Saturday, November 9, 2019

Non-Intervention

The doctrine or Principal of Non-Interference and humanitarian intervention and their legitimacy/illegitimacy in international law of human rights has long been a subject of debate and has captured a lot of attention. The critical issue in any debate on humanitarian intervention is the need to balance intervention with the principle of sovereignty, which in essence requires that a sovereign state be treated as an independent political unit, its territorial integrity be respected, and it be allowed to pursue its domestic affairs without external interference. Indeed, the issue is a conflict between the ban on the use of force and respect for sovereignty on the one hand, and the duty to uphold and promote human rights on the other. (Negeri, 2011)Should the emphasis be on preventing the use of force between states and maintaining stable relations between them or does the protection of citizens' fundamental rights deserve priority? The relationship between these two interests is complicated and need more attention and effort to do research and examine the topic itself. This paper will address the tension between state sovereignty and humanitarian intervention. Both form an essential part of the international order based on the UN charter and both are of great importance.State sovereignty and Non-intervention in the internal affairs of other states One of the fundamental principles of a state or nation which acts as will to drives its affairs forward and gives some form of control over its domestic or territorial affairs is principle of state sovereignty. It is the foundation of inter-state relations and the basis of the modern world order. Most of the basic standards, rules and practices of international relations have grounded on the premise of state sovereignty. The original meaning of sovereignty is related to the idea of supremacy. According to Wikipedia, Sovereignty is the full right and power of a governing body over itself, without any interference from outside sources or bodies. In political theory, sovereignty is a substantive term designating supreme authority over some polity. (Wikipedia contributors, 2018)

Thursday, November 7, 2019

Are Computers an Essential Feature of Modern Education Essay Example

Are Computers an Essential Feature of Modern Education Essay Example Are Computers an Essential Feature of Modern Education Essay Are Computers an Essential Feature of Modern Education Essay Essay Topic: Education With the dawn of the computer era, all aspects of the society have become influenced by technology, including education. A large number of students use computers to work on. Even though it makes our work easier, it can turn out to be a huge distraction due to things like games, social networking sites, watching movies, etc. For example, in my school, students from grade 6 have their own laptops and during the breaks or even after school on the train platforms you will find them playing games on their laptops. I think computers are not really essential for modern education. What is important, is that we know our basics. If we have a strong foundation, we could be better off in the future. Even though jobs today are largely dependent on technology, we can learn how to use computers later on in life or alongside any other work. There are various subjects that can be taught using technology such as computer graphics, programming like C++ and Visual Basic, history (by showing videos), etc. For drama, computers can be used as well to show videos of famous actors in the past. Subjects such as chemistry, biology, art and music are better taught without a computer because these are practical subjects. In conclusion, computers could be used in education but it should be kept to a minimum. If a child gets addicted to computers from a young age, their basics in subjects like maths, for example might not be strong due to the use of calculators.

Monday, November 4, 2019

Modern Chinese Fashion Research Paper Example | Topics and Well Written Essays - 1000 words

