoenix grows to. During the 1940’s women’s roles and expectations in society were changing rapidly. Previously women had very little say in society and were stereotyped to stay home, have babies, to be a good home maker and wife. Modern day women have it so easy compared to women in the 1940’s. Women today have many career opportunities that were not open to women of the 20th century. In fact, the great majority of women were illiterate because it was assumed that they didn’t need to read if all the work they would do in life was raise children. Women of the 21st century have access to dozens of labor-saving devices that allow them to do housework in a fraction of the time that it took women in the olden days (Women’s Rights). Women today use birth control to plan the size of their families. Centuries ago, it was not unheard of for women to have 11 children, and childbirth was the single highest cause of death for women in their 20s and 30 (Women’s Rights). Women in these times live under a justice system that tries to stop domestic violence, whereas women in 1808 were the property of their husbands, who could do whatever they liked without penalty (Women’s Rights). No policeman or judge would ever think a man had done wrong if he ‘had’ to beat his wife to get her to behave. Modern women control their own finances. Women two hundred years ago were unable to sign for a bank loan without a male consenting to co-sign (Women’s Rights). They were judged incapable of owning property, even to the point that any property that they brought with them into their marriage or inherited from their father was immediately transferred to the safe keeping of their husbands (Women’s Rights). If he then turned it into cash and invested it in a business deal that went bad, the wife had no recourse to recover the money. Women were only given the vote in 1920 (Women’s Rights). Before that, they had no say whatsoever in the laws that were passed that affected their lives. In a few ways, modern women have a harder time than women of yesteryear. Today some women move so far from home that their social and family networks break down. It appears that women living in the 21st century have it vastly easier than women of the 1940’s, although not in every case. Phoenix Jackson was a very rare woman during her time and she is unlike the modern women of today. Not many women today or even back then would do what she did for her grandson. Most women are focused on their careers and would send their husband or nanny to get the medicine for their child. Phoenix Jackson sacrificed a lot because of the love she had for her grandson. Phoenix Jackson’s courage and tenacity are illustrated repeatedly as she faces crisis after crisis during her journey –a frozen day in December, animals in the thicket, hills, thorny bushes, creeks, barbed-wire fences, a com field maze, superstition, a hunter’s gun, a tower of steps, her own forgetfulness, and failing physical health–all obstacles to be overcome (Wampler 4 June 2013). And that’s what Phoenix Jackson does (Wampler 4 June 2013).

Tuesday, October 22, 2019

Cicero Essays - Ancient Greek Mathematicians, Hellenistic Philosophy

Cicero Essays - Ancient Greek Mathematicians, Hellenistic Philosophy Cicero Cicero, was truly a man of the state. His writings also show us he was equally a man of philosophical temperament and affluence. Yet at times these two forces within Cicero clash and contradict with the early stoic teachings. Cicero gradually adopted the stoic lifestyle but not altogether entirely, and this is somewhat due to the fact of what it was like to be a roman of the time. The morals of everyday Rome conflicted with some of the stoic ideals that were set by early stoicism. Thus, Cicero changed the face of stoicism by romanizing it; redefining stoicism into the middle phase. Of Cicero it can be said he possessed a bias towards roman life and doctrine. For Cicero every answer lay within Rome itself, from the ideal governing body to the place of divination. Cicero does not offer any alternate answers to roman society, which robs him of being truly a unique and bold political philosopher. This is not to say however some of his doctrines are untrue, just that he is somewhat blinde d by his roman beliefs and assumptions. The assumptions of Cicero can be noticed when one inspects his view of the ideal governing body, which he expresses through Scipio (in the commonwealth). Although Cicero presents very convincing arguments for a Composite government, clearly his view is possibly only due towards his belief in the roman structure of government.1 Cicero was limited to roman borders of experience, and this point was best illustrated by his disagreement with Aristotle's writings on the decay of states. Cicero was unable to think on the level of Aristotle's logic. He quite simply used roman history as a mapping of the paths of the decay of states. In contrast, Aristotle understood the underlying forces and influences that transpired when a state degraded. Cicero quite frankly could not understand the forces which Aristotle so eloquently denoted. For Cicero, history offered the only possible paths of outcomes; the forces and behaviors played little part on the result ing state.2 A further point of philosophical belief which Cicero contradicted the stoic lifestyle, is religion. Roman tradition conflicted greatly with stoic doctrine, and the two philosophies could never truly harmonize with one another. This point brought the distinction between the Greek learned world of intellect, and the traditional religious roman patronage. This observation literally draws a line between the two worlds, that of knowledge and reason opposing that of tradition and sentiment. This illustrated that roman was truly unable to fully accept a Greek philosophy based on knowledge and brotherhood, and a great Roman such as Cicero was similarly unable to accept the stoic doctrine as a whole.3 The philosophy of stoicism originated in Greece, and was based on the order of the universe. Nature to the stoics (universe) was a precisely ordered cosmos. Stoics taught that there was an order behind all the evident confusion of the universe. Mans purpose was to acquire order with in the universe; harmonizing yourself with the universal order. Within this notion of harmonizing lies wisdom, sin resides with resisting the natural order (or nature). The stoics also tell of a rational plan in nature; our role was to live in accord with this plan. The natural order was filled with divinity, and all things possess a divine nature. This natural order was god, and thus the universe was god; the Greek and roman pathos were simply beliefs forged by superstition. The stoics also had a great indifference towards life, in the regard that the natural plan cannot be changed. This attitude made stoic's recluse from fame, and opposed to seeking it. One fundamental belief stoics held was in the universal community of mankind. They held that a political community is nothing more than its laws' borders, since the natural laws are universal imposed; a universal political community existed in which all men share membership. This interpretation is generally regarded as the early st oic stage, which had yet to experience little roman influence. Upon roman adoption, stoicism went through a romanizing period; an altering of the philosophy to better integrate into roman mainstream. The ideal state of Cicero's; For I hold it desirable, first, that there should be a dominant and royal

Monday, October 21, 2019

Setting the Scene for Great Writing

Setting the Scene for Great Writing The setting is the place and time in which the action of a narrative takes place. Its also called the scene or creating a sense of place. In a work of creative nonfiction, evoking a sense of place is an important persuasive technique: A storyteller persuades by creating scenes, little dramas that occur in a definite time and place, in which real people interact in a way that furthers the aims of the overall story, says Philip Gerard in Creative Nonfiction: Researching and Crafting Stories of Real Life (1996). Examples of Narrative Setting The first den was a rock cavity in a lichen-covered sandstone outcrop near the top of a slope, a couple of hundred yards from a road in Hawley. It was on posted property of the Scrub Oak Hunting Club dry hardwood forest underlain by laurel and patches of snow in the northern Pocono woods. Up in the sky was Buck Alt. Not long ago, he was a dairy farmer, and now he was working for the Keystone State, with directional antennae on his wing struts angled in the direction of bears. John McPhee, Under the Snow in Table of Contents (1985)We hunted old bottles in the dump, bottles caked with dirt and filth, half buried, full of cobwebs, and we washed them out at the horse trough by the elevator, putting in a handful of shot along with the water to knock the dirt loose; and when we had shaken them until our arms were tired, we hauled them off in somebodys coaster wagon and turned them in at Bill Andersons pool hall, where the smell of lemon pop was so sweet on the dark pool-hall air that I am sometimes awakened by it in the night, even yet.Smashed wheels of wagons and buggies, tangles of rusty barbed wire, the collapsed perambulator that the French wife of one of the towns doctors had once pushed proudly up the planked sidewalks and along the ditchbank paths. A welter of foul-smelling feathers and coyote-scattered carrion which was all that remained of somebodys dream of a chicken ranch. The chickens had all got some mysterious pip at the same time, and died as one, and the dream lay out there with the rest of the towns history to rustle to the empty sky on the border of the hills. Wallace Stegner, The Town Dump in Wolf Willow: A History, a Story, and a Memory of the Last Plains Frontier (1962) This is the nature of that country. There are hills, rounded, blunt, burned, squeezed up out of chaos, chrome and vermilion painted, aspiring to the snowline. Between the hills lie high level-looking plains full of intolerable sun glare, or narrow valleys drowned in a blue haze. The hill surface is streaked with ash drift and black, unweathered lava flows. After rains water accumulates in the hollows of small closed valleys, and, evaporating, leaves hard dry levels of pure desertness that get the local name of dry lakes. Where the mountains are steep and the rains heavy, the pool is never quite dry, but dark and bitter, rimmed about with the efflorescence of alkaline deposits. A thin crust of it lies along the marsh over the vegetating area, which has neither beauty nor freshness. In the broad wastes open to the wind the sand drifts in hummocks about the stubby shrubs, and between them the soil shows saline traces. Mary Austin, The Land of Little Rain (1903) Observations on Setting the Scene Grounding the reader: Nonfiction has done a much better job in terms of setting the scene, I think. ...Think of all the splendid nature writing, and adventure writing from Thoreau to  Muir to Dillard  ... where we have fine settings of scenes. Setting the scene precisely and well is too often overlooked in memoir. Im not sure exactly why. But we the readers want to be grounded. We want to know where we are. What kind of world were in. Not only that, but it is so often the case in nonfiction that the scene itself is a kind of character. Take the Kansas of Truman Capotes  In Cold Blood, for example. Capote takes pains right at the beginning of his book to set the scene of his multiple murders on the plains and wheat fields of the Midwest. Richard Goodman, The Soul of Creative Writing  2008)Creating a world: The setting of a piece of writing, whether fiction or nonfiction, poetry or prose, is never some realistic snapshot of a place. ... If you were to describe with the utmo st accuracy every structure in a city ... and then went on to describe every stitch of clothing, every piece of furniture, every custom, every meal, every parade, you would still not have captured anything essential about life. ... As a young reader, place gripped you. You wandered with Huck, Jim, and Mark Twain down an imagined Mississippi through an imagined America. You sat in a dreamy, leafy wood with a sleepy Alice, as shocked as she when the White Rabbit bustled by with no time to spare. ... You traveled intensely, blissfully, and vicariously because a writer took you somewhere. Eric Maisel, Creating an International World: Using Place in Your Nonfiction in Now Write! Nonfiction: Memoir, Journalism and Creative Nonfiction Exercises, ed. by Sherry Ellis (2009) Shop talk: A thing I never know when Im telling a story is how much scenery to bung in. Ive asked one or two scriveners of my acquaintance, and their views differ. A fellow I met at a cocktail party in Bloomsbury said that he was all for describing kitchen sinks and frowsy bedrooms and squalor generally, but for the beauties of Nature, no. Whereas, Freddie Oaker, of the Drones, who does tales of pure love for the weeklies under the pen-name of Alicia Seymour, once told me that he reckoned that flowery meadows in springtime alone were worth at least a hundred quid a year to him. Personally, Ive always rather barred long descriptions of the terrain, so I will be on the brief side. P.G. Wodehouse, Thank You, Jeeves (1934)

