Thursday, August 27, 2020

Class discussion you will identify wage and salary components of an Essay

Class conversation you will distinguish pay and compensation segments of a powerful execution evaluation program - Essay Example parability Survey and specified that before leading the pay and pay study, â€Å"an examination of the worker pay framework ought to be founded on an intensive comprehension of material guidelines and investigation of the faculty strategies and techniques, procedures and consumptions supporting an agency’s remuneration plan† (Center for Community Futures, n.d., p. 1). At that point, the anticipated degree of remuneration ought to be unequivocally decided and recognized; related to the assets or assets of the association. This would empower the chiefs to measure the capacities with regards to making the essential changes in pay scale, contingent upon the aftereffects of the compensation and pay study. It was underlined that pay and pay reviews are instruments which help with keeping up â€Å"internal and outer compensation value for employees† (Chapter 9: Managing Compensation, 2012, p. 34). In that capacity, to lead boss started pay and pay studies, the accompanying pivotal advances and factors should be thought of: (1) the suitable choice of key occupations to be reviewed; (2) an assurance of the important work advertise; (3) choosing associations to contrast current compensation structure and; (4) settling on the data that should be gathered: compensation, benefits, pay approaches, and other relevant information influencing wages and pay rates; (5) successfully incorporating and utilizing the data that is gathered; lastly, (6) deciding the pay structure to be paid dependent on the installment objectives that were initially set (Chapter 9: Managing Compensation, 2012, p. 36). For example, there is the National Compensation Survey arranged by the Bureau of Labor Statistics which is a territory based review and gathers data dependent on geographic area; the quantity of foundations which are illustrative of every area; all occupations inside the distinguished foundations that are remembered for the study; lastly, the pay and advantages given in every occupation. As uncovered, the

Saturday, August 22, 2020

Life on the Road Essay Example for Free

Life on the Road Essay â€Å"Life on the Road† was as I would like to think written to engage, yet in addition to advise the peruser about a drifters life. The creator clarified the rudiments of his ordinary excursions and how they influenced him. He disclosed how he needed to adjust to specific methods of living, from where he would rest to where he was going to discover food the following day. Shockingly voyaging additionally showed him how to all the more likely present himself. For instance, he figured out how to remain, rather than sit while attempting to get a ride. This indicated his assurance and a progressively ideal self depicted picture. The way of life he was accustomed to living had totally changed. He no longer had extravagances handily gave to him as we Americans do today. I additionally accepted he composed this article with the goal for us to perceive the little, yet significant factors in life that we ordinarily miss considering the bustling life a large portion of us lead now a days. Wertz stated, â€Å"I was gone just three months, however in those three months I felt heart. † (Wertz, 13). His view on society and life changed totally after his experience out and about. Being distant from everyone else on the avenues constrained him to figure out how to battle for himself and figure out how to connect distinctively with individuals. All through his experiences he realized there is numerous sorts of individuals. He met exceptionally wonderful individuals, excessively glad individuals, very impolite individuals, and unfortunately even individuals enduring more regrettable than he was. Attributes he never realized he had like compassion looked their head out and instructed him that despite the fact that he was battling, there are as yet a colossal measure of individuals out on the planet that have it more regrettable than he. His excursion drove him through numerous difficulties, however mostly showed him all the more how exceptional life truly is.

Friday, August 21, 2020

Argumentative Essay Topics - Use Them to Stand Out in Writing

Argumentative Essay Topics - Use Them to Stand Out in WritingArgumentative essay topics are about issues, conversations and experiences that will help you come up with an original written piece. It is not about learning from someone else's experience, in fact, it is almost always better to learn from your own experience. The most effective essay topics are ones that allow you to illustrate your ideas using simple examples and let your words flow freely. This is a good way of learning how to write well and make your writing impressive, while still retaining your personal perspective.Personal Experience: When you write about your own experiences, there is a very high probability that it will stand out as original and very informative. It also allows you to be yourself because you will not be teaching somebody else a lesson. You will not be repeating what another writer is teaching you because you have already learned it from the experience you have. There are many types of personal exp eriences that can be explored, and they include health, relationships, emotions, money, working life and more.Personal Health and Wellness: If you are writing about your health or your well-being, you need to be very specific. You cannot just say you have a great diet or you exercise often and expect your readers to understand and accept it. The reason is that, when writing about personal health and wellness, your readers need to understand and accept something that is not readily apparent to them. Your writing should make them understand and accept something new about you, which will give them a new perspective on life.A great example would be if you wrote a dissertation on your personal experience in your personal life and how it has been related to your career. This would make you a very effective and knowledgeable writer, yet the audience wouldn't know it since you are describing something they have not seen or experienced. They will just have to read between the lines and accep t that you had a certain health or relationship issue.Hard Core Sport and Exercise: When you write about your sports, health and fitness, or exercise, it must be related to your overall life experience. That is why if you are writing about sports, make sure it is relevant to the sport. If you are writing about your very own personal experience, you better have a great story to tell.Personal Experience and the Environment: There are many situations where the environment can be directly related to one's health or well-being. For example, if you are in a very hot and humid environment, you will not be able to breathe properly, and you might even suffer from hyperventilation. If you are unable to breathe properly, you will most likely sweat profusely, which could cause dehydration and heat stroke. When writing about a personal experience in this situation, your writing must be specific and true to life.Medical Field: The medical field may be very common knowledge to many people, but if you are writing about it, you better make sure that you have the right facts and information about the specific type of issues you will discuss. If you are writing about someone else's medical field, make sure you have a very good understanding of the specific disease or condition they have to offer.The first thing you need to do when starting your argumentative essay topics is to familiarize yourself with the field of medicine. It can be very intimidating for the first-time writer to write about their own life experiences. Once you feel confident enough to start creating an original piece, the rest of the article can be used to build on what you already know.