Modern Chinese Fashion - Research Paper Example The paper "Modern Chinese Fashion" focuses on modern Chinese fashion and is basically meant to discuss the changing fashion patterns seen at festivals and traditions, how traditional and festive Chinese clothing differ from each other, mainstream Chinese fashion designers, popular dress trends, and how wealth produces influence on the type of clothes worn by the Chinese people. Integrating the creative and priceless knowledge gained from places which are considered to be centers of fashion like New York, Paris, and Milan in the native system to create modern clothes sensitively customized to the culture of China is not an easy challenge to fulfill. Chinese fashion designers are astute and sensitive enough to acknowledge the changing economical trends in the country and design their clothes while keeping the national economical state of the country in their minds so that everyone would be able to wear stylish clothes irrespective of class difference. Basic Chinese fashion elements der ive from the Tang and Song dynasties and Shiatzy Chen is one such fashion label in China run by Wang Chen which relies heavily on materials such as silk and satin. In words of Chen, â€Å"I wanted to create something that reflects Chinese culture, yet manages to achieve global recognition; a brand that would make China proud†. Class difference, though not as pronounced now as it was previously in Chinese clothing, also presents challenges for Chinese fashion designers on some levels. In the past, these elements of class difference.... Distinction made by clothes between rich and poor was undeniably so obvious in the ancient China as compared to the modern China that no one could possibly remain oblivious to it. The wealthy members of the society were identified by the richness reflecting from their royal clothes which were almost always made out of silk, while the middle class and poor people relied on wearing very simple clothes made out of cotton. But irrespective of past and modern times, silk has throughout served as a resolute status symbol in the Chinese society and has always remained the material of choice to be worn for the rich and elite Chinese people in traditional terms. It is also the general consensus among the Chinese people, fashion designers, and critics that silk has a wide range of application in both festive and ordinary clothing. From being integrated in women’s blouses and scarves to men’s dress shirts and ties, silk is recognized as the material of choice for the fashion desig ners too who design clothes in accordance with common public’s demands and tastes. The modern Chinese fashion wear largely refines the more conventional clothing approach as seen in old Chinese pictures and present day popular trends can also be considered as a major reflection of orthodox dressing trends. In the ancient days during the Tang and Song dynasties, fabrics popular in China were gauze, damask, crepe, and brocade (Csanyi). Women wore loose robes with long sleeves and used decorative cloth on the lower hems (Hua 16). Incorporation of classic Chinese symbols in the clothing is vividly apparent in the ancient Chinese clothing culture. To the present day clothing culture, symbolism still serves as one of the primarily important elements considered by the fashion designers while designing

Saturday, November 2, 2019

Cold war Essay Example | Topics and Well Written Essays - 250 words - 2

Cold war - Essay Example is of cold war and it led to worsening of economy in Europe and decline of Soviet Union, cutting of military spending, spending millions by the US, and depression among others (Taylor 78). McCarthyism is the political practice employed to create distrust and disloyalty about the communists without having any real tangible evidence leading to accusations (Taylor 127). People lost their jobs because of teaching about communism, education taught negatively about communism, freedom of speech of the communists was curtailed as well as producing movies portraying negatively about communism. Relationship between nations continued to chill. The cold war spread to other nations such as Berlin, Korea and Vietnam which were divided into two one controlled by US and the other by Russia leading to internal war and a nations destroying its own people a war initiated by the two super powers. The aftermath of the cold war was the destruction of Vietnam, separation of Korea and the war between the North and South as well as tearing of the Berlin

Thursday, October 31, 2019

Inbound Logistics Essay Example | Topics and Well Written Essays - 1000 words

Inbound Logistics - Essay Example The reason for this is fairly intuitive; if a manufacturer is to produce goods and material for distribution, it must receive the raw materials and other products necessary for production and distribution. Accordingly, the management of inbound products is central to the organizational goals in two obvious ways: First, the procurement of the materials and, second, the potential cost savings afforded by an efficient inbound supply chain system. As the next section of this paper specifically focuses on the ramifications of failing to procure materials for the manufacturing or distribution process, a word about costs is appropriate here. As cited in the case study, "the ultimate aim to achieve total control over inbound shipments would allow the retailer to eke out cost advantages from the supply chain" (Chatur 5). Several aspects of increasing efficiency within the inbound logistics side of SCM are discussed, one of which is the use of a third party logistics company, or 3PL, to manage that part of the supply chain. In fact, the idea of a collaborative environment within a large supply chain is a very popular notion. "Logistics alliances - formal or informal relationships between companies and logistics providers - are rapidly emerging...[where companies focus on their core competencies and outsource other activities" to companies that are more cost effective (Laarhoven, et al. 188). Thus, managing inbound logistics is important enough to companies that they are willing to outsource the entire process in order to save money. Q2: What is the relationship between operations and purchasing, and how does it ideally affect the management of inbound logistics Operations is the process whereby a manufacturer makes its product, but purchasing and procurement are what allow operations to do its job. Accordingly, the relationship is a dependent one where, if purchasing doesn't do its job well, operations can be shut down. Naturally, if procurement is not efficient and unnecessarily cost intensive, the entire company is threatened. The cost efficiencies related to inbound logistics, however, are not as potentially devastating as the failure of purchasing to ensure an adequate supply of material for the process. Consider the fact that if procurement doesn't perform, some manufacturers would have to stop operations until the supplies were received. This can be far more expensive than carrying a little too much inventory. As the case study points out, "...the shutdown of large petrochemical plants may cost as much as $500K to $1M daily - far more than the cost of extra hopper cars used to store product" (Chatur 4). Herein lies the dilemma for inbound logistics; balancing the need to have enough material without having too much material and the need to always have material. In terms of its effects on managing inbound logistics, the impact is clear. Many organizations use just-in-time (JIT) inventory techniques to avoid overstock and the cost of carrying too much inventory. This technique is more expensive than traditional methods due to a higher shipping cost structure, but

