Thursday, December 26, 2019
Security Testing from Agile Perspective - Free Essay Example
Sample details Pages: 5 Words: 1484 Downloads: 8 Date added: 2017/09/25 Category Advertising Essay Type Argumentative essay Tags: Development Essay Did you like this example? Security testing from perspective of scrum development Rudra Prasad Tripathy Ph. D. scholar, Utkal university Technical architect, JDA india software(P) Ltd. Hyderabad,India [emailprotected] com Ranjit Kumar Panda Senior Engineer, MindTree Limited Bangalore, India panda. [emailprotected] com Abstractââ¬â We are trying to show how security testing plays predominant role in secured development and through agile methodology-particularly scrum is a suitable development process. Keywords-scrum;security testing. 1. Introduction Application security is in attention for last few years where security no more allures to network security and transcen. Security testing is also crux of secured development though itââ¬â¢s not getting its due importance. In this paper we would discuss issues involved in security testing in traditional software development lifecycle approach like waterfall and would compare with scrum methodology, which is a agile methodology to see how it would smoothen few issues and would facilitate security testing. We would take cross-side scripting as the example to illustrate the study. 1. 1What is security testing? Application security would basically deals with the situation to try to break the software as what an attacker would do. This is different from traditional testing because of following idiosyncratic features. a. Traditional testing doesnââ¬â¢t deal with what happens if it fails, where as security testing objective to break the system and would play a role of antagonist. Hence it requires dexterity and experience to draw suitable test cases apart from tools and frameworks.. b. This would be part of risk management and hence need to reckon the cost involved. We may need to define adequate security [1] parlance to applicationââ¬â¢s business domain and value proposition aimed at. For example definition of adequate security a online credit card application and online healthcare system would differ. Hence prioritiz ation and budgeting of resources are few factors need to be considered. c. Testing of different possible vulnerabilities [2]. 1. 2Security testing approaches. Currently application security testing has been done as a white box testing, may be with help of few tools like static analysis tools to study the vulnerability. Apart from that non functional testing has been conducted to see chance of failures against vicarious attack of adversary. 1. 3Cross-Site Scripting Cross-Site Scripting (XSS) vulnerabilities were verified as executing code on the web application. This occurs when dynamically generated web pages display user input, such as login information, that is not properly validated, allowing an attacker to embed malicious scripts into the generated page and then execute the script on the machine of any user that views the site. XSS can generally be subdivided into two categories-stored and reflected attacks. Stored attacks are something like form stored on the target server, such as in a database, or via a submission to a bulletin board or visitor log. Reflected attacks, on the other hand, come from somewhere else. This happens when user input from a web client is immediately included via server-side scripts in a dynamically generated web page. Insufficient filtering of client-supplied data that is returned to web users by the web application is the major cause. In many cases, the client-supplied data is being used in the HTTP headers, which could be exploited by using carriage return-linefeed sequence-an attacker can add HTTP headers to the response and completely write the body of the HTTP request. 2. MOTIVATION In one of the web application, an XSS was found through use of third party tool. This was a critical defect. Design had been made and after implementation code had been tested by security compliance team. Cross-site scripting carried out on websites were roughly 80% of all security vulnerabilities documented by Symantec as of 2007. A ful l security review usually involves more than just seeking out XSS vulnerabilities. it also involves overall threat modeling, testing for different threats like overflows, information disclosure, error handling, SQL injection, authentication, and authorization bugs. The nice thing is that doing a thorough job in any one area often overlaps with another. Like, while testing for XSS vulnerabilities, you will very often identify error handling and information disclosure problems as well. Though automated tool like webinspect were available, we did some manual testing through a tool called Paros [8] for HTTP traffic interception. Intercepting the client GET and POST requests is extremely important. One could circumvent any sort of client-side JavaScript input validation code that may have been pushed down. A simple test will be changing a get parameter in the request. Let the URL is as below https://www. yoursite. com/index. html? param=test. One would modify the URL like https://w ww. yoursite. com/index. html? name=alert(XSS), and subsequently, if a popup opens up saying XSS then this parameter is open to XSS vulnerable. Paros Proxy is used to intercept the request parameter. Using this tool we will inject some malicious javascript code into the cookies, header or form parameters. If the code will be executed while the response is displayed in the browser, the application is vulnerable to XSS. 2. 1 Security testing models There are many methodologies proposed by SEI [5] like SSE-CMM, TSM for secured development. Following are the steps for secured development life cycle [4] followed at Microsoft. Stage 0: Education and Awareness Stage 1: Project Inception Stage 2: Define and Follow Design Best Practices Stage 3: Product Risk Assessment Stage 4: Risk Analysis Stage 5: Creating Security Documents, Tools, and Best Practices for Customers Stage 6: Secure Coding Policies Stage 7: Secure Testing Policies Stage 8: The Security Push Stage 9: The Final Security Re view Stage 10: Security Response Planning Stage 11: Product Release Stage 12: Security Response Execution This best suits to development practice like waterfall model. 2.. 2 Techniques for security testing Though security testing requires some level of craftsmanship, still we could derive some common techniques for analysis. We can broadly divide insecurities into two categories ââ¬âinsecurity by design and insecurity by implementation [7]. Analyses of bugs are another way of identifying the problem and deriving the solution, to some extent general use of this could be ascribes to already available taxonomies. We could see how following agile practice would better tackle the problems and techniques could be applied in a better way. 3. ACHIEVING AGILITY Many enterprises like Microsoft [9], IBM have presented skewed steps of normal life cycle to achieve agility Followings are mapping between steps provided for agile development features of scrum process. In above mentioned w orks authors try to explain from waterfall perspective of agile. In the following points, we are trying to show how agile is inherently suitable for secured development and particularly for security testing. . Short development period A typical development period is 2-3 weeks which means at end of every sprint one would test the software. In various papers, limitation of seven plus minus two has been advocated. Duration of 2-3 week development would make it easier for a security tester to identify impacted area, hence would help in fuzz testing. ii. Incremental development As the development is incremental, work like threat modeling. It also help in planning when to implement requirement exceptions and hence security review. iii. Cross functional team As there is paucity of security experts, one would conduct sprints specific to implement security features. As output application size is incremental developer would find it easy to do code review and rectify cryptographic error cod e. iv. Defining done Though 2-3 weeks is a small amount of time, we cannot really achieve everything. But we could define what we mean by done. We may define identifying issues as done only, may be through static analysis tool. There is a flexibility to inject short sprints in between where we could pick up security implementation instead of product features. Hence agile is a natural choice for secured development. v. No Documentation Maintaining document for threat modeling and other security test cases would be redundant and overhead maintaining documents for satisfying process requirement would not be required. Hence from process perspective we donââ¬â¢t need to do agile, secured testing can be agile. 4. CONCLUSION There is a gap in understanding of scrum from quality perspective. We tried to bridge the gap and to make development process more secured. Further empirical studies and experience papers would help to buttress use of agile for development of secured applicati ons and products. References 1]Bruce Potter and McGraw Gary, ââ¬Å"Software Security Testingâ⬠[Article], IEEE Security and Privacy. 2004. pp. 32-35. 2]C. E. Landwehr et al. , ââ¬Å"A Taxonomy of Computer Program Security Flaws,with Examplesâ⬠, tech. report NRL/FR/5542ââ¬â93/9591, Naval Research Laboratory, Nov. 1993. 3]Allen Julia, Barnum Sean, Ellison Robert, McGraw Gary and Mead Nancy. ââ¬Å"Software Security: A Guide for Project Managersâ⬠, Addison-Wesley, 2008. 4]Steve Lipner,Michael Howard,â⬠The Trustworthy Computing Security Development Lifecycleâ⬠,Security Engineering and Communications Security Business and Technology Unit,Microsoft Corporation, March 2005. 5]Noopur Davis,â⬠Secure Software Development Life Cycle Processesâ⬠, Software Engineering Institute ,2009. 6]K Tsipenyuk, B Chess, G McGraw IEEE Security Privacy Magazine, 2005 7]OWASP Top Ten Most Critical Web Application Security Vulnerabilities, https://www. owasp. org /documentation/topten. html 8]https://www. parosproxy. org 9]https://www. blackhat. com/presentations/bh-dc-10/Sullivan_Bryan/BlackHat-DC-2010-Sullivan-SDL-Agile-wp. pdf Donââ¬â¢t waste time! Our writers will create an original "Security Testing from Agile Perspective" essay for you Create order
Wednesday, December 18, 2019
Violence Against Nurses in the Emergency Department
Violence Against Nurses in the Emergency Department Kimberly L. Kirk Professional Nursing Practice of the Baccalaureate Nurse August 8, 2014 Violence against Nurses in the Emergency Department According to the National Institute for Occupational Safety and Health, workplace violence is defined as ââ¬Å"an act of aggression directed toward persons at work or on duty, ranging from offensive or threatening language to homicideâ⬠(Wolf, Delao Perhats, 2014, p.305). Workplace violence (WPV) can include verbal, physical, and emotional abuse, or any type of threatening behavior that can cause physical or emotional harm. According to the Emergency Nurseââ¬â¢s Association Position Statement (2010), ââ¬Å"workplace violence is aâ⬠¦show more contentâ⬠¦Despite the lack of reporting, it is clear that emergency department nurses are frequently victims of violence perpetrated by patients and visitors (Gates et al., 2012, p. 203). Prosecution to the full extent of the law is necessary to decrease the perception that violence against nurses is acceptable. Greater support from public officials and management is necessary to combat this growing problem, with the instit ution of specific policies and procedures. Movement toward a nonviolent workplace will result in higher nurse satisfaction and retention. To effectively establish and address the issue, more research, support from hospital management, and stronger legislation is necessary. References Violence in the Emergency Care Setting. (2010, January 1). Retrieved , from http://www.ena.org/about/position/position/Pages/Default.aspx Gates, D., Gillespie, G., Smith, C., Rode, J., Kowalenko, T., Smith, B. Using action research to plan a violence prevention program for emergency department. (2011). Journal of Emergency Nursing, 37, 32-39. Gillespie, G., Gates, D., Mentzel, T., Al-Natour, A., Kowalenko, T. Evaluation of a Comprehensive ED Violence Prevention Program. (2013). Journal of Emergency Nursing, 39, 376-383. Pich, J, Hazelton, M., Sundin, D., Kable, A. Patient-related Violence Against Emergency Department Nurses. (2010). Nursing Health Sciences, 12, 268-274. Wolf, L., Delao, A., Perhats, C. Nothing Changes,Show MoreRelatedPatient Violence Towards Nursing Personnel772 Words à |à 3 PagesViolence in all its forms has increased dramatically worldwide in recent