Saturday, October 19, 2019

Buddhism Essays (1386 words) - Yogacara, Buddhist Practices

Buddhism Buddhism, one of the major religions of the world, was founded by Siddhartha Gautama, the Buddha, who lived in northern India from 560 to 480 B.C. The time of the Buddha was one of social and religious change, marked by the further advance of Aryan civilization into the Ganges Plain, the development of trade and cities, the breakdown of old tribal structures, and the rise of a whole spectrum of new religious movements that responded to the demands of the times (Conze 10). These movements were derived from the Brahmanic tradition of Hinduism but were also reactions against it. Of the new sects, Buddhism was the most successful and eventually spread throughout India and most of Asia. Today it is common to divide Buddhism into two main branches. The Theravada, or "Way of the Elders," is the more conservative of the two; it is dominant in Sri Lanka, Burma, and Thailand (Berry 23). The Mahayana, or "Great Vehicle," is more diverse and liberal; it is found mainly in Taiwan, Korea, and Japan, and among Tibetan peoples, where it is distinguished by its emphasis on the Buddhist Tantras (Berry 24). In recent times both branches, as well as Tibetan Buddhism, have gained followers in the West. It is virtually impossible to tell what the Buddhist population of the world is today; statistics are difficult to obtain because persons might have Buddhist beliefs and engage in Buddhist rites while maintaining folk or other religions such as Shinto, Confucian, Taoist, and Hindu (Corless 41). Such persons might or might not call themselves or be counted as Buddhists. Nevertheless, the number of Buddhists worldwide is frequently estimated at more than 300 million (Berry 32). Just what the original teaching of the Buddha was is a matter of some debate. Nonetheless, it may be said to have centered on certain basic doctrines. The first of the Four Noble Truths, the Buddha held, is suffering, or duhkha. By this, he meant not only that human existence is occasionally painful but that all beings; humans, animals, ghosts, hell- beings, even the gods in the heavens; are caught up in samsara, a cycle of rebirth, a maze of suffering in which their actions, or karma, keep them wandering (Coomaraswamy 53). Samsara and karma are not doctrines specific to Buddhism. The Buddha, however, specified that samsara is characterized by three marks: suffering, impermanence, and no- self, or anatman. Individuals not only suffer in a constantly changing world, but what appears to be the self, the soul, has no independent reality apart from its many separable elements (Davids 17). The second Noble Truth is that suffering itself has a cause. At the simplest level, this may be said to be desire; but the theory was fully worked out in the complex doctrine of "dependent origination," or pratityasamutpada, which explains the interrelationship of all reality in terms of an unbroken chain of causation (Conze 48). The third Noble Truth, however, is that this chain can be broken, that suffering can cease. The Buddhists called this end of suffering nirvana and conceived of it as a cessation of rebirth, an escape from samsara. Finally, the fourth Noble Truth is that a way exists through which this cessation can be brought about: the practice of the noble Eightfold Path. This combines ethical and disciplinary practices, training in concentration and meditation, and the development of enlightened wisdom, all thought to be necessary. For the monks, the notion of offering extends also to the giving of the dharma in the form of sermons, to the chanting of scriptures in rituals (which may also be thought of as magically protective and salutary), and to the recitation of sutras for the dead (Corless 57). All of these acts of offering are intimately involved in the concept of merit-making. By performing them, individuals, through the working of karma, can seek to assure themselves rebirth in one of the heavens or a better station in life, from which they may be able to attain the goal of enlightenment. Zen Buddhism Zen or Chan Buddhism represents a movement within the Buddhist religion that stresses the practice of meditation as the means to enlightenment. Zen and Chan are, respectively, Japanese and Chinese attempts to render the Sanskrit word for meditation, dhyana (Coomaraswamy 94). Zen's roots may be traced to India, but it was in East Asia that the movement became distinct and flourished. Like other Chinese Buddhist sects, Chan first established itself as a lineage of masters emphasizing the teachings of a particular text, in this

Friday, October 18, 2019

Empowerment in health Promotion Essay Example | Topics and Well Written Essays - 500 words

Empowerment in health Promotion - Essay Example In most cases, empowerment is usually associated with feminism. These affected persons may be empowered on individual or community levels (Lee 22). Therefore, the person intending to empower either individual or the community must initiate the process by identifying the groups affected and then evaluating the nature of the discrimination involved. Individual empowerment is equally empowering a community since the empowered individual will reflect the same change initiated in the same community thereby affecting the entire community, group, or society. Empowerment often aims at enhancing an individual’s capacity to transform and make an informed choice on the already available choices towards a desired action to effect an appropriate outcome (Linhorst 51). The universal aim of individual empowerment is to initiate an action or process that builds an individual and his collective assets towards improving fairness and efficiency of institutional and organizational contexts that govern the use of the targeted assets (Minkler 59). In healthcare institutions, integrative medicine practitioners often empower individuals to take actives roles towards their own their health care as well as the ultimate decision makers. Moreover, they also encourage their patients to be responsible towards maintaining their individual health. Numerous health care agencies advocate for patient centered health care provision. For instance, according to the National Academy of Science, patients should be given adequate and necessary information as an opportunity for them to exercise a degree of control on their health care decisions. It further argues that health care systems should readily accommodate the differences in the patients’ preferences and encouraging shared decision making among the patients (Linhorst 72). Additionally, patients should be allowed access to their unfettered medical information and clinical knowledge.

Motivating and Maintaining Morale during Downsizing at Rutledge Essay

Motivating and Maintaining Morale during Downsizing at Rutledge Company. The Ethical Selection Dilemma at Integrity Motors - Essay Example For this reason, it implies that a number of employees eventually have their contracts terminated, and it consequently affects their productivity before termination of their employment. Thus, this expose analyses the best practices using the case study about downsizing in Rutledge Company. First, communication is the most important aspect in a firm, and it will be essential in solving problems such as these affecting Rutledge Company. Thus, communicating to employees on how the organization will manage change and informing them on measures that the management will use in determining who to train is crucial in creating an honest environment instrumental for motivating employees. Secondly, assisting the departing employees to find employment in other places will help boost their morale and ensure that the company does not encounter losses in terms of productivity during the downsizing period. Other actions that can increase morale and motivation are providing counseling, establishing f airness by treating all employees equally, and subsequence announcement of downsizing as planned (Mishra & Spreitzer, 1998). The objective of the company should be the elimination of most of the employees who failed to use the technology required for the job. However, the company should make definite decisions that motivate the remaining employees in order to avoid losing some of their talents. First, evaluating this category of employees and identifying their preferences and potential becomes crucial in determining the employees to retain. Therefore, Rutledge Company and its employees should collaborate in developing the best program suited to train the employees who are not using the required technology. In effect, these employees will experience a bond with Rutledge and will start using the latest technology since they participated in developing the plan and they have the feeling of ownership of the plan they helped develop. The best criteria that Rutledge should use during downs izing must encompass employee productivity and competence. In this regard, productivity should be the basis for determining the performance of employees during downsizing, and there should be a performance appraisal in place meant to determine the performance of each employee with the new technology. The performance appraisal, determined by the developers of the technology, will ensure fairness in the retention process. In addition, the fairness will make sure that all employees remained motivated to perform their responsibilities before they knew of their fate at work. It is common knowledge that changing technology in a firm requires properly training the employees. In effect, training will similarly apply to Rutledge Company and its employees. Conversely, retraining employees might improve their morale and motivate them at work. Providing in-service training to the employees will help them learn together with their managers on working while using the new technology. In effect, le arning with their managers and supervisors will help create a â€Å"fellow feeling† to the company, which ultimately motivates the employees and improves their productivity at work since there will be an attachment created in the company. In addition, further training is crucial since it enhances communication within an organization. As previously indicated, communication is crucial since there will be the creation of an environment of trust and openness, which motivates Rutledge’s employees. Case 2: The Ethical Selection Dilemma at Integrity Motors Entrepreneurs and managers realize the importance of hiring the right personnel to run their businesses successfully. In order to

