Monday, September 30, 2019

Nature vs. Nurture

Nature Vs. Nurture For centuries psychologists have argued over which plays the larger role in child development, heredity or environment. One of the first theories was proposed in the seventeenth century by the British philosopher John Locke. Locke believed that a child was born with an empty mind, tabula rasa (meaning â€Å"blank slate†) and that everything the child learns comes from experience, nothing is established beforehand. Years later, Charles Darwin brought forth his theory of evolution, which led to a return of the hereditarian viewpoint. With the twentieth century, however, came the rise of behaviorism. Behaviorists, like John B. Watson and B. F. Skinner, argued that a child can be made into any kind of person, regardless of their heredity. Today, most psychologists agree that both nature (genes) and nurture (environment) play an important role, not independently, but as they interact together (Atkinson, p. 72). One of the most important factors believed to influence a child are parents. Parents are known to share a distinctive bond with their children. This special bond is what enables parents to shape their children. Whether it is into free-willed adolescents, ready to challenge any controversy, or into caring adults willing to spend the seventy cents a day to save a poverty stricken child. Parents have the power to mold their children. Setting firm, yet sensible, guidelines teaches children discipline and good behavior. Using physical abuse produces aggressive children, but having patience and understanding leaves a child better capable to handle stress in later years. How parents raise their children influences how they will turn out (Begley, p. 53). Surprisingly, a new debate is taking place. As the author of The Nurture Assumption: Why Children Turn Out the Way They Do; Parents Matter Less Than You Think and Peers Matter More, Judith Rich Harris argues that parents have absolutely no say in what kind of children they raise. She claims that after the parents contribute an egg or sperm filled with DNA, their job of â€Å"creating† a child is complete. Her book is backed by some 750 references, but most of her conclusions come from the observation of her own two daughters; one her own and one adopted (Begley, p. 53). Parents, however, do play an important role in childhood development. For the purposes of this essay, her theory that parents have no lasting effects on a child's personality will be argued. The following contains supporting scientific evidence. The DNA structure of a human, the genes, determines the height a person will reach, whether an individual's eyes will be green or brown, and if a person's hair will be straight or curly (Saplosky, p. 44). Research has also found that genes are 30 to 70 percent responsible for personality traits such as aggression, passion, shyness and intelligence. The other 30 to 70 percent of a person's personality develop from the environment (Pool, p. 2). Genes, however, are not what produces a behavior, an emotion, or even a thought. Instead, genes produce a protein that contains hormones, which carry messages between cells, and neurotransmitters that carry messages between nerve cells. The protein also contains receptors that receive the hormonal and neurotransmitter messages as well as enzymes that read the messages. So what does all this have to do with behavior? Well, the hormone does not cause a behavior either, but rather a reaction. This reaction is a tendency to respond to the individual's environment in a certain way. This response is behavior. Without the ever changing environment, behavior would not happen (Saplosky, p. 42-43). Wouldn't this fact make everyone act the same? Everyone lives in the same world. Everyone is facing the same problems of a growing population, pollution, and disintegrating resources. Wouldn't this make everyone act the same? Not at all. When speaking of the environment that shapes a person's personality, it isn't the environment that the world population shares. It includes more personal things like birth order and personal, unique life experiences. This is the â€Å"environment† that influences behavior. Things like the pollution leave no lasting effect on a child's behavior (Pool, p. 52). Everyone's genes also differ. Of the DNA found in every human being, only 5% can be coded and used to determine which proteins will be used. The other 95% of non coded DNA is used as a instruction manual for the operator. The environment being the operator which regulates the genes. In turn, a personality is produced. As well as having different genes to produce different proteins, the proteins produce hormones at different levels. For example, two people both have the same functioning gene. The hormones produced are the same, but function at different levels. Therefore, one of them may become more prone to depression than the other simply because the proteins in that person's genes function, in a sense, better (Sapolsky, p. 46). Parents can not determine whether or not their family history of shyness is passed on to their children, but they can determine if they are going to let it control their childrens' life. Studies done by Harvard scholar Jerome Kagan prove that parents who push their timid children to try new things end up with children who are far less fearful. On the other hand, overprotective parents did nothing to ease their childrens' discomfort. Intervention studies, studies similar to Kagan's, have shown that parents who purposely change their behavior can change their child's behavior. Although genes cannot be helped, parents can control whether or not they affect the child (Begley, p. 56). Research has also found that a child's experience of his or her parents is an especially strong sculptor in parts of the brain involved with emotion, personality, and behavior. Strong bonds with parents are found to increase a child's ability to learn and cope with stress. On the other hand, abusive parents raise children that in later years grow to express inappropriate aggression and have a small attention span. Having responsive, sensitive parents inspire trust and secure attachments. Yet, insensitive and withdrawn parents create an insecure attachment. Developmental psychologists agree, the bond children have with parents is essential for them to become well-functioning adults (Wright, p. 76). Megan Gunnar, a developmental psychologist at the University of Minnesota in Minneapolis, studies relationships between parents and children. One of her studies focused on the relationship between attachment security and reaction to stress. Gunnar found that when infants were exposed to stressful situations, such as vaccinations, strangers, or separation from the mother, the stress hormone cortisol was produced. By the age of two, the hormone wasn't produced by the toddlers in stressful situations, although they acted out as if it were. These children, however, had secure attachments to their parents. Children who didn't have the security still produced the hormone cortisol (Wright, p. 76). Harris, who feels parents leave no impression on their children, believes that â€Å"Parental divorce has no lasting effects on the way children behave† (Begley, p. 56). Heredity, she says, is what makes a child act out about or during a divorce. The fact, though, is that the unstable situation of the family causes a child to act out (Edwards, p. 31). For a child, friends, pets, teachers, and others important people may come and go. Parents and their family, however, should always be there for them. When parents divorce, a child may feel lost and may not know how to handle it (Edwards, p. 31). Acting out is one way of showing anger and hurt. Parents, although they don't realize it, are shaping their child's personality. Whether it is by acting out or holding it all in, children are influenced by their parent's actions. Kids will be kids. It's a common phrase. Everybody uses it, but not everybody understands it. Parents often feel that, despite their efforts, their children will do what they want. They'll smoke and drink and party. They'll cuss and cheat. They'll go against their parents wishes. Why? Because human behavior often follows cultural norms (Pinker, p. 94). If the parents did their job well, the rebellion will only be a stage that the child will grow out of. If parents didn't do their job right, the stage may set the mood for the rest of the child's life. Parents are the most influential â€Å"environmental† factors in a child's behavior. A special bond is shared between children and their parents. As Roger Rosenblatt put it, â€Å"We do what we can as parents, one child at a time. We take what we get in our children, and they take what they get in us, making compromises and adjustments where we are able, making rules and explanations, but for the most part letting things happen. . . † (Rosenblatt, p. 90). Genes may determine the possibilities of personality available, but it is the parents that make those possibilities possible. Parents matter. Bibliography: Arkinson, Rita L. â€Å"Psychological Development† Introduction to Psychology. New York: Harcourt Brace Jovanovich Inc. , 1993. Begley, Sharon. â€Å"The Parent Trap,† Newsweek, (September 7, 1998). p. 52-59. Edwards, Randall. Divorce Need Not Harm Children. † in Child Welfare: Opposing Viewpoints. Bender, David and Leone, Bruno, Series Editors. San Diego: Greenhaven Press, 1998. Kevles, Behhyann H. and Daniel J. â€Å"Scapegoat Biology. † Discover, (October 1997). p. 58-62. Pinker, Steven. â€Å"Against Nature. † Discover, (October 1997). p. 92-95. Pool, Robert. â⠂¬Å"Portrait of a Gene Guy. † Discover, (October 1997). p. 51-55. Rosenblatt, Roger. â€Å"A Game of Catch,† Time, Vol. 152 (July 13, 1998). p. 90. Sapolsky, Robert. â€Å"A Gene For Nothing,† Discover, (October 1997). p. 40-46. Waldman, Steven. â€Å"Divorce Harms Children. † in Child Welfare: Opposing Viewpoints. Nature vs. Nurture Nature Vs. Nurture For centuries psychologists have argued over which plays the larger role in child development, heredity or environment. One of the first theories was proposed in the seventeenth century by the British philosopher John Locke. Locke believed that a child was born with an empty mind, tabula rasa (meaning â€Å"blank slate†) and that everything the child learns comes from experience, nothing is established beforehand. Years later, Charles Darwin brought forth his theory of evolution, which led to a return of the hereditarian viewpoint. With the twentieth century, however, came the rise of behaviorism. Behaviorists, like John B. Watson and B. F. Skinner, argued that a child can be made into any kind of person, regardless of their heredity. Today, most psychologists agree that both nature (genes) and nurture (environment) play an important role, not independently, but as they interact together (Atkinson, p. 72). One of the most important factors believed to influence a child are parents. Parents are known to share a distinctive bond with their children. This special bond is what enables parents to shape their children. Whether it is into free-willed adolescents, ready to challenge any controversy, or into caring adults willing to spend the seventy cents a day to save a poverty stricken child. Parents have the power to mold their children. Setting firm, yet sensible, guidelines teaches children discipline and good behavior. Using physical abuse produces aggressive children, but having patience and understanding leaves a child better capable to handle stress in later years. How parents raise their children influences how they will turn out (Begley, p. 53). Surprisingly, a new debate is taking place. As the author of The Nurture Assumption: Why Children Turn Out the Way They Do; Parents Matter Less Than You Think and Peers Matter More, Judith Rich Harris argues that parents have absolutely no say in what kind of children they raise. She claims that after the parents contribute an egg or sperm filled with DNA, their job of â€Å"creating† a child is complete. Her book is backed by some 750 references, but most of her conclusions come from the observation of her own two daughters; one her own and one adopted (Begley, p. 53). Parents, however, do play an important role in childhood development. For the purposes of this essay, her theory that parents have no lasting effects on a child's personality will be argued. The following contains supporting scientific evidence. The DNA structure of a human, the genes, determines the height a person will reach, whether an individual's eyes will be green or brown, and if a person's hair will be straight or curly (Saplosky, p. 44). Research has also found that genes are 30 to 70 percent responsible for personality traits such as aggression, passion, shyness and intelligence. The other 30 to 70 percent of a person's personality develop from the environment (Pool, p. 2). Genes, however, are not what produces a behavior, an emotion, or even a thought. Instead, genes produce a protein that contains hormones, which carry messages between cells, and neurotransmitters that carry messages between nerve cells. The protein also contains receptors that receive the hormonal and neurotransmitter messages as well as enzymes that read the messages. So what does all this have to do with behavior? Well, the hormone does not cause a behavior either, but rather a reaction. This reaction is a tendency to respond to the individual's environment in a certain way. This response is behavior. Without the ever changing environment, behavior would not happen (Saplosky, p. 42-43). Wouldn't this fact make everyone act the same? Everyone lives in the same world. Everyone is facing the same problems of a growing population, pollution, and disintegrating resources. Wouldn't this make everyone act the same? Not at all. When speaking of the environment that shapes a person's personality, it isn't the environment that the world population shares. It includes more personal things like birth order and personal, unique life experiences. This is the â€Å"environment† that influences behavior. Things like the pollution leave no lasting effect on a child's behavior (Pool, p. 52). Everyone's genes also differ. Of the DNA found in every human being, only 5% can be coded and used to determine which proteins will be used. The other 95% of non coded DNA is used as a instruction manual for the operator. The environment being the operator which regulates the genes. In turn, a personality is produced. As well as having different genes to produce different proteins, the proteins produce hormones at different levels. For example, two people both have the same functioning gene. The hormones produced are the same, but function at different levels. Therefore, one of them may become more prone to depression than the other simply because the proteins in that person's genes function, in