decades (Balamurugan, Jose Nandakumar, 2012). According to the Occupational Safety and Health Administration (OSHA) report, nearly two million American workers report having been victims of workplace violence each year (2011). Among those at highest risks for violence in the healthcare setting are nurses, social workers and psychiatric evaluators (OSHA, 2011). In the healthcare setting, physical assault is almost exclusivelyRead MoreThe Incidence Of Aggression And Violence Essay923 Words à |à 4 Pagesaggression and violence in acute mental health settings is internationally recognised as an ongoing and significant issue (Gascon, Martinez-Jarreta, Gonzales-Andrade, Santed, Casalod Rueda 2009). Although the problem is endemic among mental health professionals, nurses are at a higher risk of experiencing patient or family violence compared to other healthcare providers and auxiliary staff (Schablon, Zeh, Wendeler, Peters, Wohlert, Harling Nienhaus 2012). Evidence suggests that psychiatric nurses are twoRead MoreWorkplace Violence And Health Care1641 Words à |à 7 Pages Workplace Violence in Health Care Morgan L. Hofmeister Baker University School of Nursing Abstract This research paper discusses workplace violence, specifically the nursing population. Using results from previous research conducted, negative factors impacting a nurse and solutions to this issue are explored. There is a lack of reporting causing this issue of workplace violence to be difficult to determine interventions and bring about public awareness. Looking at the historicalRead MoreHaley Mccullian, Human Resources Consultant, At Mercy Fitzgerald839 Words à |à 4 Pagesthe nursing field involving workplace violence in the emergency room. The purpose of this report is to educate the workforce on potential causes, effects, and theories revolving around the current organizational challenge. Workplace violence is a dangerous and complex occupational hazard in todayââ¬â¢s health care work environment. It poses challenges for nurses and other health care employees, hospital administration, unions, and health care regulators. Violence from patients, visitors, and coworkersRead MorePatient-Related Violence for Nurses in Australia Essay1359 Words à |à 6 Pagesof nurses in Australia being identified as the occupation at most risk of patient-related violence in the health care sector. The researchers found that patient-related violence against nurses was highest in emergency departments; 70% of nurses working there estimated to experience violence on a weekly basis and between 60-90% of nurses reported exposure to violence, both verbal and physical (Pich et al., 2010). Patients were consistently identified as the most common source of such violence, responsibleRead MoreHealth Policy Issues Essay1345 Words à |à 6 Pagesaffect our workplaces every day. The professional meeting I had the opportunity to attend was the North Texas Organization for Nurse Executives (N-TONE) fall forum. Several health policy issues and opportunities to address them were brought up at the meeting with the main issue to be covered in this overview being workplace violence. TONE is a member of the Texas Nurses Associations Nursing Legislative Agenda Coalition (NLAC), which has helped foster policy change. Many of the health care policyRead MoreEvidence Based Practice For Victims Of Human Trafficking1648 Words à |à 7 Pagesbeing trafficked within and across the United States border annually (Richards, 2014). Trafficked individuals experience many health issues and nurses are one of the first health professionals to be in contact with trafficked individuals during their captivity and upon their release (Holland, 2014). The researchers are gathering information to educate nurses on evidence based practice for victims of human trafficking and the key health assessment techniques. Providing community resources and patientRead MoreDeveloping An Implementation Plan For Patients With Chronic Pain1650 Words à |à 7 Pagesmakes issues on the unit, leading to disruptions to the patientsââ¬â¢ healing process, the work environment, the staff attitude, and the quality of care. For instance, a psychiatric patient who is knowledgeable of the healthcare system activates the emergency medical s ystem to be transferred to an LPS designated area. This patient, as being a re-admission and has done this tactic before, will say or do what it takes to be admitted and ultimately, will obtain narcotic medicine. This causes a delay in theRead MoreA Research Study On The Minds Perspectives Through Interviews And Perceptions1494 Words à |à 6 Pagesat how nurses receive physical and psychological trauma from patient violence towards them. Please take whatever time you need to discuss the study with your family and friends, or anyone else you wish to. The decision to join, or not to join, is up to you. In this research study, we are investigating/testing/comparing/evaluating how violence from patients impacts healthcare professionals work productivity and how do they develop symptoms of post-traumatic stress disorder (PTSD)? Violence from patientsRead MoreCreating Quality Workplace For Canadian Nurses1920 Words à |à 8 PagesOur Health Our Future: Creating Quality Workplace for Canadian Nurses (Maslove and Fooks, 2004). Safe working environment plays a vital role in the ability for providing quality nursing care. So, workplace safety is a main issue for discussion in every occupation particularly in nursing profession in health care setting since nurses are an integral part of public health. Violence against nurses causes hamper in achieving personal, professional as well as organizational goal. According to Canadian
Tuesday, December 10, 2019
Environmental Crisis Essay Example For Students
Environmental Crisis Essay We Have An Environmental Crisis Because We Have A People Crisis A Crisis ofPopulation Growth, of Wasteful Consumption of Resources, and A Crisis of Apathyand Inaction.An environmental crisis is an emergency concerned with the place in which everyhuman lives the environment. A people crisis is an emergency with thecommunity that inhabits the world environment. A crisis of population growth isa turning point where the environment can no longer sustain the amounts ofpeople which it contains. A crisis of apathy and inaction is one where thehuman race cannot be motivated to solve the problems with the environment thatthey themselves have created. The claim that we have an environmental crisis because we have a people crisisis valid because our environmental problems have largely resulted frompopulation growth, which has lead to apathy and inaction with regard to thewasteful consumption of resources. Examples are the desertification of the Sahelin Africa, the one child policy in China and the mis-management of our oceans. The Sahel is a strip of land that extends for more than 6000 kilometres acrossthe southern edge of the Sahara desert. It stretches from Senegal andMauritania in the west to Ethiopia and Somalia in the east. These nations areamong the worlds poorest. The area is one of social and biophysical crisis because of the way thepopulation are forced to live; they are destroying the productivity of the land. The alarming rate of population growth and ever increasing pressure on the landhave initiated an expansion of desert-like conditions into the Sahel a processcalled desertification. Traditionally, the people of the drier, northern Sahel followed a nomadiclifestyle, constantly moving their herds of cattle, sheep and goats over largeareas in the search for suitable grazing land. These movements preventedovergrazing and lessened the likelihood of land degradation. With increasinghuman numbers, the increased intensity of land use, and the harvesting of treesand scrub for fuel wood threaten to overwhelm the regions fragile environmentand result in permanent ecological damage and declining standard of living. During the 20th century 3.9 billion people have been added to the worldspopulation. This is an increase of 244%. Rapid growth occurred because of the improvementof living conditions, reduced child mortality rates and increased lifeexpectancy. The population of undeveloped nations will continue to grow in the foreseeablefuture because at present 45% of the population is under 15 years of age. In the North the population growth is slowing down because children areconsidered an expense. In Italy, Germany and Austria, the growth rate isnegative. The slowdown in population growth is a result of the lower fertility rates thathave accompanied improvements in the quality of peoples lives and theincreasing use of contraceptives throughout the South. As peoples economicwell-being improves they tend to have less children. Future efforts to control population growth will depend on the Norths capacityto share the worlds resources and the ability of poor nations to improve thequality of life experienced by their people. At the beginning of this century there were some 426 million people living inChina. This has resulted in a country that has endured the demographic effectsof devastating famines, wars, and epidemics for millennia; the population growthand change that occurred in the 20th century is unprecedented. By the year 2000, the Chinese population is officially projected to top the 1.3billion mark. About two-thirds of this 900 million increase was added within thelast 50 years, as mortality was reduced amid high fertility rates. .ub9a04bc0a444777a8d84d20a93b7c241 , .ub9a04bc0a444777a8d84d20a93b7c241 .postImageUrl , .ub9a04bc0a444777a8d84d20a93b7c241 .centered-text-area { min-height: 80px; position: relative; } .ub9a04bc0a444777a8d84d20a93b7c241 , .ub9a04bc0a444777a8d84d20a93b7c241:hover , .ub9a04bc0a444777a8d84d20a93b7c241:visited , .ub9a04bc0a444777a8d84d20a93b7c241:active { border:0!important; } .ub9a04bc0a444777a8d84d20a93b7c241 .clearfix:after { content: ""; display: table; clear: both; } .ub9a04bc0a444777a8d84d20a93b7c241 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub9a04bc0a444777a8d84d20a93b7c241:active , .ub9a04bc0a444777a8d84d20a93b7c241:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub9a04bc0a444777a8d84d20a93b7c241 .centered-text-area { width: 100%; position: relative ; } .ub9a04bc0a444777a8d84d20a93b7c241 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub9a04bc0a444777a8d84d20a93b7c241 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub9a04bc0a444777a8d84d20a93b7c241 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub9a04bc0a444777a8d84d20a93b7c241:hover .ctaButton { background-color: #34495E!important; } .ub9a04bc0a444777a8d84d20a93b7c241 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub9a04bc0a444777a8d84d20a93b7c241 .ub9a04bc0a444777a8d84d20a93b7c241-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub9a04bc0a444777a8d84d20a93b7c241:after { content: ""; display: block; clear: both; } READ: Rose For Emily By Faulkner EssayThe Chinese government has been moved by this demographic affluence to curbfertility. Chinas strategic demographic initiatives (SDI) were contrived out ofthis need. The government installed numerous measures for curbing fertility,embracing delayed marriage, sterilisation, all known contraceptive methods, andabortion. Exhortations, campaigns, financial and material incentives, andnumerous other sanctions were used to implement the policies. All these effortswere, at first, to redirect young couples to have fewer offspring and, later, toheed the one-child-per-couple, or minimal reproduction, policy. The purpose of this call for minimal reproduction was to keep the populationfrom exceeding 1.2 billion by the year 2000. The scheme has proved problematicinside the country and controversial abroad for practical, political, ethical,and religious reasons. The massive gain in population in recent decades has intensified olddifficulties in the countrys effort to raise living standards, and has ignitednew economic, environmental, and social concerns within the nations borders. The major issues range from Chinas population carrying capacity, unemploymentand underemployment in the countryside, surging urbanisation, and spreading airand water pollution to mass illiteracy and education in relation to development. SDI itself has added such new concerns as the effect of son preference on femaleinfanticide and the sex ratio, the impact of a fast fertility reduction onpopulation aging, and the implications of exempting the countrys 55 minoritygroups from the nations fertility control measures. The global significance of Chinas demographics is likewise enormous. Whateverthe size of Chinas population is at the dawn of the 21st century it is certainto account for twenty percent of the worlds projected population. Chinasindustrialisation, modernisation, expanding