Remote Sensing of the Coral Reefs Coursework Example | Topics and Well Written Essays - 3000 words

Remote Sensing of the Coral Reefs - Coursework Example Coral reefs are productive ecosystem and diverse habitats in the world because of their economic and social importance including food provision, tourism among others. There is a high rate of global degradation of coral reefs and these calls for their sustainable management. Their reduction has fueled the local and international communities to come up with approaches of monitoring coral reefs. Ecology involves the study of organisms in the environmental surroundings which require spatially accurate data given the distribution of spices. In the past manual and field observation methods were used to gather ecological information. These methods were labor-intensive and time-consuming. As a result, remote sensing became widely incorporated in the ecological duties because of its large coverage, cost-effectiveness, and accuracy. This called for the venture into new technologies to enable easy and faster access to remotely sensed information in the management and monitoring of ecological sp ecies. The coral ecosystem is one of the important habitats in the world. Coral reefs play a significant role in checking the amount of carbon dioxide in the sea. Without them regulating the level of carbon dioxide in water could be difficult and many species on earth including human being could be at high risk. Although, that is the current situation in the world because people have destroyed the reefs due to the level of impurities in the water bodies this has resulted in global warming. They are also habitat to millions of fish species, source of employment, food provision, tourism attraction sites and protect the shores fro waves. In short, they are a source of livelihood to millions of people around the globe. This paper addresses landscape remote sensing approaches of mapping coral reefs.

Thursday, October 17, 2019

High school does not adequately prepare students for college Essay

High school does not adequately prepare students for college - Essay Example Some of those schools lack required resources whereas in some schools, the teachers are not skilled enough to build the concepts of students properly. High school teachers must possess the ability to prepare high school students for successful transition to college level education. In this paper, we will discuss the factors, which make high schools unable to prepare the students for higher education. Why High Schools Are Not Able to Prepare Students? Lack of resources is one of those factors due to which most of the high schools are not able to prepare students for college. High schools, which do not have enough funds, are not able to pay competitive salaries to the well-experienced teachers. Such schools hire fresh graduates or less-experienced teachers who agree to teach students even on low wages. Such teachers do not posses the ability to teach students in an effective way because they do not have enough teaching experience required to teach high school students. In some schools, there are no proper labs and technological equipment due to lack of available funds. Properly equipped labs and classrooms not only assist teachers deliver their lectures to the students but also help the students learn in an interactive environment. â€Å"Teachers are not always successful at engaging their students when introducing lessons through typical lecture format† (Beam).

Discussion Question 2 Week 6 Assignment Example | Topics and Well Written Essays - 250 words

Discussion Question 2 Week 6 - Assignment Example New employees have to be retrained so as to think outside the box when making decisions. The employees have the ability to relate with people they meet outside the business hence creating a good rapport with potential customers. Empowerment of the employees creates trust in them, as they are motivated in displaying their creativity, initiative and commitment in the decision making process required to propel the achievement of the hotel’s goals (Cameron, 2010). Also by being entrusted with decision making about their own jobs, the employees invest more in the overall performance of the company. By adding challenges to their jobs and giving them a sense of ownership, the employees became motivated (Rutkowski, 2011). With this empowerment, services provided to customers are of highest standards. Services such as stocking extra towels in the guest rooms, provision of quality food, and quick delivery of the customers’ requirements is observed. With this empowerment, organizational goals were achieved, and ways of performing jobs in the boutique hotel improved (Rutkowski,

Wednesday, October 16, 2019

Remote Sensing of the Coral Reefs Coursework Example | Topics and Well Written Essays - 3000 words

Remote Sensing of the Coral Reefs - Coursework Example Coral reefs are productive ecosystem and diverse habitats in the world because of their economic and social importance including food provision, tourism among others. There is a high rate of global degradation of coral reefs and these calls for their sustainable management. Their reduction has fueled the local and international communities to come up with approaches of monitoring coral reefs. Ecology involves the study of organisms in the environmental surroundings which require spatially accurate data given the distribution of spices. In the past manual and field observation methods were used to gather ecological information. These methods were labor-intensive and time-consuming. As a result, remote sensing became widely incorporated in the ecological duties because of its large coverage, cost-effectiveness, and accuracy. This called for the venture into new technologies to enable easy and faster access to remotely sensed information in the management and monitoring of ecological sp ecies. The coral ecosystem is one of the important habitats in the world. Coral reefs play a significant role in checking the amount of carbon dioxide in the sea. Without them regulating the level of carbon dioxide in water could be difficult and many species on earth including human being could be at high risk. Although, that is the current situation in the world because people have destroyed the reefs due to the level of impurities in the water bodies this has resulted in global warming. They are also habitat to millions of fish species, source of employment, food provision, tourism attraction sites and protect the shores fro waves. In short, they are a source of livelihood to millions of people around the globe. This paper addresses landscape remote sensing approaches of mapping coral reefs.

Discussion Question 2 Week 6 Assignment Example | Topics and Well Written Essays - 250 words

Discussion Question 2 Week 6 - Assignment Example New employees have to be retrained so as to think outside the box when making decisions. The employees have the ability to relate with people they meet outside the business hence creating a good rapport with potential customers. Empowerment of the employees creates trust in them, as they are motivated in displaying their creativity, initiative and commitment in the decision making process required to propel the achievement of the hotel’s goals (Cameron, 2010). Also by being entrusted with decision making about their own jobs, the employees invest more in the overall performance of the company. By adding challenges to their jobs and giving them a sense of ownership, the employees became motivated (Rutkowski, 2011). With this empowerment, services provided to customers are of highest standards. Services such as stocking extra towels in the guest rooms, provision of quality food, and quick delivery of the customers’ requirements is observed. With this empowerment, organizational goals were achieved, and ways of performing jobs in the boutique hotel improved (Rutkowski,

Tuesday, October 15, 2019

Principles of assessment in lifelong learning Essay Example for Free

Principles of assessment in lifelong learning Essay 1.1Explain the types of assessment used in lifelong learning. (150 words approx.) Initial/diagnostic assessment can be taken before learner’s enrollment for a course. This is a way of finding out whether the prospective course is suitable for a student and meets the learner’s needs or not. Formative assessment can be taken during the programme or a course. Teachers use assessments in their teaching sessions to make judgement about their learners. Summative assessment is used to outline or work out the level of achievement. Summative assessment is used for a final judgement about the learning achievements. Formal assessment is used where there is a need to assess learners under controlled conditions. Informal assessment is used as an ongoing check on understanding without control conditions. This is an aid for a teacher to monitor progress. Independent assessment applies to courses where the learners are assessed by someone other than their teacher. Peer assessment is used where other learners are at the same level of skill and knowledge and can play a vital role in judging a learners achievement level. 1.2 Explain the use of methods of assessment in lifelong learning. (150 words approx.) Different methods can be used for assessment in the lifelong learning. Short answers: is a good way of keeping student activities in their learnings. Multiple –choice: is a task in which learner has to select the correct answer from a number of alternative options. Observation: Observation is used i this programme for assessment of micro-teach/ teaching practice delivery. It can be used in any situation where practical skills are being assessed. Project work: involves a piece of written work in which learners take responsibility. Essays: This is a substantial piece of written work as well. It asks learners to show understanding of the subject. Exams: can be taken either by written tests or completion of a practical task under controlled conditions. Oral and aural: These assessment test speaking and listening skills. In this assessment, learners are required to listen to something and respond . Electronic assessment: refers to the use of information technology for any assessment-related activity.

