Thursday, November 28, 2019

Stakeholders of an Organization and their Importance

The stakeholders of an organization include various groups of either people who affect the business directly or indirectly. They are categorized into four major groups as users, contributors, governance, and influencers. Users are those people who will be final consumers of the business goods or services; they are part of the business beneficiaries for instance customers (Cameron, Price, 2009:P.43).Advertising We will write a custom essay sample on Stakeholders of an Organization and their Importance specifically for you for only $16.05 $11/page Learn More Governance are the people who are very interested on how the business is running for instance the management team, auditors etc. influencers are the people are the people who are capable of changing the business views and direction for instance, trade unions. Finally, contributors are those people who are the business suppliers. Business partners as well fall under this category of contributors, and a nyone else providing resources to the business. The most appropriate way of meeting the stakeholders’ needs is first identifying them through the help of the other business team of staffs (Anderson, 2009:P.213). After identification, each group should have a key individual to represent the whole group. These key people should be people who have the authority to make decisions, and who can act as channel of communication to his or her group. Through these key people, one would be able to learn the attitude and the specific interests of every group. As one interacts with these representatives, he or she would easily identify their needs. Once you discover their expectations from the business, it would be easy to discuss with the representatives on how to meet those expectations (Silverman, 2007:P.113). Communication between the business and the stakeholders should be a continuous dialogue. Continuous communication would lead to an effective decision making process. Both interna l and external communication protocols can be used depending on the type of the stakeholders. The business may use internal means of communication such as brochures, and newsletters. Currently, businesses prefer to use the interactive social media methods like the blogs and the social networks like LinkedIn, as they are fast and effective. For the business and its key stakeholders to make decisions quickly, fast means of communication should be adopted to ensure messages are received by the relevant groups and at the right time (Horn, 2009:P.56).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Traditional tools of communication that allowed for only one-way communication is no longer in use. The current social media outlets are giving a two-way communication, immediate feedbacks, and the business as well can hold a discussion with more than one user identities. Any business that considers i ts stakeholders interests is always at a more competitive edge. Each stakeholder in a business has a different interest and expectations that may help the business in policy and project formulation. When the business is implementing its plans and doing evaluation, it is advisable to incorporate the ideas and the interests of the stakeholders to avoid some major problems that may arise in future. The main goals, authority, and relationships among various stakeholders would help the business to facilitate change within the shortest time possible (Horn, 2009:P.82). The stakeholders’ analysis can greatly improve the performance of the business through identifying the needs and the interests of the powerless people in the society. For instance, through the suppliers the business would be in a position to acquire resources at affordable prices, hence reducing the operating expenses and increasing the total revenue. A healthy relationship of the business with he stakeholders would r esult to a well performing business with wide range of connections (Marchington, Wilkinson, 2008:P.102). References Anderson. V. (2009). Research methods in human resource management. 2nd ed. London: Chartered Institute of Personnel and Development. Cameron, S. Price, D. (2009). Business research methods: a practical approach. London: Chartered Institute of Personnel and Development.Advertising We will write a custom essay sample on Stakeholders of an Organization and their Importance specifically for you for only $16.05 $11/page Learn More Horn, R. (2009). Researching and writing dissertations: a complete guide for business  and management students. London: Chartered Institute of Personnel and Development. Horn, R. (2009). The business skills handbook. London: Chartered Institute of Personnel and Development. Marchington, M. Wilkinson, A. (2008). Human resource management at work: people  management and development. 4th ed. London: Chartered Ins titute of Personnel and Development. Silverman, D. (2007). A very short, fairly interesting and reasonably cheap book about  qualitative research. London: Sage. This essay on Stakeholders of an Organization and their Importance was written and submitted by user Kaylynn Hebert to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

bioethics gene therapy paper essays

bioethics gene therapy paper essays Genes, which are carried on chromosomes, are the basic physical and functional units of heredity. Genes are specific sequences of bases that encode instructions on how to make proteins. Although genes get a lot of attention, its the proteins that perform most life functions and even make up the majority of cellular structures. When genes are altered so that the encoded proteins are unable to carry out their normal functions, genetic disorders can result. Gene therapy is a technique for correcting defective genes responsible for disease development. Researchers may use one of several approaches for correcting faulty genes. In most gene therapy studies, a "normal" gene is inserted into the genome to replace an "abnormal," disease-causing gene. A carrier molecule called a vector must be used to deliver the therapeutic gene to the patient's target cells. Currently, the most common vector is a virus that has been genetically altered to carry normal human DNA. The scientists are trying to make the virus that will work as it should, delivering the right genetic material to the right region. Specifically, to design virus-based vectors that can be injected directly into patients in order to accomplish gene transfer. The long-term goal is to engineer vectors that would target the correct tissue, insert into a safe site in the genome, and be regulated by normal physiological signals.( Anderson, 1999, para. 1) Viruses have evolved a way of encapsulating and delivering their genes to human cells in a pathogenic manner. Scientists have tried to take advantage of this capability and manipulate the virus genome to remove disease-causing genes and insert therapeutic genes. Target cells such as the patient's liver or lung cells are infected with the viral vector. The vector then unloads its genetic material containing the therapeutic human gene into the target cell. The generation of a functional protein product from the therapeutic gene restores ...