use of natural resources, and risingconsumption will increasingly disrupt the earths ecosystem. It has been thought that the worlds seas would provide an inexhaustible supplyof fish, however, this has been found to be untrue. Since the 1950s there hasbeen a rapid increase in the amount of fish caught and most traditional foodfishes are now over-exploited and stocks are falling. Overfishing is partly the result of the belief that the worlds oceans arecommon property, and belong to everyone. They have been seen as a resource opento everyone with no one responsible for their protection. This has led toexploitation and the Tragedy of the Commons. This tragedy occurs when aresource is freely available to everyone; everyone uses the resource to themaximum so that the resource is eventually destroyed. Each year the cities of the world flush enough oil down their storm waterdrains and sewers into the sea to fill three Exxon Valdez supertankers. Largeareas of seas such as the Baltic and Mediterranean are now dead from pollution. Fishing is the most traditional activity in Australian waters . Today a fleet of10,000 boats lands a harvest of 200,000 tonnes of fish, prawns lobsters adshellfish worth $1.2 billion a year. Being long-established, the fishing industry was also first to encounter thebiological limits of local waters: of our top 10 fisheries, five are now classedas over-exploited and five fully exploited. Now, if a particular fishery dropsto unsustainable levels, catch limits may be imposed. In greatest difficultiesare southern bluefin tuna, southern shark and gemfish. New fishery prospects arefew and costly to develop, most being in deep water. Related problems in fishing include the extent to which trawling damages thesea-bottom and changes the populations of sea creatures, and the growingconfrontation between inshore fishers and recreational anglers, which many nowpredict will end in bans on professional fishing. The ever increasing need for food due to population growth, has led to widerareas of the oceans being fished. Increasingly, fishing is taking place far outto sea, beyond the continental shelf in the waters of the continental slopes andocean depths. Large fishing nations such as Japan, the USSR and the USA havefleets of trawlers that operate in these areas using the latest technology whichfurther deplete ocean stocks. .u68e68c0332c36ff696440caca30c8393 , .u68e68c0332c36ff696440caca30c8393 .postImageUrl , .u68e68c0332c36ff696440caca30c8393 .centered-text-area { min-height: 80px; position: relative; } .u68e68c0332c36ff696440caca30c8393 , .u68e68c0332c36ff696440caca30c8393:hover , .u68e68c0332c36ff696440caca30c8393:visited , .u68e68c0332c36ff696440caca30c8393:active { border:0!important; } .u68e68c0332c36ff696440caca30c8393 .clearfix:after { content: ""; display: table; clear: both; } .u68e68c0332c36ff696440caca30c8393 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u68e68c0332c36ff696440caca30c8393:active , .u68e68c0332c36ff696440caca30c8393:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u68e68c0332c36ff696440caca30c8393 .centered-text-area { width: 100%; position: relative ; } .u68e68c0332c36ff696440caca30c8393 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u68e68c0332c36ff696440caca30c8393 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u68e68c0332c36ff696440caca30c8393 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u68e68c0332c36ff696440caca30c8393:hover .ctaButton { background-color: #34495E!important; } .u68e68c0332c36ff696440caca30c8393 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u68e68c0332c36ff696440caca30c8393 .u68e68c0332c36ff696440caca30c8393-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u68e68c0332c36ff696440caca30c8393:after { content: ""; display: block; clear: both; } READ: Why Do We Need The Covenants? EssayThese modern methods exploit the ocean resources by catching too much fish andby not being selective in what fish they catch before it is too late to throwthem back. This will eventually deplete worlds fish supplies and if trawlercompanies do not start to limit catches. The major issue concerned with the downfall of our oceans is that marine life isvital to the food chain which includes our survival in the future. There are many other long term issues involved within environmental crisis. Some of these are air pollution, garbage, logging and erosion. Often governmentsoverlook these problems when creating new policies because they seem to be moreconcerned with immediate economic considerations. Globally, there is anindifference towards environmental issues and a lack of concern for the well-being of the world environment today. These examples have illustrated thatpeople put their own personal needs before the survival of the earth. Thedeveloped nations of the earth need to take a larger responsibility for theenvironment, as they have been educated to the ill effects of pollution andover-population and they have only themselves to blame for environmentaldestruction. As for the people in the nations of the South, population growthneeds to be slowed possibly by educating women about contraception, economicincentives, people interested in careers, less infant mortality and increasingthe cost of children. Apathy and inaction can be reversed by concerted and effective Governmentpolicies that encourage personal, social and economic benefits. Apathy must beresisted if our planet is to survive. Category: History
Monday, December 2, 2019
Midsummer Nights Dream And Romeo And Juliet Essays -
Midsummer Nights Dream And Romeo And Juliet Certain parallels can be drawn between William Shakespeare's plays, "A Midsummer Night's Dream", and "Romeo and Juliet". These parallels concern themes and prototypical Shakespearian character types. Both plays have a distinct pair of 'lovers', Hermia and Lysander, and Romeo and Juliet, respectively. Both plays could have also easily been tragedy or comedy with a few simple changes. A tragic play is a play in which one or more characters have a moral flaw that lead to his/her downfall. A comedic play has at least one humorous character, and a successful or happy ending. Comparing these two plays is useful to find how Shakespeare uses similar character types in a variety of plays, and the versatility of the themes which he uses. In "Romeo and Juliet", Juliet is young, "not yet fourteen", and she is beautiful, and Romeo's reaction after he sees her is: "O, she doth teach the torches to burn bright! It seems she hangs upon the cheek of night As a rich jewel in an Ethiop's ear Beauty to rich for use, for the earth too dear!" Juliet is also prudent, "Although I joy in thee, I have no joy in this contract tonight. It is too rash, too unadvised, too sudden." She feels that because they have just met, they should abstain from sexual intercourse. Hermia is also young, and prudent. When Lysander suggests that "One turf shall serve as a pillow for both of us, One heart, one bed, two bosoms, and one troth," Hermia replies "Nay, good Lysander. For my sake, my dear, Lie further off yet; do not lie so near." Although this couple has known each other for a while (Romeo and Juliet knew each other for one night when the above quote was spoken), Hermia also abstains from even sleeping near Lysander even though she believes he does not have impure intentions. Romeo's and Juliet's families are feuding. Because of these feuds, their own parents will not allow the lovers to see each other. In the a differnet way Hermia is not allowed to marry Lysander. Hermia's father Egeus says to Theseus, Duke of Athens: "Full of vexation come I, with complaint Against my child, my daughter Hermia. Stand fourth, Demetrius. My noble lord, This man hath my consent to marry her. Stand forth, Lysander. And, my gracious Duke, This man hath bewitched the bosom of my child." Egeus tells the Duke that his daughter can marry Demetrius, not Lysander. Hermia replies ". . . If I refuse to wed Demetrius," Egeus replies "Either to die the death, or to abjure for ever the society of men." If Hermia does go against her father's wishes, and weds Lysander, she will either be put to death, or be forced to become a nun. Both pairs of lovers also seek help from another. Juliet and Romeo seek Friar Lawrence, and Lysander and Hermia seek Lysander's aunt, who lives in the woods near Athens. Both sets of youths have the same character type. They are young, their love is prohibited, both women are prudent, and both seek the help of an adult. Yet they have their subtle differences. For example, Lysander, never mentioned a love before Hermia. Romeo loved Rosaline, before he loved Juliet. Hermia's family and Lysander's family were not feuding, whereas the Montagues' and Capulets' feude was central to the plot of the play. The stories of "Romeo and Juliet" and "A Midsummer Night's Dream" are very different however. "A Midsummer Night's Dream" is a comedy. Oberon, king of the fairies, sends a mischievous imp named, Puck, to play a trick on the queen of the fairies, Titania, and on a pair of Athenian youth. Puck turns Nick Bottom's head into that of an ass (Nick Bottom is the man in the play production within "A Midsummer Night's Dream"; he tried to play every part), and places an herb on Titania that causes her to fall in love with him. This is quite humorous. However, at the end of the play all the couples are back together, with the ones they love. Thus Lysander and Hermia do get married. If Egeus had showed up at the wedding, he could have killed her. Egeus' dominate nature is his 'flaw', and if he would have attended the wedding, and killed his daughter, this play could have been a tragedy. Likewise, "Romeo and Juliet", could have been a comedy. The first two acts of this play qualifies it as a comedy. In act I, Sampson and Gregory,
Wednesday, November 27, 2019
The JSEC Essays
The JSEC Essays The JSEC Essay The JSEC Essay Also, Just like every other official business, you have to secure business permits, pay taxes and rent, and provide salary for your employees. At first glance, SEC looks Just Like every other university cafeteria with Its general layout of different stalls sitting right next to each other, tables, and people. It seems Like a regular food place where the students of the Atone regularly hang out. However, SEC is not only a venue for great food choices: Its also the home of the stereotypes. SEC is stereotypically seen as the domain of the John Koenig School of Management SMOG) majors; the arena of the future businessmen and businesswomen of our nation. They are regarded as the elitists and burghs; they rule the SEC scene. And with the prevalence of SOME people in SEC, the stereotypes attached to these students have also rubbed off to the place, pinning SEC with its very own stereotypes. SEC has become known to be the tambala or hangout place of the cool crowd; therefore, earning the name: SEC crowd. The SEC crowd is where you will usually see boys who sport polo shirts or v-necks, chino shorts, and boat shoes; girls dressed n skater skirts or cropped tops; and groups of friends facing their branded devices. These people are dressed to impress and are seemingly ready to party: thus, giving birth to the SEC outfit. And lastly, the thing that has become so famous that it has been boxed up to a certain stereotype associated with SEC: the canyon people. These are the people who use an irritating tone while speaking Carbon English or Digitalis. Some of them overly abuse the words like or though during their entire discourse. They are usually divided into two: the people who do it because they are bilingual and tend to code witch for easier flow of ideas; or the people who do It because they want to sound cool. So by looking more closely at the scene, youll see that a grand show Is happening before your eyes: but the star of the show Is not the food; It Is the people. What Is really cooked in that place are the stereotypes and the culture spiced up by the people who dominate the scene. The SEC By Catamaran is called the John Koenig School of Management Student Enterprise Center, or unique and non-mainstream proposals; because there are plenty of applicants and the SOME. Also, Just like every other official business, you have to secure business At first glance, SEC looks Just like every other university cafeteria with its general like a regular food place where the students of the Atone regularly hang out. However, SEC is not only a venue for great food choices; its also the home of the switch for easier flow of ideas; or the people who do it because they want to sound So by looking more closely at the scene, youll see that a grand show is happening before your eyes: but the star of the show is not the food; it is the people.
