Saturday, January 25, 2020
QOD Protocol for Wireless Network Service Quality
QOD Protocol for Wireless Network Service Quality CHAPTER 1 INTRODUCTION Overview A generalized treatment of a topic a summary oroutline The development of the wireless network must be prevented in various applications of wireless networks and they can be used in several areas of the hybrid networks respectively. Here the wireless network such as Wi-Fi in laptops and in mobiles can be used to increase the use of wireless networks. These wireless applications are used in the several fields such as in watching videos, playing games and also in watching TV also in wireless mobile devices. While performing all such functions some security will be needed in the specific wireless networks. The applications of wireless networks should be directly connect some wireless mobile devices for required operations. The physical security must be provided in the wireless networks as in the wired networks the security will be provided. The wireless networks sometimes failed to provide the network security at that time the large sensors may be needed to deploy in the specific network area. Here we proposed a routing protocol in the wireless networks for the overall performance of the network respectively. The protocol provides the respective applications for the transmission of data across the wireless networks. The quality of service will be provided in the specific areas of networks and overall network performance will be maintained as in required manner. The quality of service support will reduces the delay in the end-to-end transmission delay in the throughput also be reduced. However in the hybrid wireless networks, one thing have been proven that it is a better network structure for the future generation, and it have been proved that it will be helpful for the network communication. For example the mobile ad hoc network is also a wireless network in that the mobile devices are connected with the wireless communication. These MANETs will automatically form a network organization to elaborate the usage of network as required and the mobile ad hoc network is also a wireless network in that the mobile devices are connected with the wireless communication. Thus the network security will be provided using some specific applications and thus the significant security will be provided. In the hybrid wireless networks it combines the networks infrastructure and the structure of MANET respectively. Number of reservation based routing protocols are to be used to provide the infrastructure wireless communication and it improves the scalability of the wireless network. The hybrid wireless networks also increases the reliability of the network with the help of specific routing protocol and it should also increases the lifetime of the network. The overall network performance will be well maintained using the distributed routing protocol and the protocol will make the fastest data transmission across the network. The base stations of the mobile ad hoc network will used for the internet servers through the access points. The physical security must be provided in the wireless networks as in the wired networks the security will be provided. The wireless networks sometimes failed to provide the network security at that time the large sensors may be needed to deploy in the specific network area. The reservation-based protocols have been implemented for MANETs and that will specify the routes that is formed by the specific nodes and respective links that are associated with the resources to fulfill the quality of service requirements. Also such protocols will increases the QoS of the MANETs for some extents, they also suffers some of the problems like race conditions and the invalid reservation respectively. The invalid reservation is nothing but the invalid resources will be useless when the data forwarding path between source to destination node will breaks. And race condition is nothing but double allocation of the similar resources for two different qualities of service routes respectively. In order to specify the quality of service support capability in wireless networks, we had proposed a distributed routing protocol for the quality of service support. Usually a wireless network has the several base stations and also the access points across the wireless networks. There are two main features regarding the data transmission in the hybrid wireless networks. The one is the transmission should be any cast transmission and the other is number of transmission hops between source to destination is very small. Taking the full advantage of these two features the distributed routing protocol transmits the packets. This protocol performs various operations: If the source node fails to send the packet then requests neighbor node to send the data. This protocol reduces the transmission delay by associating with the specific scheduling algorithms and also associated with the packet resizing algorithm to resize the packets respectively. This protocol also reduces the delay during the transmission; it also removes the duplicate copy of data from the data stream (redundant data). By performing these operations above protocol will provides the high quality of service for the hybrid wireless networks. There are five contributions in our project they are resource reservation based protocol for mobile ad hoc networks. Sometimes wireless networks faces invalid reservation and as well as the race condition respectively. Here we proposed a distributed routing protocol for enhance a quality of service (QOD). The reply message of the transmission includes the information of the certain resources packets in packet scheduling feasibility, transmission delay, and reduces the traffic in the transmission. Hence the packets scheduling feasibility and the mobility of the node determines the size of the packets. On the basis of this information, the source nodes will selects the neighbor node that guarantee the quality of service delay in the data transmission to the access points. The particular neighbor node will report their upgrades to the source nodes, which specify their scheduling feasibility to reduce the whole transmission delay in the wireless networks. The message should contain the whole information according to the available resources for finding the feasibility of scheduling packets and transmission delay and also the redundancy in traffic in the every transmission. On the basis of this information, the source nodes will selects the neighbor node that guarantee the quality of service delay in the data transmission to the access points. The particular neighbor node will report their upgrades to the source nodes, which specify their scheduling feasibility to reduce the whole transmission delay in the wireless networks. The particular neighbor node will report