Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This study investigates the Copper(111) - Antimony (Sb) system which is characterized by a complex interplay between adsorbate interactions and adsorbate substrate interactions which manifest through self-assembly processes. Surface sensitive techniques such as Low Energy Electron Diffraction and Auger Electron Spectroscopy were utilized to determine the substrate cleanliness prior to the growth of monolayer Sb coverage. The surface chemical reactivity on an atom-by-atom basis of the Cu sample surface was studied by current imaging tunneling spectroscopy. The use of surface sensitive techniques in studying the surface alloy in question allows for more precise statements to be made about the surface structure of the system at various temperatures. Based on the experimental results, a comprehensive study of the adsorption and segregation behavior of Sb on Cu(111), including the mechanisms for phase formation at the atomic scale, is presented in this study.
Some managers shy away from implementing employee recognition programs fearing high associated costs. Yet, there are some simple and free-cost recognition programs - like saying "e;thank you"e; and "e;well done"e; - which are crucial. Upon this basis, this study's main purpose is to assess the relationship between simple employee recognition and employee productivity. It is guided by the following objectives: Determining and measuring the best employee productivity, forms of simple employee recognition, relationship between simple employee recognition and employee productivity, and strategies of how to improve employee productivity through recognition. For this purpose, related literature was reviewed and a case study research design in support of both quantitative and qualitative techniques was applied for data collection, presentation and analysis. A sample size of 400 respondents was selected and used with composition of all levels of management for M-Nic Consultancy & Research Centre. Data collection was done using questionnaires and interviews, presented, analysed, interpreted and discussed for conclusions and recommendations.
The dire African economic situation has been a perennial problem for the past six decades. Many problems emanate from slow economic growth, such as poverty and unemployment. There is a need for a collective effort to ensure economic growth, which would be the most viable solution to these problems, and the key to such a collective effort is regional economic integration (REI). This study examines REI within the legal context. It tests the proposition that the law can be used as a means to achieving REI. At the heart of this proposition lies the legal challenge that comes with the different approaches to legal reception and how they impede the realisation of REI. An analysis is performed of the theories related to legal reception, which include the monist, the dualist and the hybrid theories. REI was embraced in Europe and has yielded fruitful results. There is no doubt that the collective efforts to realise economic growth in other continents stem from the inspiration of the European example. Europe is used in this study to illustrate how the obstacles that accompany the different approaches to legal reception may be superseded. The study examines how the law was used in Europe as a means to attain REI. An attempt is then made to understand REI from an African perspective by setting out the legal framework and its shortcomings. Attention is paid to Africa's sub-region of Southern Africa, and the study examines legal reception within Southern Africa and how the different approaches to legal reception within the two RECs, the SADC and COMESA, impact upon the realisation of REI. It seeks to evaluate the possibility that the African continent, particularly Southern Africa, may be able to use the law to attain REI. A further analysis is made by examining South Africa's approach to legal reception and how this impacts on the realisation of REI.
Remaining competitive in the retail industry of South Africa in the digital age is a major business concern. In the age of digital natives"e;, people are well-connected on various digital technology platforms and are digital consumers. Digital technologies offer retail organizations new innovative ways to create value by utilizing digital business strategies, processes, and products. This qualitative research study explores the perception of retail strategy experts and decision-makers toward realignment of IT and business strategies considering digital transformation in South Africa. Based on interviews with seven managers and decision-makers in the retail industry, the study reveals that digital technologies have disrupted traditional ways of doing business. The study proposes eight major recommendations, in which retail traders could innovate their business strategy to enhance value creation beyond traditional approaches to retailing. It provides a good starting point for academic research in a domain that is deficient in theoretical and empirical research on the South Africa retail sector, and offers retailing managers a conceptual model to guide them toward a digital business strategy for transient competitive advantages.