Tuesday, May 26, 2020

Emmeline Pankhurst, Womens Rights Activist

Emmeline Pankhurst (July 15, 1858–June 14, 1928) was a British suffragette who championed the cause of womens voting rights in Great Britain in the early 20th century, founding the Womens Social and Political Union (WSPU) in 1903. Her militant tactics earned her several imprisonments and stirred up controversy among various suffragist groups. Widely credited with bringing womens issues to the forefront—thus helping them win the vote—Pankhurst is considered one of the most influential women of the 20th century. Fast Facts: Emmeline Pankhurst Known For: British suffragette who founded the Womens Social and Political UnionAlso Known As: Emmeline GouldenBorn: July 15, 1858  in Manchester, United KingdomParents: Sophia and Robert GouldenDied: June 14, 1928  in  London, United KingdomEducation: École Normale de NeuillyPublished Works: Freedom or Death (speech delivered in Hartford, Connecticut on Nov. 13, 1913, later published), My Own Story (1914)Awards and Honors: A statue of Pankhurst  was unveiled in Manchester on Dec. 14, 2018. Pankhursts name and image and those of 58 other womens suffrage supporters including her daughters are etched at the base  of a  statue of Millicent Fawcett  in  Parliament Square in London.Spouse: Richard Pankhurst (m. Dec. 18, 1879–July 5, 1898)Children: Estelle Sylvia,  Christabel,  Adela,  Francis Henry,  Henry FrancisNotable Quote: We are here, not because we are law-breakers; we are here in our efforts to become law-makers. Early Years Pankhurst, the eldest girl in a family of 10 children, was born to Robert and Sophie Goulden on July 15, 1858, in Manchester, England. Robert Goulden ran a successful calico-printing business; his profits enabled his family to live in a large house on the outskirts of Manchester. Pankhurst developed a social conscience at an early age, thanks to her parents, both ardent supporters of the antislavery movement and womens rights. At age 14, Emmeline attended her first suffrage meeting with her mother and came away inspired by the speeches she heard. A bright child who was able to read at the age of 3, Pankhurst was somewhat shy and feared speaking in public. Yet she was not timid about making her feelings known to her parents. Pankhurst felt resentful that her parents placed a lot of importance upon the education of her brothers, but gave little consideration to educating their daughters. Girls attended a local boarding school that primarily taught social skills that would enable them to become good wives. Pankhurst convinced her parents to send her to a progressive womens school in Paris. When she returned five years later at the age of 20, she had become fluent in French and had learned not only sewing and embroidery but chemistry and bookkeeping as well. Marriage and Family Soon after returning from France, Emmeline met Richard Pankhurst, a radical Manchester attorney more than twice her age. She admired Pankhursts commitment to liberal causes, notably the womens suffrage movement. A political extremist, Richard Pankhurst also supported home rule for the Irish and the radical notion of abolishing the monarchy. They married in 1879 when Emmeline was 21 and Richard was in his mid-40s. In contrast to the relative wealth of Pankhursts childhood, she and her husband struggled financially. Richard Pankhurst, who might have made a good living working as a lawyer, despised his work and preferred to dabble in politics and social causes. When the couple approached Robert Goulden about financial assistance, he refused; an indignant Pankhurst never spoke to her father again. Pankhurst gave birth to five children between 1880 and 1889: daughters Christabel, Sylvia, and Adela, and sons Frank and Harry. Having taken care of her firstborn (and alleged favorite) Christobel, Pankhurst spent little time with her subsequent children when they were young, leaving them instead in the care of nannies. The children did benefit, however, from growing up in a household filled with interesting visitors and lively discussions, including with well-known socialists of the day. Gets Involved Pankhurst became active in the local womens suffrage movement, joining the Manchester Womens Suffrage Committee soon after her marriage. She later worked to promote the Married Womens Property Bill, which was drafted in 1882 by her husband. In 1883, Richard Pankhurst ran unsuccessfully as an independent for a seat in Parliament. Disappointed by his loss, Richard Pankhurst was nonetheless encouraged by an invitation from the Liberal Party to run again in 1885—this time in London. The Pankhursts moved to London, where Richard lost his bid to secure a seat in Parliament. Determined to earn money for her family—and to free her husband to pursue his political ambitions—Pankhurst opened a shop selling fancy home furnishings in the Hempstead section of London. Ultimately, the business failed because it was located in a poor part of London, where there was little demand for such items. Pankhurst closed the shop in 1888. Later that year, the family suffered the loss of 4-year-old Frank, who died of diphtheria. The Pankhursts, along with friends and fellow activists, formed the Womens Franchise League (WFL) in 1889. Although the Leagues main purpose was to gain the vote for women, Richard Pankhurst tried to take on too many other causes, alienating the Leagues members. The WFL disbanded in 1893. Having failed to achieve their political goals in London and troubled by money woes, the Pankhursts returned to Manchester in 1892. Joining the newly formed Labor Party in 1894, the Pankhursts worked with the Party to help feed the multitudes of poor and unemployed people in Manchester. Pankhurst was named to the board of poor law guardians, whose job it was to supervise the local workhouse—an institute for destitute people. Pankhurst was shocked by conditions in the workhouse, where inhabitants were fed and clothed inadequately and young children were forced to scrub floors. Pankhurst helped to improve conditions immensely; within five years, she had even established a school in the workhouse. A Tragic Loss In 1898, Pankhurst suffered another devastating loss when her husband of 19 years died suddenly of a perforated ulcer. Widowed at only 40 years old, Pankhurst learned that her husband had left his family deeply in debt. She was forced to sell furniture to pay off debts and accepted a paying position in Manchester as registrar of births, marriages, and deaths. As a registrar in a working-class district, Pankhurst encountered many women who struggled financially. Her exposure to these women—as well as her experience at the workhouse—reinforced her sense that women were victimized by unfair laws. In Pankhursts time, women were at the mercy of laws which favored men. If a woman died, her husband would receive a pension; a widow, however, might not receive the same benefit. Although progress had been made by the passage of the Married Womens Property Act (which granted women the right to inherit property and to keep the money they earned), those women without an income might very well find themselves living at the workhouse. Pankhurst committed herself to securing the vote for women because she knew their needs would never be met until they gained a voice in the law-making process. Getting Organized: The WSPU In October 1903, Pankhurst founded the Womens Social and Political Union (WSPU). The organization, whose simple motto was Votes for Women, accepted only women as members and actively sought out those from the working class. Mill-worker Annie Kenny became an articulate speaker for the WSPU, as did Pankhursts three daughters. The new organization held weekly meetings at Pankhursts home and membership grew steadily. The group adopted white, green, and purple as its official colors, symbolizing purity, hope, and dignity. Dubbed by the press suffragettes (meant as an insulting play on the word suffragists), the women proudly embraced the term and called their organizations newspaper Suffragette. The following spring, Pankhurst attended the Labor Partys conference, bringing with her a copy of the womens suffrage bill written years earlier by her late husband. She was assured by the Labor Party that her bill would be up for discussion during its May session. When that long-anticipated day came, Pankhurst and other members of the WSPU crowded the House of Commons, expecting that their bill would come up for debate. To their great disappointment, members of Parliament (MPs) staged a talk out, during which they intentionally prolonged their discussion on other topics, leaving no time for the womens suffrage bill. The group of angry women formed a protest outside, condemning the Tory government for its refusal to address the issue of womens voting rights. Gaining Strength In 1905—a general election year—the women of WSPU found ample opportunities to make themselves heard. During a Liberal Party rally held in Manchester on October 13, 1905, Christabel Pankhurst and Annie Kenny repeatedly posed the question to speakers: Will the liberal government give votes to women? This created an uproar, leading to the pair being forced outside, where they held a protest. Both were arrested; refusing to pay their fines, they were sent to jail for a week. These were the first of what would amount to nearly 1,000 arrests of suffragists in the coming years. This highly publicized incident brought more attention to the cause of womens suffrage than any previous event; it also brought a surge of new members. Emboldened by its growing numbers and infuriated by the governments refusal to address the issue of womens voting rights, the WSPU developed a new tactic—heckling politicians during speeches. The days of the early suffrage societies—polite, ladylike letter-writing groups—had given way to a new kind of activism. In February 1906, Pankhurst, her daughter Sylvia, and Annie Kenny staged a womens suffrage rally in London. Nearly 400 women took part in the rally and in the ensuing march to the House of Commons, where small groups of women were allowed in to speak to their MPs after initially being locked out. Not a single member of Parliament would agree to work for womens suffrage, but Pankhurst considered the event a success. An unprecedented number of women had come together to stand for their beliefs and had shown that they would fight for the right to vote. Protests Pankhurst, shy as a child, evolved into a powerful and compelling public speaker. She toured the country, giving speeches at rallies and demonstrations, while Christabel became the political organizer for the WSPU, moving its headquarters to London. On June 26, 1908, an estimated 500,000 people gathered in Hyde Park for a WSPU demonstration. Later that year, Pankhurst went to the United States on a speaking tour, in need of money for medical treatment for her son Harry, who had contracted polio. Unfortunately, he died soon after her return. Over the next seven years, Pankhurst and other suffragettes were repeatedly arrested as the WSPU employed ever more militant tactics. Imprisonment On March 4, 1912, hundreds of women, including Pankhurst (who broke a window at the prime ministers residence), participated in a rock-throwing, window-smashing campaign throughout commercial districts in London.  Pankhurst was sentenced to nine months in prison for her part in the incident. In protest of their imprisonment, she and fellow detainees embarked upon a hunger strike. Many of the women, including Pankhurst, were held down and force-fed through rubber tubes passed through their noses into their stomachs. Prison officials were widely condemned when reports of the feedings were made public. Weakened by the ordeal, Pankhurst was released after spending a few months in abysmal prison conditions. In response to the hunger strikes, Parliament passed what came to be known as the Cat and Mouse Act (officially called the Temporary Discharge for Ill-Health Act), which allowed women to be released so that they could regain their health, only to be re-incarcerated once they had recuperated, with no credit for time served. The WSPU stepped up its extreme tactics, including the use of arson and bombs. In 1913, one member of the Union, Emily Davidson, attracted publicity by throwing herself in front of the kings horse in the middle of the Epsom Derby race. Gravely injured, she died days later. The more conservative members of the Union became alarmed by such developments, creating divisions within the organization and leading to the departure of several prominent members. Eventually, even Pankhursts daughter Sylvia became disenchanted with her mothers leadership and the two became estranged. World War I and the Womens Vote In 1914, Britains involvement in World War I effectively put an end to the WSPUs militancy. Pankhurst believed it was her patriotic duty to assist in the war effort and ordered that a truce be declared between the WSPU and the government. In return, all suffragette prisoners were released. Pankhursts support of the war further alienated her from daughter Sylvia, an ardent pacifist. Pankhurst published her autobiography, My Own Story, in 1914. (Daughter Sylvia later wrote a biography of her mother, published in 1935.) Later Years, Death, and Legacy As an unexpected by-product of the war, women had the opportunity to prove themselves by carrying out jobs previously held only by men. By 1916, attitudes toward women had changed; they were now regarded as more deserving of the vote after having served their country so admirably. On February 6, 1918, Parliament passed the Representation of the People Act, which granted the vote to all women over 30. In 1925, Pankhurst joined the Conservative Party, much to the astonishment of her former socialist friends. She ran for a seat in Parliament but withdrew before the election because of ill health. Pankhurst died at the age of 69 on June 14, 1928, only weeks before the vote was extended to all women over 21 years of age on July 2, 1928. Sources ï » ¿Emmeline Pankhurst - Suffragette - BBC Bitesize.†Ã‚  BBC News, BBC, 27 Mar. 2019,  Pankhurst, Emmeline. â€Å"Great Speeches of the 20th Century: Emmeline Pankhursts Freedom or Death.†Ã‚  The Guardian, Guardian News and Media, 27 Apr. 2007.â€Å"Representation of the People Act 1918.†Ã‚  UK Parliament.