a sense, better (Sapolsky, p. 46). Parents can not determine whether or not their family history of shyness is passed on to their children, but they can determine if they are going to let it control their childrens' life. Studies done by Harvard scholar Jerome Kagan prove that parents who push their timid children to try new things end up with children who are far less fearful. On the other hand, overprotective parents did nothing to ease their childrens' discomfort. Intervention studies, studies similar to Kagan's, have shown that parents who purposely change their behavior can change their child's behavior. Although genes cannot be helped, parents can control whether or not they affect the child (Begley, p. 56). Research has also found that a child's experience of his or her parents is an especially strong sculptor in parts of the brain involved with emotion, personality, and behavior. Strong bonds with parents are found to increase a child's ability to learn and cope with stress. On the other hand, abusive parents raise children that in later years grow to express inappropriate aggression and have a small attention span. Having responsive, sensitive parents inspire trust and secure attachments. Yet, insensitive and withdrawn parents create an insecure attachment. Developmental psychologists agree, the bond children have with parents is essential for them to become well-functioning adults (Wright, p. 76). Megan Gunnar, a developmental psychologist at the University of Minnesota in Minneapolis, studies relationships between parents and children. One of her studies focused on the relationship between attachment security and reaction to stress. Gunnar found that when infants were exposed to stressful situations, such as vaccinations, strangers, or separation from the mother, the stress hormone cortisol was produced. By the age of two, the hormone wasn't produced by the toddlers in stressful situations, although they acted out as if it were. These children, however, had secure attachments to their parents. Children who didn't have the security still produced the hormone cortisol (Wright, p. 76). Harris, who feels parents leave no impression on their children, believes that â€Å"Parental divorce has no lasting effects on the way children behave† (Begley, p. 56). Heredity, she says, is what makes a child act out about or during a divorce. The fact, though, is that the unstable situation of the family causes a child to act out (Edwards, p. 31). For a child, friends, pets, teachers, and others important people may come and go. Parents and their family, however, should always be there for them. When parents divorce, a child may feel lost and may not know how to handle it (Edwards, p. 31). Acting out is one way of showing anger and hurt. Parents, although they don't realize it, are shaping their child's personality. Whether it is by acting out or holding it all in, children are influenced by their parent's actions. Kids will be kids. It's a common phrase. Everybody uses it, but not everybody understands it. Parents often feel that, despite their efforts, their children will do what they want. They'll smoke and drink and party. They'll cuss and cheat. They'll go against their parents wishes. Why? Because human behavior often follows cultural norms (Pinker, p. 94). If the parents did their job well, the rebellion will only be a stage that the child will grow out of. If parents didn't do their job right, the stage may set the mood for the rest of the child's life. Parents are the most influential â€Å"environmental† factors in a child's behavior. A special bond is shared between children and their parents. As Roger Rosenblatt put it, â€Å"We do what we can as parents, one child at a time. We take what we get in our children, and they take what they get in us, making compromises and adjustments where we are able, making rules and explanations, but for the most part letting things happen. . . † (Rosenblatt, p. 90). Genes may determine the possibilities of personality available, but it is the parents that make those possibilities possible. Parents matter. Bibliography: Arkinson, Rita L. â€Å"Psychological Development† Introduction to Psychology. New York: Harcourt Brace Jovanovich Inc. , 1993. Begley, Sharon. â€Å"The Parent Trap,† Newsweek, (September 7, 1998). p. 52-59. Edwards, Randall. Divorce Need Not Harm Children. † in Child Welfare: Opposing Viewpoints. Bender, David and Leone, Bruno, Series Editors. San Diego: Greenhaven Press, 1998. Kevles, Behhyann H. and Daniel J. â€Å"Scapegoat Biology. † Discover, (October 1997). p. 58-62. Pinker, Steven. â€Å"Against Nature. † Discover, (October 1997). p. 92-95. Pool, Robert. â⠂¬Å"Portrait of a Gene Guy. † Discover, (October 1997). p. 51-55. Rosenblatt, Roger. â€Å"A Game of Catch,† Time, Vol. 152 (July 13, 1998). p. 90. Sapolsky, Robert. â€Å"A Gene For Nothing,† Discover, (October 1997). p. 40-46. Waldman, Steven. â€Å"Divorce Harms Children. † in Child Welfare: Opposing Viewpoints. Nature vs. Nurture Nature Vs. Nurture For centuries psychologists have argued over which plays the larger role in child development, heredity or environment. One of the first theories was proposed in the seventeenth century by the British philosopher John Locke. Locke believed that a child was born with an empty mind, tabula rasa (meaning â€Å"blank slate†) and that everything the child learns comes from experience, nothing is established beforehand. Years later, Charles Darwin brought forth his theory of evolution, which led to a return of the hereditarian viewpoint. With the twentieth century, however, came the rise of behaviorism. Behaviorists, like John B. Watson and B. F. Skinner, argued that a child can be made into any kind of person, regardless of their heredity. Today, most psychologists agree that both nature (genes) and nurture (environment) play an important role, not independently, but as they interact together (Atkinson, p. 72). One of the most important factors believed to influence a child are parents. Parents are known to share a distinctive bond with their children. This special bond is what enables parents to shape their children. Whether it is into free-willed adolescents, ready to challenge any controversy, or into caring adults willing to spend the seventy cents a day to save a poverty stricken child. Parents have the power to mold their children. Setting firm, yet sensible, guidelines teaches children discipline and good behavior. Using physical abuse produces aggressive children, but having patience and understanding leaves a child better capable to handle stress in later years. How parents raise their children influences how they will turn out (Begley, p. 53). Surprisingly, a new debate is taking place. As the author of The Nurture Assumption: Why Children Turn Out the Way They Do; Parents Matter Less Than You Think and Peers Matter More, Judith Rich Harris argues that parents have absolutely no say in what kind of children they raise. She claims that after the parents contribute an egg or sperm filled with DNA, their job of â€Å"creating† a child is complete. Her book is backed by some 750 references, but most of her conclusions come from the observation of her own two daughters; one her own and one adopted (Begley, p. 53). Parents, however, do play an important role in childhood development. For the purposes of this essay, her theory that parents have no lasting effects on a child's personality will be argued. The following contains supporting scientific evidence. The DNA structure of a human, the genes, determines the height a person will reach, whether an individual's eyes will be green or brown, and if a person's hair will be straight or curly (Saplosky, p. 44). Research has also found that genes are 30 to 70 percent responsible for personality traits such as aggression, passion, shyness and intelligence. The other 30 to 70 percent of a person's personality develop from the environment (Pool, p. 2). Genes, however, are not what produces a behavior, an emotion, or even a thought. Instead, genes produce a protein that contains hormones, which carry messages between cells, and neurotransmitters that carry messages between nerve cells. The protein also contains receptors that receive the hormonal and neurotransmitter messages as well as enzymes that read the messages. So what does all this have to do with behavior? Well, the hormone does not cause a behavior either, but rather a reaction. This reaction is a tendency to respond to the individual's environment in a certain way. This response is behavior. Without the ever changing environment, behavior would not happen (Saplosky, p. 42-43). Wouldn't this fact make everyone act the same? Everyone lives in the same world. Everyone is facing the same problems of a growing population, pollution, and disintegrating resources. Wouldn't this make everyone act the same? Not at all. When speaking of the environment that shapes a person's personality, it isn't the environment that the world population shares. It includes more personal things like birth order and personal, unique life experiences. This is the â€Å"environment† that influences behavior. Things like the pollution leave no lasting effect on a child's behavior (Pool, p. 52). Everyone's genes also differ. Of the DNA found in every human being, only 5% can be coded and used to determine which proteins will be used. The other 95% of non coded DNA is used as a instruction manual for the operator. The environment being the operator which regulates the genes. In turn, a personality is produced. As well as having different genes to produce different proteins, the proteins produce hormones at different levels. For example, two people both have the same functioning gene. The hormones produced are the same, but function at different levels. Therefore, one of them may become more prone to depression than the other simply because the proteins in that person's genes function, in a sense, better (Sapolsky, p. 46). Parents can not determine whether or not their family history of shyness is passed on to their children, but they can determine if they are going to let it control their childrens' life. Studies done by Harvard scholar Jerome Kagan prove that parents who push their timid children to try new things end up with children who are far less fearful. On the other hand, overprotective parents did nothing to ease their childrens' discomfort. Intervention studies, studies similar to Kagan's, have shown that parents who purposely change their behavior can change their child's behavior. Although genes cannot be helped, parents can control whether or not they affect the child (Begley, p. 56). Research has also found that a child's experience of his or her parents is an especially strong sculptor in parts of the brain involved with emotion, personality, and behavior. Strong bonds with parents are found to increase a child's ability to learn and cope with stress. On the other hand, abusive parents raise children that in later years grow to express inappropriate aggression and have a small attention span. Having responsive, sensitive parents inspire trust and secure attachments. Yet, insensitive and withdrawn parents create an insecure attachment. Developmental psychologists agree, the bond children have with parents is essential for them to become well-functioning adults (Wright, p. 76). Megan Gunnar, a developmental psychologist at the University of Minnesota in Minneapolis, studies relationships between parents and children. One of her studies focused on the relationship between attachment security and reaction to stress. Gunnar found that when infants were exposed to stressful situations, such as vaccinations, strangers, or separation from the mother, the stress hormone cortisol was produced. By the age of two, the hormone wasn't produced by the toddlers in stressful situations, although they acted out as if it were. These children, however, had secure attachments to their parents. Children who didn't have the security still produced the hormone cortisol (Wright, p. 76). Harris, who feels parents leave no impression on their children, believes that â€Å"Parental divorce has no lasting effects on the way children behave† (Begley, p. 56). Heredity, she says, is what makes a child act out about or during a divorce. The fact, though, is that the unstable situation of the family causes a child to act out (Edwards, p. 31). For a child, friends, pets, teachers, and others important people may come and go. Parents and their family, however, should always be there for them. When parents divorce, a child may feel lost and may not know how to handle it (Edwards, p. 31). Acting out is one way of showing anger and hurt. Parents, although they don't realize it, are shaping their child's personality. Whether it is by acting out or holding it all in, children are influenced by their parent's actions. Kids will be kids. It's a common phrase. Everybody uses it, but not everybody understands it. Parents often feel that, despite their efforts, their children will do what they want. They'll smoke and drink and party. They'll cuss and cheat. They'll go against their parents wishes. Why? Because human behavior often follows cultural norms (Pinker, p. 94). If the parents did their job well, the rebellion will only be a stage that the child will grow out of. If parents didn't do their job right, the stage may set the mood for the rest of the child's life. Parents are the most influential â€Å"environmental† factors in a child's behavior. A special bond is shared between children and their parents. As Roger Rosenblatt put it, â€Å"We do what we can as parents, one child at a time. We take what we get in our children, and they take what they get in us, making compromises and adjustments where we are able, making rules and explanations, but for the most part letting things happen. . . † (Rosenblatt, p. 90). Genes may determine the possibilities of personality available, but it is the parents that make those possibilities possible. Parents matter. Bibliography: Arkinson, Rita L. â€Å"Psychological Development† Introduction to Psychology. New York: Harcourt Brace Jovanovich Inc. , 1993. Begley, Sharon. â€Å"The Parent Trap,† Newsweek, (September 7, 1998). p. 52-59. Edwards, Randall. Divorce Need Not Harm Children. † in Child Welfare: Opposing Viewpoints. Bender, David and Leone, Bruno, Series Editors. San Diego: Greenhaven Press, 1998. Kevles, Behhyann H. and Daniel J. â€Å"Scapegoat Biology. † Discover, (October 1997). p. 58-62. Pinker, Steven. â€Å"Against Nature. † Discover, (October 1997). p. 92-95. Pool, Robert. â⠂¬Å"Portrait of a Gene Guy. † Discover, (October 1997). p. 51-55. Rosenblatt, Roger. â€Å"A Game of Catch,† Time, Vol. 152 (July 13, 1998). p. 90. Sapolsky, Robert. â€Å"A Gene For Nothing,† Discover, (October 1997). p. 40-46. Waldman, Steven. â€Å"Divorce Harms Children. † in Child Welfare: Opposing Viewpoints.