Population ageing is a process no longer confined to industrialized countries. Many developing countries are now also experiencing ageing of their populations, reflected by the rising share of the elderly in the total population. Not only are developing countries ageing, they are ageing at a much faster rate and at a much earlier stage of economic development, thus placing them at a greater disadvantage in terms of their ability to respond to ageing developments. The availability of domestic resources, for example, to finance ageing pressures on public finances and public services are likely to be more limited. In addition, the political timeframe available to formulate and implement appropriate policy responses will be shorter. Developing countries are confronting ageing pressures at a time when social security coverage is still limited to a minority of the better-off elderly population, and when the systems of protection which have supported the elderly in the past are gradually eroding. Old age is commonly associated with retirement, illness and dependency. Most government jobs have set the retirement age at sixty. However, in a country such as India, where no universal social security exists, people tend to work as long as they can: About seventy percent of the elderly in India still work like the rest of the adults. It is important to recognize the strengths of the old and empower them rather than to adopt a paternalistic attitude that can have devastating impact on the self-esteem of the elderly citizens. This study takes a close look at silver workers in Vadodara, India, who are working in their retirement age. By undertaking such a research, the government and civil society will be enabled to provide a better work environment for the silver workers.
The wear resistance of PTFE can be significantly improved by addition of suitable filler materials. Besides the type, the shape and size of the materials added also influence the tribological properties. In the past, research in this area has been confined to the PTFE filled with conventional filler materials like glass fibers, graphite, carbon fibers, etc. However, with the growing demand for utilizing PTFE in a variety of applications, significant effort is needed towards developing the novel composite materials by adding one or more non-conventional filler materials possessing the potential of increasing the wear resistance. It is established that PTFE exhibits significantly low coefficient of friction when sliding against steels. The low coefficient of friction results from the ability of its extended chain linear molecules, - (CF2-CF2) n-, to form low shear strength films upon its surface and mating counter-faces during sliding. PTFE is extensively used for a wide variety of structural applications as in aerospace, automotive, earth moving, medical, electrical, electronics, computer and chemical industries. On account of its good combination of properties, these are used for producing a number of mechanical components such as gears, cams, wheels, brakes, clutches, bearings, gaskets, seals as well as wires, cables, textile fibers, electronic components, medical implants, surgical instruments etc.
This book contains various applications of programmable logic controllers and SCADA designing of a plant. Nowadays, all human handled plants are being replaced by automatic control systems, thus called Automation. PLCs are accepted worldwide for easier access and better precision. In this book Rockwell PLCs are described and so is the SCADA design, which is also done by the RSView32 software, manufactured by Rockwell. It is one of the biggest names in the PLC software industry, being easy to use, control and modify. Some electrical drives, such as D.C drives and A.C drives, are also described in detail because the control part is done by the PLCs but the main plant is based on these electrical drives.
Since Liechtenstein, as the first country in the world, acknowledged the legal position of Single Member Liability Companies by statute law, this type of company has been legally recognized in an increasing number of countries. But in practice, England is the first country which paved the way to one man company practice with the Solomon case. Single Member Company emerged and developed rapidly in recent years, for the reason of their strong economic, political and legal theoretical basis. As a result, we can dig into their emergence and development from a social and historical point of view. It is helpful to encourage investment, develop economy and facilitate employment, and more freedom to the owner of the company. When compared with ordinary types of companies, Single Member Companies' legal character lies in the singularity of shareholder and the particularity of its corporate governance structure. Thus it increases the possibility for the single shareholder to abuse the rights and damage the interests of companies' creditors and tax authority. In order to protect the company's creditors, it is necessary to regulate single member company strictly and set up integrated creditors protection rules. Therefore, the legal status for Single Person Companies should be authorized and as well positively standardized in order to seek advantages and avoid disadvantages. Ethiopia has suitable conditions when we analyse the factual situation of a country to introduce and to benefit from the advantage of one man companies.
The Azad Jammu and Kashmir (AJK) environmental profiling project has been completed aiming at the healthy environment for the citizens of AJK. The Environmental Protection Agency of AJK has been providing the logistical support and mobility etc. throughout the sampling period. The present study has a very strong focus on "e;Indoor Air Quality Monitoring"e;. The monitoring has been performed at the selected locations of Muzaffarabad, Mirpur and Bhimber in residential, commercial and industrial areas for ambient air. Indoor air quality has been measured in schools, houses, hospitals and industrial units of different locations of Muzaffarabad, Mirpur and Bhimber.