Friday, May 15, 2020

Zara Case - 620 Words

DEPARTMENT OF ACCOUNTANCY UNIVERSITY OF ILLINOIS MEMORANDUM TO: Mario Schijven FROM: Yue Ma DATE: September 28th, 2015 SUBJECT: Zara’s Value Chain (Zara Case) Zara’s value chain differs from the other traditional models a lot. The design and creation rely extensively on copying fashion trends observed at the fashion shoes and at competitors’ points of sale, which based on buyers and designers alike. Value Chain Zara’s value chain is supported by each primary and secondary activity in which it has a substantial value –creating activity. The primary activities are based on Zara’s purchase supplies and inbound, operations, distribution and outbound, sales and marketing, and profit†¦show more content†¦This turnover will also force to encourage customers to come to Zara stores more frequently and buy new products. According to the case, no any style can stay in the store for more than 4 weeks. There fore, this action can help company to sell more new productions at full prices. Case from: Pankaj. G and Jose. N (2006), ZARA: Fast Fashion, Harvard Business SchoolShow MoreRelatedZara Case3845 Words   |  16 Pages1. With which of the international competitors listed in the case is it most interesting to compare Inditexs financial results? Why? What do comparisons indicate about Inditexs relative operating economics? Its relative capital efficiency? We think HM’s financial results are the most interesting one to compare with Inditex’s. HM is the most important and largest competitor of Inditex and due to their similar background, both being large international European apparel brands and offers fashionableRead MoreZara Business Case15365 Words   |  62 Pages9-703-497 REV: DECEMBER 21, 2006 PANKAJ GHEMAWAT JOSÉ LUIS NUENO ZARA: Fast Fashion Fashion is the imitation of a given example and satisfies the demand for social adaptation. . . . The more an article becomes subject to rapid changes of fashion, the greater the demand for cheap products of its kind. — Georg Simmel, â€Å"Fashion† (1904) Inditex (Industria de Diseà ±o Textil) of Spain, the owner of Zara and five other apparel retailing chains, continued a trajectory of rapid, profitable growth byRead MoreZara Case Study1656 Words   |  7 Pages3.1 HISTORY and BACKGROUND ZARA is the flagship chain store for the Spanish Inditex Group owned by Amancio Ortega, who also brands such as Massimo Dutti and Bershka. It was first open in 1975 in La Coruna, Galicia, Spain. Originally a lingerie store, then the product range expanded to incorporate women’s fashion, menswear and children’s clothes (5). The international adventure began in 1988, opened its first foreign store in Oporto, Portugal. The market growth remained mysterious and it kept growingRead MoreZara Case1472 Words   |  6 Pagesexpected to show high resistance in response to it. Even though Zara has a decentralized decision making process, the retailer’s IS department exercises absolute autonomy on the IT infrastructure and design. The fact that â€Å"only one person had left the department† in the past 10 years further confirms that the retailer is suffering from cognitive and action inertia, and thus creating a huge barrier for such upgrade. Nevertheless, Zara should still perform such upgrade in the long run. Q1b. ShouldRead MoreZara Case Study1975 Words   |  8 PagesEducation Ltd. Company Case 19 Zara – the fast and furious giant of fashion One global retailer is expanding at a dizzying pace. It is on track for what appears to be world domination of its industry. Having built its own state-of-the-art distribution network, the company is leaving the competition in the dust in terms of sales and profits, not to mention speed of inventory management and turnover. Wal-Mart, you might think? No! Tesco, possibly? No! The company is Zara, the flagship specialty chainRead MoreZara Case Study1037 Words   |  5 PagesZARA Case Assignment 1. With which international competitor listed in the case is it most useful to compare Inditex’s financial performance? What do comparisons indicate about Inditex’s operating economics? Why? There are 3 key international competitors mentioned in the case: The Gap, Hamp;M and Benetton. The Gap‘s production was internationalized with more than 90% of it outsourced outside of the United States. Its stores, however, were US centric. Therefore, The Gap’s strategy was to ownRead MoreZara It for Fashion Case Study1595 Words   |  7 PagesExecutive Summary Zara has relied on Personal Digital Assistants (PDA’s) and Point of Sales (POS) terminal operating on Microsoft DOS which are not linked to the headquarters or other stores for its daily transactions. Although, the system has proved to be stable and reliable over time, it has become obsolete and cannot be supported by the providers. I recommend that the company invest on a new system like Windows, UNIX or Linux operating system which will enhance connectivity and flexibilityRead MoreZara It for Fast Fashion Case Notes903 Words   |  4 PagesZara IT for Fast Fashion Case Notes Identify decision issue, and your role as a decision maker Salgado and Sanchez need to decide if it is the right time to update Zara’s information technology. The key concern is the outdated operating system they use for their point of sale (POS) terminals. Should they purchase the current POS machines from their vendors so that they can support their needs in case the vendor changes their machines to new technology? Or should they move to using new operatingRead MoreZara Case Study Answers2011 Words   |  9 PagesExplain the data collected by Zara to predict the trend. What makes the middle aged mother to buy cloths in Zara while the daughter aged in mid 20s buys Zara clothing? Because it is fashion able and up to trend. By collecting data and focusing on shorter response times, the company ensures that its stores are able to carry clothes that the consumers want at that time. Zara can move from identifying a trend to having clothes in its stores within 30 days. That means Zara can quickly and catch a winningRead MoreCase Study 2: Zara International824 Words   |  4 PagesZara International is considered a high end clothing store that is affordable. Due to its quality in fashion, low prices and immediate availability, popular stores such as Gap and HM fail to keep up with Zara’s success. Zara’s well known tactic of fast fashion has separated them from their competition. The ‘fast fashion’ objective is to distribute top trends of fashion within the runway to customers by selling them in local stores. Zara has been able t o achieve the fast fashion perspective by hiring

Wednesday, May 6, 2020

The Viable And Authorization Of Life Cycle Based Product...

Abstract This paper discusses the use and importance of EPDs in the viable and authorization of life cycle-based product environmental impacts. The role and purpose of EPDs, market acceptance of EPD schemes, costs of EPDs to start using this information tool. It also concludes with a look at potential developments regarding the use of EPDs in support of product environmental claims. Finally, manufacturers who use EPDs help to create a greater public awareness of the environmental impact aspects of products, thereby contributing to global sustainability efforts. Keywords: eco-labelling, environmental product declarations, life cycle assessment, costs. Emergence of EPD’S Keeping environment green is†¦show more content†¦An EPD tells the lifecycle story of a product in a single, written report, provides a complete picture focusing on information about a products environmental impact, such as global warming, ozone depletion etc. It covers everything from fossil fuel depletion to effects on human health, and there’s already a growing list of industry organizations that recommend using the EPDs Existence of an EPD for a product does not indicate that environmental performance criteria have been met. EPDs are a declaration tool that helps purchasers better understand a products sustainable qualities and environmental results so they can make more informed product selections. EPDs can be developed after a product LCA is conducted, and are based on applicable PCRs. For architects and designers, EPDs helps in intensifying the sustainability of design and enable to create the best possible spaces. EPDs can also helps to get industry certificat ions and LEED credits. It is committed to diminish the carbon footprint waste, building a bright sustainable future for all of us. Process for developing an EPD LCA tool helps in promote transparency and full revelation of potential environmental impacts. Potential uses for EPDs †¢ World-Wide – In Industry EPDs help ensure that wood products are not at risk for non†tariff trade barriers. †¢ Manufacturers –

Tuesday, May 5, 2020

Islam and Jihad free essay sample

Ian Netton defines it as â€Å"holy war† in his book A Popular Dictionary of Islam and he also writes: â€Å"The word derives from an arabic root meaning basically to strive all muslims are obliged to wage a spiritual jihad in the sense of striving against sin and sinful inclinations within themselves; this is the other major sense of Jihad. † Both of those definitions are similar to the American definitions. Jihad is broken down into two parts; a greater and a lesser. The greater jihad is seemed to be spiritual. Jihad of the heart. It finds a rough parallel in the christian command to put to death the sin nature. Jihad of the mouth aims to undermine opposition to islam through speech. A war of words is prefered over a war of violence. Jihad of the pen applies the written word to Islam’s defense. Jihad of the hand seeks to promote the cause of Allah through through praiseworthy deeds. We will write a custom essay sample on Islam and Jihad or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The lesser Jihad would be that of the Jihad of the sword. This is the one seen throughout the history of Islam. Is Jihad a synonym of Holy War or does it portray a broader concept that suits the general ethos of Islam? Today Jihad is mostly seen as the greater one, and in the past the lesser one played a big role in Islam. I would like to start with the history and origins of Jihad and then move on to who believes and practices it, then lastly talk about a Jihad that has happened in the past. Jihad was introduced by the last prophet Muhammad. Before Muhammad came into ruling there were pre-islamic bedouin arabs who had their own society and was highly matriarchal. They believed in many gods. These ancient people did not accept muhammad and his teachings from the quran. On the other hand there were people who were Christian and Jewish and the followers of Muhammad did not accept those people. One day Muhammad had a revelation. The messenger angel for god, Gabriel, came to Muhammad and told him to read. Muhammad can’t read, so Gabriel told him to write. Muhammad being illiterate can’t do either of those so he ran home to his wife Khadijah and told her he thinks he is crazy. She wrapped him in a blanket and explained to him that he isn’t crazy that he is gods messenger to the arabs. This was when Muhammad started spreading the word about Allah, the only god. The Jews and Christians see Muhammad as a false prophet. Muhammad had many obstacles to face while spreading the word of Allah. It was then when Jihad was introduced to Muhammad to help spread the word of the religion. Again Jihad means Holy War. Jihad is only supposed to be used if you are fighting for your religion. While it says in the Quran to kill Christians and Jews at the same time it welcomes good relationship and peace between them. This is stating to harm the ones that will not allow Islam to spread and get in the way with trying to get others to follow. Muhammad trained his followers as warriors as well and fought throughout the middle east to spread his faith like he was told to do. There have been many jihads throughout the history. To name a few that were important to spreading Islam were the Jihad against the Byzantine Empire, the Jihad against the Turks, the Crusades, and the Jihad against the Mongols. Again that was just a few Jihads from the past. All muslims believe Muhammad is a prophet and all believe in Jihad since it is the Quran, but different groups believe in different ideas of Jihad. Like I just said, all muslims believe in Jihad. Since there are different ‘types’ of jihad different muslim groups believe in different ideas of Jihad. The Concept and Practice of Jihad in Islam states: â€Å"Jihad was generally understood not as an obligation of each individual Muslim (known as fard ’ayn) but as a general requirement of the Muslim community (fard kifaya). Only in emergencies, when the Dar al-Islam comes under unexpected attack, do all Muslims have to participate in jihad. † Dar- al Islam was known as the territory under Islamic rule. Most of the different groups of Jihad divide it into two groups like I explained earlier: lesser and greater. An Islamic reformist movement, Ahmadiyya founded in 1889, believe Jihad is one’s personal inner struggle and should not be used violently. The Sunni which account for eighty five to ninety percent of all muslims classify Jihad as either lesser or greater. They also believe there are four different kinds of Jihad in the sense of struggle in the cause of God. There is a group of muslims called Jihadists which focus only on war. Along with the Sunni, the Shi’as and Sufis believe Jihad should be in two categories: lesser and greater. Some leaders like Taqi al-Din Ahmad Ibn Taymiyya believed if you did not strictly enforce the Sharia, including Jihad you were to forfeit your right to rule. The Sharia are the moral codes and religious laws of Islam. Taymiyya strongly advocated jihad against the crusades and the mongols. Finally I’d like to focus on examples of Jihad that have happened in the past. One that most people know would be the Crusades. Since Muhammad there have been many caliphs. All of these caliphs over time have occupied certain areas of land that they gained and lost. They were just trying to follow in the steps of Muhammad and spread the word of Islam and if something got in their way Jihad would happen. The second caliph, Umar oversees a massive expansion of the lands he controls. Jerusalem was taken in the seventh century. Over time and after a few caliphs have been in power the Buyids take over Baghdad from the Abbasids but do not claim caliphate. They start to hand out land grants called iqtas to turks to guard the border and in return they get the land. Eventually these iqtas become ancestral and empires form. First the Ghaznavids but then they are taken over by the Seljuks. The Seljuks spread into the middle east all the way to Turkey. The Byzantine Empire, controlling Anatolia, see the Seljuks coming so they ask Pope Urban the second for help. This is the launch of the first crusade. The Christian knights go into the holy land and fight in effort to reclaim what was theirs from the Fatimids. It was successful and the christians take back Jerusalem. The second Crusade is led by the King of France Louie the Ninth and Holy Roman Emperor Conrad the Third. Both armies passed through the Balkans and pillaged through the Byzantine Empire. Both armies were eventually defeated by the Seljuks and thus the second Crusade was a win for the Muslims. That is just a little section of what had happened during the Crusades. It shows how Muslims used Jihad to protect their religion and to spread it across the Middle East. That is just a brief story of the Crusades. It goes into a lot more detail. Also that is only one example of how Jihad was used, there are multiple other examples but I just wanted to focus on the empires and rulers using Jihad to gain land, spread the word of the lord, and protect their faith. The Muslim faith over all is very peaceful. Jihad translates into the word struggle, and is seen as ‘Holy War’ but that is not the only case. When Muhammad came into caliphate he used Jihad to spread the word of Islam like he was told to by Gabriel. He used violence to protect the faith, and that was seen a lot throughout the history of the Middle East. Jihad is also broken down though into a greater Jihad and a lesser Jihad. The greater being more spiritual and the lesser being the violent act. To answer the question from earlier, Is Jihad a synonym of Holy War or does it portray a broader concept that suits the general ethos of Islam? I would conclude that in the past Jihad was definitely a synonym of Holy War, but now it is more about spirit, peace, and coming together.