Thursday, November 21, 2019

Why abortion should not be legal in the U.S Research Paper - 1

Why abortion should not be legal in the U.S - Research Paper Example Secondly, the basic fundamentals of how the law is interpreted in favor of abortion and how this is incorrect will be briefly discussed. Firstly, one must understand that the process of an abortion is a rather violent act. For purposes of this author’s response, the violence that is associated with this procedure will not focus upon the particular manner in which the embryo is deconstructed and removed; rather, the focus will be upon the long-term effects that such a procedure portends for the mother (Emery 1). Whereas many women have abortions for different reasons, the fact of the matter is that healthcare decisions and procedures are usually implemented only at times in which no other alternative is readily available. As such, risking the current and future fertile health of the mother in such an unnecessary process is both foolish and shortsighted. Due to the fact that alternatives exist, one is left to answer a rhetorical question revolving around why someone would willfully put their body through such a process (Rothsgrove 1). Although many other factors play into the choice of whether or not to receive an abortion, the one that is concentric upon the health, well-being, and future fertility of the mother is of primal importance to this author. Due to the fact that the damages sustained during an abortion are oftentimes non-reversible and life-altering, such a course of action may well need to be outlawed until a method that is not nearly so harmful to a woman’s health is able to be produced. Rothsgrove, Carl. "9 Reasons Why Abortions Should Be Illegal." 9 Reasons Why Abortions Should Be Illegal. N.p., 15 Nov. 2012. Web. 15 Nov. 2012.

Wednesday, November 20, 2019

A Comparison of the Passion Narratives of the Gospels of Matthew and Essay

A Comparison of the Passion Narratives of the Gospels of Matthew and John - Essay Example The paper throws light on the Passion of Jesus, which refers to the sufferings that the Lord has experienced from the moment He is arrested at Gethsemane to His Death on the cross, is told in all four Gospels. In the Gospel of Matthew, it can be found in Matthew 26:47-27:61 and in the Gospel of John it is found in John 18:1-19:42. These two Gospels both have similarities and differences on the account of the Passion. Furthermore, a number of these similarities and differences may have profound theological implications. One of the differences between the Gospels is when it comes to the arrest of Jesus where Matthew gives a longer account of the events while John gives a shorter one and does not mention any kiss of betrayal from Judas. In all three synoptic Gospels including Matthew, Judas turns to the crowd he is with and gives them a signal saying â€Å"The man I kiss is the one you want. Arrest him!†. Judas then approaches Jesus and says, â€Å"Peace be with you, Teacher!â⠂¬  but to which Jesus replies, â€Å"Be quick about it, friend†. John, on the other hand, never mentions any exchange of words between Jesus and Judas, who was mentioned to be just standing with the crowd, but rather only between the former and the crowd of soldiers themselves. Jesus asks them, â€Å"Who is it you are looking for?† and when they say â€Å"Jesus of Nazareth†, Jesus replies, â€Å"If, then, you are looking for me, let these others go†. The role of Judas in the Gospel of John during the arrest is not underlined and is presumably a minor one. Upon the arrest of Jesus, a disciple of His cuts off the ear of the High Priest’s slave with a sword. While in Matthew the disciple and the slave are both unnamed, John identifies them as Simon Peter and Malchus. It is also interesting to note that in the Gospel of Matthew, Jesus reprimands the disciple who is assumed to be Peter, by saying, â€Å"Put your sword back in its place†¦All who take the sword will die by the sword.† (Matt. 26:52) On the trial of Jesus, the Gospel of John mentions that Jesus has first been taken to Annas, the father-in-law of Caiaphas, who was the High Priest that year (Jn. 18:13). Nevertheless, the Gospel of Matthew mentions of no such thing. Although John does not indicate whether the trial of Jesus before Annas is visible to the crowd, the complete account is found in John 18:19-24. Based on John’s narration of the trial, it is interesting to note that Jesus seems to defy Annas’ authority by saying, â€Å"†I have always spoken publicly to everyone†¦Why, then do you question me? Question the people who heard me†¦they know what I said† (Jn. 18:20-21). After which, Jesus is taken to Caiaphas, which both John and Matthew mentions. Nevertheless, it is Matthew who gives a rather full account of Jesus’ trial before Caiaphas. Perhaps one of the most important statements of Jesus stated by Matthew is this: â€Å"From this time on you will see the Son of Man sitting at the right side of the Almighty and coming on the clouds of heaven† (Matt. 26:64), which Caiaphas himself considers blasphemous. During the death sentence of Jesus that follows, it is interesting to note that, according to Matthew, Pilate’s wife sends him a message while he is sitting in the judgment hall right after Jesus’ trial. The message of Pilate’s wife says, â€Å"Have nothing to do with that innocent man, because in a dream last night I suffered much on account of Him† (Matt. 27:19). Nevertheless, John does not mention of such a message. Moreover, while Matthew mentions nothing of where Jesus has been presented during the death sentence, John makes reference to â€Å"The Stone Pavement† or â€Å"Gabbatha.† (Jn. 19:13) Another striking difference between the Gospels of Matthew and John when it comes to the events surrounding the crucifixion is the fact that John

