Wednesday, September 2, 2020

Physical Development Essay Example for Free

Physical Development Essay Grade younger students, matured six to twelve years of age, will experience an assortment of formative changes, both physical and mental, and as educators it is basic that we both comprehend and oblige the physical needs of understudies in the learning condition. To completely appreciate these changes, one must consider the real physical changes that happen, specifically the advancement of engine aptitudes, just as how to oblige the physical needs and improvement of understudies during their grade school years. Advantageous to these more extensive subjects are the advantages of physical movement just as the results of delayed latency, and how a student’s physical improvement can either encourage or confine advancement in different zones. Kids between the ages of 6 and 10 (alluded to as ‘middle childhood’) will encounter a plenty of physical turns of events. Initially, they will consistently put on weight and tallness, however their essential body structure will stay unaltered. Kids will likewise lose their 20 essential or ‘baby’ teeth, which will be supplanted by lasting teeth. The absolute most noteworthy abilities offspring of this age will create are engine aptitudes. Engine abilities allude to a scholarly grouping of developments that consolidate to make an effective activity so as to get capable at a specific action. These can be separated into two subcategories: ‘gross engine skills’ and ‘fine engine skills’. Net engine abilities are â€Å"large developments of the body that grant motion through and inside the environment† (McDevitt Ormrod, 2010) and incorporates such aptitudes as strolling and swimming, while fine engine aptitudes are â€Å"Small, exact developments of specific pieces of the body, particularly the hands† (McDevitt Ormrod, 2010), and incorporate such aptitudes as composing and drawing. In youth, people depend generally on reflexive (that is, unlearned and automatic) development examples, and in this way are deficient with regards to fine engine aptitudes. As they arrive at center adolescence, youngsters create willful development examples, and start refining both their gross and fine engine abilities, picking up capability in an assortment of activities. Youngsters speed up and coordination of their running, kicking and tossing, and become ready to incorporate these developments into sports and other organized play exercises. They likewise make propels in their penmanship, decreasing and increasingly steady, and their drawings, upheld by further psychological turn of events, become progressively point by point. At last, the elements of the mind are upgraded in various manners. The two halves of the globe of the mind form into progressively exceptional parts, and gatherings of routinely utilized neurons are developed. The procedure of myelination, ‘the development of a greasy sheath around neurons that permits them to transmit messages more quickly’ (McDevitt Ormrod, 2010), keeps, allowing quick and supported learning. So as to oblige and energize student’s physical requirements and advancements, instructors should most importantly consistently guarantee that the learning territory is sheltered. The study hall ought to continually be checked for perils, for example, sharp edges on work areas, free ground surface, or possibly perilous substances, and instructors ought to guarantee that â€Å"Rooms, restrooms, and passages are cleaned daily† (Wilford, 2006). Kids ought to likewise be instructed on the best way to perceive circumstances or articles that could hurt them, and how to manage them viably. As little youngsters are particularly defenseless against ailment, it is especially imperative to do everything conceivable to forestall it, by keeping the territory clean and sterilizing surfaces, and showing kids sterile practices, for example, washing their hands in the wake of toileting. This is an imperative territory of training; should a youngster experience the ill effects of a genuine disease for a significant stretch of time, their physical improvement might be for all time soiled, having genuine outcomes on their whole lives. It is additionally significant that understudies approach solid and nutritious food at school, and find out about sound dietary patterns. Certain nourishments or scarcity in that department, effectsly affect students’ physical turn of events, and should kids be malnourished for an all-encompassing timeframe, their advancement might be for all time hindered. A kid who is malnourished is â€Å"more inclined to infections† (Brewster and White, 2002) which â€Å"further impede (their) wholesome state by discouraging (their) hunger and expanding the interest on his stores of protein and energy† (Brewster and White, 2002), prompting additionally reduced paces of physical turn of events. Consequently, it is basic that grade school students’ learning condition be kept as protected and sound as could be expected under the circumstances, through the teacher’s guaranteeing that the study hall is sans risk and disinfected, and that the kids approach nutritious and solid food, just as instructing the youngsters with the goal that they may actualize such aptitudes themselves. By doing this, instructors can suit the physical needs and improvements of their youngsters, and expand the viability of their tutoring, both physical and scholastic. During elementary school, understudies are â€Å"at an ideal age as far as engine ability learning† (Anshel, 1990), and therefore engine aptitudes grow quickly, permitting them to perform talented errands. So as to assist understudies with building up these engine aptitudes, it is significant for instructors to fuse physical movement into their educational program. This aids the improvement of both fine and gross engine aptitudes. Right off the bat, they ought to give visit chances to understudies to take an interest in physical action for the duration of the day; these exercises would preferably permit the support of youngsters, paying little heed to their separate aptitude levels. For instance, while controlling kids through jumping rope, the instructor could from the start have them utilize a long rope and basically step over the rope; youngsters who locate this simple could then attempt real skipping. Should this demonstrate generally simple, they could skip at a quicker pace, and youngsters who indicated capability at this more elevated level could have a go at traverse while skipping. Teachers can likewise coordinate physical action into scholastic exercises, which won't just abbreviate the period of time between physical exercises, yet in addition keep the understudies progressively occupied with the exercise. Then again, it is likewise essential to give understudies sufficient opportunity to rest. On the off chance that they invest a lot of energy practicing and overexert themselves, this will just prompt diminished fixation during the remainder of their exercises, making their presentation endure. Furthermore, youngsters advancing through center youth despite everything have moderately delicate bones, so extra alert ought to be taken on the off chance that they play out any high effect works out, for example, lifting overwhelming loads. To repeat, youthful students’ physical improvement can be obliged through the use of physical action at school, anyway this must be done with some restraint, else it might be inconvenient to the child’s instruction and general prosperity. At last, teachers ought to know about how a child’s physical improvement can help with or obstruct their advancement in different regions. For instance, a kid who has created at a quicker rate than their friends will probably be increasingly capable at sports, and the reinforced neuron pathways will expand the rate at which they learn and get capable at scholastic subjects. The self-assurance this gives them may then be communicated through the child’s premium and application in school, which thus will make their whole learning experience both simpler and increasingly pleasurable. Expanded interest in both game and scholastic exercises will thus make meeting and get to know different understudies simpler, permitting the understudy to grow socially, again giving them a progressively inspirational attitude toward school and further expanding their concentration and assurance to succeed genuinely and scholastically. Then again, understudies who have not truly evolved as fast as others in their year gathering may not proceed also in either scholarly or physical exercises, and accordingly experience the ill effects of ‘learned helplessness’, a circumstance wherein a child’s experience persuades they will consistently come up short, and in this manner they don't have a go at, acting â€Å"as however they (are) vulnerable to do better† (U. S. Dep Education, 1992). This absence of certainty and educated weakness can make understudies become â€Å"listless and unmindful and at times disruptive† (U. S. Dep Education, 1992), and â€Å"may be forestall (understudies) from satisfying (their) potential† (Seligman, 1990). This is the reason it is basic to actualize framework into the learning condition, to help less genuinely created understudies and help them in succeeding, building their certainty. In this way, it is significant that educators cautiously screen the advancement of understudies separately, and offer help and support suitable to their formative stage to encourage the learning experience for them. Youngsters finishing their essential instruction will encounter numerous new things; socially, intellectually and truly. It is the job of educators to make this experience as advantageous as could be expected under the circumstances, and a key component of doing so is the comprehension of the physical improvements they experience during this time. To completely welcome these turns of events, teachers ought to think about the advantage of physical movement, just as the outcomes of delayed latency, how a student’s physical improvement can help with or upset their advancement in different territories, engine advancement in youngsters and how this is impacted, lastly how to suit and bolster the turns of events and necessities of their understudies.