Sunday, April 12, 2020

Home Security System Essay Example

Home Security System Essay ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, house security system becomes the best solution to overcome house intrusion problem when user is not in house. As we know, there are many types of house security system which is too expensive and difficult to use. For that reason, an effective house security system at low cost is built where user can also program the security system by their own. This project is focusing on developing a house security system with an active infrared motion detector which is controlled by microcontroller Intel 8051. The overall project is divided into two parts. The first part is concern on the hardware development where all electronics component are connected via the circuit design using wrapping technique. An active infrared, the magnetic sensor, and keypad are the input components while buzzer, indicator, and LCD display are the output components where it’s all controlled by controller circuit. The second part is base on software programming to operate the hardware structure. Program for security system based on microcontroller Intel 8051 assembly language is assemble using ASM51 assembler to get the binary file thus, to load into external memory of the hardware structure via serial communication. The process of downloading and executing the program is done using HyperTerminal’s communication software to the microcontroller serial port. In order to achieve the best house security system, more detectors or sensors can be connected to the microcontroller output port where it can be reprogram by user using their personal computer at home. We will write a custom essay sample on Home Security System specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Home Security System specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Home Security System specifically for you FOR ONLY $16.38 $13.9/page Hire Writer As the result, the infrared motion detector is capable to detect motion while the microcontroller is capable to control the whole operation of the security system. CHAPTER 1 INTRODUCTION 1. 1 Background Motion detection is the action of sensing physical movement in a given area. Motion can be detected by measuring change in speed or vector of an object in the field of view. This can be achieved either by mechanical devices that physically interact with the field or by electronic devices that quantifies and measures changes in the given environment. There are two device of motion detection which is the mechanical device, and the other one is electronic device. In the mechanical device, a tripwire is a simple form of motion detection. If a moving objects steps into the tripwires field of view then a simple sound device like bells may alert the user. Mechanical motion detection devices can be simple to implement, but at the same time, it can be defeated easily by interrupting the devices mechanics like cutting the wire†. While in electronic device, the electronic motion sensing such as motion detectors, can prevent such mechanical intervention. The principal methods by which motion can be electronically identified are optical detection and acoustical detection. Infrared light or laser technology may be used for optical detection. Motion detection devices, such as motion detectors, have sensors that detect movement and send a signal to a sound device that produces an alarm or switch on an image recording device. There are motions detector which employ cameras connected to a computer which stores and manages captured images to be viewed over a computer network. The applications for such detection are detection of unauthorized entry, detection of cessation of occupancy of an area to extinguish lighting, and detection of a moving object which triggers a camera to record subsequent events. The motion detector is thus a basic idea of electronic security systems. 1. 2 Project objective The objective of this project is to build a house security system using microcontroller Intel 8051 based on active infrared motion detection. 1. 3 Project scope This project concentrates on a development of an active infrared motion detector for house security system. To develop the whole project, it consists of three methods which are the concept of security system, the electrical structure, and the software programming. The concept of security system is on the detection of movement using active sensor to trigger alarm controlled by the microcontroller Intel 8051. The electrical structure consist of two systems which are the active infrared circuit that used to detect or sense motion and the microcontroller Intel 8051 circuit, used to control the whole operation of the security system. While the software programming is base on the microcontroller Intel 8051 instruction sets. It contains a program designed for a security system as an interaction to operate the electrical structure. 1. 4 Literature review Motion detectors are mainly used in security systems [4]. It is typically positioned near exterior doorways or windows of a building to monitor the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the average homeowner as well as commercial organizations [4]. An electronic motion detector is a device used to detect any physical movement in a given area and transforms motion into an electric signal. It consist of sensor that electrically connected to other devices such as security system, lighting, audio alarms, and other applications. Motion sensors are used in a wide variety of applications and as a result, many different types of motion sensors are available including the infrared sensor. Infrared sensors are widely known in the arts of intrusion detection and in fire or smoke detection. It is a device that often used in automatic light switches and security systems to turn on a light or to activate some other form of alarm or warning indicator when a person enters a monitored area [4]. The infrared sensors have basically two forms: active and passive. [4] An active infrared detector includes a radiation source and an infrared sensor which is sensitive to interruptions in the radiation sensed from the source. [4] These detectors are used as intrusion detectors by providing a path of radiation from the source to the sensor in a place where the path is likely to be interrupted by an intruder. The proposed active infrared method of motion detection has the advantage of fast speed response of a relatively large sensor. This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents substantial problems in the passive infrared (PIR) sensors. Low production cost is another advantage of these active infrared detectors. [4] Passive infrared motion detection detects heat energy radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is generally use an optical ollection system and multiple sensing elements of alternating polarity to create a detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for producing a detection signal in response to the heat sensor detecting a change o f temperature caused by the body heat of a person entering the detection pattern. PIR motion detectors are perhaps the most frequently used home security device. 4] Passive IR motion detectors are usually designed to provide an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is responsive to receipt of the breach indication to cause an alarm condition to occur. The other motion detector used in security system is an ultrasonic motion detector. It is commonly used for automatic door openers and security alarms [4]. It is inexpensive and can operate with narrow beam-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector. It can be used to detect motion in an area where there are not supposed to be any moving objects. This type of motion detector is most commonly used in burglar alarm systems since they are very effective in this application [4]. In an ultrasonic motion detector, there are two transducers; one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the receiver in constant phase if none of the objects in the area are moving. If something moves, the received signal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm. Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a plane overhead. Besides, the installation options on this type of motion detector are limited because ultrasonic beams are easily blocked by thin materials, including paper. False triggering is easily caused by reflections from blowing curtains, pets, and flying insects. While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use two infrared sensors, which monitor different zones within a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area. For that reason, the purpose of using the active infrared as a sensor to detect motion for this project is surely on the advantage offers by the sensor. Its capability on detecting motion with a simple design at lowest cost is needed to build an effective house security system based on motion detection. 1. 5 Thesis outline Chapter 1 explains the background of motion detection, the project objective, the project scope, and the literature review of motion detector for security system. The concepts of motion detector are the major element as a guide for the development of the security system. Chapter 2 explains the systems involved for the development of the active infrared motion detector for house security system. The understanding of three systems which are the active infrared, motion detector, and house security system stated in this chapter needed for the development of the whole project. Chapter 3 focuses on the methodologies for the development of the electrical structure and the implementations of microcontroller programming. It gives a brief review on the concept of active infrared motion detector, the electrical structure for hardware development, and the programming for the operation of the security system. Chapter 4 discusses on the results obtained of the whole project. All discussions are concentrating on the result and performance of the security system. The discussion is valuable for future development of the security system. Chapter 5 discusses about the conclusion on development of the active infrared motion detector for house security system. The recommendations and modification required on this project is stated in this chapter for further development. CHAPTER 2 ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM 2. 1 Introduction There are two systems on a development of the active infrared motion detector for house security system. The first system is an active infrared motion detector and the other one is the controller system. The first system concentrates on a development of an active infrared motion detector. It is consists of three element, which are the active infrared, the motion detector, and the house security system. The motion detector circuit will be control by the second system which is the microcontroller Intel 8051 based system. The combination between this two systems will built a project called an active infrared motion detector for house security system. 2. 2 Active infrared (IR) Infrared is an electromagnetic spectrum at a wavelength that is longer than visible light. It cannot be seen but it can be detected. Objects that generate heat also generate infrared radiation and those objects include animals and the human body whose radiation is strongest at a wavelength of 9. 4 µ meter. Infrared in this range will not pass through many types of material that pass visible light such as ordinary window glass and plastic. However it can pass through, with some attenuation, material that is opaque to visible light such as germanium and silicon. The active infrared sensors use invisible light to scan a defined area. In active infrared systems, there are two-piece elements which are consisting of an infrared transmitter and an infrared receiver. There is a 3/8 inch infrared beam between the transmitter which is placed on one side of the trail and the receiver which is placed on the other side of the trail. The transmitter and the receiver can be separated by as much as 150 feet. The transmitter emits a beam of light into the scan zone. The light, which is reflected by the background returns to the receiver, which constantly monitors the scan zone. When a person or object enters the zone the infrared light is interrupted. It then sends a signal to the controller system, which is wired into the door controls. One variation of this operating mode is called ‘background suppression’. This is when the receiver only detects a change in the reflected light when a person or object enters the scan zone thus causing a reflectance variation of the light, sending a signal to the microcontroller thus trigger the alarm of the security system. 2. 3 Motion detector A motion detector is a device that contains a motion sensor and is either integrated with or connected to other devices that alert the user of the pre-sense of motion. An electronic motion detector contains a motion sensor that transforms the detection of motion into an electric signal. The electric signal can be connected to a burglar alarm system which is used to alert the home owner or security service after it detects motion. An example of sensor that used in security system is an active sensor. Active sensors in motion detectors system are commonly used inside homes for a security system. An active motion detector emits optics or sound waves and measures feedback to detect motion. The simplest type of active motion detector is commonly used in commercial doorways to trigger a doorbell. A device is fixed to one side of the doorway, an optical sensor to the other. A beam of light will passes from the device through the sensor. When someone enters the establishment, the beam is broken, triggering the doorbell thus warn user for the intrusion. For that reason, active motion detectors can be purchased for home improvement security system. It is inexpensive devices that can add for more security to a home and provide peace of mind for home owners. 2. 