Tuesday, October 29, 2019

Personal relationships Essay Example for Free

Personal relationships Essay As human beings we all have similar interests however, Rosenbaum (1986b) proposed a repulsion interpretation for this well –established relationship. According to Rosenbaum, attitude similarity does not lead to liking, but attitude dis-similarity does indeed lead to repulsion. Attraction toward a person described by the individual’s personality alone differs when paired with a photograph or political affiliation. With the popularity of social networking and the internet it might be useful to research the subjects of physical attractiveness and similarity when the intimacy factor is absent. Although 94% of internet daters deny that their profile contains any fibs (Gibbs et al,. 2006), psychologists Toma et al. (2008) decided to measure the heights and weights of 80 internet daters, as well as checking their driving licences for real age. When this data was checked against their profiles, it was found at least nine out of ten had lied on at least one of the attributes measured. The most frequent anomaly was in regards to weight. Women tended to shave pounds off, while men gave themselves a boost in height. Even though the vast majority fibbed on their profile it was only by a small amount as most people want to meet up eventually. Toma and Hancock (2010) took photographs of the internet daters and compared them to their online profile pictures. Although less physically attractive people were the most likely to choose a self-enhancing photo, overall the differences were minimal towards the lab photo. Scholars say a certain amount of fibbing is socially even necessary to compete in the online dating world. By boosting one’s attributes, they can increase their chances of a relationship developing in the future. So this would point to the fact that we value goods looks not just in other people but also in ourselves. Opposites attract, well this is not the case when it comes to internet dating. Fiore and Donarth (2005) examined data from 65,000 online daters, the found that people were choosing based on similarities to themselves. That includes ethnicity and religion. Of all the data analysed 80% of the contacts initiated by white members were to other white members, and only 3% were made to black members. Online dating agencies have taken advantage of this fact by setting up dating websites to caterer to this for example JustChristian. com, or Afrointrodution. com. Although researching internet dating is a good way of examining interpersonal relationships, there is only limited data on how well it works. Most of the research is based on heterosexual daters therefore ignores the comparison with homosexual daters. Most people think of it in consumerist terms (Heino et al, . 2010) users are â€Å"Relation shopping†, looking at other people’s features weighing them up, then choosing potential partners, as though from a catalogue, its human relationships reduced to check boxes. Social psychological studies have not so much influenced our opinion on interpersonal attraction, but reinforced the reasons why we find people attractive for example; physical attraction, proximity, familiarity or reciprocal liking. Most of the research is potentially artificial focusing on forced social settings or attitude surveys. It can ignore ecological or cultural relationship criteria. What is prevalent though is the need to form relationships with other people maybe for romantic reasons or friendship. References 1. : Walster et al. 1966. (N/A). Matching hypothesis. Available http://en.wikipedia.org/wiki/matching_hypothesis. Last accessed 28th Jan 2012. 2. Duck S. (1995). Repelling the study of attraction. The Psychologist, N/A (8), 60-63. 3. http://www.prenhall.com/divisions/hss/app/amberdigital/aronson/content/10.pdf. (accessed on 28/01/2013) 4. Arthur Aron, Jodie L Steele, Todd b Kashdan, Max Perez (2006)When similars do not attract: Test of a prediction from the self- expansion model, personal relationships 13, 387-39 5. P H Aronson Interpersonal attraction from first impressions to close relationships chapter 10 http://www.prenhall.com/divisions/hss/app/amberdigital/aronson/content/10.pdf 6. http://www.nytimes.com/2011/11/13/fashion/online-dating-as-scientific-research.html?pagewanted=all_r=0 7. http://www.spring.org.uk/2010/09/online-dating-10-psychological-insights.php