their upgrades to the source nodes, which specify their scheduling feasibility to reduce the whole transmission delay in the wireless networks. Number of reservation based routing protocols are to be used to provide the infrastructure wireless communication and it improves the scalability of the wireless network. The hybrid wireless networks also increases the reliability of the network with the help of specific routing protocol and it should also increases the lifetime of the network. The overall network performance will be well maintained using the distributed routing protocol and the protocol will make the fastest data transmission across the network. The base stations of the mobile ad hoc network will use for the internet servers through the access points. On the basis of this information, the specific source node will selects the replied neighbor that should guarantees the quality of service delay in the transmission of packets to the access points. The selected neighbor node specifically updates its status about the transmission of the data packets in the hybrid wireless networks which ensures their feasibility scheduling and transmission delay of the transmitted data packets respectively. The hybrid wireless networks also increases the reliability of the network with the help of specific routing protocol and it should also increases the lifetime of the network. The overall network performance will be well maintained using the distributed routing protocol and the protocol will make the fastest data transmission across the network. The packet scheduling feasibility and the mobility of the node determines the size of the packets. On the basis of this information, the source nodes will selects the neighbor node that guarantee the quality of service delay in the data transmission to the access points. Sometimes wireless networks faces invalid reservation and as well as the race condition respectively. Here we proposed a distributed routing protocol for enhance a quality of service (QOD). In wireless networks there are two features one is the transmission should be any cast transmission and the other is number of transmission hops between source to destination is very small. Taking the full advantage of these two features the distributed routing protocol transmits the packets. This protocol performs various operations: If the source node fails to send the packet then requests neighbor node to send the data. This protocol reduces the transmission delay by associating with the specific scheduling algorithms and also associated with the packet resizing algorithm to resize the packets respectively. This protocol also reduces the delay during the transmission of data and the redundant data will be removed from the data stream and the protocol will make the fastest data transmission across the network. The packets scheduling feasibility and the mobility of the node determine the size of the packets. The hybrid wireless networks also increases the reliability of the network with the help of specific routing protocol and it should also increases the lifetime of the network. The overall network performance will be well maintained using the distributed routing protocol and the protocol will make the fastest data transmission across the network. The base stations of the mobile ad hoc network will used for the internet servers through the access points. The physical security must be provided in the wireless networks as in the wired networks the security will be provided. The wireless networks sometimes failed to provide the network security at that time the large sensors may be needed to deploy in the specific network area. The distributed routing protocol transmits the packets. This protocol performs various operations: If the source node fails to send the packet then requests neighbor node to send the data. This protocol reduces the transmission delay by associating with the specific scheduling algorithms and also associated with the packet resizing algorithm to resize the packets respectively. This protocol also reduces the delay during the transmission; it also removes the duplicate copy of data from the data stream (redundant data). By performing these operations above protocol will provides the high quality of service for the hybrid wireless networks. Aim/Objective Here we used a QOD protocol for providing a quality of service and also overall network performance can be maintained. The transmission delay can be reduced with the help of distributed routing protocol and network life time can be increased. The traffic in the data stream or packet stream is also reduced with the help of this protocol and also eliminates the redundant data from the data stream. Problem Statement In the traditional wireless networks, it is difficult to provide the good quality of service and hence we proposed a QOD protocol to overcome such drawbacks. This protocol should select the respective neighbour node when the source node is not within the range. The protocol should helps in reducing the transmission delay in the hybrid wireless network. It also helps in resizing the packets to make an easy flow in the wireless networks and the physical security will be provided. The traffic will be removed from the stream of data and also the redundant data should be removed, hence overall network performance will be maintained and quality of service will be provided. Scope of the project The reservation-based protocols have been implemented for MANETs and that will specify the routes that is formed by the specific nodes and respective links that are associated with the resources to fulfill the quality of service requirements. Also such protocols will increases the QoS of the MANETs for some extents, they also suffers some of the problems like race conditions and the invalid reservation respectively. The invalid reservation is nothing but the invalid resources will be useless when the data forwarding path between source to destination node will breaks. And race condition is nothing but double allocation of the similar resources for two different quality of service routes respectively. In wireless networks there are two features one is the transmission should be any cast transmission and the other is number of transmission hops between source to destination is very small. Taking the full advantage of these two features the distributed routing protocol transmits the packets. This protocol performs various operations: If the source node fails to send the packet then requests neighbor node to send the data. This protocol reduces the transmission delay by associating with the specific scheduling algorithms and also associated with the packet resizing algorithm to resize the packets respectively. This protocol also reduces the delay during the transmission of data and the redundant data will be removed from the data stream.