4 House security system House security system is one of security that truly related to burglar or safety alarm system. Burglar and safety alarms are found in electronic form nowadays. Sensors are connected to a control unit via either a low-voltage hardwire which in turn connects to a means for announcing the alarm to elicit response. In a new construction systems are predominately hardwired for economy while in retrofits wireless systems may be more economical and certainly quicker to install. Some systems are dedicated to one mission; handle fire, intrusion, and safety alarms simultaneously. In common security system, the lights are triggered by motion gives the impression to user that someone is at home and able to see the burglar. Infrared motion detectors placed in house security system in crucial areas of the house can detect any burglars and alert the home owner or police. The first security system invented, house alarms were triggered by the release of a pressure button fitted into a door or window frame. This basic alarm was fundamentally flawed as the entire intruder needed to do to silence the alarm was to close the door or window. While various systems on the market ranging from inexpensive house security alarms to highly sophisticated systems requiring professional installation. All modern alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or closed depending on the security system designed. The alarm is triggered when the circuit is altered and will not be silenced until a code is punched into the control panel. The most expensive and complicated alarm systems might also involve a combination of motion sensors and pressure pads to ensure even the most cunning intruder doesn’t get his hands on treasures. 2. 5 Microcontroller Intel 8051 The microcontroller 8051 is an 8-bit machine. Its memory is organized in bytes and practically all its instruction deal with byte quantities. It uses an Accumulator as the primary register for instruction results. Other operands can be accessed using one of the four different addressing modes available: register implicit, direct, indirect or immediate. Operands reside in one of the five memory spaces of the 8051. The five memory spaces of the 8051 are the Program Memory, External Data Memory, Internal Data Memory, Special Function Registers and Bit Memory. The Program Memory space contains all the instructions, immediate data and constant tables and strings. It is principally addressed by the 16-bit Program Counter (PC), but it can also be accessed by a few instructions using the 16-bit Data Pointer (DPTR). The maximum size of the Program Memory space is 64K bytes. The External Data Memory space contains all the variables, buffers and data structures that can not fit on-chip. It is principally addressed by the 16-bit Data Pointer (DPTR), although the first two general purposes register R0 and R1 of the currently selected register bank can access a 256-byte bank of External Data Memory. The maximum size of the External Data Memory space is 64K bytes. The external data memory can only be accessed using the indirect addressing mode with the DPTR, R0 or R1. The Internal Data Memory space is functionally the most important data memory space. In it resides up to four banks of general purpose registers, the program stack, 128 bits of the 256-bit memory, and all the variables and data structures that are operated on directly by the program. The maximum size of the Internal Data Memory space is 256-bytes. The register, indirect and direct addressing modes can be used in different parts of the Internal Data Memory space. The Special Function Register space contains all the on-chip peripheral input and output registers as well as particular registers that need program access. The maximum number of Special Function Registers (SFRs) is 128, though the actual number on an 8051 family member depends on the number and type of peripheral functions integrated on. The SFRs can only be accessed using the direct addressing mode while the upper 128 bytes of the Internal Data Memory can only be accessed using the Indirect addressing mode. The Bit Memory space is used for storing bit variables and flags. There are specific instructions in the 8051 that operate only in the Bit Memory space. The maximum size of the Bit Memory space is 256-bits. Bits can only be accessed using the bit instructions and the direct addressing mode. 2. 6 Summary The understanding on the elements of the systems involved for this project which are the active infrared, the motion detector, and the house security system is needed before proceed for the design and development process. This is important to ensure the project done according to the main idea of each part discuss in this chapter. CHAPTER 3 METHODOLOGY 3. 1 Introduction There are several steps to be applied in designing an active infrared motion detector for house security system. The relevant information is gathered through literature review from previous chapter. Data on motion detection and security system projects has been collected where the theoretical design is studied based on the motion detector for security concept. The understanding on the electrical structure for the hardware development is needed for the design circuit process of the motion detector and the basic security circuit. The next is the hardware development according to the circuit designed. This process is just only being proceed if each part of the circuit being improved is valid, else, it will be repeated until it is valid as the theoretical. Once the hardware development circuits have the output as the expected, then, the comparison for both hardware and theoretical analysis will be done. Next is the step where software structure is developed for the security system to be interface with the hardware development. While the final step of this research is on applying the whole project to the real house entrance like doors and windows. 3. 2 The concept of motion detector for security system Figure 3. 1 Active infrared motion detectors Figure 3. 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consists of two housings. The first housing contains an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector. The other housing contains an infrared reflector to reflect the infrared signal. When positioned in front of an entrance to a protected area, the two housings establish an invisible beam. Figure 3. 2 The concept of infrared motion detector for security system A person who enters the area will interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the active infrared motion detector. An interruption in the signal modulated pulsating beam transmit by an infrared diode while receive by an infrared detector will set ‘on’ or ‘off’ the alarm of the security system. 3. 3 Hardware development Figure 3. 3 Block diagram for the house security system The hardware development is divided into three stages as shown in block diagram above. The inputs stage of the security system is the motion detector circuit, keypad, and magnetic sensor. The second stage is the controller unit which is the microcontroller Intel 8051. The purpose of using microcontroller is to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzers. 3. 3. 1 Motion detector circuit In designing the infrared motion detector circuit, it is based on two basic principle of active infrared motion detector which is the infrared transmitter and infrared receiver as shown in Figure 3. 4. Figure 3. 4 Basic principle of infrared operation 3. 3. 2 Infrared transmitter For the infrared transmitter which is also known as emitter circuit, it is on a basic design of timer 555 astable operation. The output of timer is connected to the infrared transmitter is used to produce pulse using an astable timer circuit. In astable circuit operation, pulse will continually generated until the power supplied through the circuit is removed. The astable circuit produces a continuous train of pulses at any frequency required. This means that the 555 timer can operate repeatedly; it will switch ‘on’ and ‘off’ continually to generate data for the infrared transmission. . 3. 3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high ‘1’ or low ‘0’ from the output termi nal thus activate or deactivate the controller system operation. The range of infrared detector components according to datasheet stated that the infrared detector can fully operates on detecting the infrared signal of 38 to 45 kHz. . 3. 4 4 ? 4 hexadecimal keypad The purpose of using 4 ? 4 hexadecimal keypad in the project is as an input where secure code entries to activate of deactivate the security system operation. The keypad provides eight interface pins, where one pin for each row and column of the keypad matrix. This 4 ? 4 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the keypad bouncing in the hardware development. 3. 3. 5 Keypad encoder (MM74C922) The MM74C922 key encoders provide all the necessary logic to fully encode an array of 4 ? hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller syst em. Figure 3. 5 Interaction between keypad, keypad encoder, and octal buffer The figure 3. 5 above shows the block diagram on the interaction between the 4 ? 4 hexadecimal keypad, keypad encoder (MM74C922), and the octal buffer (74LS244). The keypad is used as a switch to give logic configuration to the keypad encoder. While the encoder will encode the data configuration from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 3. 3. 6 Octal buffer (74LS244) A buffer is simply a unity-gain amplifier, usually with very high input impedance and very low output impedance. It allows a connection of heavily loaded to another load which requires a lot of current like capacitive load. The octal buffer is used to isolate one device from another by eliminating loading effects. It provides a ‘buffer’ between the two devices. The 74LS244 are octal buffers and line drivers designed to be employed as the memory address drivers, clock drivers, and bus-oriented transmitters/ receivers which provide improvement on the controller board density. 3. 3. 7 Microcontroller circuit (Intel 8051 – expended mode) The controller systems that use to control the motion detector system and other electronic devices are the microcontroller Intel 8051 – expended mode. In expended mode configuration, external ROM and RAM are used to add the data memory to be more than internal memory provided by the Intel manufacturer. The purpose of using an expended mode for the project is to expend more data available on developing and designing an excellent operation of the security system. Figure 3. 6 Intel 8051 block diagram The microcontroller Intel 8051 is a widely used on controlling devices and instruments due to its flexibility, existence of multiple producers. It consists of a simple architecture introduced by Intel in the year of 80’s. It produced with 128 bytes of RAM, 4K bytes of on-chip ROM, 2 timers, one serial port, and 8-bits wide of ports. This type of microcontroller become very popular after Intel allowed another manufacturer to make and market any flavor of the 8051, and still remains compatible with 8051. There are various versions of 8051 with different speeds and amount of the on-chip ROM which is valuable on controlling a system designed. 3. 4 Software development The software structure is using the assembly language where a set of program based on security system is assembled using ASM51 assembler. The 8051 Cross Assembler (ASM51) takes an assembly language source file created with a text editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the Cross Assembler builds a symbol table and labels that used in the source file. While the second pass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose. A security program as shown in flow chart below were written in notepad based on 8051 instruction set before assembling process to get the binary code. This binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 3. 7 is a basic designed for the security system operation. In this security system, the security code is set as ‘1985’ to activate or deactivate security system. When user closed the door, the system will activate where the magnetic switch and infrared is in active condition. To deactivate the system where opening door without alarm, user must enter the deactivation code. The chance to deactivate the system is once before keypad locked, where user can not enter the code anymore. If deactivation code was correct, green LED will ‘on’ while alarm will ‘off’ condition. System at this time is successfully deactivated and user can open the door without alarm. Figure 3. 7 Flow chart of software design for the security system If deactivation code enters was incorrect, system is still activate and for that, red LED and alarm will ‘on’ where the system is in a warning mode. The system will keep in this mode until the correct deactivation code entered. When the correct deactivation codes enter, the reconfirm code is needed where user need to reenter the correct deactivation code before the system successfully deactivate; the green LED will ‘on’ and the alarm will ‘off’ condition. The reconfirm code is designed in the system to make more security for the system developed. If intruder open the magnetic switch without entered the correct security code, thus the alarm will ‘on’. User must enter the correct deactivation code to turn ‘off’ the alarm system. The activation and deactivate code for this system are ‘1985’ and the ‘enter’ button codes are ‘A’ for every codes entered. 3. 5 Summary There are three elements discussed in this chapter which are the concept of motion detector for security system, the hardware development, and the software designed for the security system. Each part of these elements is related to each other. The understanding of the concepts and methods on developing the project is very important to achieve the main objective for the whole project. CHAPTER 4 RESULTS AND DISCUSSIONS 4. 1 Introduction This chapter will briefly discuss on the results and discussions of the hardware development. There are three major modules in developing the hardware structure which are the active infrared motion detector circuit, keypad module circuit, and the most important; the controller circuit 4. 2 Motion detector circuit The hardware development of the active infrared motion detector system is divided into two parts, which are the infrared emitter