Saturday, November 23, 2019
Custom Essay Help
Custom Essay Help Custom Essay Help Welcome to custom writing service! We are not the market leader in terms of the first positions; however, we are the leader in developing a very flexible system that brings together a professional approach to writing, adequate customer support, reasonable prices, and exceptionally high quality of every custom essay we deliver. Our writers complete custom essay orders for clients from any English speaking country. It is not a secret that English has already become a global language. Custom essay help is your chance to receive a professionally written custom essay which meets all of your requirements and expectations: Custom Essay Help Your tutor has told that you while writing term paper you have to organize your ideas. Many students prefer to create a traditional outline. By the way, every client is welcome to request free outline writing service while placing an order. However, there is another way of organizing custom essay writing. When you do have a sense of how events or things relate to each other and you can put them in a narrative structure or show cause-and-effect relationships, then you can illustrate these relationships by drawing a topic tree. The primary advantage of the topic tree is that it helps you determine whether essay ideas are related to each other and the overall topic. As with cluster diagrams, topic tree allows you to represent your thinking pictorially. However, rather than drawing essay ideas in a random, disorganized fashion, you can impose order on them, placing them from general to specific or vice versa. However, there is another way to get an essay you need - order custom essay help. Every time you place an order, you receive 100% plagiarism free custom essay written in accordance to your requirements. Every time we have an order, we assign only qualified writers to provide custom essay help. Custom Paper Writing is not a paper mill. We do not resell delivered custom essays and we do not have a database. Custom essay help is individuals. You can communicate with the writer directly, ask questions, request progress updates, and ask for free plagiarism report. We appreciate your trust and devote all of our efforts to meet your requirements. Our custom essay writers have access to libraries and can locate relevant publications very quickly. Moreover, we guarantee full and proper references and the issue of plagiarism is totally avoided. We deliver only 100% plagiarism free custom essays prior to deadline! Popular posts: Writing a Research Paper APA University Research Proposal Shakespeare Research Paper Topics Research Proposal Guidelines Research Paper Topics
Thursday, November 21, 2019
The Chinese Communist Partys Ideological Change Essay
The Chinese Communist Partys Ideological Change - Essay Example There have been many changes in the political systems and in particular to the ideology of the Chinese Communist Party, from 1978, when the then leader of the party and the country Deng Xiaoping began to initiate reforms and a movement towards a more market oriented economy. According to Misra (1998, p.272) and other scholars predicted the imminent decline and demise of the Marxist ideology in China, while other scholars who held a contrary opinion held that the ideology is not on its death bed; rather it is on its path to recovery (Brugger and David 1990, p.7). Ordinary Chinese citizens had become tired with the ideologies of the party and those of the its high profile leaders, it was perceived by the masses as more of a privileged society but less in touch with what is happening on the ground, this majorly began in the late 1990s. Currently, there is a general feeling amongst the populace that the Chinese Communist Party is riddled with corruption, and its sheer size complicates ef fectiveness of the party. Pro-democracy scholars and activist have a firm belief that the Party has lost its relevance in this century, and that the current leaders have lost legitimacy from the people and that they suffer from governance issues and this will ultimately lead to its collapse. After the death of the Chinese leader, Deng in 1997, majority of leaders in the west and particularly the United States predicted the collapse and adoption of ideologies of democracy in China. Most of them had predicted in the late 1990s that the regime would eventually collapse in the year 2010; this has happened, as the current leader is tightening these political policies but opening up the economy. In the
Wednesday, November 20, 2019
The Status of the P versus NP Problem Essay Example | Topics and Well Written Essays - 500 words
The Status of the P versus NP Problem - Essay Example With innovations in computational power, there has been an increase in algorithms that are much smarter than before. Under such circumstances, the pressure to tackle P versus NP problem, is considerably increasing. Moreover, this P versus NP problem is invading all fields of science as just not a theoretical question but as a basic principle. Author of the article surmises herein, the simple description of the issue and the change in working direction related to computer science attained because of efforts to solve this question. P versus NP problem actually computes combinational issues. Jack Edmonds, first in the history, provided a program that can help in developing a program to solve combination problem, and formally defined it as ââ¬Ëefficient computationââ¬â¢. P in this problem stands for ââ¬ËPolynomial Timeââ¬â¢ and defines problem class which has efficient solution. Likewise, NP in this problem stands for ââ¬ËNondeterministic Polynomial-Timeââ¬â¢ and refers to the problems that have solutions that can be verified in an efficient manner. Furthermore, author describes that extremely complicated NP problems are termed as ââ¬ËNP-completeââ¬â¢ problems. Examples of such problems are Clique, Partition and triangles, 3D-coloring and Hamiltonian cycle. Basically, the idea promoted by NP-complete asserts that if an efficient algorithm can be developed for one problem, it can also be developed for other complicated problems too. Thus to simplify, P defines the type or the category of the problem that comes with efficient solution whereas, NP defines a group of problems, each of which has an efficient recognizable solution. By saying P = NP, we mean to say that for any problem that has an efficient verifiable solution, we can efficiently identify that solution. However, there are many scientists who believed that P âⰠNP and defined it as inability to find the solution efficiently. The author presents several attempts to prove a problem that is
Sunday, November 17, 2019
Rene Ryman Essay Example for Free
Rene Ryman Essay Week 1 Case Study Professor Rene Ryman Case Problems ââ¬â Chapter 1 ââ¬â Question 1, parts a through d 1. A. How did Pine Valley Furniture go about developing its information systems? Why do you think the company chose this option? What other options were available? Pine Valley started small with the owner Alex Schuster just taking orders from customers for his custom furniture. Eventually each department had its own system, but they were still separate databases. The system has evolved into an automated system supported by in-house information system staff. I feel the company chose this option because they wanted to have their own in-house IS staff to maintain their own system. They could have outsourced the creation and support of their current system but they see the value in being self sufficient. B. One option available to Pine Valley Furniture was an enterprise-wide system. What features does an enterprise-wide system, such as SAP, provide? What is the primary advantage of an enterprise-wide system? An enterprise-wide system provides a single database as a repository for companies to centralize the management and availability of company data. The primary advantage of the enterprise-wide system is that it can be maintained at one location and supported from that location. The data is consistent and it costs less to support. C. Pine Valley Furniture will be hiring two systems analysts next month. Your task is to develop a job advertisement for these positions. Locate several Web sites and/or newspapers that have job advertisements for systems analysts. What skills are required? Required skills for Systems Analysts: Must be able to make program modifications Must be able to consolidate multiple databases into one Must be able to train support staff on new system Stay abreast of compliance rules and regulations D. What types of information systems are currently utilized at Pine Valley Furniture? Provide an example of each. Two primary information systems used at Pine Valley Furniture are for accounting and financial. As an example of each there would be a system for paying suppliers and contractors to run the furniture business. For all bills paid out of the general operating account a system needs to be in place to keep track of invoices, purchase orders and printing checks. Likewise a system is used to maintain payroll data. To pay the employees a system is needed to maintain hourly data and salary data. Along with whatever benefits are offered to employees. This system would keep all of the records, process the payroll and print payroll checks.