As modern organizations seek for changes to enhance their competitive positions and their survivability in global markets, the successful implementation of organizational change has become an important management task. But still, many companies are unable to succeed in change processes. Failures show that there is considerable room for researchers to provide insights into opportunities for improving the success of organizational change events. Given the fact that individuals are the most important units in organizational change, a successful implementation requires employees' acceptance and support. Hence, employees' positive attitudes and their Work Engagement are considered to be fundamental requirements. Nevertheless, there is limited understanding of the multitudinous factors associated with employees' decision to support organizational change. Basically, organizational change is stressful as it requires the readiness to embrace change and the readjustment of employees' routine tasks. In this regard, leadership is considered to be one of the most important variables affecting the attitudinal dimension of organizational processes. Empowering Leadership implies sharing power to foster employees' motivation and engagement in their work. Empowering Leadership emerges when supervisors foster trust-based relationships with followers, show interest in their personal problems, facilitate participative decision-making and coach them to be more self-reliant. However, relatively few studies have tested how and why Empowering Leadership relates to Follower Work Engagement in organizational change environments. This study tries to cover exactly these points.
Wireless communication systems are extensively used in the current decade. Internet based applications are accessed by mobile networks at any time and from anywhere. Nowadays, roaming in mobile communication has become extremely popular. Mobility is the function that allows a user to move around and, at the same time, stay inside the network. The Global Mobility Network (GLOMONET) plays a very important role in wireless communication. When people visit some other country they have to use the mobile services. In GLOMONET, the roaming user, being in a foreign country, uses the mobile services with the help of their home country network. Mobile users connect themselves to a foreign network and the foreign network verifies the legality of the mobile user through their home network and home agent. Due to the technological improvements, many security issues have been raised up. While designing the security protocols for wireless networks, communication and computation costs are very important. The objective of this study is to propose an authentication scheme that has the ability to detect and resist all possible attacks. Formal security analysis and authenticity of proposed thesis is analyzed with BAN logic and ProVerif. Furthermore, the author checked the security of the proposed scheme informally against different attacks.
The implementation of Radio Frequency Identification (RFID) technology in industrial manufacturing and retail supply chain management has seen strong growth in recent years. This is partly due to Wal-Marts RFID mandate to its suppliers. As more companies along the global supply chain adopt RFID, RFID tags embedded can be expected to proliferate in virtually every industrial product, ranging from computers to automobiles, in the near future. Large retailers likeWal-Mart and government agencies such as the U.S. Department of Defense (DoD) have driven recent developments in RFID technology. This in turn has a diffusion effect on hundreds of suppliers and manufacturers as their products are required to be tagged before shipping to these giant customers. RFID technology provides a good alternative to automatically reading and writing product information. In addition to recording the identity of an object, RFID technology also documents its current status, recent past, and immediate future.
This research discusses the relationship between the migration of skilled professional and managerial workers from Canada to the United States, the so-called "e;brain drain"e;, and seeks to determine if and how the Canada-U.S. Free Trade Agreement (FTA) and the North American Free Trade Agreement (NAFTA) may have affected bilateral flows of permanent and non-permanent immigrants between the two countries. Classical economic theory suggests that trade and factor movements are substitutes, so that freer trade between Canada and the United States could be expected to reduce incentives for bilateral migration. On the other hand, the labor demands of multinational corporations in the emerging global marketplace require a greater degree of worker mobility than has heretofore existed. The research reviews available historic and longitudinal evidence related to political, social and economic effects of the FTA and the NAFTA.