Wednesday, March 11, 2020

Manage Stress at University Essays

Manage Stress at University Essays Manage Stress at University Essay Manage Stress at University Essay Stress occurs in human life is frequency because there are many challenge people need to face in daily. Also it is a part of student’s life, when the student study at university, they may face more difficult problem such as more expectation from their parents, financial problems, exam or assignment. There are many definitions about stress, one definition of stress is the body’s reaction from any situation or thought that changes a physical, mental or emotional adjustment or response. (Morrow, 2009) Sometimes appropriate stress is good for student as it pushed them to work better. It means that they can enhance their performance, including in exam. However, stress bring harmful more than beneficial, it can separate to physical and mental to present itself. In this essay, it will talk about the symptoms of stress and strategies of manage stress at university. When student was overwhelmed by stress, it can show by physical. Pain may normal in our life but sometime it is because of stress, even though we may not realize it, such as headache, back pain, chest pain and stomach upset, that is the symptoms of stress. Also, long time living with stress can affect health, it may lead to some disease, for instance heart disease, heart palpitations and high blood pressure. One of the symptoms of stress is sleep problems, it can affect student frequent forgetfulness or decreased productivity at exam, also, long time cannot get enough sleep that can cause decreased immunity. (Mayo Clinic staff,2009) Moreover, stress can bring about mental problem. There are some symptoms is about emotion was affected by stress. When student live under pressure, they may always feel anger and they will arguing with their friends or loves one by little provocation or no reason. Stress also can make student feel lonely or isolated, they may trigger crying jags, sometimes seemingly without warning, even they may cry for little things unrelated to their stress. Furthermore, too much stress to take, it will make student avoid the problems, feel hopeless or simply give up and chronic stress can develop to depression or anxiety disorders. They may think negativity when they can’t cope with stress. As they are automatically expect the worst or magnify the negative aspects of any undesirable situation. (Mayo Clinic staff, 2010) There are many strategies to cope of stress, here will provide two methods to help student cope well with stress. First, when you can’t avoid a stress situation, try to change it that may involve change the way of communicate and operate in the daily life. Student may feel resentment sometimes, some of them will endure it but it is not a good way to deal the stress. When student depressive their emotion in a long term, it may develop to mental illness. The better method is expressing their feelings and finds the best way of communication. If does not to convey the feelings, the discontented situation will likely remain the same. Something we have to be willing to compromise. When we hope others to change the treatment to ourselves, others are expecting the same things. For example, if both sides quarrel over something, they can mutually making a compromise and that can peaceful to solve the problem. Manage time better also can help to reduce pressure, as poor time management can cause time to be disperse and influence to study. Smith, Jaffe-Gill amp; Segal, 2008) Make a daily schedule, from social events to assignments to housework, and selective the quality things to do, it better is effective and don’t forget to set aside time for rest. In addition, some source of stress is unavoidable and unable to change, the best way is learn how to accept. Life has too many things under the control such as death, disease and behaviour of others. Student may focus on something can control by themselves, like reaction of the problem and try to face it positive. There are many challenge is a part of development, perhaps we may fault in the process, try to learn from mistake and improve the defect. Also, share the experience with someone can trust until overcome by stress. Even it does not have any realistic action, at least it can release negative emotion. The world is not perfect, everyone can make a mistake and that is a fact student need to accept, so learn to forgive, life will be easier. Negative mood can cause student make a wrong decision and injury the spirits by themselves, therefore let go of the negative energy that is the best way to go on of life. Smith, Jaffe-Gill amp; Segal, 2008) In conclusion, stress is deeply affecting our life, no one can avoid it. It is affect to physical and mental and it can lead to health problem. Therefore, manage stress is very important. Try to alter the situation and accept the things can’t change, even if something out of our expectation, try to face it be optimistic. Student also can do so me exercise to relax themselves. Although this essay only is written two forms of stress and strategies, students will get these problems normally. Reference list Morrow, A. R. N. 2009, Stress  Definition, viewed June 18, http://dying. bout. com/od/glossary/g/stress. htm Mayo Clinic staff, 2009, Stress symptoms: Effects on your body, feelings and behavior, viewed Feb, 20, mayoclinic. com/health/stress-symptoms/SR00008_D Mayo Clinic staff, 2010, Stress management: Reexamine your stress reactions, viewed July 23, mayoclinic. com/health/stress-management/SR00032 Smith, M. M. A. Jaffe-Gill, E. M. A. amp; Segal, R. M. A. 2008, Stress Management How to Reduce, prevent, and Cope with Stress, viewed December, helpguide. org/mental/stress_management_relief_coping. htm#authors

Sunday, February 23, 2020

Professional statement Personal Example | Topics and Well Written Essays - 250 words

Professional - Personal Statement Example During my third year in nursing school, in 2007, I became a patient care associate at Penn Presbyterian Medical Center on ACE Unit. After graduating from nursing school, I was employed as a Registered Nurse in 2008 on the same unit. I worked hard to become a charge nurse, a preceptor and later attained an ACLS certification on my Unit. I am an active member of the cultural diversity committee and an active member of the ambulation program initiation on my Unit. According to Barker (45), a nurse has to acquire knowledge through continuous learning. I took the Basic Arrhythmia Course, the Medical, Surgical nurse certification review course, and I am a board certified gerontological registered nurse. I have completed 34 credits at graduate level in my Adult Nurse Practitioner program at La sale University. In addition, I completed 250 hours clinical orientation as a NP student at three different sites: Einstein Medical Center, Park pleasant with the ACE Unit attending medical doctor and Philadelphia Prison system. I have worked with UPHS, which values patient safety. Patient safety goals are studies by safety officers within an organization and throughout the world. I plan to suggest to the patient safety committee to make it compulsory that pharmacists evaluate a patient’s

Friday, February 7, 2020

Are the united nations peace operations an appropriate tool for Essay

Are the united nations peace operations an appropriate tool for preventing the abuse of human rights during violent internal conflicts - Essay Example What is the meaning of people who are not combatants? which kind of protection is available in times of civil wars?. To answer these questions, it is wise if one understood why United Nations Peace Operations were put into place. The first step towards this is to understand the term peace operations. As such, it is a broad term in regard to its scope. It covers operations associated with peacekeeping as well as operations designed purposely to enforce peace. Such operations are usually conducted such that they support the efforts of the diplomats aimed towards peace maintenance. To be precise, the term is constituted of; peace building, peacemaking and peace enforcement (Solis 2010). The following discussion thereby, will critical evaluate the role that the law plays in situations of armed conflicts and further, it will illustrate how law gives guidelines on the conducts associated with hostility as well how it mitigates the fatal ends following the armed conflicts. Moreover, it will demonstrate how the law provide protection to civilians not only in international conflicts but also to non-international conflicts. In most cases, the main organization mandated to establish and implement peace operations is the United Nations. In regards to the last six years, the UN peace operations has gone through evolvement and thus lately integrated to the most important and main tool by which the international community uses to manage those crises that can be said to be complex and which pose as a threat to global security as well as peace (Solis 2010). The beginning of the new millennium saw the number of police, military and the civilian recruited in the peace keeping operation of the United Nations across the world adding up to the existing ones to exceptional levels. United Nations is a vital and efficient organization in dealing with the contemporary issues. It deals with issues such as; cease-fires, where they are called upon to monitor; Political