Monday, October 14, 2019

Digital Signal Processing (DSP) and CDMA Advantages

Digital Signal Processing (DSP) and CDMA Advantages INTRODUCTION ANALOG AND DIGITAL SIGNALS The signal is initially generated is in the form of an analog electrical voltage or current, produced for example by a microphone or some other type of transducer. The output from the readout system of a CD (compact disc) player, the data is already in digital form. An analog signal must be converted into digital form before DSP techniques can be applied. An analog electrical voltage signal, for example, can be digitized using an electronic circuit called an analog-to-digital converter or ADC. This generates a digital output as a stream of binary numbers whose values represent the electrical voltage input to the device at each sampling instant. Digital signal processing (DSP)-digital representation of signals and the use of digital processors to analyze, modify, or extract information from signals. Many signals in DSP are derived from analogue signals which have been sampled at regular intervals and converted into digital form. The key advantages of DSP over analogue processing are Guaranteed accuracy (determined by the number of bits used) Perfect reproducibility No drift in performance due to temperature or age Takes advantage of advances in semiconductor technology Greater flexibility (can be reprogrammed without modifying hardware) Superior performance (linear phase response possible, and filtering algorithms can be made adaptive) Sometimes information may already be in digital form. There are however (still) some disadvantages Speed and cost (DSP design and hardware may be expensive, especially with high bandwidth signals) Finite word length problems (limited number of bits may cause degradation). Application areas of DSP are considerable: Image processing (pattern recognition, robotic vision, image enhancement, facsimile, satellite weather map, animation) Instrumentation and control (spectrum analysis, position and rate control, noise reduction, data compression) Speech and audio (speech recognition, speech synthesis, text to speech, digital audio, equalisation) Military (secure communication, radar processing, sonar processing, missile guidance) Telecommunications (echo cancellation, adaptive equalisation, spread spectrum, video conferencing, data communication) Biomedical (patient monitoring, scanners, EEG brain mappers, ECG analysis, X-ray storage and enhancement). INTRODUCTION TO CDMA Code Division Multiple Access (CDMA) is a radically new concept in wireless communications. It has gained widespread international acceptance by cellular radio system operators as an upgrade that will dramatically increase both their system capacity and the service quality. It has likewise been chosen for deployment by the majority of the winners of the United States Personal Communications System spectrum auctions. It may seem, however, mysterious for those who arent familiar with it. CDMA is a form of spread-spectrum, a family of digital communication techniques that have been used in military applications for many years. The core principle of spread spectrum is the use of noise-like carrier waves, and, as the name implies, bandwidths much wider than that required for simple point-to-point communication at the same data rate. Originally there were two motivations: either to resist enemy efforts to jam the communications (anti-jam, or AJ), or to hide the fact that communication was even taking place, sometimes called low probability of intercept (LPI). It has a history that goes back to the early days of World War II. The use of CDMA for civilian mobile radio applications is novel. It was proposed theoretically in the late 1940s, but the practical application in the civilian marketplace did not take place until 40 years later. Commercial applications became possible because of two evolutionary developments. One was the availability of very low cost, high density digital integrated circuits, which reduce the size, weight, and cost of the subscriber stations to an acceptably low level. The other was the realization that optimal multiple access communication requires that all user stations regulate their transmitter powers to the lowest that will achieve adequate signal quality. CDMA changes the nature of the subscriber station from a predominately analog device to a predominately digital device. Old-fashioned radio receivers separate stations or channels by filtering in the frequency domain. CDMA receivers do not eliminate analog processing entirely, but they separate communication channels by means of a pseudorandom modulation that is applied and removed in the digital domain, not on the basis of frequency. Multiple users occupy the same frequency band. This universal frequency reuse is not fortuitous. On the contrary, it is crucial to the very high spectral efficiency that is the hallmark of CDMA. Other discussions in these pages show why this is true. CDMA is altering the face of cellular and PCS communication by: Dramatically improving the telephone traffic capacity Dramatically improving the voice quality and eliminating the audible effects of multipath fading Reducing the incidence of dropped calls due to handoff failures Providing reliable transport mechanism for data communications, such as facsimile and internet traffic Reducing the number of sites needed to support any given amount of traffic Simplifying site selection Reducing deployment and operating costs because fewer cell sites are needed Reducing average transmitted power Reducing interference to other electronic devices Reducing potential health risks Commercially introduced in 1995, CDMA quickly became one of the worlds fastest growing wireless technologies. In 1999, the International Telecommunications Union selected CDMA as the industry standard for new third-generation (3G) wireless systems. Many leading wireless carriers are now building or upgrading to 3G CDMA networks in order to provide more capacity for voice traffic, along with high-speed data capabilities. DS_CDMA Multiple access systems based on DS CDMA have achieved increasing significance for mobile communications applications. A promising concept is based on DS_CDMA applying MRC at the receiver. MRC takes advantage of the channel diversity to combat the multipath fading. However the capacity of a DS_CDMA system is limited by both multi-user interference and inter symbol interference ISI in high data rate applications. OFDM is applied to combat the frequency selectivity of the channel using a simple one tap equalizer Further more OFDM prevents the ISI and inter carrier interference ICI by inserting a guard interval between adjacent OFDM symbols OFDM is typically used for audio TV and HDTV transmission over terrestrial channels and achieves high spectral efficiency. The CMDA Technology overview FDMA In Frequency Division Multiple Access, the frequency band is divided in slots. Each user gets one frequency slot assigned that is used at will. It could be compared to AM or FM broadcasting radio where each station has a frequency assigned. FDMA demands good filtering. TDMA In Time Division Multiple Access, the frequency band is not partitioned but users are allowed to use it only in predefined intervals of time, one at a time. Thus, TDMA demands synchronization among the users. CDMA CDMA, for Code Division Multiple Access, is different from its traditional ways in which it does not allocate frequency or time in user slots but gives the right to use both to all users simultaneously. To do this, it uses a technique known as Spread Spectrum . In effect, each user is assigned a code,which spreads its signal bandwidth in such a way that only the same code can recover it at the receiver end. This method has the property that the unwanted signals with different codes get spread even more by the process, making them like noise to the receiver . Spread Spectrum Spread Spectrum is a mean of transmission where the data occupies a larger bandwidth than necessary. Bandwidth spreading is accomplished before the transmission through the use of a code, which is independent of the transmitted data. The same code is used to demodulate the data at the receiving end. The following figure illustrate the spreading done on the data signal x(t) by the spreading signal c(t) resulting in the message signal to be transmitted, m(t). Originally for military use to avoid jamming (interference created on purpose to make a communication channel unusable), spread spectrum modulation is now used in personal communication systems for its superior performance in an interference dominated environment . Definition of Spread Spectrum: A transmission technique in which a pseudo-noise code, independent of the information data, is employed as a modulation waveform to â€Å"spread† the signal energy over a bandwidth much greater than the signal information bandwidth. At the receiver the signal is â€Å"despread† using a synchronized replica of the pseudo-noise code. Basic Principle of Spread Spectrum System: The Principal types of Spread Spectrum are Direct Sequence (DS), and Frequency Hopping (FH). An over view of these systems is hereby given: Pseudo shift of the phase pseudo shift of the frequency Coherent demodulation noncoherent Direct Sequence Spread Spectrum (DSSS) A pseudo-noise sequence pnt generated at the modulator, is used in conjunction with an M-ary PSK modulation to shift the phase of the PSK signal pseudo randomly, at the chipping rate Rc (=1/Tc) a rate that is integer multiple of the symbol rate Rs (=1/Ts). The transmitted bandwidth is determined by the chip rate and by the base band filtering. The implementation limits the maximum chip rate Rc (clock rate) and thus the maximum spreading. The PSK modulation scheme requires a coherent demodulation. PN code length that is much longer than a data symbol, so that a different chip pattern is associated with each symbol. Frequency Hopping Spread Spectrum A Pseudo-noise sequence pnt generated at the modulator is used in conjuction with an M-ary FSK modulation to shift the carrier frequency of the FSK signal pseudurandomly, at the hopping rate Rh. The transmitted signal occupies a number of frequencies in time, each for a period of time Th (= 1/Rh), referred as dwell time. FHSS divides the available bandwidth into N channels and hops between these channels according to the PN sequence. At each frequency hop time the PN generator feeds the frequency synthesizer a frequency word FW (a sequence of n chips) which dictates one of 2n frequency position fhl . Transmitter and receiver follows the same frequency hop pattern. The transmitted bandwidth is determined by the lowest and highest hop position by the bandwidth per hop position (à ¢Ã‹â€ Ã¢â‚¬  fch). For a given hop, instantaneous occupied bandwidth is the conventional M-FSK, which is typically much smaller than Wss. So the FHSS signal is a narrowband signal, all transmission power is concentrated on one channel. Averaged over many hops, the FH/M-FSK spectrum occupies the entire spread spectrum bandwidth. Because the bandwidth of an FHSS system only depends on the tuning range, it can be hopped over a much wider bandwidth than an DSSS system. Since the hops generally result in phase discontinuity (depending on the particular implementation) a noncoherent demodulation is done at receiver. With slow hopping there are multiple data symbol per hop and with fast hopping there are multiple hops per data symbol. 