Friday, November 15, 2019
Organzational Leadership Essay -- Human Resources
Introduction Organizations are experiencing a rapid transformation in the environment, which has caused them to reevaluate how they do business. Economic changes, globalization, and expansions in technology have warranted the need to adapt quickly to changes in the environment (Schneider, 2002). Organizational leadership has three general components: setting the direction for the organization, organizational performance, and change management (Johnson, 2011). It is critical for organizations to position themselves in this competitive market for success. To maintain a competitive advantage an organization has to study the fluctuations within the environment and make the necessary changes. Assessing organizational strengths and weaknesses continuously allows them to take strategic steps that lead to optimal outcomes. Organizational performance management is important in ensuring the right people are in the right jobs at the right time. Weak points must be identified and strengthened so that the organizationââ¬â¢s leadership can adapt to a continually changing environment (Johnson, 2011). In this paper I will discuss some organizational leadership principals and my beliefs, assumptions, and understanding of organizational leadership. Organizational Leadership Principals Vision ââ¬Å"Leaders come in every size, shape, and disposition-short, tall, neat, sloppy, young, old, male, and femaleâ⬠(Bennis, 2009, p. 33). Unlike Johnson (2011), Bennis (2009) proposes additional components to leadership. First, there must be a vision. A leader has to have a well-defined direction and purpose. They must understand not only the direction they will take, but also the steps to achieve the stated objectives. The vision must be articulat... ...om http://www.businessweek.com/managing/content/nov2010/ca2010112_608471.htm The Leaders Toolbox. (2012). Leaders toolbox principals. Retrieved from http://www.leadingforachange.com/toolbox/principles.asp Travelers. (2012). Travelers receives highest rankings on Goldman Sachs semiannual property & casualty insurance survey. Retrieved from http://inside.here.travp.net/intrahome/iwcm/insideNews/news/03-2012/CONEWS_TravelersReceivesHighestRankingsonGoldm.aspx Travelers. (2012). Travelers once again named Fortuneââ¬â¢s worldââ¬â¢s most admired companies list. Retrieved from http://inside.here.travp.net/intrahome/iwcm/insideNews/news/03-2012/CONEWS_TravelersOnceAgainNamedtoFORTUNEsWorlds.aspx Webster, A. (n.d.). Principles of organizational leadership. Retrieved from http://www.ehow.com/list_7541679_principles-organizational-leadership.html#ixzz1r5O71eyy
Tuesday, November 12, 2019
Assessment of Studentsââ¬â¢ Satisfaction on the Restructured Essay
1.0 Introduction At the University of Ghana there are reports that rooms originally built to take two students, are now officially allocated to five students (after minor modifications), but unofficially occupied by as many as eight or nine ââ¬â to the knowledge of the university authorities! Apart from the obvious hygiene and health hazards posed, what kind of ambience does this provide for study after classes? All of which have brought most African universities to a state of serious deterioration. This is evident not only to those who work or study in those universities but to even the most casual visitor. ââ¬â (Association of African Universities, 2004) Housing is a basic human need in all societies and fundamental right of every individual. In advanced countries, housing is more accessible to all categories of people including the poor and the needy as a result of subsidies from the government. The situation is not the same in developing countries of the world. In Ghana, for example, accessibility to housing by the poor is quite a difficult situation which is worsened by the harsh economic conditions and poor enabling environment. Likewise, accessing housing facilities by Ghanaian students at the university is no exception, especially where such university happens to be the dream destination of most Ghanaians entering into tertiary institution. In tertiary institutions worldwide, the provision of accommodation to the studentsââ¬â¢ population takes different models. This includes; non-residential, where students source for their own accommodation. Residential, where the university houses all its students and dual-residential, where the university houses its student population for a period of time only, probably the first and final year, while the students during the remaining period source for their own accommodations. The experiences of students in tertiary institutions in sourcing and securing for their own accommodation around university communities are likely to be interesting and significant. However, it is worth noting that, University of Ghana, the nationââ¬â¢s premier university has gone through a series of development when it comes to how to accommodate its students, both undergraduates and postgraduates. 1.1 Research problem University of Ghana has undergone a series of reforms when it comes to the residential policy for its students. The ever increasing number of enrollees in the institution is what defines this restructuring of the policy governing studentsââ¬â¢ accommodation over time. In the past two years what the incumbent vice chancellor of the university term as ââ¬Å"Decongestionâ⬠has taken place in anticipation to the fulfillment of the university achieving efficiency in its field of operation. The drive has also been fast tracked by his informal goal that the university should achieve a world-class status. Effective August, 2011, the university effectively implemented its decongestion policy allocating rooms to a maximum of three (3) students and four (4) students in the main halls and annexes respectively. This was done to address the problems of overcrowding that resulted in adverse effects of poor sanitation, pressure on residential utilities such as reading rooms and libraries, kitchen and washrooms, among other poor conditions for effective personal studies by students. Residential facilities have been increased to make the policy successful. Even though, the problem of inadequate accommodation for students is not entirely solved, the restructuring have been effective since its implementation, and it is worth investigating the effects of the new policy, whether it has achieved its goal or it is towards achieving its intended goal or otherwise. 1.2 Purpose of the study The main reason why this research is being conducted is to evaluate the satisfaction of students with the current studentsââ¬â¢ residential policy and its effects on their studies. 1.3 Objectives of the study Specific objectives of the study are as follows: 1. To assess students perception of sanitation in the halls/hostels now. 2. To assess students perception of security in the halls/hostels now. 3. To investigate students accessibility to some basic hall/hostel utilities. 1.4 Research Questions 1. What is studentsââ¬â¢ perception of sanitation in the halls/hostels now? 2. What is studentsââ¬â¢ perception of security and comfort in the halls/hostels now? 3. What is the accessibility status of students to basic halls/hostels utilities now? 1.5 Relevance of the study As a top university in Ghana and Africa and one which is striving to attain a world class status, adequate facilities should be provided and already existing ones improved, especially standards of services and facilities which include providing conducive on-campus student housing facility. The above research provides the grounding for this study and highlights the areas of new knowledge which are needed; to focus upon studentsââ¬â¢ satisfaction of residential facilities in University of Ghana. A key question is what is the level of studentsââ¬â¢ satisfaction with regards to the students housing facility (SHF) in the context of University of Ghana? The study contributes to a better understanding of SRS of UG. The results offer valuable feedback to the university authorities, facility managers and university hostel/hall administrators in terms of the present standards or the need for further improvement of the SHF through effective designs and management. The results will help to formulate guidelines in terms of allocation of rooms to students, maintenance and for future developments of student housing ensuring that the university is able to provide adequate and contemporary on-campus SHF. 2.0 Literature Review 2.1 Introduction This section reviews existing literature on the student residential facilities. It is mainly made up of previous studies, journals, articles, periodicals amongst other sources. They form the secondary source of data to the study. 2.2 The Concept of Student Residential Facility Student housing has long been regarded as an essential component of the facilities provided by the higher learning institutions in assisting students to expand their intellectual capabilities. According to Hassanain (2008), well planned student housing facilities (SHF) promote desirable educational outcomes and help to achieve the broader objectives such as social cohesion and responsible citizenship. An earlier study by Zahran (1972) reveals that a good student housing promotes interactions between roommates of different backgrounds and specializations; and thus broadens the studentsââ¬â¢ knowledge. Amole (2005) argues that facilities such as study areas or meeting places for academic discussions and social gatherings provided in the student housing will encourage informal intellectual activities outside the studentsââ¬â¢ own faculties. Price et al. (2003) related student interpersonal growth to adequate facilities and Fay (1981) highlighted the importance of studentsââ¬â¢ satisfaction in the SHF as a strategy to enhance student development. Despite the importance of SHF, little literature is available to evaluate student opinions of their housing facilities. Most studies on post-occupancy evaluation focus on family housing either public or private residences, investigating the interaction between owner-occupiers or tenants and their housing settings. Majority of these studies utilized the concept of housing satisfaction when evaluating the interactions between the residents and their physical environment (Amole, 2009b). Arguing that housing satisfaction can lead towards improving individualââ¬â¢s quality of life, Salleh (2008) investigates dwelling, housing services and neighbourhood factors that influence the residents of private low-cost housing in Malaysia. The study revealed that the residents are more satisfied with their dwelling units and housing services if compared to their neighbourhood facilities. Elsinga and Hoekstra (2005) study housing satisfaction among European communities and find out that except in Austria, homeowners are more satisfied than the tenants because homeownership provides security, freedom and financial benefits. In contrast, James (2008) analyses the influence of age and type of ownership on the level of satisfaction and establishes that tenant satisfaction increases with the age at a much faster rate than the type of homeownership. However, student housing and family housing are not the same. Student housing comprises of basic bedroom units with other shared facilities such as bathrooms, toilets, laundry, kitchens, common lounges and cafeterias located either per floor level, per block or for the whole student housing accommodation (Amole, 2009a). On the contrary, the basic unit for family housing is a house which includes bedrooms, bathrooms, toilets and a living area all as part of the unit with other housing facilities such as playground, shops and school at the neighbourhood (Parkes et al., 2002). In addition, student housing offers limited security of ownership and freedom if compared to family housing. Therefore, the above findings may not apply in the context of student housing. Studies on residential satisfaction (RS) from the student perspective are mostly focused on factors affecting RS; such as reasons for students to maintain their previous residence (Cleave, 1996) and predictors of student residential satisfaction (SRS) (Foubert et al., 1998; Khozaei et al., 2010b). There are also studies on student housing with narrower scopes such as the effects of floor height on over-crowding (Kaya and Erkip, 2001); studentsââ¬â¢ perceptions on indoor comfort (Dahlan et al., 2009); studentsââ¬â¢ sense of attachment with a particular student housing (Khozaei et al., 2010a); coping strategies for students staying in student housing (Amole, 2005) and the relationship between satisfaction and levels of environment (Amole, 2009b). These studies offer little guidance as to whether the students are satisfied with SHF provided. Among the limited studies on SRS are studies by Amole (2007, 2009a), Hassanain (2008) and Radder and Han (2009). Amole (2007, 2009a) investigates RS among students in Nigeria and the findings indicated a low satisfaction with the SHF provided. Radder and Han (2009) researched student satisfaction levels in South Africa and the findings indicated again a level of dissatisfaction with campus residences. Alternatively, Hassanain (2008) found that students in Saudi Arabia indicated a level of satisfaction with the SHF provided. However, the studies were conducted in countries where the culture and climate are different from that experienced in the Southeast Asia region, which is likely to affect the perceived environment of the built environment. Therefore, the results of the studies may not be applicable to the study context. 