Friday, January 17, 2020
Assess the view that factors and processes within the school Essay
Many sociologists argue that ââ¬Å"factors and processes within school are the main cause of differenceâ⬠These factors include gender, class and ethnicity. All of these things can lead to certain stereotypes and labels being forced upon pupils. The idea that Teachers have certain expectations of different social and ethnic groups means that self-fulfilling prophecy can lead to pupils living out positive and negative labels. The role of gender in educational achievement is that in past times it has been that boys have achieved less than girls in school, this could be that boys have a history of ââ¬Ëladdishââ¬â¢ behaviour and have had a negative attitude to learning. This had also led to teachers expectations of ââ¬Ëladsââ¬â¢ to be low which has caused negative stereotypes and labels. All of these things have in turn caused many anti-school subcultures. Jackson did a study about how this ââ¬Ëladdishââ¬â¢ behaviour is now being seen in some girls which could in fact mean that it is not only boys that have these negative labels but also girls. Another factor that may influence the achievement of girls is that girls now have a lot of higher role models and more opportunities in the future; this can lead to them working harder because they can see themselves being successful in the future. Another In-school factor would be ethnicity, different ethnic groups achieve better than others in education, for example the highest achieving ethnic group is British Chinese and the lowest would be black African Caribbean boys. The reasons for these differences in achievement could be linked to family morals and attitudes to school. Teachers also have expectations of different ethnic groups which again, like gender can lead to positive and negative labels and stereotypes. The curriculum in schools could also lead to this due to it being ethnocentric. Differences in class an play a crucial role in the achievement between different classes, for example working class children do not have as much cultural capital as middle class children and this can play a vital part in how they achieve at school, due to teachers expectations of how they behave and achieve. The idea of the hidden curriculum means that schools are preparing students for middle class jobs with middle class ideas. Also the idea that middle class teachers get on better with idle class students also reinforces the idea of teacherââ¬â¢s expectations which can lead to self-fulfilling prophecy and students either over or under achieving. One more in-school factor would be pupil subcultures and how streaming and setting can lead to both anti and pro school subcultures, This again links to the idea of self-fulfilling prophecy and that students may either reject their labels or follow them. The organisation of the school can also be closely linked to class and how students may be put into lower streams or sets due to their social background and how teachers perceive them. Home backgrounds of students also contribute to a large part of their achievement. The differences in class can lead to many home disadvantages such as material deprivation which means that students do not have enough money for resources such as private tutors, laptops, trips or uniforms; this will give them a disadvantage compared to middle class students. Working class students may also have other responsibilities to attend to such as looking after siblings or even disabled parents; this means that they do not have as much time to spend on studying. Parentââ¬â¢s attitudes towards school and education can also prove to be an impact, if a parent has a negative attitude to school and learning then the child will not have as much pressure or ambition to do as well. This idea of parent expectations links closely with ethnicity and how different ethnic groups view educarion. In conclusion there are many in school processes that can influence the achievement of children such as gender and how girls and boys are perceived and what teachers expect of them. Another would be Class and how working and middle class students achieve differently due to aspects of school life like the hidden curriculum. Also ethnicity and the expectations and ideas about certain groups like the British Chinese. There are also a lot of out of school factors such as home background, material deprivation and parentsââ¬â¢ expectations. Overall I believe that the both in school factors and out of school factors contribute to the differences in educational achievement of different social groups.