Dental caries is a multi factorial, bacterial, chronic infection that affects millions of people in the world and has become a public health problem. Also referred to as tooth decay, this disease is one of the most common disorders throughout the world, second only to the common cold. Dental caries is the most common chronic childhood disease in the United States and is 5 to 7 times more common than asthma. According to the World Oral Health Report in 2003, dental caries affect 60-80% of school children and a vast majority of adults. If left untreated, dental caries can result in cavities forming and, eventually, tooth loss. Although the prevalence and severity of dental caries has decreased over the years, this disease can be controlled better with proper fluoride exposure. Fluoride dentifrices have been shown in numerous clinical trials to be effective anticaries agents and have been recognized as a major cause of the remarkable decline in caries prevalence in many developed countries. Dentifrices have been widely adopted around the world as the principle means of delivering topical fluoride and obtaining caries preventive benefits. Although there is documented literature on the use of topical fluorides, the issue needs to be further researched based on the recent documeanted literature and guidelines regarding use of topical fluorides. Hence, the present review was conducted with the aim to review the available literature on the use and effectiveness of different topical fluorides used in dentistry.
The purpose of this volume is to broadly discuss the media's responsibility to provide discursive contributions to the ethical and moral challenges of our times. At the crossroads of intellectual progress and profit-orientation, concentration tendencies in the academic publishing industry pose a threat to the reputation and integrity of higher education. The actions of whistleblowers like Edward Snowden have radically changed our perception of privacy, stirring debates about the ethical and moral dilemma attached to the disclosures. Islam and religion continue to rank as urgent topics in the news - with the most influential contributions to the public discourse often belonging to ideologically influenced Western voices. One century after the Bolshevik revolution in 1917, Russia is still negotiating how to categorize these events - which have recently been pointed out in a controversial TV show. The example of Nigeria makes clear that insecurity and national development go hand in hand with responsible press coverage, while the low self-perception of the Belarusian film industry is due partly to its depiction in the country's only cinematographic publication.
Literary data is supposed to reflect real life situations and is at the same time written in a style of writing that is considered as highly elevated. Such reasons have prompted the contributors to this book to deal with this type of data. Such attempts range from semantics to stylistics and pragmatics. This book introduces linguistic analyses of literary data from different points of view. This involves dealing with various linguistic topics and different types of literary data. Hence, many models are presented to analyze the linguistic aspects of those topics in the light of the genre in which those topics are undertaken. Accordingly, different results are yielded from those analyses and this makes each type of analysis distinct from the other ones. It is hoped that this work will be a useful source to all those - whether theoretically, practically, or both - interested in linguistics, pragmatics of literature, applied linguistics and literary stylistics.
The main concern of this work is to tackle manipulation in communicative events as one of the means used by politicians to achieve certain goals such as influencing the behavior, desire, belief and emotions of others to their self-interests without evident detection of their communicative intention. As a communicative event and from a pragmatic point of view, manipulation in the political field has not been given enough attention. Thus, this study scrutinizes the pragmatic aspects of manipulation in British and American political debates. As such, it sets itself the task of achieving several aims, the most important of which are: (1) specifying the pragmatic criterion/criteria according to whose presence a certain political debate is considered as manipulative, (2) identifying the manipulation types used by politicians and the pragmatic strategies via which each type is fulfilled, (3) exhibiting the whole pragmatic structure of manipulative, whether British or American, political debates, (4) pinpointing both the manipulative pragmatic strategies used to fulfill each sub-stage (component) and manipulative strategies adopted to attain all the sub-stages (components) of the entire pragmatic structure of manipulation, (5) highlighting the manipulative pragmatic strategies, the manipulative strategies, as well as the manipulation types highly resorted to by politicians in political debates, (6) showing transparent inter/intra-differences that can be detected in terms of the debater's employment of manipulation types, the whole pragmatic structure of manipulation, the manipulative pragmatic strategies, and the manipulative strategies used by the debaters, and (7) developing a pragmatic model for identifying the types of manipulation and the pragmatic strategies used to fulfill each type; in addition to another eclectic model to analyze the pragmatic structure and strategies of the data under scrutiny.