2.3 Evolution of the accommodation structure Originally, halls in the university were built to accommodate two students per room. This provision was adequate for students because not many people sought for higher education. However, as the population of Ghana increased and the need to seek higher education became prominent in the country, the number students enrolled each academic year increased rapidly as well. Residential facilities were increased and expanded to accommodate the ever increasing number of student intake which demanded restructuring of student residential policy given the limited resources the university had. In the midst of the reforms, beyond the expansion and modification of the original rooms to accommodate two persons at a time, the number increased to five (5) in a room officially, both in the main halls and the annexes. The continuous increase in the student intake amidst the unexpanded residential facilities meant that, not all students could be accommodated on campus, therefore, private hostels began to spring up to absorb the excess students who could not secure accommodation on campus. The private hostels motivation to make profit meant that they charge high prices which were unbearable by many students. This brought about one of the prominent terms that everyone who has passed through the four walls of the University of Ghana is popular with ââ¬Å"Perchingâ⬠. 2.4 The issue of ââ¬Å"Perchingâ⬠The word connotes students who illegally share residential facilities with official occupants of a room. This resulted in overcrowding in the halls, putting extreme pressure on washrooms, reading rooms, hall libraries, dry lines, among other facilities that were originally constructed for two people. This was happening who many reforms were going on. The two most popular reforms were the ââ¬Å"in-out-out-inâ⬠and the ââ¬Å"in-out-out-outâ⬠policies. The former meant that, all first year students were qualified for accommodation on campus, this qualification did not mean automatic allocation of rooms to freshmen but allocation was subject balloting for a ââ¬Å"YESâ⬠or ââ¬Å"NOâ⬠and second and third year students were to look for their own accommodation. Under this policy, final year students like first year students also qualified to be accommodated on campus; it is however, worth noting that, even for the final year students, because of the limited number of rooms available, allocation of rooms was also done via balloting a yes or no by students. The latter policy, in-out-out-out raised a lot of eyebrows as it meant that only first year students were offered accommodation on campus. And for this policy allocation to level 100 students was automatic and assured. With this policy in place the problem of ââ¬Å"perchingâ⬠worsened. The official number of occupants in a room almost doubled for almost all the halls of residence. The adverse effects of poor situation created a lot of problems; poor sanitation, insecurity, discomfort, which had direct impact on studentsââ¬â¢ health, hygiene, and efficiency. 2.5 The current residential policy ââ¬Å"The University of Ghana Hostels with a capacity of 26000 beds, which was to be built at the University of Ghana, Legon, with partnership between the university and six banks was a dream come alive as long as finding a solution to the perennial problem of accommodation in our public universities is concernedâ⬠this was an assertion made by Professor C. N. B. Tagoe, Vice Chancellor of the university of Ghana (GhanaWeb, 2008). From the above statement I would to acknowledge the ââ¬Å"Contingency theoryâ⬠one of the prominent schools under the Open Systems perspective of Organizations. This theory as a branch of systems design emphasizes that design decisions are dependent on environmental conditions. Contingency theory is guided by the general orienting hypothesis that organizations whose internal features match the demands of their environments will achieve the best adaptation. Lawrence and Lorsch (1967), who coined the label ââ¬Å"contingency theoryâ⬠, argue that different environments place differing requirements on organizations. In a recent review article, Lawrence (1993) provides a partial list of factors that one or another theorist has considered important. They include size or scale, technology, geography, uncertainty, individual predispositions of participants, resource dependency, national or cultural differences, scope and organizational life cycle. With concentration on the resource dependency factor, it is indicative that, the adaptation and realization of the said solution was heavily contingent on the provision of financial resources by the six banks which are external to the organization. As the resources from the external environment was provided by the six banks, the expansion of the residential facilities have been a reality indeed, making it possible to establish four different hostels which accommodates about 7, 120 students. It is a combination of these factors that made it possible for the decongestion exercise in the five traditional halls feasible. Currently, some of the hostels have been restructured into halls and run as the traditional halls. The standard rooms accommodate four (4) persons as the annexes do. With other stringent measures put in place to control ââ¬Å"perchingâ⬠it is believed that, the purpose for which this restructuring was done is being worked towards. It must be stated categorically that, the main reason for this exercise is to improve studentsââ¬â¢ efficiency in the university. 2.6 Halls of Residence/Hostels The University believes in community living as an essential part of student life. It is therefore primarily residential, providing accommodation in Halls of Residence for both undergraduate and post-graduate students as well as flats and guest rooms for senior members and guests. There are five halls of residence (available to all students) and several Hostels. The present Halls and Hostels are as follows: Each Hall consists of junior members (students) and senior members (academic and senior administrative and professional staff), and is managed by a Council comprising members elected by persons belonging to the Hall. The Master (or Warden in the case of Volta Hall) is the Head of the Hall. Each Hall has Junior and Senior Common Rooms for students and Faculty, respectively. A tutorial system offers an opportunity for counseling students and ensuring their welfare at both academic and social levels. Students maintain interaction with each other and the wider community through recogni zed clubs and societies. Each Hall has a kitchen and a dining hall to cater for studentsââ¬â¢ feeding. Chapels and a mosque are also available for use by various religious denominations. A Chaplaincy Board co-ordinate the activities of religious groups. Social life on the campus is organised mainly by the Studentsââ¬â¢ Representative Council and the Junior Common Room Committees which provide various kinds of social programmes. LEGON HALL: Legon Hall was the first to be built on the permanent site of the University of Ghana at Legon and is, therefore, the Premier Hall of the University. Its foundation tablet was laid during the Michaelmas Term of 1951 and, in September 1952, the first undergraduates were accepted into residence. On Trinity Sunday, 31st May 1953, the first service was held in the Chapel and the first meal served in the Dining Hall. From these events, the Hall took Trinity Sunday every year as its birthday, celebrated by a common ââ¬Å"Feastâ⬠for both its Junior and Senior Members. The Hallââ¬â¢s motto, Cui Datum (ââ¬Å"To whom much is givenâ⬠¦Ã¢â¬ ), was selected from St. Lukeââ¬â¢s Gospel, in recognition of the special responsibility attached to the Hallââ¬â¢s seniority. Senior Members of t he University may be assigned as Fellows of the Hall by the Vice Chancellor and they usually keep their Fellowship for as long as they remain with the University. Persons of academic distinction outside the University may be elected as Honorary Fellows at a General Meeting of Fellows. The rest of the membership of the Hall is made up of persons in statu pupillari. The governing body of the Hall is the Hall Council, members of which are Fellows of the Hall. The principal Hall Officers are: The Master, the Vice-Master, the President of the Senior Common Room, the Senior Tutor, and the Hall Bursar. AKUAFO HALL: Akuafo Hall was established with the appointment of Professor D.A. Taylor, a Master-designate and a Hall Council in 1953. The Hall Council in 1954 decided to name the Hall Akuafo to commemorate the generous gesture of the farmers of Ghana in giving money for the foundation of the University College. A crest which depicts a cocoa tree, an open book and a drum, designed by Professor W.J. McCallien, and a motto, laboremus et sapiamus, suggested by Professor L.H. Ofosu-Appiah, were adopted by the Council. A commemorative plaque with a Latin inscription composed by Professor L.H. Ofosu-Appiah was set up to show the gratitude of the Hall to the farmers of the country and to the British Government who gave the University College funds for the building of the Hall. The Hall was officially opened on 17 February, 1956, but the first students, numbering 131, came into residence on the 5th October, 1955. The Hall has its own statutes governing the election of officers and the administration of its affairs. Once a year, the Master has to convene a meeting of the Fellows, who form the governing body, to receive his annual report. The Senior Common Room is open to all Fellows and their guests, and the Senior Combination Room to all senior members of the University. Senior Members may also invite students to the Combination Room. COMMONWEALTH HALL: The first batch of students was admitted into residence in Commonwealth Hall at the beginning of the 1956-1957 academic year. In the Lent Term of that academic year, Ghana attained its independence from Great Britain, and the Hall, hitherto known as the Third Hall, was officially christened Commonwealth Hall to commemorate Ghanaââ¬â¢s admission into the Commonwealth of Nations. The official opening of the Hall was performed in March, 1957. It is, so far, the only all-male Hall of Residence in the University. The motto of the Hall, Truth Stands, was taken from a quotation from Satyre by John Donne (1572-1631): ââ¬Å"On a huge hill, cragged, and steep, Truth stands and hee that will Reach her, about must, and about must goeâ⬠This motto combines both the physical situation of the Hall (on a hillside overlooking most of the University and beyond) and the proper pursuit of a University education, the search for truth. It is the only Hall of Residence in the University which has a theatre and Amphitheatre for lectures and plays. The Coat of Arms of the Hall depicts the strength and unity of purpose of members of the