Thursday, January 9, 2020
Managers Should Run Businesses According To Shareholder Interests Finance Essay - Free Essay Example
Sample details Pages: 5 Words: 1479 Downloads: 9 Date added: 2017/06/26 Category Finance Essay Type Narrative essay Did you like this example? Managers have always been known to lead and direct an organisation, since the firm is owned by the shareholders but run by the management. Managers should run the business with the shareholders interest, thus the main objective of managers should be to maximise owners wealth by maximise amount of dividends paid out to shareholders. Since the amount of dividend can be represented by the current stock markets values of the firm ordinary share capital. As a result, the main interest of management is to take decision to maximise the stock value of company share. Furthermore, managers might interest others area rather than pure financial gain. Management would interest on companys responsibility to the environment and society, in turn to minimise the pollution to the environment. Secondly, managers interest on following the governments legislation, for example, not to produce any harmful product that break the law. Finally, management are also highly concerned on the term and condition of their staffs, and make sure they are fairly paid. Donââ¬â¢t waste time! Our writers will create an original "Managers Should Run Businesses According To Shareholder Interests Finance Essay" essay for you Create order However, there is no reason to assume that manager will always follow the interest of shareholder. Since salary of manager usually not based on the share price of firms value, therefore, manager might concentrate more on their own interest such as personal jet and commission paid of sales. In a corporation, the legal entity is separate and distinct from its owner, the shareholders and owners are separate from the management. Therefore, management is given responsibility for running the corporations affairs in shareholders interest. Conflict of interest happens when both parties want to maximise their benefit. The shareholders want to have a higher share price as more dividends can be paid; however, the managers are more interested on revenue because it means more expense can be made that are beneficial to them. By applying the fisher separation theory, it stated that if the manager and shareholder have the same perfect information with the same rational approach to decision making, they should have identical expectations, therefore, no conflict of interest is create. On the other hand, if the management and shareholder have delegated decision making with asymmetric information, it will generate an agent problem. Generally, there are number of ways where the interest of shareholders and managers may conflict, firstly, managers may wish to hold more cash and received perks like having a personal company car that would be the expenses on company, this will affect the firms profit and wealth, since managers have to face a trade-off from perks and firms wealth. In an example of a single owner-manager case, we assume the owner is also the manager, so, firm is owns and run by the owner. Illustrated with the graph below, with an x-axis of perk consume, Y-axis of Value of firm. The slope on the graph is -1; represent the owner has 100% of ownership. As the graph shown, if the perk consumption rises by 1 unit units, the values of firm will drop by 1 unit, so, there is an inverse relationship between perk consumption and firms wealth. For every one pound in perks consumed from owner, there will be a reduction of 1 pound in the values of firm. As a result, there is a trade off between firmss value and perks, the more the manager increase on perks, the more it reduces on the firms values. We can understand more about the conflict between shareholder and manager by studying the principal-agent relationship, where the agent (managers) act on the behalf of principal (shareholder), but the principal cannot monitor the actions of the agent( hidden action) or the principle does not have full set of information known to agent( hidden information). Those hidden action and information from principal create agent cost. In a multiple owners case, the original point at D. If a fraction of firm is sold, the insider (owner-manager)s holding will reduce to ÃÆ'Ã
½Ãâà ±, and the outsider (potential buyer) now owns (1- ÃÆ'Ã
½Ãâà ±). Now, the insiders will share the cost of perks taken with the others shareholders, for example, the cost to the owner-manager of consuming 1 of perk in the firm will no long be 1, instead, it will be (ÃÆ'Ã
½Ãâà ± X 1). According to the graph above, when the new budget constraint with (V1,P1), the insider will achieve a higher level of utility at U1, as a result, original point D will move to point A with perks F0 and wealth reduced to V0. After the sale, the new constraint is (V2, P2), and point B is the trading point accepts by both parties with perks F and wealth V. As the graph shown, the value of firm is reducing from V* to V is giving by a movement from point D to B. The reduction of wealth is the agency cost by introducing the agency relationship with outsider in the absence of monitoring and bonding. Secondly, the insufficient effort by managers, they may not grow the firm at an optimal rate, since the value of firm does not directly influence on managers salary and individual have different preferences, so, managers may pursue a sub-optimal expansion path for the firm at a different level of investment. The best ways to illustrate this concept is to plot a graph with production opportunity set, indifferent curve and financial market line. According to the graph, the optimal production rate is where the MRS = MRT= -(1-r), but the manager might make the investment decision above the production rate at point A or below it at point B according to their own