Saturday, August 22, 2020

Emily Dickinson Essay Example | Topics and Well Written Essays - 750 words - 1

Emily Dickinson - Essay Example She spent quite a bit of her youth and on composing letters to her companions and various sonnets. When Emily was just fourteen, she saw the demise of her subsequent cousin and dear companion, Sophia Holland, and became damaged. Her folks sent her away to live with family in Boston, where she had the option to get legitimate treatment and recuperate from the awful occasion. After she got back to Amherst, she additionally came back to class, where she made various companions and correspondences, and discovered comfort in her congregation. At the point when she finished her time at the Academy, she quickly went to Mount Holyoke Female Seminary, which was brief because of a blend of Emily’s bombing wellbeing and her dislike for the outreaching intensity of the school. She got back and turned out to be, pretty much, tamed, cleaning and cooking for her family. At eighteen, Emily was acquainted with Benjamin Franklin Newton, who, as indicated by letters composed by Emily herself, wa s accepted to assume a huge job in most of Emily’s composing as she became more established. He empowered her composition, imparting to her his conviction that she had what it took to be a cultivated, distributed artist. It was Newton that acquainted her with different celebrated essayists and writers, for example, William Wordsworth, Ralph Waldo Emerson, and Lydia Maria Child. Sadly, Newton kicked the bucket not very long after from tuberculosis, and Emily’s sibling assumed the job of guaranteeing that his sister got all the books she might need, including numerous works by William Shakespeare. In 1850, Emily’s enthusiastic and mental states got ugly. In a range of only a couple of years, Emily lost a bunch of dear companions to different ailments. Because of these passings, Emily pulled back into herself, keeping far out and sound of society. Emily kept on thinking of her sonnets, however they concentrated significantly regarding the matter of death, which sho cked no one. Be that as it may, the main portion of the 1860s, the years following these passings, â€Å"proved to be Dickinson’s most profitable composing period (Habegger 405).† In the later 50% of the 1860s, however, Emily turned out to be significantly increasingly pulled back, never going out except if she completely expected to; even her sonnets got rare. In the mid-1870s, Emily lost both of her folks, just as a couple of all the more dear companions, diving her into a much more noteworthy melancholy, where she stayed until she passed on May 15, 1886, from Bright’s sickness. Emily was viewed as a smart writer because of the novel manners by which she thought of her verse. They contained short lines, incline cadence, unusual capitalization and punctation, and they only sometimes had titles (McNeil 2). Emily frequently dismissed pentameter, liking to utilize trimeter, tetrameter, and dimeter, the utilization of these is viewed as unpredictable. She was likew ise utilized runs in the spot of periods or commas, which would frequently expand the states of mind of her sonnets. Most of her sonnets managed demise and everlasting status; Emily saw the last as something feasible through her composition, which was additionally an idea she considered during her short fellowship with Newton. Basic subjects incorporate the utilization of blossoms and gardens, dismalness, and gospel. A significant number of Emily’s sonnets were additionally peppered with songs and enigmas, just as psalms and melody structures. When