Hall deriving from the bonds of association enjoyed by the individual members of the Hall. High Commissioners of the Commonwealth countries in Ghana are accorded Honorary Membership of the Hall. There is a Hall Council which administers the affairs of the Hall, assisted by the Tutorial Board and the Senior Common Room Committee. VOLTA HALL: Volta Hall started as the Fourth Hall in the 1959-60 academic year, on 16th November, 1960. The University College Council, on the recommendation of the Hall Council, named it Volta Hall. The Hall consists of the main hall originally designed to accommodate 82 students, and an annex with an original capacity for accommodating 198 students, the occupation of which began in January 1966. The motto of the Hall, chosen during the Hallââ¬â¢s tenth anniversary celebrations, is in the Akan language and it is: Akokobere Nso Nyim Adekyee. This means that the secret or knowledge of life and nature is a gift to women as it is to men. The Hall has a governing Body which comprises all the Fellows assigned to it and those elected by the assigned Fellows. The government of the Hall rests with this body which delegates some of its powers to a Hall Council. The Hall Council consists of ten members, including the Warden, the Deputy Warden, the Senior Tutor and the Bursar who are ex-officio members. The day-to-day administration of the Hall is carried out by the Warden with the help of the Senior Tutor, who deals with all studentsââ¬â¢ affairs, and the Bursar. MENSAH SARBAH HALL: Mensah Sarbah Hall, the fifth Hall of the University, stands in the southern part of the campus. The Hall consists of a main Hall built around a quadrangle and a number of Annexes standing to the north and east. The last two south annexes are attached to the Hall. Until October 1991, Mensah Sarbah was the only co-ed Hall of Residence in the University, which made it quite unique among the Halls. The governing body of the Hall is the Council, which is responsible to the full body of Fellows who form the Senate. Studentsââ¬â¢ affairs are handled by studentsââ¬â¢ own elected government headed by a President, while the general administration of the Hall is under the Master who is assisted by the Senior Tutor and Tutors on the one hand and the Bursar on the other. Other Hall Officers are the Chaplai n, who is responsible for the Roman Catholic Chapel, the Prayer Room Warden, who is responsible for the Protestant Chapel, and the Librarian. Senior Common Room affairs are managed by an elected committee under the President of the Senior Common Room. The Hall is named after the famous Ghanaian jurist, writer and statesman, John Mensah Sarbah of Cape Coast. It has been customary for the Hall to celebrate the birthday anniversary of this great man every year. This anniversary is known as Sarbah Day and is highlighted by a dinner and a get-together. The Hall has a crest designed to bring out the principal features of Mensah Sarbahââ¬â¢s life. It consists of three elements: a pair of scales, a stool with a book resting upon it, and a hill surmounted by a castle. The scale signifies the legal profession, the stool and the book symbolise culture while the hill and the castle are intended to depict the familiar landscape of Cape Coast with its many hills and forts. At the same time, the castle is intended to symbolise strength and honour. The Hallââ¬â¢s motto is: Knowledge, Honour, Service ââ¬â three words which aptly summarise the guiding principles of Mensah Sarbahââ¬â¢s life. VALCO TRUST HOSTELS: The idea to build a grad uate hostel was first nurtured when Legon Hall Annex C was prepared exclusively for graduate students of the Hall. The quest for a suitable accommodation for graduate students gained attention when Valco Trust Fund offered to finance the construction of a graduate hostel. As a further boost to this course, Legon Hall Annex C was converted into an Annex of the Hostel. The Valco Trust Hostel, donated to the University by the Valco Trust Fund to ease pressure on student accommodation, is a block of purpose-built, self-contained flats for 190 students. The Hostel, which was completed in June 1997, is the Universityââ¬â¢s first hostel for graduate students. A second block with similar facilities was opened in January 2006. Located behind Mensah Sarbah Hall on the southern part of the campus, the flats are arranged in single and double study bedrooms with en suite shower and toilet. There is a shared kitchen for every twelve rooms. Facilities in the hostels include common rooms, washrooms and a restaurant. INTERNATIONAL STUDENTSââ¬â¢ HOSTELS: The International Studentââ¬â¢s Hostels are located on the southern part of the campus off the road to the Noguchi Memorial Institute for Medical Research. For a long time, it had been the dream of the University of Ghana to create and strengthen links with other universities in order to enhance the international student presence on campus. The first phase was commissioned in June 1999 and the second in January 2006. The Hostels are co-educational and each has 43 single rooms and 85 double rooms. In addition, there are facilities such as a well-fortified security system, kitchenettes and restaurants. REFERENCES Amole, D. (2005),ââ¬Å"Coping strategies for living in student residential facilities in Nigeriaâ⬠, Environment and Behaviour, Vol. 37, pp. 201-19. Amole, D. (2009b),ââ¬Å"Residential satisfaction in studentsââ¬â¢ housingâ⬠, Journal of Environment Psychology, Vol. 29, pp. 76-85. Association of African Universities (2004), ââ¬Å"Challenges Facing African Universities: Selected Issuesâ⬠, African Studies Review (2004) Vol. 47, No. 1, 1-59 Dahlan, N., Jones, P., Alexander, D., Salleh, E. and Alias, J. (2009),ââ¬Å"Evidence base prioritization of indoor comfort perceptions in Malaysian typical multi-storey hostelsâ⬠, Building and Environment, pp. 2158-65. Elsinga, M. and Hoekstra, J. (2005),ââ¬Å"Homeownership and housing satisfactionâ⬠, Journal of Housing and the Built Environment, Vol. 20, pp. 401-24. Fay, G. (1981),ââ¬Å"A model for reviewing growth environmentsâ⬠, Journal of College and University Student Housing, Vol. 11 No. 1, pp. 46-7. Foubert, J.D., Tepper, R. and Morrison, D.R. (1998),ââ¬Å"Predictors of student satisfaction in university residence hallsâ⬠, Journal of College and University Student Housing, Vol. 21No. 1, pp. 41-6. Hassanain, M.A. (2008),ââ¬Å"On the performance evaluation of sustainable student housing facilitiesâ⬠, Journal of Facilities Management, Vol. 6 No. 3, pp. 212-25. James, R.N. (2008), ââ¬Å"Residential satisfaction of elderly tenants in apartment housingâ⬠, Social Indicators Research, Vol. 89, pp. 421-37. James, R.N. (2008), ââ¬Å"Residential satisfaction of elderly tenants in apartment housingâ⬠, Social Indicators Research, Vol. 89, pp. 421-37. Kaya, N. and Erkip, F. (2001), ââ¬Å"Satisfaction in a dormitory building: the effects of floor height on the perception of room size and crowdingâ⬠, Environment & Behavior, Vol. 33 No. 1, pp. 35-53. Khozaei, F., Hassan, A.S. and Khozaei, Z. (2010a), ââ¬Å"Undergraduate studentsââ¬â¢ satisfaction with hostel and sense of attachment to place: case study of ââ¬Å"universiti sains Malaysiaâ⬠, American Journal of Engineering and Applied Sciences, Vol. 3 No. 3, pp. 516-20. Lawrence, Paul R. and Jay W. Lorsch. (1967)ââ¬Å"Organization and environmentâ⬠Boston; Harvard University, Division of Research, Graduate School of Business Administration. Parkes, A., Kearns, A. and Atkinson, R. (2002), ââ¬Å"What makes people dissatisfied with their neighbourhoods?â⬠, Urban Studies, Vol. 39 No. 13, pp. 2413-38. Price, I., Matzdorf, F., Smith, L. and Agahi, H. (2003),ââ¬Å"The impact of facilities on student choice of universityâ⬠, Facilities, Vol. 21 No. 10, pp. 212-22. Radder, L. and Han, X. (2009), ââ¬Å"Service quality of on-campus student housing: a South African experienceâ⬠, The International Business & Economics Research Journal, Vol. 8 No. 11, pp. 107-19. Salleh, A.G. (2008),ââ¬Å"Neighbourhood factors in private low-cost housing in Malaysiaâ⬠, Habitat International, Vol. 32, pp. 485-93. www.ghanaweb.com, (Tuesday, 8th January, 2008) retrieved on 4th October, 2012. www.ug.edu.gh (2012) retrieved on 10th October, 2012 www.ug.edu.gh (2012) retrieved on 2nd November, 2012 www.ug.edu.gh (2012) retrieved on 5th November, 2012
Sunday, November 10, 2019
Simulation And Result Of Scalar Control Engineering Essay
6.0 IntroductionThis chapter focuses on scalar control in three stage initiation motor public presentation, trying to happen the intrinsic advantages and disadvantages of the method. An probe is conducted, via instance survey, into the public presentation of initiation motor thrust using the scalar control method. As package bundle, Matlab Simulink has been used and the simulation consequences are presented to turn out the dynamic behaviour of this type of control method.6.1 Matlab and simulink.In the simulation of initiation machines utilizing Matlab and Simulink are first-class for numerical computation and informations visual image ; control applied scientists use them extensively for analysis design are many different tool chests available which extend the basic map of Matlab into different application countries ; for illustration, the Matlab tool chests, ââ¬Å" control system â⬠ââ¬Å" model prognostic control â⬠and ââ¬Å" Robust control â⬠supply methods for computing machine -aided control system design. The simulation bundle allows a broad scope of different constellations and theoretical accounts to be investigated quickly. The Simulink Matlab application is adopted because of its intrinsic integrating of vectorized system representation in block diagram signifier. Therefore, in this bundle, the package is used as an analytical for the graphical portraiture of the clip developments of signals combined with the simple realisation of the functionality of control and power electronic excitements.6.2 The initiation motor theoretical accountThe initiation motor theoretical account has to be taken into consideration, It is of import because it is related to the control of the initiation motor. The initiation motor is used because it has perfected of features of theoretically and by experimentation. It is driven in a figure of different mentions frame, so the purpose of the theoretical account is frequently expressed in an arbitrary two-axis go arounding mention frame. This makes it easy to command ; the interior decorator can mend the mention frame to a peculiar motor measure and adjust the theoretical account consequently. All electrical parts of the machine, the variables and parametric quantities, are viewed from the stator. This is all indicated by the major marks in the machine equations given below. All rotor and stator measures are in the arbitrary two-axis rotor mention frame ( dq frame ) . The inferiors used are defined as follows: vitamin D: A vitamin D axis measure Q: A A Q axis measure R: A A rotor measure s: A stator measure cubic decimeter: A A escape induction m: A common inductioniÃâ ? Electrical System( 6.1 )( 6.2 )( 6.3 )( 6.4 )Where,( 6.5 )( 6.6 )( 6.7 )( 8.8 )( 9.9 )( 6.10 )( 6.11 )iÃâ ? Mechanical System( 6.12 )( 6.13 )Asynchronous machine parametric quantities in the rotor mention frame are defined as follows: Rs, Lls stator opposition and escape induction R'r, L'lr Rotor opposition and escape induction Lumen Common induction Ls, L'r entire stator and rotor inductions Vqs, intelligence quotient Q axis stator electromotive force and current V'qr, i'qr Q axis rotor electromotive force and current Vds, Idahos vitamin D axis stator electromotive force and current V'dr, i'dr vitamin D axis rotor electromotive force and current stator Q and vitamin D axis fluxes rotor Q and vitamin D axis fluxes angular speed of the rotor P figure of pole braces electrical angular speed ( Wr * P ) Tellurium electromagnetic torsion Thulium shaft mechanical torsion rotor angular place Joule combined rotor and burden inactiveness Hydrogen combined rotor and burden inactiveness invariable F combined rotor and burden syrupy clash Table ( 6.1 ) -rotor mention frame definitions Where the inferior s corresponds to stator, r corresponds to rotor, d corresponds to direct axis, q corresponds to quadrature axis and L corresponds to leakage. Te represents torsion, while P is the figure of poles. The tantamount circuit is shown above.6.3 Reference frame.The mention frame is used to change over input electromotive force ( abc mention frame ) to the dq mention frame and besides used for change overing the end product currents dq mention frame to ( abc mention frame ) . A pick has to be made between the following mention frame transmutations: Synchronous. Stationary ( Clarke or ii transmutation ) . Rotor ( park transmutation ) . The pick of the mention frame wave forms affects all dq variables. It besides affects the velocity of the simulation and, in some instances, the truth of the consequences. The undermentioned guidelines are suggested: If the stator electromotive forces are non balanced or non connected and the rotor electromotive forces are balanced ( or 0 ) a stationary mention frame can be used. If the rotor electromotive forces are non balanced or non connected and the stator electromotive forces ; are balanced rotor mention frame can be used. If all the electromotive forces are connexions and balanced the stationary or synchronal mention frame can be used. The undermentioned relationships explain the rudiment to dq mention frame transmutations which apply to the initiation machine block ââ¬Ës input electromotive forces.