preference. Therefore, managers investing decision might not be the optimal level for the firm. Without a single market rate, shareholder will not able to delegate their investment decision to managers. Thirdly, both managers and shareholders have different attitude toward risk, the shareholders are more risk loving because they may invest in many companies, so that they are holding less risk if one company go into bankruptcy. Whilst managers tend to be more risk averse when they facing an investment decision, since managers financial security relies on what happen to the firm, if the value of firm falls below what it should be, the risk of takeover or change in management is likely to increased. Conflict also arise when these is a takeover bid to the company, therefore managers will lose their job whilst shareholders usually gain from this takeover as they will receive above the normal share price. Therefore, the investment decision make by managers might not favour the shareholders of investing risky project. By applying a diagram of efficient frontier of an asset portfolio, with x-axis (Risk) and y-axis (expected return). It shows each indifference curve represent a different equilibrium position which depends on varying risk attitude, shareholders will make their investment decision on IC1, but mangers often set their indifferent curve on IC2 where closer to the minimum variance portfolio at point D. Consequently, firm couldnt achieve high return by investing on those less risk assets, which reducing the return on firms revenue. The potential conflicts between managers and shareholders could be mitigated by arranging contractual financial remuneration to the managers. But, the shareholders have to be careful to choose an award that link to their performance and own interest. Furthermore, the agency cost induced by conflict between managers and shareholders can be mitigated by contractual arrangement. It is possible for shareholders (outsider) to monitoring the expenditure of non-pecuniary from managers. Owner-manager can enter a contract with the shareholders (outsider) to restrict their spending on non-pecuniary consumption. According to the graph, without monitoring from outsiders, firms value is V and perks is F at point B. By given the contract, the consumption of perk will restrict to F and value of firm rise to V .The optimal monitoring expenditure on the outsiders, M, is the amount between D-C. If the equality market is competitive, the potential buyers will be indifferent between two contracts: Firstly, potential buyers can purchase of a share of (1- ÃÆ'Ã
½Ãâà ±) of the firm total price of (1- ÃÆ'Ã
½Ãâà ±) v, but giving no right to monitor on managers consumption. Secondly, potential buyers can purchase share of (1- ÃÆ'Ã
½Ãâà ±) of firm total price of (1- ÃÆ'Ã
½Ãâà ±) V and D-C is the net cost of monitoring and bonding, which could limit the owner-mangers consumption on perks. The expenditure on bonding is a form of contractual guarantees to have financial accounts audited by an external auditor, which contractual limited managers decision making power because it restrict his ability to take advantage on his own profitable opportunities. If the bonding costs were under the control of the owner-mangers and yielded the opportunity set at BCE, it would limit the perk consumption to F. Finally, the optimum occurs at point C, where bonding cost yielded the same opportunity set as the monitoring cost. The solution to reduce agency conflict I is when the shareholders (outsider) perform monitoring to owner-manager (insider).
Tuesday, December 31, 2019
Understanding and Supporting Behavior Free Essay Example, 3500 words
Assessing of the studentââ¬â¢s behaviour can be aided by observation. His behaviour has changed a lot to a more disruptive an unacceptable behaviour since it disrupts his class. The behaviour change of this child can be attributed to changes in the environment of the child either in school or in school. The environment shapes the behaviour either positively or negatively. In order to analyse the behaviour of the child, it is important to look at his immediate environment to identify the cause of the negative change. Since the teachers feel the source of change is not the school environment, the teacher asked his mother who revealed that his behaviour changed after his father moved out of the house, and since then, he is not afraid of punishment. Thus, we can conclude that the change in the negative behaviours of Abdi can be attributed to emotional imbalance caused by his broken family. This may have led to feelings of neglect, parents stress, and confusion. This negative feelings lead to poor interactions, discriminative interaction, low self-esteem, unruly behaviour, lack of interest in studies, poor adult role models, and increased rates of negative interactions (Cross, 1989). Behaviour issues and solution Abdi gets punished by the teacher or the learning support assistant by being sent to see the head teacher. We will write a custom essay sample on Understanding and Supporting Behavior or any topic specifically for you Only $17.96 $11.86/page Effective corrective action on the child should be able to reduce or diminish disruptive behaviour such that the child is able to return to his cooperative nature and good behaviour. Good behaviour should also be reinforced in order to encourage it to develop on Abdi as development of desirable behaviour will lead to weakening of the undesirable behaviours. The behaviour issues in this case include; disruption in class, calling out, swearing and uncooperative with other students, argumentative and confrontational when attempts are made to correct him, lack of concentration on studies and more attention on play and lunchtimes. All this behaviours can be addressed using the Behaviourist approach through negative reinforcement, positive reinforcement, and punishment.