International business correspondence is not simply writing or information exchange. It is something that you want others to know about you - to know about your business and the way you deal with business transactions. It is by the way you create your letter that your reader can identify whether you are friendly, rude, or you just simply want to do business. Your letter shows your attitude. This is one reason why it is important to consider your way of writing, write professionally and with courtesy. Success of business transactions is not only dependent on your ability to talk and communicate verbally, but also the way you communicate in letters. How important is learning the proper way of writing business letters? This book will help you to improve your written communication by guiding you through the steps and guidelines of making an effective letter. Aside from that, you will learn to see that planning is important. Gathering information and doing some research will help you. As you go through answer complaints, it will save you to make adjustments, it is important and friendly to reply to inquiries, it is good to be precise in your quotations, it is proper to acknowledge placed orders or acknowledge payment, it is worth to check all outgoing orders for shipment and delivery, it is important to have an insurance policy, it is tedious to deal internationally without bank transactions, and it is by connection that you can increase your sales. You need to connect to your customers and readers in order to build a good working relationship. If you are able to establish a good relationship, they will value you as their business partners. Skills in creating business letters are important for the success of your business. Business letter writing skills will also boost your confidence as a businessman and will help boosting your business as well. This book aims to help students to develop their skills and confidence in writing international busi-ness letters. It can also serve as a reference for students at college and university levels.
In the past few years, secure information sharing became very popular in the area of immigration, military applications, healthcare, education, foreign affairs, etc. As secure communication utilizes both wireless and wired communication mechanizations for exchanging sensitive information, security and privacy of the information exchange cannot be easily compromised. To moderate the security, integrity, authenticity, and privacy issues related to information exchange, numerous authentication mechanisms have been recommended by different researchers in the literature in recent times, but these are vulnerable to prospective security flaws such as masquerade, insider, replay, impersonation, password guessing, server spoofing, denial-of-service attacks and, in addition, have failed to deliver mutual authentication. In the past few years we have also witnessed a balanced growth in the acceptance of VoIP (Voice over IP) facilities because the numerous Web and VoIP applications depend on huge and extremely distributed infrastructures to process requests from millions of users in an appropriate manner. Due to their extraordinary desires, these large-scale internet applications have frequently surrendered security for other objectives such as performance, scalability and availability. As a result, these applications have characteristically favored weaker, but well-organized security mechanisms in their foundations. Session Initiation Protocol (SIP) is an application and presentation layers signaling protocol that initiates, modifies, and terminates IP-based multimedia sessions. Implementing SIP for secure communication has been a topic of study for the past decade, and several proposals are available in the research domain. However, security aspects are not addressed in most of these proposals, because SIP is exposed to several threats and faces security issues at these layers. Probes for SIP (Session Initiation Protocol) servers have been conveyed for many years. To gather more details about these activities the author has designed a scheme for SIP servers in a network and composed data about some popular attacks. Furthermore, he explains his interpretations and guidance on how to prevent these attacks from being successful. Biometrics, a new field of research, has also been dealt with in this research by means of a "e;three-factor authentication scheme"e;, in which one factor is biometrics.
This book provides a comparison of different wearable technology systems used in professional football. Furthermore, it includes a qualitative study about the possibilites of amateur football clubs to use said devices or similar ones. The aim is to evaluate if it makes sense to use wearable technology in amateur football.
Wireless communication is one of the most dynamic and vibrant areas of technology development in the communication field today. It has been found that severe climatic conditions disturb the propagation of electromagnetic signals at higher frequencies (greater than 30 MHz). The disturbance is mainly due to molecular absorption by oxygen for frequencies ranging between 60 and 118 GHz and due to water vapour in 22, 183 and 325 GHz bands. Rain and fog has the most significant impact, since the size of the rain drops is of the order of the wavelength of the transmitted signal. This results in energy absorption by the rain drops themselves, and as a secondary effect energy is scattered by the drops. The frequency selective absorption characteristics of the atmosphere can be approximated by a transfer function. In most of the practical channels when the signal propagates through the atmosphere the effect of many factors on the signal has to be considered along with the free space propagation channel assumption. The main objective of this study is, therefore, to find out whether, and how, the different climatic conditions are influencing radio wave propagation in GSM frequency bands in general and in Narnaul, Haryana (India) in particular. To carry out this investigation, the records of radio wave propagation along with path loss during different climatic conditions have been analyzed. On the strength of these analyses, a propagation path loss model has been developed by proposing suitable correction factors due to different climatic conditions. The validation of this developed path loss model has been verified by taking reference models and by applying practically in different urban areas. The effect of these climatic conditions on the link budget has also been analyzed.