( 6.14 )I n the old equations, I? is the angular place of the mention frame, while i = i?à ± ââ¬â i?à ±r, and the difference between the place of the mention frame and the place ( electrical ) of the rotor. Because the machines twists are connected in a three-wire Y constellation. There is no sequence ( 0 ) constituent. It besides justifies the usage of two input electromotive force lines to the line in the signifier alternatively of three electromotive force lines to impersonal. The relationships that follow depict the dq-to rudiment mention frame transmutations applied to Asynchronous machine stage currents. ( 6.15 ) ( 6.16 ) ( 6.17 ) ( 6.18 ) In the tabular array below are shown values represented by andi . In each mention frame ( vitamin E is the location of the synchronously revolving mention frame. Mention Frame Rotor R 0 Stationary 0-rSynchronous vitamin E e ââ¬â R Table ( 6.2 ) , value of and in each mention frame. ( Reference Matlab )6.4 Induction Motor Drives with Scalar ControlOne manner of understanding scalar control method is by utilizing instances survey with Matlab simulation. This portion of this chapter will concentrate and discus how this method performs. The simulation consequences will be analysed and compared subsequently on with vector control.6.4.1 Case surveyThe circuit shown below as the instance survey, an unfastened cringle scalar control method with PWM inverter is used to feed the stator through the control electromotive force supply. This inverter uses sinusoidal pulse-width transition ; hence, the base of frequence of the moving ridge ââ¬Ës frequence is set at 60 Hz and the triangular bearer wave ââ¬Ës frequence is set at 1980Hz. This corresponds to a frequence transition factor medium frequency of 33 ( 60 *33 = 1980 Hz ) . A three-phase initiation motor is connected to a changeless burden of nominal value 11.9Nm.In this circuit, a three stage initiation motor is b uilt. Blocks of the machines and power electronic Matlab libraries have been used and besides in this circuit all the parametric quantities are the same circuit of vector control because the research worker wished to do a comparing between this circuit diagram of scalar control and vector control. Furthermore, the machine is used it has the same parametric quantities of vector control and scalar control. Figure ( 6.2 ) unfastened cringle simulink block diagram theoretical account6.4.2 Construction of Electrical Model Induction Machine.Figure ( 6.3 ) shows block diagram the abc transmutation to dq of the initiation machine Figure ( 6.4 ) shows implement distinct trspezoidal integrating of machine equations in rotor, stationary or synchronal mention frame. Figure ( 6.5 ) shows block diagram of the dq transmutation to abc of the initiation machine6.4.3 Simulation parametric quantities:Choosing the ode23tb incorporating algorithm, set the comparative tolerance to 1e-3, the absolute tolerance and maximal measure size to car and the stop clip to 4s. So the scalar method simulation was carried out utilizing the motor parametric quantities as shown in the tabular array below. The tabular array shows the simulation parametric quantities for constellation of the circuit Fig ( 6.2 ) Start clip 0 Integrator type 0d23 Stop clip 4s Relative tolerance 1e-3 Relative tolerance car Maximal measure size car Initial measure size car Table ( 6.3 ) the simulation parametric quantities in the simulation parametric quantities instance survey. Power, electromotive force and frequence [ pn ( VA ) Vn ( Vrms ) , fn ( Hz ) ] [ 50*746, 460,60 ] Stator opposition and induction [ Rs ( ohm ) L1s ( H ) ] : [ 0.087 0.8e-3 ] Rotor opposition and induction [ Rr, ( ohm ) Llr, ( H ) ] : [ 0.228 0.8e-3 ] Common induction Lm ( H ) : [ 34.7e-3 ] : Inertia, clash factor and pole braces [ J ( Kg.m 2 ) F ( N.m.s ) p0 ] : [ 1.662 0.12 ] Initial conditions [ 1,0,0,0,0,0,0,0 ] Table ( 6.4 ) Asynchronous motor parametric quantities6.4.4 Simulation consequences:The thrust started from deadlock by stipulating 0 for all initial conditions of province variables in the Powergui interface. In this instance, the mention velocity was stepped from 120 to160 rad / s at t= 1 s and thrust variables velocity, torsion and current observed. Transeunt responses to get down the initiation motor thrust are shown below ; the first figure shows motor steady province torsion and velocity. Figure ( 6.6 ) the motor started and reached its steady province velocity of 120 rad/s ( 1800rpm ) at 1s ; at get downing, the magnitude of the 60 Hz current reached approximately 180 A, its peak current ( 127 rms ) , = = 127 Arms. Therefore, there was a high initiation motor get downing current, as was expected, because the motor has high power, whereas its steady province value was ( 20A ) and the Irms value about ( 14,14 rms ) . Besides, strong oscillations of the electromagnetic torsion at get downing were observed. On the torsion in steady province observation noisy signal with a average value of 11.9 Nm. In the three motor currents there was observed all the harmonics [ multiples of the 1980 Hz exchanging frequence ] which were filtered by the stator induction, so that the 60 Hz constituents were dominant. Sing the curves of the three stage initiation motor ( squirrel Cage ) , on get downing the motor without burden, the motor get downing currents, torsion and velocity can be observed on the range. At the terminal of simulation clip at ( 4s ) . , when the motor was reached steady province that is the torsion and velocity are changeless, So, Te ââ¬â TL = 0, it was observed that the stator and rotor currents were rather ( noisy ) and the torsion and velocity had truly changeless value because the motor was non yet loaded so that is why the motor was on steady province. Figure ( 6.6 ) Simulation of the initiation motor without burden6.4.5 Get downing with burden.In the following simulation end product different simulations were used to happen out the result when the velocity is set-up at steady province at a certain clip. In this figure ( 6.7 ) , the rotor velocity started increasing from 0 to 120 rad/s, after this, the lessening velocity for short clip between 2 2nd and 2.5 second, so velocity decreased until steady province ( 100 rad/s ) , for the falling value of the velocity is 20 rad/s. Suddenly, alteration in the magnitude of the stator current resulted in transient before the torsion reached the steady province and besides alteration in the linkage of the rotor flux. The research worker could detect the motor currents were high and largely noisy get downing current and besides that the torsion starts additions from 2 seconds to 2.5 seconds and to increase until changeless value was reached ; at the same clip as cut downing velocity, the curre nt, nevertheless, was increased because the relationship between torsion and velocity are reciprocally related. Finally and clearly either the dynamic torsion control is really hapless and besides it has jobs with the transeunt response of the torsion or it is really hapless and can non be controlled by the torsion in the transient province. Figure ( 6.7 ) measure up torque response at 11.9N.m The undermentioned simulation of torsion 50N.m applied at least two seconds and a changeless velocity of 120 rad / s to see how this theoretical account of scalar controls responded to these alterations. This simulation shows the end product velocity started increasing from 0 to 120 rad / s, than at 2 seconds the velocity will be reduced to 90 rad / s, so that the torsion is applied to two seconds, so get down to cut down velocity ( a little ) at the same clip, torsion is increased until making a changeless value. The starting currents were high, up to 1.5 seconds, and so reduced until the steady province was reached at the same clip the torsion applied. Internist provinces torque and current were noisy and did non discontinue. However, the dynamic behavior of scalar control was non perfect, so in this it instance affected the public presentation of the initiation motor. Scalar control should be used at low velocity and variable velocity, for illustration as fans or pumps. Figure ( 6.8 ) simulation of the initiation motor thrust with step-up torsion Figure ( 6.9 ) shows simulation end product difference simulation status was used to happen out the result when the velocity is step up at the steady province at certain clip. At the one second the velocity starts to increase and the torsion besides increased but for short clip so the torsion starts to decreased until reached changeless value, besides this clip the velocity invariable. This means altering the velocity with the scalar control under the steady province status will be sensible. Figure ( 6.9 ) simulation of the initiation motor thrust with step-up velocity The dynamic public presentation of thrust ( public presentation relation to the velocity control mention alteration and burden torsion ) as Fig ( 6.10 ) can be studied by using two alterations in operating conditions of the thrust ; a measure alteration in velocity mention and measure alteration of the burden torsion. The torsion 50Nm was applied for 2 seconds and velocity of measure 140rad / s for 1 2nd, to see how these model scalar controls would react to these alterations. In this instance, it was observed the velocity dropped aggressively to one second, shortly, and so went up to 140 rad / s to 3.5 seconds. The electromagnetic torsion of the initiation motor was foremost variable in 0.6 seconds. After the torsion is little bead of one second when the rate was applied the torsion continuously went up to 90Nm in 3.5 seconds. In this instance, the increased velocity and torque addition were non the same as earlier. The chief job of current and torsion in 1 second is if the torsion all of a sudden drops and the current addition is more than the starting current, In this instance, the value of the burden and velocity control should be increased. Figure ( 6.10 ) simulation of the initiation motor thrust with step-up velocity and torsion. Figure ( 6.11 ) simulation of the initiation motor thrust with step-up velocity and torsion.6.5 Scalar control dissectionThe electromotive force applied to the motor must alter with frequence. The control method is really simple and easy to implement. Improves inactive public presentation of control system, but its transient capableness is non satisfactory. Accurate place control is non possible. Open cringle scalar control will be able to provide speed fluctuation ; it is non able to supply reliable control under transeunt conditions. Therefore, the scalar control is suited merely if the motor operates in steady province without velocity ordinance. Scalar control is used chiefly in applications where changeless torsion is required. Scalar control ever has hapless kineticss. Scalar control methods are used merely the magnitude and frequence ( V/Hz ) .
Subscribe to:
Posts (Atom)