3.3 Basic principle of Direct Sequence Spread Spectrum For BPSK modulation the building blocks of a DSSS system are: Input: Binary data dt with symbol rate Rs = 1/Ts (=bitrate Rb for BPSK) Pseudo-noise code pnt with chip rate Rc = 1/Tc (an integer of Rs) Spreading: In the transmitter, the binary data dt (for BPSK, I and Q for QPSK) is ‘directly multiplied with the PN sequence pnt , which is independent of the binary data, to produce the transmitted baseband signal txb: txb = dt . pnt The effect of multiplication of dt with a PN sequence is to spread the baseband bandwidth Rs of dt to a baseband bandwidth of Rc. Despreading: The spread spectrum signal cannot be detected by a conventional narrowband receiver. In the receiver, the baseband signal rxb is multiplied with the PN sequence pnr . If pnr = pnt and synchronized to the PN sequence in the received data, than the recovered binary data is produced on dr. The effect of multiplication of the spread spectrum signal rxb with the PN sequence pnt used in the transmitter is to despread the bandwidth of rxb to Rs . If pnr ≠  pnt , than there is no dispreading action. The signal dr has a spread spectrum. A receiver not knowing the PN sequence of the transmitter can not reproduce the transmitted data. Performance in the presence of interference: To simplify the presence of interference, the spread spectrum system is considered for baseband BPSK communication (without filtering). The received signal rxb of the transmitted signal txb plus an additive inteferance i (noise, other users, jammer,†¦Ã¢â‚¬ ¦): rxb = t xb + i = dt . pnt + i To recover the original data dt the received signal rx0 is multiplied with a locally generated PN sequence pnr that is an exact replica of that used in the transmitter (that is pnr = pnt and synchronized) The multiplier output is therefore given by: dr = rxb . pnt = dt . pnt . pnt + i . pnt The data signal dt is multiplied twice by the PN sequence pnt , where as the unwanted inteferance i is multiplied only once. Due to the property of the PN sequence: pnt + pnt = +1 for all t The multiplier output becomes: dr = dt + i . pnt The data signal dr is reproduced at the multiplier output in the receiver, except for the inteferance represented by the additive term i . pnt . Multiplication of the inteferance by the locally generated PN sequence, means that the spreading code will affect the inteferance just as it did with the information bearing signal at the transmitter. Noise and inteferance, being uncorrelated with the PN sequence, becomes noise-like, increase in bandwidth and decrease in power density after the multiplier. After dispreading, the data component dt is narrow band (Rb) whereas the inteferance component is wideband (Rc). By applying the dr signal to a baseband (low-pass) filter with a band width just large enough to accommodate the recovery of the data signal, most of the inteferance component i is filtered out. The effect of inteferance is reduced by processing gain (Gp). Narrowband inteferance: The narrowband noise is spread by the multiplication with the PN sequence pnr of the receiver. The power density of the noise is reduced with respect to the despread data signal. Only 1/Gp of the original noise power is left in the information baseband (Rs). Spreading and dispreading enables a bandwidth trade for processing gain against narrow band interfering signals. Narrow band inteferance would disable conventional narrow band receivers. The essence behind the inteferance rejection capability of a spread spectrum system: the useful signal (data) gets multiplied twice by the PN sequence, but the inteferance signal get multiplied only once. Wideband interference: Multiplication of the received signal with the PN sequence of the receiver gets a selective despread of the data signal (smaller bandwidth, higher power density). The inteferance signal is uncorrelated with the PN sequence and is spread. Origin of wideband noise: Multiple Spread Spectrum user: multiple access mechanism. Gaussian Noise: There is no increase in SNR with spread spectrum: The large channel bandwidth (Rc instead of Rs) increase the received noise power with Gp: Ninfo = N0 . BWinfo à   Nss = N0 . BWss = Ninfo .Gp The spread spectrum signal has a lower power density than the directly transmitted signal. Code division multiple access (CDMA) is a methode of multiplexing (wireless) users distinct (orthogonal) codes. All users can transmit at the same time, and each is allocated the entire available frequency spectrum for transmission. CDMA is also known as Spread-Spectrum multiple access (SSMA). CDMA dose not require the bandwidth allocation of FDMA, nor the time synchronization of the individual users needed in TDMA. A CDMA user has full time and full bandwidth available, but the quality of the communication decreases with an increasing number of users (BER ). In CDMA each user: Has its own PN code Uses the same RF bandwidth Transmits simultaneously (asynchronous or synchronous) Correlation of the received baseband spread spectrum signal rxb with the PN sequence of user 1 only despreads the signal of user 1. The other user produces noise Nu for user 1. ACCESS SCHEMES For radio systems there are two resources, frequency and time. Division by frequency, so that each pair of communicators is allocated part of the spectrum for all of the time, results in Frequency Division Multiple Access (FDMA). Division by time, so that each pair of communicators is allocated all (or at least a large part) of the spectrum for part of the time results in Time Division Multiple Access (TDMA). In Code Division Multiple Access (CDMA), every communicator will be allocated the entire spectrum all of the time. CDMA uses codes to identify connections. MULTIPATH AND RAKE RECEIVERS One of the main advantages of CDMA systems is the capability of using signals that arrive in the receivers with different time delays. This phenomenon is called multipath. FDMA and TDMA, which are narrow band systems, cannot discriminate between the multipath arrivals, and resort to equalization to mitigate the negative effects of multipath. Due to its wide bandwidth and rake receivers, CDMA uses the multipath signals and combines them to make an even stronger signal at the receivers. CDMA subscriber units use rake receivers. This is essentially a set of several receivers. One of the receivers (fingers) constantly searches for different multipaths and feeds the information to the other three fingers. Each finger then demodulates the signal corresponding to a strong multipath. The results are then combined together to make the signal stronger. Difference between TDMA vs CDMA. TDMA is Time Division Multiple Access, while CDMA is Code Division Multiple Access. Both technologies achieve the same goal of better utilization of the radio spectrum by allowing multiple users to share the same physical channel, but by using different methods and that is why the three of the four words in each acronym are identical. Both allow more than one person to carry out a conversation on the same frequency without causing interference. The two technologies differ in the way in which users share the common resource. In TDMA the channel is chopped up into sequential time slices. The data of each user is put on the channel in a round-robin fashion. In reality, only one user actually uses the channel at any given point of time, but he uses it only for short bursts. He then gives up the channel for a short duration to allow the other users to have their turn. This is similar to how a computer with just one processor runs multiple applications simultaneously. CDMA on the other hand allows everyone to transmit at the same time. With conventional methods of modulation techniques it would hav been simply not possible. What makes CDMA to allow all users to transmit simultaneously is a special type of digital modulation called Spread Spectrum. In this modulation technique users stream of bits is taken and splattered them across a very wide channel in a pseudo-random fashion. The pseudo part is very important here as at the receiver end the randomization must be undone in order to collect the bits together in a coherent order. For example consider a room full of couples, and each couple trying to carry on one-on-one conversations. In TDMA each couple takes their turn for talking and they keep their turns short by speaking only one sentence at a time. As there is always more one person speaking in the room at any given point of time, no one has to worry about being heard over the background din. In CDMA assume each couple talks simultaneously, but they all use different languages. The background din doesnt cause any real problem as none of the listeners understand any language other than that of the individual to whom they are listening. Voice Encoding At this point many people confuse two distinctly different issues involved in the transmission of digital audio. The first is the WAY in which the stream of bits is delivered from one end to the other. This part of the air interface is what makes one technology different from another. The second is the compression algorithm used to squeeze the audio into as small a stream of bits as possible. This latter component is known at the Voice Coder, or Vocoder for short. Another term commonly used is CODEC, which is a similar word to modem. It combines the terms COder and DECoder. Although each technology has chosen their own unique CODECs, there is no rule saying that one transmission method needs to use a specific CODEC. People often lump a technologys transmission method with its CODEC as though they were single entities. Voice encoding schemes differ slightly in their approach to the problem. Because of this, certain types of human voice work better with some CODECs than they do with others. The point to remember is that all PCS CODECs are compromises of some sort. Since human voices have such a fantastic range of pitch and tonal depth, one cannot expect any single compromise to handle each one equally well. This inability to cope with all types of voice at the same level does lead some people to choose one technology over another. All of the PCS technologies try to minimize battery consumption during calls by keeping the transmission of unnecessary data to a minimum. The phone decides whether or not you are presently speaking, or if the sound it hears is just background noise. If the phone determines that there is no intelligent data to transmit it blanks the audio and it reduces the transmitter duty cycle (in the case of TDMA) or the number of transmitted bits (in the case of CDMA). When the audio is blanked your caller would suddenly find themselves listening to dead air, and this may cause them to think the call has dropped. To avoid this psychological problem many service providers insert what is known as Comfort Noise during the blanked periods. Comfort Noise is synthesized white noise that tries to mimic the volume and structure of the real background noise. This fake background noise assures the caller that the connection is alive and well. However, in newer CODECs such as EVRC (used exclusively on CDMA systems) the background noise is generally suppressed even while the user is talking. This piece of magic makes it sound as though the cell phone user is not in a noisy environment at all. Under these conditions, Comfort Noise is neither necessary, nor desirable. DS-CDMA-INTRODUCTION While multiple access interference (MAI) by other users has been recognized as the capacity-limiting factor in direct sequence code-division multiple-access (DS-CDMA)-based cellular communication systems, multiuser approaches have largely alleviated the problem when the noise process is additive Gaussian. With the availability of multiuser