Sunday, September 29, 2019

New Hoarding Technique for Handling Disconnection in Mobile

Literature Survey On New Hoarding Technique for Handling Disconnection in Mobile Submitted by Mayur Rajesh Bajaj (IWC2011021) In Partial fulfilment for the award of the degree Of Master of Technology In INFORMATION TECHNOLOGY (Specialization: Wireless Communication and Computing) [pic] Under the Guidance of Dr. Manish Kumar INDIAN INSTITUTE OF INFORMATION TECHNOLOGY, ALLAHABAD (A University Established under sec. 3 of UGC Act, 1956 vide Notification no. F. 9-4/99-U. 3 Dated 04. 08. 2000 of the Govt. of India) (A Centre of Excellence in Information Technology Established by Govt. of India) Table of Contents [pic] 1.Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3 2. Related Work and Motivation 1. Coda: The Pioneering System for Hoarding†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 2. Hoarding Based on Data Mining Techniques†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 3. Hoarding Techniques Based on Program Trees†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 4. Hoarding in a Distributed Environment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 5.Hoarding content for mobile learning†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 6. Mobile Clients Through Cooperative Hoarding†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 10 7. Comparative Discussion previous techniques†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 3. Problem Definition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 4. New Approach Suggested 1. Zipf’s Law †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 2. Object Hotspot Prediction Model†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 13 5. Schedule of Work†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 13 6. Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 13 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 . Introduction Mobile devices are the computers which are having wireless communication capabilities to access global data services from any location while roaming. Now a day’s mobile devices are supporting applications such as multimedia, World Wide Web and other high profile applications which demands continuous connections and Mobile devices are lacking here. However, mobile devices with wireless communication are frequently disconnected from the network due to the cost of wireless communication or the unavailability of the wireless network.Disconnection period of mobile device from its network is called as offline period. Such offline periods may appear for different reasons – intentional (e. g. , the available connection is too expensive for the user) or unintentional (e. g. , lack of infrastructure at a given time and location). During offline periods the user can only access materials located on the device’s local memory. Mobile systems typically have a relatively small amount of memory, which is often not enough to store all the needed data for ongoing activities to continue.In such a case, a decision should be taken on which part of the data has to be cached. Often we cannot count on the user’s own judgement of what he/she will need and prefetch. Rather, in our opinion, some sort of automatic prefetching would be desirable. Uninterrupted operation in offline mode will be in high demand and the mobile computer systems should provide support for it. Seamless disconnection can be achieved by loading the files that a user will access in the future from the network to the local storage. This preparation process for disconnected operation is called hoarding.Few of the parameters which complicate the hoarding process are prediction of future access pattern of the user, handling of hoard miss, limited local hoard memory and unpredictable disconnections and reconnection, activities on hoarded object at other clients, the asymmetry of communications bandwidth in downstream and upstream. An important point is to measure the quality of the hoarding and to try to improve it continuously. An often used metric in the evaluation of caching proxies is the hit ratio. Hit ratio is calculated by dividing the number of by the total number of uploaded predictions.It is a good measure for hoarding systems, though a better measure is the miss ratio – a percentage of accesses for which the cache is ineffective. In this work we have given brief overview of the techniques proposed in earlier days and also given the idea for the new hoarding technique. 2. Related Work and Motivation Before the early 1990’s, there was little research on hoarding. Since then, however, interest has increased dramatically among research scientists and professors around the globe and many techniques have been developed. Here we have listed few of the techniques and also will discuss them in brief. Coda: The Pioneering System for Hoarding †¢ Hoarding Based on Data Mining Techniques ? SEER Hoarding System (inspired by clustering technique) ? Association Rule-Based Techniques ? Hoarding Based on Hyper Graph ? Probability Graph Based Technique †¢ Hoarding Techniques Based on Program Trees †¢ Hoarding in a Distributed Environment †¢ Hoarding content for mobile learning †¢ Mobile Clients Through Cooperative Hoarding 2. 1 Coda Coda is a distributed file system based on client–server architecture, where there are many clients and a comparatively smaller number of servers.It is the first system that enabled users to work in disconnected mode. The concept of hoarding was introduced by the Coda group as a means of enabling disconnected operation. Disconnections in Coda are assumed to occur involuntarily due to network failures or voluntarily due to the detachment of a mobile client from the network. Voluntary and involuntary disconnections are handled the same way. The cache manager of Coda, called Venus, is designed to work in disconnected mode by serving client requests from the cache when the mobile client is detached from the network.Requests to the files that are not in the cache during disconnection are reflected to the client as failures. The hoarding system of Coda lets users select the files that they will hopefully need in the future. This information is used to decide what to load to the local storage. For disconnected operation, files are loaded to the client local storage, because the master copies are kept at stationary servers, there is the notion of replication and how to manage locks on the local copies. When the disconnection is voluntary, Coda handles this case by obtaining exclusive locks to files.However in case of involuntary disconnection, the system should defer the conflicting lock requests for an object to the reconnection time, which may not be predictable. The cache management system of Coda, called Venus, diff ers from the previous ones in that it incorporates user profiles in addition to the recent reference history. Each workstation maintains a list of pathnames, called the hoard database. These pathnames specify objects of interest to the user at the workstation that maintains the hoard database. Users can modify the hoard database via scripts, which are called hoard profiles.Multiple hoard profiles can be defined by the same user and a combination of these profiles can be used to modify the hoard database. Venus provides the user with an option to specify two time points during which all file references will be recorded. Due to the limitations of the mobile cache space, users can also specify priorities to provide the hoarding system with hints about the importance of file objects. Precedence is given to high priority objects during hoarding where the priority of an object is a combination of the user specified priority and a parameter indicating how recently it was accessed.Venus per forms a hierarchical cache management, which means that a directory is not purged unless all the subdirectories are already purged. In summary, the Coda hoarding mechanism is based on a least recently used (LRU) policy plus the user specified profiles to update the hoard data-base, which is used for cache management. It relies on user intervention to determine what to hoard in addition to the objects already maintained by the cache management system. In that respect, it can be classified as semi-automated.Researchers developed more advanced techniques with the aim of minimizing the user intervention in determining the set of objects to be hoarded. These techniques will be discussed in the following sections. 2. 2 Hoarding based on Data mining Techniques Knowing the interested pattern from the large collection of data is the basis of data mining. In the earlier history of hoarding related works researchers have applied many different data mining techniques in this arena of mobile hoa rding. Mainly clustering and association rule mining techniques were adopted from data mining domain. . 2. 1 SEER Hoarding System To automate the hoarding process, author developed a hoarding system called SEER that can make hoarding decisions without user intervention. The basic idea in SEER is to organize users’ activities as projects in order to provide more accurate hoarding decisions. A distance measure needs to be defined in order to apply clustering algorithms to group related files. SEER uses the notion of semantic distance based on the file reference behaviour of the files for which semantic distance needs to be calculated.Once the semantic distance between pairs of files are calculated, a standard clustering algorithm is used to partition the files into clusters. The developers of SEER also employ some filters based on the file type and other conventions introduced by the specific file system they assumed. The basic architecture of the SEER predictive hoarding syste m is provided in figure 1. The observer monitors user behaviour (i. e. , which files are accessed at what time) and feeds the cleaned and formatted access paths to the correlator, which then generates the distances among files in terms of user access behaviour.The distances are called the semantic distance and they are fed to the cluster generator that groups the objects with respect to their distances. The aim of clustering is, given a set of objects and a similarity or distance matrix that describes the pairwise distances or similarities among a set of objects, to group the objects that are close to each other or similar to each other. Calculation of the distances between files is done by looking at the high-level file references, such as open or status inquiry, as opposed to individual reads and writes, which are claimed to obscure the process of distance calculation. pic] Figure 1. Architecture of the SEER Predictive Hoarding System The semantic distance between two file referen ces is based on the number of intervening references to other files in between these two file references. This definition is further enhanced by the notion of lifetime semantic distance. Lifetime semantic distance between an open file A and an open file B is the number of intervening file opens (including the open of B). If the file A is closed before B is opened, then the distance is defined to be zero.The lifetime semantic distance relates two references to different files; however it needs to be somehow converted to a distance measure between two files instead of file references. Geometric mean of the file references is calculated to obtain the distance between the two files. Keeping all pairwise distances takes a lot of space. Therefore, only the distances among the closest files are represented (closest is determined by a parameter K, K closest pairs for each file are considered). The developers of SEER used a variation of an agglomerative (i. e. bottom up) clustering algorithm called k nearest neighbour, which has a low time and space complexity. An agglomerative clustering algorithm first considers individual objects as clusters and tries to combine them to form larger clusters until all the objects are grouped into one single cluster. The algorithm they used is based on merging sub clusters into larger clusters if they share at least kn neighbours. If the two files share less than kn close files but more than kf, then the files in the clusters are replicated to form overlapping clusters instead of being merged.SEER works on top of a user level replication system such as Coda and leaves the hoarding process to the underlying file system after providing the hoard database. The files that are in the same project as the file that is currently in use are included to the set of files to be hoarded. During disconnected operation, hoard misses are calculated to give a feedback to the system. 