Monday, November 18, 2019

Dictatorships in the World Today Term Paper Example | Topics and Well Written Essays - 750 words

Dictatorships in the World Today - Term Paper Example This has resulted in a global demand for capitalism, democracy, and individual rights. The 2010 and 2011 protests in the Middle East and North Africa corroborate this observation to the extent that those uprisings were motivated by, and carried out on behalf of, an opposition to dictatorial rule. Even one of the last few true dictatorships in the world, which is the reign of Muammar Al-Gaddafi, is under attack right now from American-supported rebels in the Libyan Civil War. This wave of change means that while dictatorships remain in the world in a few particular places, it seems that in only a decade the world may not have the problems associated with dictatorial rule. A poignant example of dictatorship in today’s world is the hereditary succession of Kim Il-Sung (â€Å"the Great Leader†) and Kim Jong-Il of North Korea (â€Å"the Dear Leader†). Kim Jong-Il represents dictatorship because of the cult of personality that he attracts from the citizens of North Kor ea. As opposed to modern democracies, which tend to rely on notions of politicians as pragmatic champions of the people, a cult of personality attracts an idealized or heroic public imagery to an individual. That is, instead of merely arguing for policies conducive to a better life for average citizens, a leader like Kim Il-Sung or Kim Jong-Il is thought to be directly responsible for a country’s success and he does this through absolute authority. Kim Jong-Il in particular is thought of having god-like powers, control of magic, and the ability to perform feats that no other men can (Kang & Rigoulot, 2005). In addition, nationwide celebrations are held for his birthdays. The motivations behind these celebrations are partly that the citizens of North Korean truly respect him, or that they fear punishment for not partaking (Mansourov, 2007). In this manner, the regime of North Korea truly represents a modern dictatorship. Like North Korea, the country of Libya is led by a dicta tor who commands instant respect from his people. Colonel Muammar Al-Gaddafi, who is the unofficial leader of the Libyan government, operates under the title of â€Å"Brotherly Leader and Guide of the Revolution†, which refers to the late 1960s Socialist coup d’etat that Al-Gaddafi led. In many ways, Al-Gaddafi fits the mold of a 20th century dictator. Today, his regime is defined by condemnable acts, including the outlawing of dissent, removal of foreign languages from schools, censoring of the press, central planning of the economy, assassinations of foreign leaders abroad, the creation of weapons of mass destruction program, and sponsorship of the Lockerbie bombing incident (BBC, 2009). Unlike the North Korean regime, the Libyan government led by Al-Gaddafi has been challenged in the Libyan Civil War and as of 2011, the government controls only half of the country due to resistance from the uprising. Despite Al-Gaddafi’s explicitly and well-known dictatorial style, he has forged connections with a broad base of European and Asian powers to boost the status of Libya in the world. For instance, he brokered deals with French President Nicolas Sarkozy in 2007 and met with Russian leaders in 2008 to discuss the supply of weapons to Libya (Reuters, 2008). In addition, the Chinese government has extensive economic interest tied with Libya with regard to the growing demand for oil in East Asia (Ford,