Sunday, October 27, 2019

Low-Power Folded Tree Architecture for DSP Applications

Low-Power Folded Tree Architecture for DSP Applications Low-Power Folded Tree Architecture for DSP applications Abstract— Wireless communication exhibits the highest energy consumption in wireless sensor network (WSN) nodes. Due to their limited energy supply from batteries, the low power design have become inevitable part of today’s wireless devices. Power has become a burning issue in VLSI design. In modern integrated circuits, the power consumed by clocking gradually takes a dominant part. Reducing the power consumption not only enhance battery life but also avoid overheating problem. By employing a more appropriate Processing Element (PE), the power consumption is significantly reduced. In this paper the novel method for low power design is achieved by using Folded Tree Architecture (FTA) and high speed adder design for on-the-node data processing in wireless sensor networks using Parallel Prefix Operations (PPO) and data locality in hardware. Besides power reduction the objective of minimizing area and delay is also considered. Index Terms— Folded Tree Architecture (FTA), Parallel Prefix Operation (PPO), Processing Element (PE), Wireless Sensor Network (WSN). INTRODUCTION Power optimization is always one of the most important design objectives in modern nanometer integrated circuit design. Especially for wireless sensor networks (WSNs), power optimization have become inevitable part in today VLSI design. Power optimization not only can enhance battery life but also reduce the overheating problem. Self-configuring wireless sensor networks can be invaluable in many civil and military applications for collecting, processing, and disseminating wide ranges of complex environmental data. Because of this, they have attracted considerable research attention in last years. Sensor nodes are battery driven and hence operate on an extremely frugal energy budget. Further, they must have a lifetime on the order of months to years. Since battery replacement is not an option for networks with thousands of physically embedded nodes. In some cases, these networks may be required to operate solely on energy scavenged from the environment through seismic, photovoltaic or thermal conversion. This transforms energy consumption into the most important factor that determines sensor node lifetime. The another important application in wireless sensor networks is event tracking, which has widespread use in applications such as security surveillance and wildlife habitat monitoring. Tracking involves a significant amount of collaboration between individual sensors to perform complex signal processing algorithms such as kalman filtering, Bayesian data fusion and coherent beamforming. This applications will require more energy for their processing. In general Wireless Sensor Networks (WSNs) can operate in four distinct mode of operation: Transmit, Receive, Idle and Sleep. An important observation in the case of most radios is that operating in Idle mode results in significantly high power consumption, almost equal to the power consumed in the Receive mode. The data-driven nature of WSN applications requires a specific low power data processing approach. By employing more appropriate Processing Element (PE), the power consumption in all the four mode of operation will be reduced significantly. In present VLSI technology, reducing power consumption is an important issue. Especially for WSN, due to their limited battery lifetime the low power VLSI design is become inevitable for wireless commmunication. The goal of this paper is to design an low-energy Folded Tree and Multi-Bit Flip-Flop Merging technique for WSN nodes. II. RELATED WORKS In paper [2], the author proposed low-energy data processing architecture for WSN nodes using folded tree method. This paper identifies that many WSN applications employ algorithms which can be solved by using parallel prefix-sums. Therefore, an alternative architecture is proposed to calculated them energy-efficiently. It consists of several parallel Processing Elements (PEs) structured as a folded tree. The folded tree method with parallel prefix operations reduces the number of processing element and memory bottleneck. Due to clock distribution for more flip-flops, it consumes more clock power and also parallel prefix operations has high delay. In