Wednesday, January 29, 2020

Energy drink Essay Example for Free

Energy drink Essay Introduction The marketing mix (tool largely used by marketers) is composed of the tactics being developed by a company in the 4 Ps areas: product, price, place and promotion, to assist them in pursuing their objectives. These variables have to be carefully managed by the organisation to meet the need of the defined target group. In this essay, we are going to focus on the product variable of the marketing mix. Phillip Kotler has defined the product as: anything that can be offered to a market to satisfy a want or need (Philip Kotler, Marketing Management, 2000). The product, but also its name and packaging, have a major impact on the brand positioning. They are fundamental tools in helping the company to induce trial and repeat purchase; they are also invaluable to achieve the desired awareness levels and to form positive attitudes among both customers and perspective customers. Highly profitable and attractive (giving the trend that consumers are increasingly looking for convenient drinks that boost their energy levels), the energy drinks market is highly competitive. A Mintels research (Market Trends category analysis, June 2004, www.PreparedFoods. com), found little brand loyalty among consumers of energy drinks, and a willingness to try a new product if the brand of choice is not available. This suggest the possibility that consumer could be swayed by the appeal of an intriguing package for instance. In this context, we will try to analyse, with the help of the example of the energy drinks, the importance of the naming and packaging tactics employed by the brands to differentiate their offer from the competition (given that the generic attributes of the energy drinks, in terms of composition, are quite similar). 1 Naming and Packaging: marketing mix tools of the product 1. 1 The products levels Philip Kotler, in Principles of Marketing, suggested that a product should be viewed in three levels (a division between five products levels has also been identified by the author but in our case, we are going to keep the simpler scheme of three levels). (source : www. learnmarketing. net/product. htm, 14/09/2004) The core product (level one) represents the core function of the product, a generic attribute that will be identical to all products on a specific market. For example, the main attribute a customer is willing to find when buying an energy drink is a liquid which composition will comprise ingredients that boost his or her energy levels (caffeine, guarana, taurine ) The actual product (level two) involves the brand, the packaging and the possible added features (benefits) that are provided to differentiate the companys product from its competitors. In the case of the energy drinks, if all of them actually provide a liquid that increase energy levels, some of them are sold in cans, other in plastic bottles or in aluminium bottles, using different designs and volumes. The augmented product (level three) is composed of the different additional non-tangible benefits that the company is offering to the customer. This comprises normally added services such as after-sales service, warranties, delivery It is difficult for a company providing energy drinks to differentiate itself from the competition through this kind of attributes. This is why we decided to focus on the second level of the energy beverages, their name and package. (www. learnmarketing.net/product. htm, 14/09/2004) First, what lies behind the concepts of naming and packaging? 1. 2 Naming The naming of the product, service or company is called branding. A brand or name is the label that consumers associate with your product. For this reason, a brand or name should help communicate the products positioning and its inherent drama for the consumer (Roman G. Hiebing Jr and Scott W. Cooper; The successful marketing plan, a disciplined and comprehensive approach; 2003). McCarthy, Perreault and Quester define branding as the use of a name, symbol, design or combination of the three to identify a product and more particularly a brand name as a word, letter, or group of words or letters used to identify a product (Basic Marketing, a managerial approach; 1997). 1. 2. 1 The visual distinctiveness of a brand The name is composed of the title by which the company, product, or service is commonly known and the graphic forms of identification, including symbols, logotypes or signatures, tag lines, and representative characters (Roman G.Hiebing Jr and Scott W. Cooper; The successful marketing plan, a disciplined and comprehensive approach; 2003). Some products, as paper clips, or energy drinks, are poorly differentiated by their physical attributes. One of the marketers tasks will be then to develop the brand in terms of its name and its graphic identity (logo), to communicate its differences. Nowadays, the consumers have an astonishing and increasing array of choice. In parallel, their available time to research products and make purchase decisions is decreasing. The importance of having a distinctive name is critical to securing competitive advantage, even more for the products such as the energy drinks, which core specificities have become insufficient to make a real difference. Consumers must be able to recognize the company in its name, logo, graphics and brands slogan; these must provide means of identifying the product as different from that of the competitors, create a visual and verbal distinctiveness. For example, the name and logo of Ralph Lauren (a polo player) have become high means of recognition for the brand. Coca-cola is one of the best-known names in the world (even the characters type can be identified and recognized by the customer nowadays). Some companies, which offer different product lines, can use manufacturer brands, a name provided specifically for a product or collection of products that is different from the manufacturers one. For example, Powerade is the sport beverage supplied by Coca-Cola. Pepsi-Co sells a sport drink line under the name Gatorade. If the name is the more important element of the brand, one mustnt forget that a brand cant be simply reduced to its name. What is important are the positive associations that are going to be related to the brand in the customers mind (Philip Kotler, Marketing Management, 2000). 1. 2. 2 Selecting the right name A good brand name can help create brand familiarity (really important in the case of energy drinks). In general, good brand names are:  · short and simple (easy to recognize and remember)  · easy to pronounce  · should be able to be pronounced in all languages  · suggestive of product benefits (but not too generic)  · avoid any potentially undesirable connotation or image. (Roman G. Hiebing Jr and Scott W. Cooper; The successful marketing plan, a disciplined and comprehensive approach; 2003). 1. 3 Packaging 1. 3. 1 Definition For manufacturers, packaging holds and protects the product and assists in communicating the products attributes and image. For retailers and service firms, packaging is the inside and outside environment that houses and dispenses the product/services (stores, offices, etc ), and it helps communicate the companys attributes and image (Roman G. Hiebing Jr and Scott W. Cooper; The successful marketing plan, a disciplined and comprehensive approach; 2003). Kotler has defined the packaging as the activities of designing and producing the container for a product (Philip Kotler, Marketing Management, 2000). 1. 3. 2 The functions of packaging Three functions lay behind the concept of packaging: protection, facilitating the product usage and communication. At its basic level, the package serves to protect the product (prevent breakage, exposure to light, exposure to air, spoilage ) and, in some cases, to hold or to contain it. Packaging also plays a role in protecting the consumer as well. Then, the package has a facilitative role in the use of the product (shape, size, fact that it can be resealed ). Finally, the products package represents a strong communication tool, at two levels. First, the package will comprise indications on the brand name, the product category definition, the composition, the flavour, warnings, directions Second, packaging also serves an important role in promotion. Its design, size, shape, materials, colour, text and brand mark should appeal to the target market. For example, yoghurt designated to the women on diet will not have the same package than yoghurt targeting the children. Besides, in todays cluttered environment, where tens of thousands of brands are fighting for the shoppers attention, consumers are making more and more purchase decisions at the point of sale. This is why the package, through graphics and colours that are attractive, plays an important role in getting the product noticed in the selves (to encourage impulse purchase for instance). (Philip Kotler, Marketing Management, 2000; Roman G. Hiebing Jr and Scott W. Cooper; The successful marketing plan, a disciplined and comprehensive approach; 2003). 1. 3. 3 The importance of packaging Packaging is a critical marketing tool. It can make an important difference from the competition by meeting customers needs more effectively. A better box, wrapper, bottle or can may help to emphasize the distinctiveness or novelty of a product or even result in the opening of a new market. It can even improve the product by making it easier or safer to use and then increase its value in the customers mind. Used correctly, the package can then underline the brand image, convey qualities such as freshness, fashion and quality (McCarthy, Perreault Quester; Basic Marketing, a managerial approach; 1997). It is important that the packaging elements align with the rest of the marketing strategy to support it (pricing, advertising and other marketing tools). For example, an expensive perfume would rather be sold in a crystal bottle than in a plastic one, to underline and support the prestigious image (Philip Kotler, Marketing Management, 2000). 2 Packaging and Naming for the energy drink industry 2. 1 Industry overview. As a relatively new style of beverage in Australia (appearing in the mid 90s), energy drinks, sometimes known as smart drinks, were originally designed to give people a boost. Other benefits advertised by these products are improved concentration, endurance, stamina and the ability to help combat fatigue (www. education. theage. com. au/pagedetail. asp? intpageid=69strsection=studentsintsectionid=0, 29/09/2004). Lifestyles are moving faster. People seem to have become time poor and tend to work harder and play harder. These drinks are for those who need to pack more hours into their day. (Glenn Martin, general manager, Frucor Beverages, The Age, May 2, 2001). Typically including a high caffeine level as well as vitamins, amino acids and herbal extracts, they usually sell for about $2 $3. 5 for 250 ml, making them a relatively expensive soft-drink alternative. (www. education. theage. com. au/pagedetail. asp? intpageid=69strsection=studentsintsectionid=0, 27/09/2004). Initially popular in nightclubs and hotels, the energy drink market has been booming during the past few years in Australia, and these beverages are now widely available in supermarkets and convenience stores. Although this market is somewhat new in Australia, it is the fastest growing area of the soft-drink market. (www. education. theage. com. au/pagedetail. asp? intpageid=69strsection=studentsintsectionid=0, 27/09/2004). 2. 1. 1 Leading brands on the Australian market In 2002, the energy drink sales were dominated by four brands in Australia: Frucor Beverages Limiteds V (remaining by far the most significant player with 35% volume share), Red Bull Australias Red Bull, Coca-Cola Amatils Lift Plus and the Red Eye Companys Red Eye. With a clever marketing and promotional tactics, V managed to cope with the growing competition and to increase its market share between 2000 and 2002, targeting at teenagers and young adults through the sponsoring of youth oriented events and advertising during youth programming (Euromonitor International, Soft Drinks in Australia, August 2004). However, in the latter part of this same period, the best growth was performed by Coca-Cola Amatils Lift Plus, which volume share increased from 5% in 2000 to 14% in 2002, to the detriment of the Red Eye brand which lost market share by the same amount. Red Bull signed, in 2003, a distribution deal with Cadbury Schweppes to solve its volume share decline over the recent years by accessing the groups strong sale network. (Euromonitor International, Soft Drinks in Australia, August 2004). Considering the huge number of small brands existing today on the energy drink market, we decided to illustrate our study using exclusively the example of these 4 leaders. 