One of the main topics of ancient Sanskrit literature and medieval literature from different parts of India are Rama and Krishna oriented themes. From Valmiki Ramayana in Sanskrit to Ramayana in different vernacular languages of Tamil, Telgu, Malayalam, Kannada, Assamese, Gujarati, Bengali, Odishi, Marathi and Hindi, all have proceeded from the rudimentary stage of local language literature to become Mahakavyas in their respective areas and reached every nook and corners of the region, galvanizing the minds and hearts of the populace. Although they have been composed in different periods and the poets and composers have a different style of presentation of their own, they acquired the status of original spokespersons of Ramayana in their respective regions. It is a fact that Indian languages and literature are enriched by the form, content, ideas and ideologies of the epics of yesteryears. After Rama became accepted as an incarnation of Vishnu and after the popularization of devotion of Rama in the fourteenth century, all literature was intertwined in the current of a feeling of love and devotion. This trend has been manifested in the work of Balarama Dasa, one of the doyens of litterateurs of medieval Odisha. He equated Rama with Lord Jagannath and named his version of Ramayana as Jagamohana Ramayana itself. He belonged to a group of litterateurs who were famous in the history of Odisha as Panchasakhas and were known for their sublimity, egalitarianism and intellectualism. It is always important to revisit the works of literature of different periods to find out about the state of mind of those writers and composers who generated their literary marvels to establish their views emphatically with a reformative approach. In Odisha, the Panchasakhas were the champions of liberty, fraternity and equality. Therefore, it is even more important to analyse their works again to escalate the idea of free thought and expression and rescue the gamut of their opinions and ideas from intellectual hibernation.
Many heat transfer problems are time dependent. Such unsteady or transient problems typically arise when the boundary conditions of a system are changed. For example, if the surface temperature of a system is altered, the temperature at each point in the system will also begin to change. The changes will continue to occur until a steady state temperature distribution is reached. Consider a hot metal billet that is removed from a furnace and exposed to a cool air stream. Energy is transferred by convection and radiation from its surface to the surroundings. Energy transfer by conduction also occurs from the interior of the metal to the surface, and the temperature at each point in the billet decreases until a steady state condition is reached. The final properties of the metal will depend significantly on the time - temperature history that results from heat transfer. Controlling the heat transfer is one key to fabricating new materials with enhanced properties. The author's objective in this textbook is to develop procedures for determining the time dependence of the temperature distribution within a solid during a transient process, as well as for determining heat transfer between the solid and its surroundings. The nature of the procedure depends on assumptions that may be made for the process. If, for example, temperature gradients within the solid may be neglected, a comparatively simple approach, termed the lumped capacitance method or negligible internal resistance theory, may be used to determine the variation of temperature with time. The entire book has been thoroughly revised and a large number of solved examples and additional unsolved problems have been added. This book contains comprehensive treatment of the subject matter in simple and direct language. The book comprises eight chapters. All chapters are saturated with much needed text supported and by simple and self-explanatory examples.
This project presents the performance analysis of Particle swarm optimization (PSO), hybrid PSO and Bayesian classifier to calculate the epileptic risk level from electroencephalogram (EEG) inputs. PSO is an optimization technique which is initialized with a population of random solutions and searches for optima by updating generations. PSO is initialized with a group of random particles (solutions) and then searches for optima by updating generations. Hybrid PSO differs from ordinary PSO by calculating inertia weight to avoid the local minima problem. Bayesian classifier works on the principle of Bayes' rule in which it is the probability based theorem. The results of PSO, hybrid PSO and Bayesian classifier are calculated and their performance is analyzed using performance index, quality value, cost function and classification rate in calculating the epileptic risk level from EEG.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.