Friday, November 15, 2019

Simplified Soft Decision Decoding of LDPC codes

Simplified Soft Decision Decoding of LDPC codes MARUTHI L N K S GURUMURTHY Abstract LDPC codes gained importance since its re-discovery by Mackay and Neil based on Tanner Graph. This paper presents the implementation of forward error correction soft-input, soft-output decoding process that efficiently decodes the received set of data under low signal-to-noise ratios due to which the errors are reduced and hence transmission time is greatly reduced. The implemented algorithm is less complex and does not require knowledge of signal-to-noise-ratio of the received data-path. INTRODUCTION Error correction coding techniques came into existence after existence of channel capacity theorem by Shannon, the father of information theory in 1948 on reliable communication over noisy transmission channels. Thereafter, many coding techniques were developed for efficient coding techniques, like Hamming, Golay and many other techniques were developed. Though Gallagher in 1962 developed LDPC codes, the method employed was not optimal. Hence it was not reviewed for last 3 decades, until 1992, when a paper â€Å"Near Shannon limit error correcting coding and decoding: turbo codes† presented by Berrou, Glavieux and Thitimajshima changed the trend followed by researchers for the past 5 decades. And now, we are aiming to develop such codes through another strategy. The coding gain provided by this method is much higher when compared to other coding systems. The LDPC codes are becoming more popular because of their reduced power for transmission and less complex logic to achieve l ow BER’s which is very essential for reliable transmission over noisy channels. LDPC CODES Low Density Parity Check (LDPC) codes are a powerful class of forward error correction codes developed by Gallagher in 1962, practically implemented by MacKay in 1995. Low Density refers to less number of 1’s in the Parity Check Matrix (H) of Block Codes. Block codes are a type of Error Correction Codes which uses a Generator Matrix(G) to produces a Code-word of length n for message(D) of length k, where n-k is the redundancy bits added to make a Code-word of length n, higher the redundancy higher the error correction capability and higher the Bandwidth. Hence, there is a trade-off between error correction capability and bandwidth. C=D.G The size of the Matrix G is (n, n-k) and the size of the Matrix H is (n-k, n). Usually redundancy is defined by the term â€Å"code rate† which is given by R=k/n This varies from  ½ to 1/6. The Encoder produces a Code-word which satisfy the condition C.HT=0 If R is the received data from the Transmitter then the acknowledgement of the correct data received is given by the Syndrome(S). S=R.HT The value of S obtained by the above calculation determines whether the received data is free from error or not, i.e. if S=0 then the received data is free from error, otherwise the received data has an error. Since this property is very useful to reduce the calculation time if we receive the data correctly as soon as we receive data. The probability that the received data needs to be retransmitted which in the range of 10-6 to 10-8. Encoding the data as required is an easy process, but decoding the data effectively and efficiently is a very hard process. The proposed algorithm uses the basic concept of block codes, i.e. R=C+E Where R=noise corrupted vector C=Code vector transmitted over noisy channel E=Error vector. The receiver does not know C and E; its function is to decode C from R, and the message D from C. PROPOSED ALGORITHM The base for LDPC decoding algorithm proposed is as described by MacKay and Neil in 1997. Following are the steps that briefly describe the algorithm STEP 1: INITIALIZATION Let rj be the received vector, i.e. the data received from the Gaussian channel We calculate the components of the vectors d02( j), and d12( j) as: d02( j)= (rj+1)2 d12( j)= (rj-1)2 j = 1, 2, . . . , n (1) These first soft estimates of the code symbols are used to initialise the algorithm by setting the following coefficients q0ij and q1ij at each symbol node q0ij= d02( j) q1ij= d12( j) j = 1, 2, . . . , n, i = 1, 2. . . , . n-k, (2) To eliminate the effect of zero in the calculation the expressions for the calculations can be reduced as shown below ln(em+en) = max(m,n) + ln(1+ e-|m-n|) log2(2m+2n) = max(m,n) + ln(1+ 2-|m-n|)(3) The tables required for calculations are computed using the above formula. The complexity is greatly reduced and the reliability of the transmission of signal is increased. STEP 2: HORIZONTAL STEP aij= f+(q0ij , q1 ij ) bij= −f−(q0ij , q1ij) if (−q 0ij ) ≠¥ (−q1ij ) sij= 0 else sij= 1 cij= ikik if ik is even r0n,ij= −f+(0, cij ) r1n,ij= f−(0, cij ) if ik is odd r0n,ij= f−(0, cij ) r1n,ij= −f+(0, cij ) STEP 3: VERTICAL STEP q0ij= d02 (j) + 0n,ij q1ij= d12 (j) + 1n,ij STEP 4: DECISION rm0ij=r0n,ij+ q0ij rm1ij=r1n,ij+ q1ij if rm02(j)12(j) then c(j) = 1 else c(j) = 0 The LUT entries used in the proposed algorithm for equation (3) and the exact value obtained will vary as shown