2. 2. 2 Association Rule-Based Techniques Association rule overview: Let I=i1,i2†¦.. im be a set of literals, called items and D be a set of transactions, such that ?T ? D; T? I. A transaction T contains a set of items X if X? T. An association rule is denoted by an implication of the form X ? Y, where X? I, Y ? I, and X ? Y = NULL. A rule X ? Y is said to hold in the transaction set D with confidence c if c% of the transactions in D that contain X also contain Y. The rule X? Y has support sin the transaction set D if s% of transactions in D contains X? Y. The problem of mining association rules is to find all the association rules that have a support and a confidence greater than user-specified thresholds.The thresholds for confidence and support are called minconf and minsup respectively. In Association Rule Based Technique for hoarding, authors described an application independent and generic technique for determining what should be hoarded prior to disconnection. This method utilizes association rules that are extracted by data mining techni ques for determining the set of items that should be hoarded to a mobile computer prior to disconnection. The proposed method was implemented and tested on synthetic data to estimate its effectiveness.The process of automated hoarding via association rules can be summarized as follows: Step 1: Requests of the client in the current session are used through an inferencing mechanism to construct the candidate set prior to disconnection. Step 2: Candidate set is pruned to form the hoard set. Step 3: Hoard set is loaded to the client cache. The need to have separate steps for constructing the candidate set and the hoard set arises from the fact that users also move from one machine to another that may have lower resources.The construction of the hoard set must adapt to such potential changes. Construction of candidate set: An inferencing mechanism is used to construct the candidate set of data items that are of interest to the client to be disconnected. The candidate set of the client is constructed in two steps; 1. The inferencing mechanism finds the association rules whose heads (i. e. , left hand side) match with the client’s requests in the current session, 2. The tails (i. e. , right hand side) of the matching rules are collected into the candidate set.Construction of Hoard set: The client that issued the hoard request has limited re-sources. The storage resource is of particular importance for hoarding since we have a limited space to load the candidate set. Therefore, the candidate set obtained in the first phase of the hoarding set should shrink to the hoard set so that it fits the client cache. Each data item in the candidate set is associated with a priority. These priorities together with various heuristics must be incorporated for determining the hoard set. The data items are used to sort the rules in descending order of priorities.The hoard set is constructed out of the data items with the highest priority in the candidate set just enough to fil l the cache. 3. Hoarding Based on Hyper Graph Hyper graph based approach presents a kind of low-cost automatic data hoarding technology based on rules and hyper graph model. It first uses data mining technology to extract sequence relevance rules of data from the broadcasting history, and then formulates hyper graph model, sorting the data into clusters through hyper graph partitioning methods and sorting them topologically.Finally, according to the data invalid window and the current visit record, data in corresponding clusters will be collected. Hyper graph model: Hyper graph model is defined as H = (V, E) where V={v1 ,v2 ,†¦ ,vn } is the vertices collection of hyper graph, and E={e1 ,e2 ,†¦ ,em } is super-edge collection of hyper graph (there supposed to be m super-edges in total). Hyper graph is an extension of graph, in which each super-edge can be connected with two or more vertices. Super-edge is the collection of a group of vertices in hyper graph, and superedge ei = {vi1, vi2, †¦ inj} in which vi1,vi2 ,†¦ ,vin ? V . In this model, vertices collection V corresponds to the history of broadcast data, in which each point corresponds to a broadcast data item, and each super-edge corresponds to a sequence model. Sequence model shows the orders of data items. A sequence model in size K can be expressed as p = . Use of hyper graph in hoarding are discussed in paper in details. 4. Probability Graph Based Technique This paper proposed a low-cost automated hoarding for mobile computing.Advantage of this approach is it does not explore application specific heuristics, such as the directory structure or file extension. The property of application independence makes this algorithm applicable to any predicative caching system to address data hoarding. The most distinguished feature of this algorithm is that it uses probability graph to represent data relationships and to update it at the same time when user’s request is processed. Before d isconnection, the cluster algorithm divides data into groups.Then, those groups with the highest priority are selected into hoard set until the cache is filled up. Analysis shows that the overhead of this algorithm is much lower than previous algorithms. Probability Graph: An important parameter used to construct probability graph is look-ahead period. It is a fixed number of file references that defines what it means for one file to be opened ‘soon’ after another. In other words, for a specific file reference, only references within the look-ahead period are considered related. In fact, look-ahead period is an approximate method to avoid traversing the whole trace.Unlike constructing probability graph from local file systems, in the context of mobile data access, data set is dynamically collected from remote data requests. Thus, we implemented a variation of algorithm used to construct probability graph, as illustrated in Figure 2. [pic] Figure 2. Constructing the prob ability graph The basic idea is simple: If a reference to data object A follows the reference to data object B within the look-ahead period, then the weight of directed arc from B to A is added by one. The look-ahead period affects absolute weight of arcs.Larger look-ahead period produces more arcs and larger weight. A ’s dependency to B is represented by the ratio of weight of arc from B to A divided by the total weight of arcs leaving B. Clustering: Before constructing the final hoard set, data objects are clustered into groups based on dependency among data objects. The main objective of the clustering phase is to guarantee closely related data objects are partitioned into the same group. In the successive selecting phase, data objects are selected into hoard set at the unit of group. This design provides more continuity in user operation when disconnected.Selecting Groups: The following four kinds of heuristic information are applicable for calculating priority for a grou p: †¢ Total access time of all data objects; †¢ Average access time of data objects; †¢ Access time of the start data object; †¢ Average access time per byte. 2. Hoarding Techniques Based on Program Trees A hoarding tool based on program execution trees was developed by author running under OS/2 operating system. Their method is based on analyzing program executions to construct a profile for each program depending on the files the program accesses.They proposed a solution to the hoarding problem in case of informed disconnections: the user tells the mobile computer that there is an imminent disconnection to fill the cache intelligently so that the files that will be used in the future are already there in the cache when needed. [pic] Figure 3. Sample program Tree This hoarding mechanism lets the user make the hoarding decision. They present the hoarding options to the user through a graphical user interface and working sets of applications are captured automatic ally. The working sets are detected by logging the user file accesses at the background.During hoarding, this log is analyzed and trees that represent the program executions are constructed. A node denotes a file and a link from a parent to one of its child nodes tells us that either the child is opened by the parent or it is executed by the parent. Roots of the trees are the initial processes. Program trees are constructed for each execution of a program, which captures multiple contexts of executions of the same program. This has the advantage that the whole context is captured from different execution times of the program.Finally, hoarding is performed by taking the union of all the execution trees of a running program. A sample program tree is provided in Figure 3. Due to the storage limitations of mobile computers, the number of trees that can be stored for a program is limited to 15 LRU program trees. Hoarding through program trees can be thought of as a generalization of a pr o-gram execution by looking at the past behaviour. The hoarding mechanism is enhanced by letting the user rule out the data files. Data files are automatically detected using three complementary heuristics: 1.Looking at the filename extensions and observing the filename conventions in OS/2, files can be distinguished as executable, batch files, or data files. 2. Directory inferencing is used as a spatial locality heuristic. The files that differ in the top level directory in their pathnames from the running program are assumed to be data files, but the programs in the same top level directory are assumed to be part of the same program. 3. Modification times of the files are used as the final heuristic to deter-mine the type of a file. Data files are assumed to be modified more recently and frequently than the executables.They devised a parametric model for evaluation, which is based on recency and frequency. 