Monday, December 23, 2019
Analysis Of Fagles s Antigone - 1526 Words
While Ismene s language relies heavily upon a Northern Irish dialect, differences between Paulin s Ismene and Fagles go further. In Fagles s Antigone, Ismene is a voice of reason in contrast to her rash and hot-headed sister. She advocates prudence as sensible. Paulin s work offers an Ismene translated not only linguistically but also in personality. As this Ismene warns Antigone, she thinks only of the punishment. Her concern is not that the two would defy the state but that they would die ââ¬âand in a most unpleasant manner. Her speech emphasizes the concern for them rather than the state as she stresses how we ll die and repeatedly speaks of what will happen to us. These lines clearly mark a point at which Paulin chose fidelity to Ismene s Irishness over fidelity to Sophocles s politics. However, these lines also raise questions about the nature of Irishness. Is Ismene s rational response, in the original, inherently un-Irish and untranslatable into an Irish context? And, i f so, is Paulin suggesting here that the Irish are the overly-emotional and hot-blooded people that stereotypes have made them out to be? More than a simple substitution of standard English for Irish English, Paulin s translation raises such questions throughout. As he translates, Paulin displaces Irishness, removing it from a familiar context defined by Irish/English dichotomies, character stereotypes, and the trite settings and practices expected of conventional Irish plays.Show MoreRelatedAnalysis Of Oedipus The King And Antigone1170 Words à |à 5 Pagesworld. In civilizations such as Athens, women were looked down upon and this battle to leave behind tradition proved to be almost if not fatal. Sophocles Oedipus the King and Antigone exemplify three distinct female Athenian characters who approach this battle with different fronts. Through analysis of Ismene, Antigone and Jocastaââ¬â¢s distinct characters, the reader better understands how Sophocles uses a feminine voice t o break away from the tradition discerned in Athenian life to advocate for theRead MoreAntigoneââ¬Å¡Ãâà ´s Law: a Critique of Patriarchal Power Structures1121 Words à |à 5 PagesStructures à The heroine Antigone sacrifices her life to defy the patriarchal society in which she is imprisoned. By confronting and resisting Creonââ¬â¢s authoritarian rule, Antigone empowers the oppressed people of Thebes. On the surface, her motives seem clear; she defies civil law in favor of a higher moral law. Antigone declares she acts out of a sense of honor and obedience to the gods, however her words and actions reveal additional motives. Antigone follows her own unique law, whichRead More Comedic Violence in The Medea, The Oresteia, and Antigone Essay2353 Words à |à 10 PagesComedic Violence in The Medea, The Oresteia, and Antigone à à à à Almost no Greek tragedy escapes the use of violence. The Medea, The Oresteia, Antigone, and other classic works of Grecian tragoidia all involve huge components of violence in many prominent places, and for all of these stories, violent action is an integral part of the play. Medea, especially, is a character worthy of note in this regard; her tumultuous life can be plotted accurately along a path of aggression and passionate fits
Sunday, December 15, 2019
Wajdan Free Essays
It will took some time and need some sacrifice from the public in the shape of tax paying. The observation of Finance Minister Ishaq Dar is right that the economy of previous year was running itself. His enthusiasm to put the agenda of PMLN programme of his party as Laptops, Ashiana and other housing schemes, Nandipur Power Project, M-4, 8 and 9, Karachi Circular Railway, Prime Ministerââ¬â¢s Youth Training Programme, Prime Ministerââ¬â¢s Youth Skills Development Programme, Small Business Loans Scheme, Fee Reimbursement Scheme for Less Developed Areas, Prime Ministerââ¬â¢s Micro Finance Scheme, continued provision of funds for parliamentarians under a favoured name and the Ramazan Package. We will write a custom essay sample on Wajdan or any similar topic only for you Order Now With all this, the development budget goes up by as much as 50 per cent. A big issue of Budget the not increasing the salaries of Government employees also resolved. Finance Minister Ishaq Dar today announced a 10% increase in the salaries of government employees. The newly formed government had earlier decided against increasing the salaries of government servants for the first time in nearly three decades. Now, The federal governmentââ¬â¢s decision affects up to 650,000 federal employees and more than two million provincial government mployees. The finance minister said that the new government has taken tough decisions because the aim is to move in the right direction from the very beginning. He said the government needs to ensure that GDP grows enough to support the swelling population. The Finance Minister Ishaq Dar said the government will save Rs40 billion because of the cuts in expenditure and austerity measures taken in the latest budget. The PML- N government announced it will not keep more than 40 ministries in order to curb expenses. Dar, in his speech, also announced that all discretionary funds previously vailable to federal and state ministers will be abolished. Moreover, the PML-N government has also decided to abolish the Peoples Works Programme-II ââ¬â the head used for the premierââ¬â¢s discretionary spending. According to Dar, however, Peoples Works Programme-I, which allots discretionary funds to all members of Parliament, has been retained. The cuts in current expenditure still leave a revenue deficit of 1. 