in the figure. Comparison of BER performance of (8 * 12) LDPC SSD decoder (10 iterations) Comparison of BER performance of (8 * 12) LDPC SSD decoder (50 iterations) As explained above, for higher precision the number of iterations is increased to obtain the same performance of the exact equation. The obtained results approach towards the complex algorithm developed by Gallagher with simple iterative approach and provides a high coding gain compared to uncoded signal. And it provides higher performance at larger iterations. This algorithm provides even higher performance for large length codes. CONCLUSION In this paper we have described Low Density Parity Check (LDPC) codes and decoding of these codes using low complexity algorithms. LDPC codes are used now-a-days in communication systems that take advantage of parallelism, good error correction and high through put. This led to the new algorithm which could decode the errors and yet give similar BER performance as the complex algorithms without the knowledge of the channel noise parameters like variance. This new algorithm is based on repeated use of an antilog-sum operation, and has been simulated on the Tanner graph representation of several LDPC codes and this algorithm can be regarded as a generalized form of belief propagation, where the belief propagated is Euclidean distance estimate rather than a probability estimate. The advantages of the new algorithm are that the performance is as good as the complex algorithm provided the value of base of the logarithm is used properly; that knowledge of noise is not required and that in the simplified form the algorithm needs only additions/subtractions, comparisons and two look-up tables avoiding the use of quotients and products operations that are of high complexity in practical implementations especially using FPGA technology. REFERENCES 1] R.G. Gallager, â€Å"Low Density Parity Check Codes†, IRE Trans. Information Theory, IT-8, 21-28 (1962). 2] D.J.C. Mackay and R.M. Neal, â€Å"Near Shannon limit performance of low density parity check codes,† Electronics Letters, vol. 33, pp 457-458 (1997). 3] L. Arnone, C. Gayaso, C. Gonzalez and J. Castineira, â€Å"Sum-Subtract Fixed Point LDPC Decoder,† Latin American Applied Research, vol. 37, pp 17-20 (2007). 4] Castineira Moreira, Farrell P.G.: â€Å"Essentials of error control coding†, Wiley (2006). 5] Castineira Moreira J., Farrell, P.G.: â€Å"Soft-decision SISO decoding of error-control codes†, Proc. 13th Int. Conf. on telecommunications (SENACITEL ’08), Valdivia, Chile, 12-15 November 2008. 6] L. Arnone, Castineira Moreira, Farrell P.G.: â€Å"FPGA implementation of a Euclidean distance metric SISO decoder,† Int. Symposium on communication theory and applications (ISCTA’09), Ambleside, UK, July 2009. 7] P.G. Farrell, L.Arnone, J. Castineira Moreira: â€Å"Euclidean distance soft-input soft-output decoding algorithm for low density parity check codes,† IET comm. Vol.5, Iss. 16, pp. 2364-2370, (2011). 8] J. Castineira Moreira, M. Rabini, C. Gonzalez, C. Gayaso, L. Arnone: â€Å"FPGA implementation of two very low complexity LDPC decoders,† IEEE papers, (2011). 9] Simon Haykin: â€Å"Digital communications†, John Wiley sons (2006). 10] Bernard Sklar, Pabitra K. Ray: â€Å"Digital communications: fundamentals and applications†, 2nd edn. Pearson education (2009). 11] Shu Lin, Daniel J. Costello Jr.: â€Å"Error Control coding†, 2nd edn. Pearson education (2004). 12] Moon T. K.: â€Å"Error correction coding- mathematical methods and algorithms†, Wiley (2005).

Wednesday, November 13, 2019

Women and the American Revolution Essay -- Essays on American Revoluti

Women generally did not fight in the revolution, and the traditional status of Eighteenth Century women meant that they were not publicly able to participate fully in the debates over the revolution. However, in their own sphere, and sometimes out of it, woman participated fully in the revolution in all the ways that their status and custom allowed. As the public debate over the Townshend Acts grew more virulent, women showed their support for the cause of freedom by engaging in certain "feminine" pursuits. A common practice was to publicly ban English imports, especially tea, from their homes. Creating homespun, that is, the tedious creation of homemade fabric from spinning and weaving their own cloth, was another public way of showing support for the cause of freedom. During the American Revolution, many women were directly affected by the fighting since their father or brothers or husband or sons were off fighting. This meant that the women often had to take full responsibility for the family farm or business. More and more women became "deputy husbands" and represented the family in legal or commercial transactions. In some instances, as the fighting came close to their lands, women even had to take up arms to defend their person or property when the occasion demanded. Several women in Groton, Massachussetts, put on their husbands' clothing, armed themselves with muskets and pitchforks and defended the Nashua River Bridge. They captured a notoriou...