2. 1. 2 Target market of the energy drinks The potential customers initially consisted in 90% of young and trendy people (club scene, extreme sports), nocturnal revellers, trendsetters and clubbers. Nowadays, the group of customers has evolved and includes:  · long distance drivers, especially people who work during the night or even employees working out of the office and rushing from appointment to appointment who have come to appreciate Energy Drinks as a good way to wake them up,  · top-level as well as free time sportsmen like snowboarders, mountain bikers, free climbers and downhill racers but also people going to the gym or participating in a triathlon, · pupils or students under stress who use the energy drinks as a new substitute of coffee. Users of Energy Drinks buy/drink them to be mentally and physically top fit and wide awake. They are dynamic, health conscious, achievement-orientated and active, in their jobs as well as in their spare time. Most of them are young but there is an increased interest in these products coming from an older age group of the population. (www. fortunecity. com/tinpan/clapton/843/energydrinks. html#eda, 29/09/2004). 2. 2 Packaging issues and trends on the energy beverage market Due to its growing competitive context, the energy drinks sector saw packaging used as an essential element in establishing brand identity. Consequently, the emergence of plastic bottles was far less pronounced in this sector than in any other soft-drinks sector. 2. 2. 1 Capacity and materials When Red Bull entered the Australian market in 1999, the company employed its trademark slim can and made it an immediate sign of recognition for the energy drink product. The brand wanted to use this as a point of differentiation to help consumers distinguish these highly caffeinated drinks from their carbonate counterparts, and competitors such as Lift Plus, V and Black Stallion followed this example to benefit from the association consumer would make between 250ml can and the type of product (Spark Gale, Sports and energy drink market expanding faster than other soft drinks, Food Drink Weekly, February 23, 2004). This can size not only differentiate the product from the usual soft drink but also, according to the manufacturers, encourages only moderate consumption at any one time, because of the high caffeine content. Indeed, the energy drinks market has suffered from claims that excessive consumption of caffeine can cause a rise in blood pressure and can trigger events such as heart problems and strokes in some people (Euromonitor International, Global Packaging: Key Trends, www. euromonitor. com. library. vu. edu. au/gmid/default.asp, 20/09/2004) The initial choice of many energy drinks producers for the can packaging has also been determined according to the purpose of the beverage and the needs of its target market. Indeed, the design of the package and its material had to answer the requirements of people responding to the growing trend for eating and drinking on-the-move, had to offer at the same time convenience, solidity, to be light-weighted, easy to handle (the 250 mL format appears more convenient than the usual 330 mL size). Single-serve products also allow busy consumers, to drink in the car, office and in school, which happened to be essential to appeal to a broaden target market as it is now (Marsha Barancik, Bottle cans have magnetic attraction, Beverage Industry, March 2003). In fact, when the product entered the market, it was sold in major part in bars, pubs and nightclubs and convenience stores, but as brand like V and Red Bull started to gain distinctive brand identities the started to sell through supermarkets. In this context the 250mL aluminium can presented another advantage since it was an easy shape to offer in multipack that could fit in shelves optimally, and appealed to consumers because of the lower unit prices offered and the ease of transport to their homes (Euromonitor International, Soft Drinks in Australia, August 2004). However, the need for differentiating from competitors and for acquiring a strong brand equity, related to number entry the industry saw these last year, pushed the company to innovate, creating packagings that would differ from the overused 250 mL aluminium can. This need happened to strengthen with the addition of supermarket as a channel of distribution: the number of product and beverages that competed with the brand on the purchase decisional process was suddenly more diverse. To that extent, Red Eye used glass packaging as a strategy (that happened to be successful), to build brand loyalty among its consumers and to break with the expected can packaging offered by competitors. Since then, Lift Plus and V also offered a glass format to differentiate themselves from other canned energy drink brands (Global Packaging: Key Trends, www. euromonitor. com. library. vu. edu. au/gmid/default. asp, 20/09/2004). 2. 2. 2 Graphics and scripts Packaging in the energy drinks also feature distinctive graphics and script. Each brand will attend to convey a differentiated image using specific colours and visual affect known for being associated by the consumer to positive attributes. In 1988, McGraw Hill studied the feelings and the images conveyed by colour in order to show the importance of the packaging in the purchase decision process. As a result, he found out that consumer unconsciously were making the following association:  · Black: formality and elegance.  · White: Crispness  · Violet: tenderness  · Red: revolution, excitement, fire, energy, stanfurd.  · Blue: night, sadness, coolness, tranquillity  · Yellow: happy, warm, optimism  · Aluminium: high-energy voltage (http://www. alumni. berkeley. edu/Students/Group_Resource_Guide/Marketing_Tips_for_CAA_Student_Leaders. asp, 7/10/2004). Looking at each brands packaging, we can see that, according to this theory, different feelings are meant to be evocated by each brand. Except for Lift Plus, that is more oriented towards young people and students/children market, the aluminium colour is present on each packaging. The blue of the Red Bull can immediately reminds the customer with the clubbing and the nightlife while the red letter stands for energy and excitement. The yellow can of Lift Plus gives a joyful and playful image to the beverage and makes it a drink to be consumed during the day rather than in nightclub as a mixed drink (like its competitor Red Eye, Red Bull, or V). We can notice also the use of black in the two other packages, that gives a classy and distinctive image to the beverage, allowing them to stand in bar and clubs shelves. 2. 3 Naming issues on the energy drinks market In general, even if branding is one of the most important steps in the marketing plan of a product (a good name provides a strong mean of distinctiveness for the brand), there is not much secondary information available on the naming strategy adopted by the companies. Concerning the energy drinks industry, we are going to focus on the major brands present on the Australian market: V, Lift Plus, Red Eye and Red Bull. V is a typical example of a simple and memorable brand name that quickly identifies the product with an idea of vibrant, velocity, vitality, vigour Above all, V is the widely known abbreviation for volt, positioning the product as a high energy provider (www. frucor. com/brands/aus/new_age. html, 03/10/2004). The name Lift Plus explicitly suggests the benefits of the drink that, according to its producer Coca-Cola Amantil, as been designed for people who work and play hard and need a boost to help them make the most of their waking hours. It is also named after the well-known beverage Lift, to inform the consumer on the common point between the two beverages: both have citrus-based flavour (http://www. cokebuddy. com.au/about_brands. asp, 03/10/2004). Red Bull has been the first energy drink to enter the global market, the name of the product reflects well its attributes and benefits (the bull is a powerful animal, it represents the high level of energy the consumer is going to get by drinking this product). But this brand name has also been subject to a lot of controversy (that has finally benefited the brand by creating some promotion around it) related to the fact that the word Bull created a direct association in the public mind with one of the ingredient included in the formula: the Taurine. However, despite whatever conclusions one might draw from the name, Red Bull contains no substances of animal origin; even the taurine used in the formulation is synthetically produced (www. snopes. com/toxins/redbull. htm, 03/10/2004). Again, as for its competitor Red Eye, the code of colour (Red) is used as a way to suggest the energy and improvement of physical performance provided by the consumption of the beverage. Red Eye, as a following entrant in the energy drink market (after Red Bull), has used the notoriety of the Red Bull name as part of its naming strategy (the two brand names are quite similar). The term eye reflects the personality of the product, putting the stress on the ability of the product to provide its consumer with an improved ability to concentrate, an increased alertness and an enhanced reaction time (www. red-eye. com. au/classic. html, 03/10/2004). (Roman G. Hiebing Jr. and Scott W. Cooper, The successful marketing plan, McGraw-Hill, 2003). Conclusion Naming and packaging are critical marketing tools for the company; they assist its brand differentiation in the customers mind and product identification in the shelves of the store. Even if these two elements are even more important for products as energy drinks, that have quite generic core attributes (their composition is almost similar) and that cannot differentiate their offer using the augmented level of the product, we discovered through our research that a brand mustnt limit its marketing mix tactic to its product features (naming and packaging). The three other Ps areas (Price, Place, and Promotion) are critical tools to strengthen the differentiation of its offer. The leading brands demonstrate it by supporting their product with heavy advertising campaigns and diverse promotional actions, as they proved to be essential to ensure their brand equity (sponsoring, sample distribution, co-branding, commercials, ads in various medias ). The study of the energy drinks market also showed us how the strategies linked to the issues of naming and packaging can evolve as the industry changes. Indeed, we discovered how these two aspects of the actual product could be used as way to assimilate the brand to a particular type of product, as well as a differentiation feature. In fact, the energy drinks market demonstrated us that the maturity of the industry influences greatly the challenges implied by the choice of a name or a package. Indeed, all the companies which launched their energy drink at the introduction of the product in the soft drink industry, chose to follow the first entrant (Red Bull) on its package choice, in order to clearly indicate to the customer the kind of product provided. As the industry matured, and the competition increased, offering a packaging that actually differentiated the brand seemed to be the only way to gain customer loyalty and to survive in this mature market. Sources : Literature:  · Philip Kotler, Marketing Management, 2000  · Roman G. Hiebing Jr and Scott W. Cooper; The successful marketing plan, a disciplined and comprehensive approach; 2003  · McCarthy, Perreault Quester; Basic Marketing, a managerial approach; 1997 Websites:  · Market Trends category analysis, June 2004, www.PreparedFoods. com  · www. learnmarketing. net/product. htm  · www. education. theage. com. au/pagedetail. asp? intpageid=69strsection=studentsintsectionid=0  · www. fortunecity. com/tinpan/clapton/843/energydrinks. html#eda  · Euromonitor International, Soft Drinks in Australia, August 2004, www. euromonitor. com. library. vu. edu. au/gmid/default. asp  · Euromonitor International Global Packaging: Key Trends, August 2004, www. euromonitor. com. library. vu. edu. au/gmid/default. asp  · www. alumni. berkeley.edu/Students/Group_Resource_Guide/Marketing_Tips_for_CAA_Student_Leaders. asp  · www. frucor. com/brands/aus/new_age. html  · www. cokebuddy. com. au/about_brands. asp  · www. snopes. com/toxins/redbull. htm  · www. red-eye. com. au/classic. html Articles :  · Glenn Martin, general manager, Frucor Beverages, The Age, May 2, 2001  · Spark Gale, Sports and energy drink market expanding faster than other soft drinks, Food Drink Weekly, February 23, 2004  · Marsha Barancik, Bottle cans have magnetic attraction, Beverage Industry, March 2003.