2 per cent of GDP. With the addition of the proposed Jump in the development budget, the PML-N government will be the first in the history of the country to start with a working fiscal eficit of 6. 3 per cent, financed by costly domestic borrowing. It is likely to end up with a much higher deficit, given the piecemeal nature of the tax measures announced. Reliance on withholding taxes has been increased and specific and discretionary measures have been proposed rather than reforming the tax regime. In our tax culture, reducing the corporate tax rate and increasing the maximum rate for non-corporate businesses may not encourage corporatisation, but it will certainly closing at another record high, driven by blue chip stocks. Investors welcomed the ew budget where the government announced a cut in corporate taxes by a percentage point and pledged resolution of the circular debt issue in 60 days. The suspense over the timing of a government request for an International Monetary Fund (IMF) bailout finally ended when Finance Minister Ishaq Dar said a new package will be negotiated but on Pakistanââ¬â¢s terms. Pakistan does not need to rush to the International Monetary Fund. The issue is to convert the present net outflow of resources into a net inflow. In parallel with austerity imposed on the current budget, nothing except the higher taxation of luxury ehicles has been announced on the import side. Privatisation and access to international capital market have also been mentioned. I think concerted effort can end circular debt in the short term. The main thing is underlying causes to see a permanent end of this deficit. Reforms announced to improve the performance of the mismanaged public enterprises, especially railways, require political will for implementation. Much more needs to be done than granting autonomy and placing the right man or woman on the right Job. If these steps will taken sincerely this nation will get finally releife in some years. How to cite Wajdan, Papers
Saturday, December 7, 2019
Social media and identity management free essay sample
Currently, people are living in a virtual world that is dominated by social media; the influence of emergences of social media platform, such as Facebook, YouTube, has far beyond the imagination of people(Pennsylvania, 2011). There are an increasing number of people who are willing to use social media to manage their identity, which offers a large amount of opportunities for those audiences who want to standing out from the crowd. (Matthieu; Serge et al, 2013) But because of information overload, to some extend, social media are probably making it harder for them to differentiate from the counterpart . In view of the fact, how to manager personal identity has been view as a vital approach, which not only makes people appear in difference, but also causes personal information disclosure. As a consequence, there are both benefits and risks of identity management, when people immerse in surfing online. Mathias (2013) stated that identity management (ID management) is defined as a wide-ranging area that manages the personal identification during a system, (such as a country or a social networking) and have access to gain resources from it through associating user rights and restriction with established identity. One kind of main benefits from ID management is that it enables people stand out in a sea of similar targets, to achieve this, people should create their own personal brand. Olins (2003) assert that brand is ââ¬Å"a symbolic embodiment of all the information connected to a company, product or service. â⬠Also, there is another view of the issue, that personal branding is a core value of their products and even beyond themselves, which blending with reputation, belief, concern and execution (Chris, 2003). In other words, personal branding is that gives people the ability to differentiate from the crowd. Therefore, the rapid growth of social media has provided certain chances for people to establish their own personal branding. Peters (1997) claimed that everyone could use their skills to establish a brand worthy of remark, Montoya and Vandehey(2005) reported that there are some people tend to be more professional, especially actors, agents, artists, architects, author, etc. They need create a personal brand to stand out from the crowd. Some of them have been specialists on their sphere, but they need these platforms to be employed by big companies, which not only brings more reputation, but also gains personal profits. (Rambe, 2013) It is worthy to mention that, the promotion used to be quite expensive and difficult, but now the use of free social media for promotion saves lots of advertising fees. This is why more and more people prefer to use social media to promote themselves like creating their own profile in the YouTube, and regularly post their video that they are expert in aspects. Rambe (2013) highlight that more and more users are able to stand out from people, because they sign up YouTube and upload their video constantly, after that, they attract a large amounts of views, and when their channel have more 500 + subscribers, YouTube will initiatively contact them to become partnership, and share with their advertising revenue that hang over their video before, right cornet. The more like, the more money (Mathieu; Serge et al2013). As a consequence, through this way, most of users posting content for free who are seeking to