paper [3], a novel method is proposed for low clock power consumption in WSN nodes. A previously derived clock energy model is briefly reviewed while a comprehensive framework for the estimation of system wide (chip level) and clock sub-system power as function of technology scaling is presented. This framework is used to study and quantify the impact that various intensifying concerns associated with scaling will have on clock energy and their relative impact on the overall system energy. This technology scaling method reduces power clock power consumption (both static and dynamic), but due to large number of processing element- area, inverter chain, Power-Delay Product is increased. III. PROPOSED SCHEME Folded Tree Architecture with Parallel Prefix Operation is used to reduce the total number of Processing Elements (PEs) in the VLSI design. By reducing the number of processing elements, the total area is reduced. Area is proportional to power, so power consumption is also reduced. During processing and transmission of signals, the WSN nodes will consume more power. Especially for clock distribution nearly 70% power will be consumed. In order to optimize the power during clock distribution, multi-bit flip-flop merging technique is used. A. Folded Tree Architecture A straightforward binary tree implementation of Blelloch’s approach costs a significant amount of area as n inputs require p = n − 1 PEs. To reduce area and power, pipelining can be traded for throughput. With a classic binary tree, as soon as a layer of PEs finishes processing, the results are passed on and new calculations can already recommence independently [8]. Fig 1. Binary tree equivalent to folded tree The idea presented here is to fold the tree back onto itself to maximally reuse the PEs. In doing so, p becomes proportional to n/2 and the area is cut in half. Area is proportional to power, so power is also cut in half. Note that also the interconnect is reduced. This folded tree topology is depicted in Fig. 1, which is functionally equivalent to the binary tree on the left. By using the Folded Tree architecture power consumption, area and wirelength is reduced considerably. Folded Tree Architecture (FTA) for on-the-node data processing in wireless sensor networks, using parallel preà ¯Ã‚ ¬Ã‚ x operations and data locality in hardware reduces both area and power consumption. TABLE I LEAKAGE POWER AND DYNAMIC ENERGY FOR ONE PE UNDER NORMAL CONDITIONS FTA is designed to reuse the PE nodes to reduces half of the total area. It limiting the data set by preprocessing with parallel preà ¯Ã‚ ¬Ã‚ x operations. The combination of data à ¯Ã‚ ¬Ã¢â‚¬Å¡ow and control à ¯Ã‚ ¬Ã¢â‚¬Å¡ow elements to introduce a local distributed memory, which removes the memory bottleneck while retaining sufà ¯Ã‚ ¬Ã‚ cient à ¯Ã‚ ¬Ã¢â‚¬Å¡exibility. Several processing element consumes more power, so by using FTA the PE can be reused and power is reduced. Fig 2. Folding Architecture In folding architecture, we can reuse the PEs with the help of counter and FSM. Iteration count in the counter contains the total number of times the specified PE going to be reused. The FSM enables and reset the iteration count based on the instructions. B. Parallel prefix adder. Adders are also very important component in digital systems because of their extensive use in other basic digital operations such as subtraction, multiplication and division. Hence, improving performance of the digital adder would greatly advance the execution of binary operations inside a circuit compromised of such blocks. The performance of a digital circuit block is gauged by analyzing its power dissipation, layout area and its operating speed. The main idea behind parallel prefix addition is an attempt to generate all incoming carries in parallel and avoid waiting until the correct carry propagates from the stage of the adder where it has been generated.Parallel prefix adders are constructed out of fundamental carry operators denoted by  ¢ as follows (G, P)  ¢ (G, P) = (G+G ·P, P ·P) where P and P indicate the propagations, G and G indicate the generations. The fundamental carry operator is represented as Figure Fig 3. Carry operator   Ã‚   A parallel prefix adder can be represented as a parallel prefix graph consisting of carry operator nodes. The parallel prefix Ladner Fischer adder structure has minimum logic depth, but has large fan-out