3. Hoarding in a Distributed Environment Another hoarding mechanism, which was presented for specific application in distributed system, assumes a specific architecture, such as infostations where mobile users are connected to the network via wireless local area networks (LANs) that offer a high bandwidth, which is a cheaper option compared to wireless wide area networks (WANs). The hoarding process is handed over to the infostations in that model and it is assumed that what the user wants to access is location-dependent.Hoarding is proposed to fill the gap between the capacity and cost trade-off between wireless WANS and wireless LANs. The infestations do the hoarding and when a request is not found in the infostation, then WAN will be used to get the data item. The hoarding decision is based on the user access patterns coupled with that user’s location information. Items frequently accessed by mobile users are recorded together with spatial information (i. e. , where they were accessed). A region is divided into hoarding areas and each infostation is responsible with one hoarding area. 4. Hoarding content for mobile learningHoarding in the learning context is the process for automatically choosing what part of the overall learning content should be prepared and made available for the next offline period of a learner equipped with a mobile device. We can split the hoarding process into few steps that we will discuss further in more details: 1. Predict the entry point of the current user for his/her next offline learning session. We call it the ‘starting point’. 2. Create a ‘candidate for caching’ set. This set should contain related documents (objects) that the user might access from the starting point we have selected. 3.Prune the set – the objects that probably will not be needed by the user should be excluded from the candidate set, thus making it smaller. This should be done based on user behaviour observations and domain knowledge. 4. Find the priority to all objects still in the hoarding set after pruning. Using all the knowledge available about the user and the current learning domain, every object left in the hoarding set should be assigned a priority value. The priority should mean how important the object is for the next user session and should be higher if we suppose that there is a higher probability that an object will be used sooner. . Sort the objects based on their priority, and produce an ordered list of objects. 6. Cache, starting from the beginning of the list (thus putting in the device cache those objects with higher priority) and continue with the ones with smaller weights until available memory is filled in. 5. Mobile Clients Through Cooperative Hoarding Recent research has shown that mobile users often move in groups. Cooperative hoarding takes advantage of the fact that even when disconnected from the network, clients may still be able to communicate with each other in ad-hoc mode.By performing hoarding cooperatively, clients can share their hoar d content during disconnections to achieve higher data accessibility and reduce the risk of critical cache misses. Two cooperative hoarding schemes, GGH and CAP, have been proposed. GGH improves hoard performance by al-lowing clients to take advantage of what their peers have hoarded when making their own hoarding decisions. On the other hand, CAP selects the best client in the group to Hoard each object to maximise the number of unique objects hoarded and minimise access cost. Simulation results show that compare to existing schemes.Details of GGH and CAP are given in paper. 2. 7 Comparative Discussion previous techniques The hoarding techniques discussed above vary depending on the target system and it is difficult to make an objective comparative evaluation of their effectiveness. We can classify the hoarding techniques as being auto-mated or not. In that respect, being the initial hoarding system, Coda is semiautomated and it needs human intervention for the hoarding decision. T he rest of the hoarding techniques discussed are fully automated; how-ever, user supervision is always desirable to give a final touch to the files to be hoarded.Among the automated hoarding techniques, SEER and program tree-based ones assume a specific operating system and use semantic information about the files, such as the naming conventions, or file reference types and so on to construct the hoard set. However, the ones based on association rule mining and infostation environment do not make any operating system specific assumptions. Therefore, they can be used in generic systems. Coda handles both voluntary and involuntary disconnections well.The infostation-based hoarding approach is also inherently designed for involuntary disconnections, because hoarding is done during the user passing in the range of the infostation area. However, the time of disconnection can be predicted with a certain error bound by considering the direction and the speed of the moving client predicting when the user will go out of range. The program tree-based methods are specifically designed for previously informed disconnections. The scenario assumed in the case of infostations is a distributed wire-less infrastructure, which makes it unique among the hoarding mechanisms.This case is especially important in today’s world where peer-to-peer systems are becoming more and more popular. 3. Problem Definition The New Technique that we have planned to design for hoarding will be used on Mobile Network. Goals that we have set are a. Finding a solution having optimal hit ratio in the hoard at local node. b. Technique should not have greater time complexity because we don’t have much time for performing hoarding operation after the knowledge of disconnection. c. Optimal utilization of hoard memory. d. Support for both intentional and unintentional disconnection. e.Proper handling of conflicts in hoarded objects upon reconnection. However, our priority will be for hit rati o than the other goals that we have set. We will take certain assumptions about for other issues if we find any scope of improvement in hit ratio. 4. New Approach 4. 1 Zipf’s Law It is a mathematical tool to describe the relationship between words in a text and their frequencies. Considering a long text and assigning ranks to all words by the frequencies in this text, the occurrence probability P (i) of the word with rank i satisfies the formula below, which is known as Zipf first law, where C is a constant.P (i) = [pic] †¦. (1) This formula is further extended into a more generalized form, known as Zipf-like law. P (i) = [pic]†¦. (2) Obviously, [pic]†¦. (3) Now According to (2) and (3), we have C[pic] [pic] Our work is to dynamically calculate for different streams and then according to above Formula (2) and (4), the hotspot can be predicted based on the ranking of an object. 4. 2 Object Hotspot Prediction Model 4. 2. 1 Hotspot Classification We classify hotsp ot into two categories: â€Å"permanent hotspot† and â€Å"stage hotspot†. Permanent hotspot is an object which is frequently accessed regularly.Stage hotspot can be further divided into two types: â€Å"cyclical hotspot† and â€Å"sudden hotspot†. Cyclical hotspot is an object which becomes popular periodically. If an object is considered as a focus suddenly, it is a sudden hotspot. 4. 2. 2. Hotspot Identification Hotspots in distributed stream-processing storage systems can be identified via a ranking policy (sorted by access frequencies of objects). In our design, the hotspot objects will be inserted into a hotspot queue. The maximum queue length is determined by the cache size and the average size of hotspot Objects.If an object’s rank is smaller than the maximum hotspot queue length (in this case, the rank is high), it will be considered as â€Å"hotspot† in our system. Otherwise it will be considered as â€Å"non hotspot†. And t he objects in the queue will be handled by hotspot cache strategy. 4. 2. 3 Hotspot Prediction This is our main section of interest, here we will try to determine the prediction model for hoard content with optimal hoard hit ratio. 5. Schedule of Work |Work |Scheduled Period |Remarks | |Studying revious work on Hoarding |July – Aug 2012 |Complete | |Identifying Problem |Sept 2012 |Complete | |Innovating New Approach |Oct 2012 |Ongoing | |Integrating with Mobile Arena as solution to Hoarding |Nov- Dec 2012 |- | |Simulation And Testing |Jan 2013 |- | |Optimization |Feb 2013 |- | |Simulation And Testing |Mar 2013 |- | |Writing Thesis Work / Journal Publication |Apr –May 2013 |- | 6. Conclusion In this literature survey we have discussed previous related work on hoarding. We have also given the requirements for the new technique that is planned to be design.Also we are suggesting a new approach that is coming under the category of Hoarding with Data Mining Techniques. Recen t studies have shown that the use of proposed technique i. e. Zipfs-Like law for caching over the web contents have improved the hit ratio to a greater extent. Here with this work we are expecting improvements in hit ratio of the local hoard. References [1]. James J. Kistler and Mahadev Satyanarayanan. Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems, vol. 10, no. 1, pp. 3–25, 1992. [2]. Mahadev Satyanarayanan. The Evolution of Coda. ACM Transactions on Computer Systems, vol. 20, no. 2, pp. 85–124, 2002 [3]. Geoffrey H. Kuenning and Gerald J. Popek. Automated Hoarding for Mobile Computers.In Proceedings of the 16th ACM Symposium on Operating System Principles (SOSP 1997), October 5–8, St. Malo, France, pp. 264–275, 1997. [4]. Yucel Saygin, Ozgur Ulusoy, and Ahmed K. Elmagarmid. Association Rules for Supporting Hoarding in Mobile Computing Environments. In Proceedings of the 10th IEEE Workshop on Research Issues in Data Engineering (RIDE 2000), February 28–29, San Diego, pp. 71–78, 2000. [5]. Rakesh Agrawal and Ramakrishna Srikant, Fast Algorithms for Mining Association Rules. In Proceedings of the 20th International Conference on Very Large Databases, Chile, 1994. [6]. GUO Peng, Hu Hui, Liu Cheng. The Research of Automatic Data Hoarding Technique Based on Hyper Graph.Information Science and Engineering (ICISE), 1st International Conference, 2009. [7]. Huan Zhou, Yulin Feng, Jing Li. Probability graph based data hoarding for mobile environment. Presented at Information & Software Technology, pp. 35-41, 2003. [8]. Carl Tait, Hui Lei, Swarup Acharya, and Henry Chang. Intelligent File Hoarding for Mobile Computers. In Proceedings of the 1st Annual International Conference on Mobile Computing and Networking (MOBICOM’95), Berkeley, CA, 1995. [9]. Anna Trifonova and Marco Ronchetti. Hoarding content for mobile learning. Journal International Journal of Mobile Communications archive V olume 4 Issue 4, Pages 459-476, 2006. [10]. Kwong Yuen Lai, Zahir Tari, Peter Bertok.Improving Data Accessibility for Mobile Clients through Cooperative Hoarding. Data Engineering, ICDE proceedings 21st international Conference 2005. [11]. G. Zipf, Human Behavior and the Principle of Least Effort. Addison-Wesley, 1949. [12]. Chentao Wu, Xubin He, Shenggang Wan, Qiang Cao and Changsheng Xie. Hotspot Prediction and Cache in Distributed Stream-processing Storage Systems. Performance Computing and Communications Conference (IPCCC) IEEE 28th International, 2009. [13]. Lei Shi, Zhimin Gu, Lin Wei and Yun Shi. An Applicative Study of Zipf’s Law on Web Cache International Journal of Information Technology Vol. 12 No. 4 2006. [14]. Web link: http://en. wikipedia. org/wiki/Zipf%27s_law