detectors, inaccurate or inappropriate noise modelling assumptions seem to have become the issue again. Whereas multiuser detection has much to offer in the mobile- to-base station uplink, it does not at present appear to be feasible for the downlink due to the complexity involved and the lack of resistance against adjacent cell interference. Moreover, the few multiuser proposals for the downlink require the knowledge of all spreading codes, which is not possible in the tactical military environment, for instance. Enhanced single-user receivers equipped with adaptive filter banks deliver promising performance with reasonable complexity, especially in slowly varying channels. Thus, the performance of single-user detectors is still of interest, particularly in the presence of non-Gaussian noise. In both urban outdoor and indoor mobile radio environments, electromagnetic interference generated by man-made sources such as factories or power lines causes the noise to be of non-Gaussian nature. Large noise magnitudes are deemed very improbable by linear receivers, and consequently performance deterioration is experienced. It is therefore desirable to build systems that can maintain respectable functionality under a broad class of noise distributions, rather than strictly optimizing for the unrealistic Gaussian assumption. Such is the goal of robust detection and estimation theory, which aims to design systems that are suboptimal under nominal channel conditions (e.g., Gaussian channel) and yet do not face catastrophy when the noise distribution is not nominal (e.g., unlike linear schemes). Note that suboptimality here refers to very good performance that is slightly worse than that of the nominal-optimal detector/estimator. The direct sequence code division multiple access (DS-CDMA) technique has been favourably considered for application in digital mobile cellular networks due to its potential to provide higher system capacity over conventional multiple access techniques. Unlike FDMA and TDMA capacities which are mostly limited by the bandwidth, the capacity of a CDMA system is mainly restricted by its interference level. Any reduction in interference produces a direct and linear increase in system capacity. Multiple access interference (MAI) caused by non-zero cross-correlation between different spreading sequences is the major type of interference limiting the CDMA system capacity. Much work has been done to characterize MAI, and to analyze and evaluate the CDMA system performance in the presence of MAI. Since the cross-correlation properties of most sets of spreading codes are either too complex to analyze or very difficult to compute when different transmissions are not synchronized, a random seque nce model. In the case of moderate to large processing gains, Gaussian distribution with variable variance is a good approximation for the MAI distribution. One of the approaches to reduce MAI is to employ orthogonal spreading sequences, and try to synchronize the transmissions at the chip level (quasi-synchronization). However, this is generally difficult to achieve in multipoint-to-point systems, such as the reverse link (mobile-to-base) of a cellular system, due to a lack of synchronization of the various mobile terminals, and the variable transmission delays. In this paper, a multi-carrier DS-CDMA (MCDS-CDMA) scheme is employed to facilitate the synchronization process, and thus reduce MAI. SYSTEM MODEL A model of the MS-DS-CDMA system for the kth user of a CDMA system is shown in the figure 1. TRANMSITTER MODEL At the transmitter the user‘s data stream dk(t) is divided into M interleaved sub streams and spread by a spreading sequence ck(t) to a fraction 1/M of the entire transmission bandwidth W. The resultant chip sequences are then used to modulate M carrier. The carrier frequencies ωm,m=1,2,M are equally spaced by the chip rate so that they are mutually orthogonal over one channel symbol interval T. Let R be the information rate and Rc be the carrier control code rate then the channel symbol interval is BER PERFORMANCE: MC-DS-CDMA system performance measured by bit error rate through analysis and simulation. Analysis: The BER is analysed based on the following: Ortoganal spreading sequences with rectangular pulse shape are applied. ÃŽ ¶k,k=1†¦K are independent of random variables distributd in (-ÃŽ ¶D,ÃŽ ¶D) WHERE ÃŽ ¶D=ÃŽ µD+Ï‚D.Given W and ÃŽ ¶D,M is chosen so that ÃŽ ¶D It is assumed that the fading parameters of the desired user . It is perfectly estimated so that the coherent detection and optimum soft decision decoding could be carried out at the receiver to make the problem analytically tractable. The fading amplitudes as independent Rayleigh random variables with equal second moments. The model is MATLAB INTRODUCTION: Matlab is a commercial Matrix Laboratory package which operates as an interactive programming environment. It is a mainstay of the Mathematics Department software lineup and is also available for PCs and Macintoshes and may be found on the CIRCA VAXes. Matlab is well adapted to numerical experiments since the underlying algorithms for Matlabs builtin functions and supplied m-files are based on the standard libraries LINPACK and EISPACK. Matlab program and script files always have filenames ending with .m; the programming language is exceptionally straightforward since almost every data object is assumed to be an array. Graphical output is available to supplement numerical results. IMREAD Read image from graphics file. A = IMREAD(FILENAME,FMT) reads a grayscale or color image from the file specified by the string FILENAME. If the file is not in the current directory, or in a directory on the MATLAB path, specify the full pathname. The text string FMT specifies the format of the file by its standard file extension. For example, specify gif Digital Signal Processing (DSP) and CDMA Advantages Digital Signal Processing (DSP) and CDMA Advantages INTRODUCTION ANALOG AND DIGITAL SIGNALS The signal is initially generated is in the form of an analog electrical voltage or current, produced for example by a microphone or some other type of transducer. The output from the readout system of a CD (compact disc) player, the data is already in digital form. An analog signal must be converted into digital form before DSP techniques can be applied. An analog electrical voltage signal, for example, can be digitized using an electronic circuit called an analog-to-digital converter or ADC. This generates a digital output as a stream of binary numbers whose values represent the electrical voltage input to the device at each sampling instant. Digital signal processing (DSP)-digital representation of signals and the use of digital processors to analyze, modify, or extract information from signals. Many signals in DSP are derived from analogue signals which have been sampled at regular intervals and converted into digital form. The key advantages of DSP over analogue processing are Guaranteed accuracy (determined by the number of bits used) Perfect reproducibility No drift in performance due to temperature or age Takes advantage of advances in semiconductor technology Greater flexibility (can be reprogrammed without modifying hardware) Superior performance (linear phase response possible, and filtering algorithms can be made adaptive) Sometimes information may already be in digital form. There are however (still) some disadvantages Speed and cost (DSP design and hardware may be expensive, especially with high bandwidth signals) Finite word length problems (limited number of bits may cause degradation). Application areas of DSP are considerable: Image processing (pattern recognition, robotic vision, image enhancement, facsimile, satellite weather map, animation) Instrumentation and control (spectrum analysis, position and rate control, noise reduction, data compression) Speech and audio (speech recognition, speech synthesis, text to speech, digital audio, equalisation) Military (secure communication, radar processing, sonar processing, missile guidance) Telecommunications (echo cancellation, adaptive equalisation, spread spectrum, video conferencing, data communication) Biomedical (patient monitoring, scanners, EEG brain mappers, ECG analysis, X-ray storage and enhancement). INTRODUCTION TO CDMA Code Division Multiple Access (CDMA) is a radically new concept in wireless communications. It has gained widespread international acceptance by cellular radio system operators as an upgrade that will dramatically increase both their system capacity and the service quality. It has likewise been chosen for deployment by the majority of the winners of the United States Personal Communications System spectrum auctions. It may seem, however, mysterious for those who arent familiar with it. CDMA is a form of spread-spectrum, a family of digital communication techniques that have been used in military applications for many years. The core principle of spread spectrum is the use of noise-like carrier waves, and, as the name implies, bandwidths much wider than that required for simple point-to-point communication at the same data rate. Originally there were two motivations: either to resist enemy efforts to jam the communications (anti-jam, or AJ), or to hide the fact that communication was even taking place, sometimes called low probability of intercept (LPI). It has a history that goes back to the early days of World War II. The use of CDMA for civilian mobile radio applications is novel. It was proposed theoretically in the late 1940s, but the practical application in the civilian marketplace did not take place until 40 years later. Commercial applications became possible because of two evolutionary developments. One was the availability of very low cost, high density digital integrated circuits, which reduce the size, weight, and cost of the subscriber stations to an acceptably low level. The other was the realization that optimal multiple access communication requires that all user stations regulate their transmitter powers to the lowest that will achieve adequate signal quality. CDMA changes the nature of the subscriber station from a predominately analog device to a predominately digital device. Old-fashioned radio receivers separate stations or channels by filtering in the frequency domain. CDMA receivers do not eliminate analog processing entirely, but they separate communication channels by means of a pseudorandom modulation that is applied and removed in the digital domain, not on the basis of frequency. Multiple users occupy the same frequency band. This universal frequency reuse is not fortuitous. On the contrary, it is crucial to the very high spectral efficiency that is the hallmark of CDMA. Other discussions in these pages show why this is true. CDMA is altering the face of cellular and PCS communication by: Dramatically improving the telephone traffic capacity Dramatically improving the voice quality and eliminating the audible effects of multipath fading Reducing the incidence of dropped calls due to handoff failures Providing reliable transport mechanism for data communications, such as facsimile and internet traffic Reducing the number of sites needed to support any given amount of traffic Simplifying site selection Reducing deployment and operating costs because fewer cell sites are needed Reducing average transmitted power Reducing interference to other electronic devices Reducing potential health risks Commercially introduced in 1995, CDMA quickly became one of the worlds fastest growing wireless technologies. In 1999, the International Telecommunications Union selected CDMA as the