requirement up to n/2. Ladner Fischer adder has less number of delay compared to other parallel prefix adders. Power Delay Product should be less inorder to achieve high throughput and speed. Fig 4. Ladner Fischer Parallel Prefix Adder The Ladner Fischer adder construct a circuit that computes the prefix sums in the circuit, each node performs an addition of two numbers. With their construction, one can choose a tradeoff between the circuit depth and the number of nodes. V CONCLUSION This paper presented the Folded Tree Architecture and Multi-Bit Flip-Flop Merging technique for WSN applications. The design describes many data processing algorithms for WSN applications along with parallel prefix operations and clock distribution networks. Power is saved using flip flop merging technique by providing single clock signal to mergeable flip flops with the help of combinational lookup table. Thus this technique can be effectively used for clock distribution in integrated circuits requiring low power consumption in clock distribution network and low skew clocks. Area is reduced using folded tree architecture by reusing processing element. Ladner Fischer parallel prefix adder reduces the delay constraints and achieve high throughput. The proposed architecture significantly reduces both power and area in WSN nodes, can save up to half of the power in total sensor node. REFERENCES V. Raghunathan, C. Schurgers, S. Park, and M. B. Srivastava, â€Å"Energy-aware wireless microsensor networks,† IEEE Signal Process.Mag., vol. 19, no. 2, pp. 40–50, Mar. 2002. C. Walravens and W. Dehaene, â€Å"Design of a low-energy data processing architecture for wsn nodes,† in Proc. Design, Automat. Test Eur. Conf. Exhibit., Mar. 2012, pp. 570–573. D. Duarte, V. Narayanan, and M. J. Irwin, â€Å"Impact of technology scaling in the clock power,† in Proc. IEEE VLSI Comput. Soc. Annu. Symp.,Pittsburgh, PA, Apr. 2002, pp. 52–57. H. Kawagachi and T. Sakurai, â€Å"A reduced clock-swing flip-flop (RCSFF)for 63% clock power reduction,† in VLSI Circuits Dig. Tech. Papers Symp., Jun. 1997, pp. 97–98. Y. Cheon, P.-H. Ho, A. B. Kahng, S. Reda, and Q. Wang, â€Å"Power- aware placement,† in Proc. Design Autom. Conf., Jun. 2005, pp. 795–800. Y.-T. Chang, C.-C. Hsu, P.-H. Lin, Y.-W. Tsai, and S.-F. Chen, â€Å"Post-placement power optimization with multi-bit flip-flops,† in Proc.IEEE/ACM Comput.-Aided Design Int. Conf., San Jose, CA, Nov. 2010,pp. 218–223. P. Sanders and J. Traff, â€Å"Parallel prefix (scan) algorithms for MPI,† in proc, Recent ADV. Parallel Virtual Mach Message Pass, Interf., 2006, pp.49-57. G. Blelloch, â€Å"Scans as primitive parallel operations,† IEEE Trans. Comput.,Vol.38, no 11, pp. 1526-1538, Nov. 1989. D. B. Hoang, N. Kamyabpour â€Å"An Energy Driven Architecture for Wireless Sensor Networks† International Conference on parallel and Distributed computing Applications and technologies., Dec 2012. Nazhandali, M. Minuth, and T. Austin, â€Å"SensBench:Toward an accurate evaluation of sensor network processors,†in Proc. IEEE Workload Characterizat. Symp., Oct. 2005. M. Hempstead, D. Brooks, and G. Wei,† An accelerator-based wireless sensor network processor in 130 nm cmos,† J, Emerg. Select. Topics Circuits Syst., vol. 1, no. 2, pp. 193-202, 2011. B. A. Warneke and K. S. J. Pister, â€Å"An ultra-low energy micro- controller for smart dust wireless sensor networks,† in Proc. IEEE Int.Solid-state circuits conf. Dig. Tech. Papers. Feb. 2004, pp. 316-317. M. Hempstead, M. Welsh, and D.Brooks,†Tinybench: The case for a standardized benchmark suite for TinyOS based wireless sensor network devices,† in Proc. IEEE 29th Local comout. Netw, conf., Nov.2004, pp. 585-586. O. Girard. (2010). â€Å"OpenMSP430 processor core, available at opencores.org,† [online]. Available: http://opencores.org/project, openmsp430. H. Stone, â€Å"Parallel processing with the perfect shuffle,† IEEE Trans. Comput., vol. 100, no.2, pp. 153-161, Feb. 1971. M. Hempstead, J. M. Lyons, D. Brooks, and G-Y. Wei,† Survey of hardware systems for wireless sensor networks,† J. Low Power Electron., vol.4, no. 1, pp. 11-29, 2008. C.C. Yu. Design of low-power double edge-triggered flip-flop circuit. In IEEE Conference on Industrial Electronics and Applications, pp. 2054-2057, 2007. M. Donno, A. Ivaldi, L. Benini, and E. Macii. Clock tree power optimization based on RTL clock-gating. In Design Automation Conference, pp. 622-627, 2003.