Saturday, September 28, 2019

Heroes and Culture Essay Example | Topics and Well Written Essays - 1250 words

Heroes and Culture - Essay Example But the way these heroes have affected the present cultures is different. They have ignited in people the will and power to be like them and fight for their rights. Today, people imitate them and follow their ideals. Obviously, no one will go to war but people do indulge in a silent war waged through the ideals of their heroes and proper channeling of plans. Today, heroes inspire people to bring about a desired change and fight against terrorism to save mankind. The name of the hero, Beowulf, is accepted as the title of a poem, originally untitled. The greatest surviving old English poem, in a volume of the Cottonian collection now placed in the British museum, London, known as Vitellius A XV. Beowulf a warrior at heart was a young nobleman of Geatas. (a people who lived in southern Sweden}.The main deeds of his bravery depict court life, social and moral problems of the layman. The legendary Geatish Hero killed two super natural demons, Grendel and Grendel's mother, who in human form, were terrorizing the court of Hrothgar, a Danish monarch. The other event depicts the killing of a dragon that was guarding a treasure since three hundred years. He died himself while pursuing this noble deed since Beowulf belonged to the inherited Germanic heroic traditions. ... The ethical values he transpired are manifest by the Germanic code of loyalty to the chief and tribe and vengeance to enemies. The critics see Beowulf as the champion of goodness and light against the forces of evil darkness. His sacrificial death is not seen as tragic but as a fitting end of a great hero's life. Role he played in inspiring others to imitate him Beowulf has inspired heroes in laymen to sacrifice for their people and to gain earthly joy. He has inspired goodness in many and also the common man to wake up from their deep slumber and take a stand. He has inspired heroes in a nation of the then cowardly people. Today, in the 21st century the age old tale has once again brought into light since Beowulf is now an epic movie about to be released soon. The legend has come alive and will inspire many yet again. Wolverine Wolverine is a fictional character and a superhero created by writer Len Wein, artist John Romita and illustrator Herb Trimpe. Recently, the character of Wolverine was refreshed by the movie X-men's writer Chris Claremont. Wolverine's catch phrase describes his character best; "I'm the best there is at what I do, but what I do isn't very nice." Wloverine is a mutant with animal keen senses and incrdible physical capabilities. He has the power to recover from his wounds supernaturally. Using the Weapon X with the indestructible metal alloy adamantium, Wolverine has long razor sharp nails. He is a master at martial arts as well. Deeds Wolverine has a long confusing history but the character gained limelight when it was included in the popular X-men series. He is a super hero who kills evil and especially goes against authoirty of all kinds. His deeds basically depict cunningness, sharpness, quickness and fearlessnes. These qualities

Friday, September 27, 2019

Marketplace Structure Research Paper Example | Topics and Well Written Essays - 750 words

Marketplace Structure - Research Paper Example Contrary, a monopolistic market emerges after a firm produces a product that is not similar to what others produce. The product is unique and there is no replacement. The organization enjoys being the only single producer of the product or service. Consequently, the organization controls the price and quality. Entry in the monopolistic market is challenged by economies of scale. Monopolistic competitive market consists of organizations selling similar products that are not identical. There are many organizations each taking a portion of the market. Baade (33) adds that, the organizations diversify the products so that they have a variety according to name, style and pricing. Movement in and out of the industry does not have a barrier. Oligopoly is a market structure where a few organizations with same or diversified product gain prominence in the market. Because the few large organizations are known to each other, decisions are made putting into consideration the competitor’s reaction. Decisions on advertising, output and prices are influenced by the rival organizations. There is a tendency to diversify or standardize the product. Entering the industry requires a large capital. Economies of scale are the major hindrance to joining the industry.   Manchester United fits into the oligopoly market structure. It is a football club featured in the premier league among other prominent and wealthy football clubs. Its rivals in the market include; Arsenal, Liverpool, Leeds United and Manchester City.

Thursday, September 26, 2019

Makeovers Essay Example | Topics and Well Written Essays - 500 words

Makeovers - Essay Example It is through our outward appearances that we project who and what we are to other people. Regardless of how much an individual resembles the idealized images portrayed on movies and in television programs, though, there is a clear and consistent message that the average viewer sitting at home is never ‘good enough’. â€Å"Indeed Smith believes that women view their bodies as ‘objects of work’ requiring attention and upkeep in order to operate well and promote the desired effect†. Weintraub quotes Extreme Makeover creator Nely Galan regarding the reasons she started her reality show. â€Å"You know, women are always saying, ‘Oh, if I had a personal trainer and chef like Oprah, or liposuction like actresses do †¦Ã¢â‚¬â„¢ Well, we’re going to give them that.† Critics of these shows discount the professed counseling and other therapy offered as meaningless coatings on the real issue at hand, which is â€Å"getting you that new b od, the one that will make all your friends and family at last see you as being ‘hot’.However, for many people, being able to classify themselves as being in the ‘in crowd’ is all they need to feel the confidence necessary to make the changes that lead to a better life. It is this hope for the future that the programs play on, both for those participating in the program and for those at home watching their television sets. With confidence that your home, your garden, your abilities, etc.

Wednesday, September 25, 2019

APA RESEARCH PAPER Example | Topics and Well Written Essays - 1250 words

APA - Research Paper Example It is an independent risk factor for cardiovascular diseases and significantly increases the risk of morbidity and mortality. The last two decades have witnessed an increase in health care costs due to obesity and related issues among children and adolescents. Childhood obesity is a global phenomenon affecting all socio-economic groups, irrespective of age, sex or ethnicity. Aetiopathogenesis of childhood obesity is multi-factorial and includes genetic, neuroendocrine, metabolic, psychological, environmental and socio-cultural factors. Many co-morbid conditions like metabolic, cardiovascular, psychological, orthopaedic, neurological, hepatic, pulmonary and renal disorders are seen in association with childhood obesity. The treatment of overweight and obesity in children and adolescents requires a multidisciplinary, multi-phase approach, which includes dietary management, physical activity enhancement, restriction of sedentary behaviour, pharmacotherapy and bariatric surgery. A holist ic approach to tackle the childhood obesity epidemic needs a collection of activities including influencing policy makers and legislation, mobilizing communities, restructuring organizational practices, establishing coalitions and networks, empowering providers, imparting community education as well as enriching and reinforcing individual awareness and skills. The implications of this global phenomenon on future generations will be serious unless appropriate action is taken. Keywords: Adolescents, children, dietary management, obesity, overweight Go to: Introduction Worldwide, disease profiles are transforming at a rapid pace catching the attention of medical professionals and policy makers alike. This is particularly true in low and middle-income countries that form the major chunk of global population. The emerging epidemics of obesity, cardiovascular disease (CVD) and diabetes form the crux of this phenomenal change. Among these entities, obesity has become a colossal epidemic ca using serious public health concern and contributes to 2.6 million deaths worldwide every year1. Obesity is an independent risk factor for CVD. Obesity is associated with an increased risk of morbidity and mortality as well as reduced life expectancy. The last two decades of the previous century have witnessed dramatic increase in health care costs due to obesity and related issues among children and adolescents2. For children and adolescents, overweight and obesity are defined using age and sex specific normograms for body mass index (BMI). Children with BMI equal to or exceeding the age-gender-specific 95th percentile are defined obese. Those with BMI equal to or exceeding the 85th but are below 95th percentiles are defined overweight and are at risk for obesity related co-morbidities3. Go to: Epidemiology Childhood obesity affects both developed and developing countries of all socio-economic groups, irrespective of age, sex or ethnicity. It has been estimated that worldwide over 22 million children under the age of

Tuesday, September 24, 2019

Management and auditing Article Example | Topics and Well Written Essays - 500 words