industry standard for new third-generation (3G) wireless systems. Many leading wireless carriers are now building or upgrading to 3G CDMA networks in order to provide more capacity for voice traffic, along with high-speed data capabilities. DS_CDMA Multiple access systems based on DS CDMA have achieved increasing significance for mobile communications applications. A promising concept is based on DS_CDMA applying MRC at the receiver. MRC takes advantage of the channel diversity to combat the multipath fading. However the capacity of a DS_CDMA system is limited by both multi-user interference and inter symbol interference ISI in high data rate applications. OFDM is applied to combat the frequency selectivity of the channel using a simple one tap equalizer Further more OFDM prevents the ISI and inter carrier interference ICI by inserting a guard interval between adjacent OFDM symbols OFDM is typically used for audio TV and HDTV transmission over terrestrial channels and achieves high spectral efficiency. The CMDA Technology overview FDMA In Frequency Division Multiple Access, the frequency band is divided in slots. Each user gets one frequency slot assigned that is used at will. It could be compared to AM or FM broadcasting radio where each station has a frequency assigned. FDMA demands good filtering. TDMA In Time Division Multiple Access, the frequency band is not partitioned but users are allowed to use it only in predefined intervals of time, one at a time. Thus, TDMA demands synchronization among the users. CDMA CDMA, for Code Division Multiple Access, is different from its traditional ways in which it does not allocate frequency or time in user slots but gives the right to use both to all users simultaneously. To do this, it uses a technique known as Spread Spectrum . In effect, each user is assigned a code,which spreads its signal bandwidth in such a way that only the same code can recover it at the receiver end. This method has the property that the unwanted signals with different codes get spread even more by the process, making them like noise to the receiver . Spread Spectrum Spread Spectrum is a mean of transmission where the data occupies a larger bandwidth than necessary. Bandwidth spreading is accomplished before the transmission through the use of a code, which is independent of the transmitted data. The same code is used to demodulate the data at the receiving end. The following figure illustrate the spreading done on the data signal x(t) by the spreading signal c(t) resulting in the message signal to be transmitted, m(t). Originally for military use to avoid jamming (interference created on purpose to make a communication channel unusable), spread spectrum modulation is now used in personal communication systems for its superior performance in an interference dominated environment . Definition of Spread Spectrum: A transmission technique in which a pseudo-noise code, independent of the information data, is employed as a modulation waveform to â€Å"spread† the signal energy over a bandwidth much greater than the signal information bandwidth. At the receiver the signal is â€Å"despread† using a synchronized replica of the pseudo-noise code. Basic Principle of Spread Spectrum System: The Principal types of Spread Spectrum are Direct Sequence (DS), and Frequency Hopping (FH). An over view of these systems is hereby given: Pseudo shift of the phase pseudo shift of the frequency Coherent demodulation noncoherent Direct Sequence Spread Spectrum (DSSS) A pseudo-noise sequence pnt generated at the modulator, is used in conjunction with an M-ary PSK modulation to shift the phase of the PSK signal pseudo randomly, at the chipping rate Rc (=1/Tc) a rate that is integer multiple of the symbol rate Rs (=1/Ts). The transmitted bandwidth is determined by the chip rate and by the base band filtering. The implementation limits the maximum chip rate Rc (clock rate) and thus the maximum spreading. The PSK modulation scheme requires a coherent demodulation. PN code length that is much longer than a data symbol, so that a different chip pattern is associated with each symbol. Frequency Hopping Spread Spectrum A Pseudo-noise sequence pnt generated at the modulator is used in conjuction with an M-ary FSK modulation to shift the carrier frequency of the FSK signal pseudurandomly, at the hopping rate Rh. The transmitted signal occupies a number of frequencies in time, each for a period of time Th (= 1/Rh), referred as dwell time. FHSS divides the available bandwidth into N channels and hops between these channels according to the PN sequence. At each frequency hop time the PN generator feeds the frequency synthesizer a frequency word FW (a sequence of n chips) which dictates one of 2n frequency position fhl . Transmitter and receiver follows the same frequency hop pattern. The transmitted bandwidth is determined by the lowest and highest hop position by the bandwidth per hop position (à ¢Ã‹â€ Ã¢â‚¬  fch). For a given hop, instantaneous occupied bandwidth is the conventional M-FSK, which is typically much smaller than Wss. So the FHSS signal is a narrowband signal, all transmission power is concentrated on one channel. Averaged over many hops, the FH/M-FSK spectrum occupies the entire spread spectrum bandwidth. Because the bandwidth of an FHSS system only depends on the tuning range, it can be hopped over a much wider bandwidth than an DSSS system. Since the hops generally result in phase discontinuity (depending on the particular implementation) a noncoherent demodulation is done at receiver. With slow hopping there are multiple data symbol per hop and with fast hopping there are multiple hops per data symbol. 3.3 Basic principle of Direct Sequence Spread Spectrum For BPSK modulation the building blocks of a DSSS system are: Input: Binary data dt with symbol rate Rs = 1/Ts (=bitrate Rb for BPSK) Pseudo-noise code pnt with chip rate Rc = 1/Tc (an integer of Rs) Spreading: In the transmitter, the binary data dt (for BPSK, I and Q for QPSK) is ‘directly multiplied with the PN sequence pnt , which is independent of the binary data, to produce the transmitted baseband signal txb: txb = dt . pnt The effect of multiplication of dt with a PN sequence is to spread the baseband bandwidth Rs of dt to a baseband bandwidth of Rc. Despreading: The spread spectrum signal cannot be detected by a conventional narrowband receiver. In the receiver, the baseband signal rxb is multiplied with the PN sequence pnr . If pnr = pnt and synchronized to the PN sequence in the received data, than the recovered binary data is produced on dr. The effect of multiplication of the spread spectrum signal rxb with the PN sequence pnt used in the transmitter is to despread the bandwidth of rxb to Rs . If pnr ≠  pnt , than there is no dispreading action. The signal dr has a spread spectrum. A receiver not knowing the PN sequence of the transmitter can not reproduce the transmitted data. Performance in the presence of interference: To simplify the presence of interference, the spread spectrum system is considered for baseband BPSK communication (without filtering). The received signal rxb of the transmitted signal txb plus an additive inteferance i (noise, other users, jammer,†¦Ã¢â‚¬ ¦): rxb = t xb + i = dt . pnt + i To recover the original data dt the received signal rx0 is multiplied with a locally generated PN sequence pnr that is an exact replica of that used in the transmitter (that is pnr = pnt and synchronized) The multiplier output is therefore given by: dr = rxb . pnt = dt . pnt . pnt + i . pnt The data signal dt is multiplied twice by the PN sequence pnt , where as the unwanted inteferance i is multiplied only once. Due to the property of the PN sequence: pnt + pnt = +1 for all t The multiplier output becomes: dr = dt + i . pnt The data signal dr is reproduced at the multiplier output in the receiver, except for the inteferance represented by the additive term i . pnt . Multiplication of the inteferance by the locally generated PN sequence, means that the spreading code will affect the inteferance just as it did with the information bearing signal at the transmitter. Noise and inteferance, being uncorrelated with the PN sequence, becomes noise-like, increase in bandwidth and decrease in power density after the multiplier. After dispreading, the data component dt is narrow band (Rb) whereas the inteferance component is wideband (Rc). By applying the dr signal to a baseband (low-pass) filter with a band width just large enough to accommodate the recovery of the data signal, most of the inteferance component i is filtered out. The effect of inteferance is reduced by processing gain (Gp). Narrowband inteferance: The narrowband noise is spread by the multiplication with the PN sequence pnr of the receiver. The power density of the noise is reduced with respect to the despread data signal. Only 1/Gp of the original noise power is left in the information baseband (Rs). Spreading and dispreading enables a bandwidth trade for processing gain against narrow band interfering signals. Narrow band inteferance would disable conventional narrow band receivers. The essence behind the inteferance rejection capability of a spread spectrum system: the useful signal (data) gets multiplied twice by the PN sequence, but the inteferance signal get multiplied only once. Wideband interference: Multiplication of the received signal with the PN sequence of the receiver gets a selective despread of the data signal (smaller bandwidth, higher power density). The inteferance signal is uncorrelated with the PN sequence and is spread. Origin of wideband noise: Multiple Spread Spectrum user: multiple access mechanism. Gaussian Noise: There is no increase in SNR with spread spectrum: The large channel bandwidth (Rc instead of Rs) increase the received noise power with Gp: Ninfo = N0 . BWinfo à   Nss = N0 . BWss = Ninfo .Gp The spread spectrum signal has a lower power density than the directly transmitted signal. Code division multiple access (CDMA) is a methode of multiplexing (wireless) users distinct (orthogonal) codes. All users can transmit at the same time, and each is allocated the entire available frequency spectrum for transmission. CDMA is also known as Spread-Spectrum multiple access (SSMA). CDMA dose not require the bandwidth allocation of FDMA, nor the time synchronization of the individual users needed in TDMA. A CDMA user has full time and full bandwidth available, but the quality of the communication decreases with an increasing number of users (BER ). In CDMA each user: Has its own PN code Uses the same RF bandwidth Transmits simultaneously (asynchronous or synchronous) Correlation of the received baseband spread spectrum signal rxb with the PN sequence of user 1 only despreads the signal of user 1. The other user produces noise Nu for user 1. ACCESS SCHEMES For radio systems there are two resources, frequency and time. Division by frequency, so that each pair of communicators is allocated part of the spectrum for all of the time, results in Frequency Division Multiple Access (FDMA). Division by time, so that each pair of communicators is allocated all (or at least a large part) of the spectrum for part of the time results in Time Division Multiple Access (TDMA). In Code Division Multiple Access (CDMA), every communicator will be allocated the entire spectrum all of the time. CDMA uses codes to identify connections. MULTIPATH AND RAKE RECEIVERS One of the main advantages of CDMA systems is the capability of using signals that arrive in the receivers with different time delays. This phenomenon is called multipath. FDMA and TDMA, which are narrow band