get attention so that they can get more jobs, or just to be famous. The interesting thing about it is that they are making all content for free that is supposed to be free from the gatekeeping process of the past, but actually only the very best, and only certain kinds of stuff ever gets the promotion it needs to be successful on a massive scale. (Aaron,2010) Due to the information overload under the free personal media background, how to stand out and establish the personal brand in the crowed environment, which become a far more important issue. Therefore, it is necessary for users to know about how to use social media to manage personal identity in a proper way. The other one advantage is identify management brings the cloud computing. This is a IT service that through identifying and managing personal information, having access to collect data from application and computer resources. It is a better way for people to get convenience, especially for improving user productivity and reducing IT services. (Tufekci, 2008) Social convergence imposes the risk of vertical surveillance of youths by invisible audiences (Boyd, 2007) like parents, lecturers and prospective employers. There is a case that one parent-student who established an alias on Facebook add her childââ¬â¢s friend on the friend list in order to supervise the behavior of her child. She believes that identity management is a good way that makes her concern about her children invisibly (Rambe, 2013) However, for some teenagers, even adults users, identity management poses a threat for their privacy. In a series of case study by Mary and Aaron (2010) reveals that the majority of SNS users(77%) have altered their privacy setting. At the mean time, it is also the case that only 6% users have bad experiences owing to their privacy exposure, which causes them feel embarrassed. Moreover, there are 12% social networking users feeling regret the content that they have posted and shared. As a result of analyzing case study, there are increasing number of people realized the significance of identity management on social networking sites. In the view of the fact, there is not only citizens utilizing the social networking site to manage their identity, but the department of government is supervising all peopleââ¬â¢s communication and managing citizenââ¬â¢s information as well. That means if government also have access to peopleââ¬â¢s networking accounts, it is dangerous for all Internet users, especially those who support opposite political views. For example, in several ââ¬Ëdictator beltââ¬â¢ countries, Swedish telecoms giant Teliasonera allied with their government control and oppress their Swedish citizens by using technology that their participants can be traced and identified. In view of surveillances, the government gains access to steal your privacy data (Uppdrag Granskning, 2012). Besides, if users are managing personal identity via using social media, government not only hold peopleââ¬â¢s communication, even have peopleââ¬â¢s secrets. As mentioned before, some people regret that they have shared stuff like comments, pictures. As long as government want, they could expose citizenââ¬â¢s any secrets. It means this kind of identity management expose peopleââ¬â¢s privacy in an invisible way. ( Altshuler, Y 2013) Due to the information disclosure, Internet users tend to control and impose restriction on access authority. They have more concerned about the personal privacy in the Internet. Indeed, if everyone are able to optimize their management on social networking sites, which means they will have more personal space to choose what they want to share with others, what they want to keep secrets. In a series of case study by Mary (2010) reveals that the majority of SNS users (77%) have altered their privacy setting. At the mean time, it is also the case that only 6% users have bad experiences owing to their privacy exposure, which causes them feel embarrassed. Moreover, there are 12% social networking users feeling regret the content that they have posted and shared. As a result of analyzing case study, there are increasing number of people realized the significance of identity management on social networking sites. To summaries, people are using social media to manage their identities; this is because that it benefits these users from establishing personal branding. It means social media is probably making life easier for aspiring content makers to get noticed, but also social media is making it far harder for people to stand out from the crowd. Therefore, people want to differentiate from others, it is a better way to gain reputation for what they achieved in their careers or the contribution they made to society ââ¬âpersonal branding online. Furthermore, cloud computing is viewed as another benefit from identity management, which make peopleââ¬â¢s lives easier and more conveniences. Despite these benefits, there are also some drawbacks resulting from the influences of identity management via social media. On the one hand, people have to consider that their privacy are exposed to the public; on the other hand, if governments are able to gain access to our social (or other online) networking accounts, they would have all the information that they could ever need in order to utterly destroy that carefully managed image, such as the event of telecoms giant Teliasonera. Therefore, social media gives people an unprecedented ability to manage their identity. But it cannot be denied that there are both risks and benefits.
Subscribe to:
Posts (Atom)