Management and auditing - Article Example iability of the information that IT system supports and the system operate with the required intention to produce reliable outputs (GFS Consulting, 2014). ITGC comprises of the following control types: Secondly, I recommend that the agency adopt IT Application controls. The application is designed and operates automatically in ensuring accurate and complete processing of data. They vary with the type of business and the purpose. Similarly, they are very essential in ensuring the privacy and security of information which are transmitted between applications (GFS Consulting, 2014). There are many types of IT applications and they include: Moreover, there is a need to have IT controls and Chief Information Officer (CIO) or Chief Information Security Officer (CISO) who will oversee the accuracy, security as well as the reliability of the systems managing and reporting the organizational data. Enterprise Resource Planning System and financial accounting are integrated with the initiation and authorization, processing as well as reporting of financial data. Therefore, they may involve Sarbanes-Oxley compliance to mitigate particular financial risk that the agency may face (GFS Consulting, 2014). I believe additional IT control of the 22 employees will benefit the organization as it will be able to control access to the organizational data. Authorization will be essential in controlling the personnel who are required to access company information. Additionally, the agency will be able to have an automated system which detects and fix problems hence minimizing human interference. Every personnel will have a history on how he or she uses the system, hence helping in making further recommendations and adjustments on how to control the agency

Monday, September 23, 2019

This is am african history class, you can choose the topic Research Paper

This is am african history class, you can choose the topic - Research Paper Example They are responsible for leading scientific and intellectual breakthroughs in history. The world, in general, owes the Islam community a debt. In terms of industrialisation, the Islam played an intricate role in the process. They also had a central position to play in the evolution of the philosophical enterprise in the world. This paper will explain how these revolutions shaped the world. In the past, it was easy for scholars, mathematicians, economists, and researchers to draw their inspiration from Islam (Huff 73). Islam worked to open up the minds and hearts of everyone in the world. In thought and study, many scholars can attribute their success to the Islam faith and its growth and spread. It is believed that the Islam community in the late seventeenth century drew their philosophical strength from the Greek. This means that, the introduction of many inventions, for example, the telescope led to the growth of the Western curiosity on the influence of Greco-Islam revolutions. Th e West had a number of inventions and scientific breakthroughs. However, they did not draw their inspiration from anywhere as many civilisations did. Many individuals around the world believe that there was no scientific or intellectual breakthrough in the Islamic world. This is because, most of them believe that all that is Islam developed as a result of the Greek heritage. Without it, many believe that Islam would not have an avenue to exist on its own. Others also believe that, the Arabs cold not identify what the ancient hieroglyphics in their presence meant. This is not until the coming of a European who explored the ancient language and drew conclusions from his research (Abu-Rabi 145). The introduction of foreigners makes the issue of Muslims being intellectually capable of making strides in the world debatable. What these critics do not seem to comprehend is the fact that, every civilisation brings forth diverse worldviews on diverse matters. In the field of optics, the Musl im and Arab community have made significant strides (Huff 79). The most revered thing about the Muslim faith is the belief they exhibit the necessary aspects of knowledge and wisdom in life. This makes them refuse the influence brought on by many education and religious influences from around the world. The fear of foreign influences pushes them to create their own understanding on issues, which pertain to many aspects of life. Islam focuses on regulating the philosophical attitude of the world. This is by overarching the philosophy of embracing mankind regardless of their faith and cultural background. No faith in the world claims that taking another life in the name of religion is justified, and Islam is not the first. Islam embraced the power of science, even when Christianity shunned and condemned the likes of Galileo for the assumptions he made about the earth. This laid the basis for the growth and development of philosophy and science among the Islam community (Huff 81). In A frica, intellectual revolution opened doors for the much needed economic change. Islam can be the perfect ground to lay this intellectual foundation. With the political changes, it is possible to have many channels created by the Western world in the third world countries. In Africa, for instance, the introduction of madrasa ensured that children learned the importance of the different fields in the world. The European and African enlightenment was brought on by the light that Islam shone