systems, cannot discriminate between the multipath arrivals, and resort to equalization to mitigate the negative effects of multipath. Due to its wide bandwidth and rake receivers, CDMA uses the multipath signals and combines them to make an even stronger signal at the receivers. CDMA subscriber units use rake receivers. This is essentially a set of several receivers. One of the receivers (fingers) constantly searches for different multipaths and feeds the information to the other three fingers. Each finger then demodulates the signal corresponding to a strong multipath. The results are then combined together to make the signal stronger. Difference between TDMA vs CDMA. TDMA is Time Division Multiple Access, while CDMA is Code Division Multiple Access. Both technologies achieve the same goal of better utilization of the radio spectrum by allowing multiple users to share the same physical channel, but by using different methods and that is why the three of the four words in each acronym are identical. Both allow more than one person to carry out a conversation on the same frequency without causing interference. The two technologies differ in the way in which users share the common resource. In TDMA the channel is chopped up into sequential time slices. The data of each user is put on the channel in a round-robin fashion. In reality, only one user actually uses the channel at any given point of time, but he uses it only for short bursts. He then gives up the channel for a short duration to allow the other users to have their turn. This is similar to how a computer with just one processor runs multiple applications simultaneously. CDMA on the other hand allows everyone to transmit at the same time. With conventional methods of modulation techniques it would hav been simply not possible. What makes CDMA to allow all users to transmit simultaneously is a special type of digital modulation called Spread Spectrum. In this modulation technique users stream of bits is taken and splattered them across a very wide channel in a pseudo-random fashion. The pseudo part is very important here as at the receiver end the randomization must be undone in order to collect the bits together in a coherent order. For example consider a room full of couples, and each couple trying to carry on one-on-one conversations. In TDMA each couple takes their turn for talking and they keep their turns short by speaking only one sentence at a time. As there is always more one person speaking in the room at any given point of time, no one has to worry about being heard over the background din. In CDMA assume each couple talks simultaneously, but they all use different languages. The background din doesnt cause any real problem as none of the listeners understand any language other than that of the individual to whom they are listening. Voice Encoding At this point many people confuse two distinctly different issues involved in the transmission of digital audio. The first is the WAY in which the stream of bits is delivered from one end to the other. This part of the air interface is what makes one technology different from another. The second is the compression algorithm used to squeeze the audio into as small a stream of bits as possible. This latter component is known at the Voice Coder, or Vocoder for short. Another term commonly used is CODEC, which is a similar word to modem. It combines the terms COder and DECoder. Although each technology has chosen their own unique CODECs, there is no rule saying that one transmission method needs to use a specific CODEC. People often lump a technologys transmission method with its CODEC as though they were single entities. Voice encoding schemes differ slightly in their approach to the problem. Because of this, certain types of human voice work better with some CODECs than they do with others. The point to remember is that all PCS CODECs are compromises of some sort. Since human voices have such a fantastic range of pitch and tonal depth, one cannot expect any single compromise to handle each one equally well. This inability to cope with all types of voice at the same level does lead some people to choose one technology over another. All of the PCS technologies try to minimize battery consumption during calls by keeping the transmission of unnecessary data to a minimum. The phone decides whether or not you are presently speaking, or if the sound it hears is just background noise. If the phone determines that there is no intelligent data to transmit it blanks the audio and it reduces the transmitter duty cycle (in the case of TDMA) or the number of transmitted bits (in the case of CDMA). When the audio is blanked your caller would suddenly find themselves listening to dead air, and this may cause them to think the call has dropped. To avoid this psychological problem many service providers insert what is known as Comfort Noise during the blanked periods. Comfort Noise is synthesized white noise that tries to mimic the volume and structure of the real background noise. This fake background noise assures the caller that the connection is alive and well. However, in newer CODECs such as EVRC (used exclusively on CDMA systems) the background noise is generally suppressed even while the user is talking. This piece of magic makes it sound as though the cell phone user is not in a noisy environment at all. Under these conditions, Comfort Noise is neither necessary, nor desirable. DS-CDMA-INTRODUCTION While multiple access interference (MAI) by other users has been recognized as the capacity-limiting factor in direct sequence code-division multiple-access (DS-CDMA)-based cellular communication systems, multiuser approaches have largely alleviated the problem when the noise process is additive Gaussian. With the availability of multiuser detectors, inaccurate or inappropriate noise modelling assumptions seem to have become the issue again. Whereas multiuser detection has much to offer in the mobile- to-base station uplink, it does not at present appear to be feasible for the downlink due to the complexity involved and the lack of resistance against adjacent cell interference. Moreover, the few multiuser proposals for the downlink require the knowledge of all spreading codes, which is not possible in the tactical military environment, for instance. Enhanced single-user receivers equipped with adaptive filter banks deliver promising performance with reasonable complexity, especially in slowly varying channels. Thus, the performance of single-user detectors is still of interest, particularly in the presence of non-Gaussian noise. In both urban outdoor and indoor mobile radio environments, electromagnetic interference generated by man-made sources such as factories or power lines causes the noise to be of non-Gaussian nature. Large noise magnitudes are deemed very improbable by linear receivers, and consequently performance deterioration is experienced. It is therefore desirable to build systems that can maintain respectable functionality under a broad class of noise distributions, rather than strictly optimizing for the unrealistic Gaussian assumption. Such is the goal of robust detection and estimation theory, which aims to design systems that are suboptimal under nominal channel conditions (e.g., Gaussian channel) and yet do not face catastrophy when the noise distribution is not nominal (e.g., unlike linear schemes). Note that suboptimality here refers to very good performance that is slightly worse than that of the nominal-optimal detector/estimator. The direct sequence code division multiple access (DS-CDMA) technique has been favourably considered for application in digital mobile cellular networks due to its potential to provide higher system capacity over conventional multiple access techniques. Unlike FDMA and TDMA capacities which are mostly limited by the bandwidth, the capacity of a CDMA system is mainly restricted by its interference level. Any reduction in interference produces a direct and linear increase in system capacity. Multiple access interference (MAI) caused by non-zero cross-correlation between different spreading sequences is the major type of interference limiting the CDMA system capacity. Much work has been done to characterize MAI, and to analyze and evaluate the CDMA system performance in the presence of MAI. Since the cross-correlation properties of most sets of spreading codes are either too complex to analyze or very difficult to compute when different transmissions are not synchronized, a random seque nce model. In the case of moderate to large processing gains, Gaussian distribution with variable variance is a good approximation for the MAI distribution. One of the approaches to reduce MAI is to employ orthogonal spreading sequences, and try to synchronize the transmissions at the chip level (quasi-synchronization). However, this is generally difficult to achieve in multipoint-to-point systems, such as the reverse link (mobile-to-base) of a cellular system, due to a lack of synchronization of the various mobile terminals, and the variable transmission delays. In this paper, a multi-carrier DS-CDMA (MCDS-CDMA) scheme is employed to facilitate the synchronization process, and thus reduce MAI. SYSTEM MODEL A model of the MS-DS-CDMA system for the kth user of a CDMA system is shown in the figure 1. TRANMSITTER MODEL At the transmitter the user‘s data stream dk(t) is divided into M interleaved sub streams and spread by a spreading sequence ck(t) to a fraction 1/M of the entire transmission bandwidth W. The resultant chip sequences are then used to modulate M carrier. The carrier frequencies ωm,m=1,2,M are equally spaced by the chip rate so that they are mutually orthogonal over one channel symbol interval T. Let R be the information rate and Rc be the carrier control code rate then the channel symbol interval is BER PERFORMANCE: MC-DS-CDMA system performance measured by bit error rate through analysis and simulation. Analysis: The BER is analysed based on the following: Ortoganal spreading sequences with rectangular pulse shape are applied. ÃŽ ¶k,k=1†¦K are independent of random variables distributd in (-ÃŽ ¶D,ÃŽ ¶D) WHERE ÃŽ ¶D=ÃŽ µD+Ï‚D.Given W and ÃŽ ¶D,M is chosen so that ÃŽ ¶D It is assumed that the fading parameters of the desired user . It is perfectly estimated so that the coherent detection and optimum soft decision decoding could be carried out at the receiver to make the problem analytically tractable. The fading amplitudes as independent Rayleigh random variables with equal second moments. The model is MATLAB INTRODUCTION: Matlab is a commercial Matrix Laboratory package which operates as an interactive programming environment. It is a mainstay of the Mathematics Department software lineup and is also available for PCs and Macintoshes and may be found on the CIRCA VAXes. Matlab is well adapted to numerical experiments since the underlying algorithms for Matlabs builtin functions and supplied m-files are based on the standard libraries LINPACK and EISPACK. Matlab program and script files always have filenames ending with .m; the programming language is exceptionally straightforward since almost every data object is assumed to be an array. Graphical output is available to supplement numerical results. IMREAD Read image from graphics file. A = IMREAD(FILENAME,FMT) reads a grayscale or color image from the file specified by the string FILENAME. If the file is not in the current directory, or in a directory on the MATLAB path, specify the full pathname. The text string FMT specifies the format of the file by its standard file extension. For example, specify gif