Sunday, September 22, 2019

Polybrominated Diphenyl Ethers Essay Example for Free

Polybrominated Diphenyl Ethers Essay Introduction: Polybrominated diphenyl ethers are the man equipped substance which are flame resistant, it is believed about the Polybrominated Diphenyl Ethers that these chemicals are added to the plastics as well as foam items for consumption with the objective to put together them fire defiant. They are obtained in three major forms PentaBDE, OctaBDE and DecaBDE, among all of these the penta and octaBDE are considered as more poisonous then the DecaBDE as the PentaBDE and OctaBDE has less bromide which makes them more poisonous. This article has also narrated the compositions of these mixtures, the experiment based research of these mixtures shows that they are responsible for various diseases such as tumor of liver, it may cause cancer in humans and puberty abnormalities are mostly observed. So some of the countries has banned these products completely and ask the manufacturer to obtain such products which are less harmful to our environment. In this article we have also discusses the views of peoples as well as the alternative which can save future from fire incident and diseases. TBBPA is also a fire resistance product which is described as the best alternative which of PBDE as it is mutually the additive- as well as reactive-treated products encompasses to discharge TBBPA along with metabolites into the atmosphere. TBBPA has been calculated in the atmosphere, earth, along with residue but is commonly not establish in dampen illustration so TBBPA is suppose as the alternative with no harmful effects. So this article is very informative and contains all information regarding to Polybrominated Diphenyl Ethers these uses and also there harmful effects. Polybrominated Diphenyl Ethers: The research shows that every year more than 3,000 peoples are killed in dire incidents, the research also shows that more than 20,000 peoples are injured because of fire incident, these incidents also consequences in material goods reimbursement the loss which United States yearly faces is approximately $11 billion .It is believed that fire commonness has now start reducing than the precedent 25 years, the reason for the reduction in such incidents is the fire deterrence policies, these policies have supported the production of flame retardant chemicals in most of the industrial manufacture. In actuality the occurrence of potentially unnecessary fires which may be because of the combustion of electrical paraphernalia in addition to furniture is not observed as much in the United States as it is observed in Europe, the reason for this is the higher principles for fortification in opposition to flammability in the United States. Accordingly, the fire retardant does not only saves the life decreased the incident which may happen due to combustion, but they are also responsible for reducing the economic cost of fires. In this article we have did the detailed study of Polybrominated Diphenyl ethers. Polybrominated diphenyl ethers are the man prepared chemicals which are flame resistant, it is experiential that these chemicals are added to the plastics as well as foam items for consumption with the objective to formulate them fire defiant in supplementary words they are added in plastic and foam product as a result they cannot get burned easily. When Polybrominated diphenyl ethers materialize as the result of amalgamation of analogous chemicals they are tenured as congers.(Polybrominated dipehnyl ethers, September 2004) As the polybrominated diphenyl ethers are sundry in plastic and foam products so it is believed that they can leave product which can enter in environment and which is considered as the threat for human health. The chemical formula of Polybrominated diphenyl ethers is [C.sub.12]H ([.sub.9-0]) Br ([.sub.1-10]) O, the general chemical formula of PBED shows that the sum of H and Br always be equivalent to the 10 it is hypothetical with the objective of these chemicals that they have stumpy water solubility, it is also experiential that hypothetically PBED restrain of 209 congers which are moreover alienated into 10 homolog assemblage mono- to decabromodiphenyl ethers. Most of the commercial mixture have an average of 5 [pentabromodiphenyl ether (PeBDE), Penta], 8 [octabromodiphenyl ether (OBDE), Octa], or 10 [decabromodiphenyl ether (DBDE), Deca] bromines, there are not as much of profit-making products which have the 4 or fewer than 4 bromines in their composition. International union of pure and applied chemistry IUPAC is the system which is responsible for numbering the PBEDs, It is observed that deca has the largest production the chemical symphony of the marketable Deca mixture is first and foremost ( 97%) DBDE (BDE-209) along with a small amount of nonabrominated diphenyl ethers NBDEs in addition to OBDEs, in the same way penta is used principally in North America while on the other hand octa has comparatively small hand in commercial product. The commercial mixtures of octa and penta are considered as more complex than the deca mixture it is believed that Octa mixture chiefly comprised of just about 10-12% hexabrominated diphenyl ethers and the formula is (HxBDEs), 44 percent of heptabrominated diphenyl ethers (HpBDEs) and 31-35 percent of OBDEs furthermore 10-11 percent of NBDEs, and less than 1 percent of DBDE is found. Now if we look for the composition of commercial Penta mixtures shows variability but generally the mixture contains 24-38 percent tetrabromodiphenyl ethers (TBDEs), 40-60 percent PeBDEs and 4-8 percent HxBDEs. (Birnbaum, Linda S.; Cohen Hubal, Elaine A, 11/1/2006). The polybrominated diphenyl ethers are also contributing to environment, it is believed that during the manufacturing process of PBEDs they enter in water and water soil it is believed about PBEDs that they can get humiliate without difficulty by sunlight, they are not dissolved in water but the small particles of PBEDs settle down at the bottom of river or lakes. Some of the PBEDs also accumulate in fish relatively in low concentration other than every of PBED does not have this quality to mount up in fishes. If we talk about the ecological prototype of PBDEs within the air show a discrepancy from the prototype in the soil, residue as well as mud. PBDEs strappingly soak up to these surrounding substances, and the congener prototype has a propensity to replicate those in the commercial assortment, excluding in mud. It has been newly accounted that PBDE attentiveness in manure mud in the United States is as elevated as 33 mg/kg furthermore be a sign of the congener composition create in polyurethane spume. In disparity, point basis liberating DBDE enclose resulted in residue by means of very high concentrations such as 5 mg/kg. The presence of polybrominated diphenyl ethers in environment is considered as the threat for human health now; incomplete assessments on the environmental effects of PBDEs have been conducted. It is considered that the lower brominated mixtures are more contaminated than the higher brominated mixtures. PentaBDE is more contaminated as compare to OBDE, while on other hand DBDE is in actual fact non-hazardous to invertebrates but still the presence of PBED in environment is responsible for many diseases in human beings. The survey shows that both adults and children are exposed to PBED equally. It is believed that children are open to the elements of the PBED by means of contaminated foods for the reason that PBDEs voluntarily liquefy in the fats. The particles of PBED can also accumulate in mother’s milk which is transport in adolescent children which leads to the diseases such as thyroid and neurobehavioral alternations. While talking about the effects of PBED on adults so it is believed that it may cause cancer in adults but this fact is not sure as the experiment which was performed on rats and mice by giving them the food which contains decabromodiphenyl ether one type of PBDE, they eat this for their whole lives and the tumor in their livers is observed because of the continuous presence of decabromodiphenyl ether in their food. (Polybrominated diphenyl ethers, September 2004). â€Å"It is observed to find out the toxicity effects on Mammalian the studies have been demeanor mutually in rats and mice.† (Birnbaum and Staskal, 2006) The most widespread data set continue living for DBDE, with the studies variety from sensitive to continual laboratory studies. Diminutive information is present for effects of PBDE on reproductive systems. â€Å"DE-71†, is a commercial penta assortment, DE-71 was examined by the Endocrine Disrupter Screening Program. The reason for this program was to study the male as well as female level 1 pubescent code of behavior in order to identify thyroid vigorous agents. â€Å"The study shows that in male rats it caused a hindrance in reproductive growth which was further confirmed by a delay in puberty as well as it causes a decrease in ventral prostate furthermore seminal vesicle weights at the high dose 60 mg/kg.† (Birnbaum and Staskal, 2006) This abnormality was caused by reduce in T4 and T3 and by the increase in TSH level, this has also showed the effects on the liver by means of gain in liver weight and EROD, pentoxyresorufin O deethylase â€Å"PROD†, and UDP-glucuronosyltransferase â€Å"UDPGT† . These inferences propose a 5-day LOEL of 30 mg/kg per day in addition to 31 days LOEL of 3 mg/kg per day in male rats’ foundation was based on the decreases in the level of T4. While if we discussed its effects on female rats then it shows DE-71 is responsible for a impediment in the beginning of puberty. It also decreases the T4 in female rats, increased their liver size furthermore it is also responsible for the bringing on of liver enzymes. After this experimental based study it can be concluded that presence of PBED in an environment is supposed as the factor which can delay the puberty stage and this fact not only considered for rats and mice but for all of the mammals. PBDEs are also been considered for the cause of other endocrine disrupting possessions.   By making use of an in vitro model the effects on endocrine disrupting possessions are studied, this model verified that hydroxyl PBDEs are suppose to slow down estrogen sulfotransferase, which is further leaded to cause an apparent estrogenic consequence. â€Å"If PBDEs have any estrogenic activity in vivo has to be examined.† (Birnbaum and Staskal, 2006) Furthermore, a number of PBDE congeners, which are not supposed to be environmentally appropriate, have near to the ground semblance for the aryl hydrocarbon (Ah dioxin) receptor, except the fact that they are not capable to persuade dioxin reaction in an element fastening. It was also observed that frequent revelation of rats to DE-71 which is a commercial penta mixture, also resulted in initiation of EROD commotion, a characteristic reaction to Ah receptor commencement. (Birnbaum and Staskal, 2006). Now the question arise in everyone’s mind that how to secure their lives from this dangerous mixture, the specialist have given a small number of advices by the application of these advices the risk of syndrome in human being by PBED can be reduced. It is believed that in order to save children who lives near the Hazard area can save from the effects of PBED if they are not allowed to play near the sites where PBED is produces, they should also be dampen from eating dirt products and parents should ask their children to wash their repeatedly. One more question which the peoples frequently ask to the experts that is their any way to find out whether the PBED is present in our body or not? It is believed that presence of PBED in tissues, breast milk, body fat and blood can be tested but the type of PBED presented in the human body cannot be determined by the test. The advices which are given to working class in the PBED manufacturing companies is to take shower before going back to their, They are also advised to change their clothes and the experts also advised them to make separated laundries for their working clothes. If the people will keep following the advices designed by actors the chances of diseases because of this hazardous mixture PBED are supposed to reduce (Polybrominated diphenyl ethers, September 2004). The restrictions in Manufacture of PBED: It is observed that in few states of America the manufacture of PentaBDE and OctaBDE has totally be restricted, the environment protection agencies has notify all the manufacturers of United States to take permission before initiating the process of PentaBDE and OctaBDE manufacture, they have set same legal formalities for importing these mixtures among other States but in the case of DecaBDE the manufacturing process and importing is not banned yet. Same is considered for Canada almost all of the states of Canada have banned the production of these mixtures. The Europe Union has banned on marketing and making use of these two mixtures but DecaBDE is not banned by Europe Union even as it does not contain hazardous compounds like PentaBDE and OctaBDE. Although these mixtures are needed for saving from fire incident but they effecting environment by releasing hazardous substance for that reason they are banned, so it is advised to manufacturer to find better and good alternate of these two mixtures for healthy as well as secure tomorrow. It is believe of the peoples that the harmful effects of these mixtures are the threat for human lives so the government should take further steps and they should banned manufacturing of these mixtures not only in one state but all over the world. (Canada Cancer Society, 11 April, 2007). Tetrabromobisphenol A: TBBPA is also a fire resistance product it is hypothetical as the largest part of BFR which is widely used. Notwithstanding TBBPAs imprudent possessions, mutually the additive- as well as reactive-treated products encompass to discharge TBBPA along with metabolites into the atmosphere. TBBPA has been calculated in the atmosphere, earth, along with residue but is commonly not establish in dampen illustration. It is believed that there are very less numbers of laboratory which makes studies and are examining the metabolism of TBBPA. However the research shows that two sensitive, high dose studies in rats have resulted that unmetabolized TBBPA is quickly excreted in the feces after each single exposure it was observed that the peak attentiveness of 14C-TBBPA contained by the first hour in all of the body tissues; â€Å"highest concentrations was absorbed in the fat, which includes the body part such as the liver, sciatic nerve, muscles, along with adrenals. additionally,   the studies shows that there were a low percentage of the TBBPA dose was maintain in fatty tissue that is 3-6 percent and muscles 11-14 percent when the 72 hours has passed, which put it to an important person that TBBPA, or a metabolite, has the potential to bioaccumulation with frequent exposure.† (Linda, Birnbaum and Danielle, 2006) As the hazardous compounds are easily removed from the body so the experiment proved that TBBPA is not considered as destructive as it can be used as the alternate of Polybrominated Diphenyl Ethers. The Government has also not banned the manufacturing of TBBPA (Linda, Birnbaum and Danielle, 2006). Conclusion: Polybrominated Diphenyl Ethers are the fire resistance mixture which is used in plastic products as well as the foams to resist them from combustion. The studies were mutually made on rats and mice in order to know the facts about these poisonous mixtures, the studies shows that these mixtures are considered as the responsible for many diseases, the mixtures causes many tumor in liver rat when they were added continuously in the rats’ food, similarly they are considered as the reason for puberty abnormalities, This abnormality was foundation by reduce in T4 and T3 and by the increase in TSH level, this has also showed the effects on the liver by means of gain in liver weight and EROD, pentoxyresorufin O deethylase â€Å"PROD†, and UDP-glucuronosyltransferase â€Å"UDPGT† . These inferences propose a 5-day LOEL of 30 mg/kg per day in addition to 31 days LOEL of 3 mg/kg per day in male rats’ foundation was based on the decreases in the level of T4. While if we discussed its effects on female rats then it shows DE-71 is responsible for a impediment in the beginning of puberty. It also decreases the T4 in female rats, increased their liver size furthermore it is also responsible for puberty abnormalities. Among PentaBDE, OctaBDE and DecaBDE, the PentaBDE and OctaBDE are considered more poisonous than DecaBDE. So this article concluded that fire resisting product are needed to secure society but as they have many harmful effects to human health therefore these products has been banned by United States, Canada and Europe Union. So this article conveys the message that the production of these products should not be stopped completely but the manufacturer should find improved unconventional so the threat to human health can be decrease. References: Polybrominated Diphenyl Ethers, retrieved from, http://www.atsdr.cdc.gov/tfacts68-pbde.html. Linda S. Birnbaum and Danielle F. Staskal, 1/11/2006, Brominated Flame Retardants retrieved from http://www.ehponline.org/members/2003/6559/6559.html. Birnbaum, Linda S.; Cohen Hubal, Elaine A, 11/1/2006, Polybrominated Diphenyl ethers: a case study, retrieved from http://www.encyclopedia.com/doc/1G1-160532390.html. Canadian Cancer society, 11 April 2007, retrieved from http://www.cancer.ca/ccs/internet/standard/0,3182,3172_1438644643__langId-en,00.html.

Saturday, September 21, 2019

Social Cultural Trends Essay Example for Free

Social Cultural Trends Essay The four current sociocultural trends that I’d like to focus on are increasing environmental awareness, changing pace and location of life, changing household composition and increasing diversity of workforce and markets. Here at Tobyhanna Army Depot, a green vegetative roof was funded with Research and Development money meant to test easily transferable technologies and verify their impacts. Team Tobyhanna funded three other roofs because of the benefits and to reduce the heat loading from the black roofs in an effort to avoid an expensive air conditioning project. This past summer here was the first one on record as having no complaints about the heat in those areas and it was an unusually warm summer here. Our data indicates 25% reduction in heating costs and we expect cooling cost savings to be even greater. Additionally, we also experienced about 40% reduction in storm water runoff as result of our efforts to improve environmental measures across the entire workforce. Secondly, lots of information and technology forms of communication application are too complicated or hardly worth the trouble for some users especially when people allow these devices to cause undue stressors or pressure. Some reactions to the typology characterize Americans as uninterested in information and communication technology or collectively hostile to cyberspace. Here at Tobyhanna Army Depot, approximately 32% of those with either cell phones or internet say that they need help from someone else to set up or use new electronic gadgets.