Friday, August 21, 2020

The Ethical Implications of Embryonic Stem Cell Research essays

The Ethical Implications of Embryonic Stem Cell Research expositions Innovation apparently never quits developing and evolving. Also, for what reason would it be a good idea for it to? Similarly as each individual changes with understanding and age, so then do our manifestations. Tragically, it is in our aggregate nature as people to fear change. Change unavoidably brings up moral issues inside us, expelling us from the oversimplified everyday practice of day by day life and putting us in the awkward domain of contention. At the point when huge changes occur, maybe a kindred human has simply kicked the bucket it causes us re-to assess our lives and the impact that such an occasion will have on them. Such is the situation with early stage undifferentiated cell inquire about. Foundational microorganism look into, all by itself, is certifiably not another innovation. Researchers and specialists have utilized grown-up undeveloped cells for medicines on different blood infections for quite a long time. Nobody is harmed in such a circumstance, and the Hippocratic pledge is protected. The issue of early stage foundational microorganism examine is extraordinary, however. Early stage undifferentiated organisms are the very premise of human tissue, and in this way can supplant practically any utilitarian tissue in the human body, though grown-up immature microorganisms are as of now developed and in this way can't be given different undertakings. Researchers expel the undeveloped cells from early stage tissue known as blastocysts, and thus the incipient organism kicks the bucket (Latham). Consequently, the contention - is this blastocyst, which, whenever permitted to keep developing, will turn into a typical human infant if in vitro preparation is utilized, human now? Assuming this is the case, what is the contrast between slaughtering an incipient organism and executing a typical human? Not as basic an issue as it from the outset appeared, eh? Maybe youre previously taking note of the similitudes among one or the other issue of playing God during childbirth, premature birth. All things considered, theres two unequivocal situations at play here, with the essential grays in the center as well. Convoluted and fairly dubious guess with respect to precisely when people get spirits has emerged, just as the fundamental inquiries. Is the youngster a li... <!

Thursday, June 4, 2020

My Christmas Holidays, Free Descriptive Essay Sample

My Christmas Holidays Do you know what marks the Christmas season in the Philippines? It’s the four months of the year ending with –ber. The Philippines is known worldwide as having the world’s longest Christmas season which starts on September 1 (Filipino Christmas Traditions). What else can better indicate this festive season than Jose Mari Chan songs breezing through sound systems in public markets, in jeepneys, in malls even in my dreams? Daily homeward commute allows me sights of stores displaying glowing parols, as well as Christmas lights marking the silhouette of Santa Claus on his sleigh; and the classic nativity scene, Belen, and Christmas decors adorning establishments. Then rampant Christmas sales announcement in malls and online shops, and even the online games I often play will start giving off the Christmas vibes. Schools and workplaces will begin having their Christmas parties with the traditionally â€Å"required† exchange gifts. I have traumatic experience of my elementary and high school parties where I often received alarm clocks or picture frames. Another name for such â€Å"required† exchange gift done weekly is the Monito-Monita. There are themes i.e. â€Å"Something colorful† to make it easier – or harder? – to decide what to prepare as a gift. Bob Ong has an interesting anecdote on the origin of this occasion. Perhaps Monito is a miserable person who never receives any gift. So, to receive one, he strikes a deal with Monita, another person on the same boat. Other people start jumping into the boat and henceforth, the tradition of exchanging gifts begins. Everyone becomes happy and businesses boom (Ong, 2002). There are two known traditions that begin by 16th of December, one of which is caroling. This is where people, especially children and adolescents, would go household hopping and singing in the rhythm of their instruments, hoping to be spared with a few coins or even bills. The usual jingle is: â€Å"Sa may bahay ang aming bati Merry Christmas maluwalhati!† (â€Å"We joyfully wish this home a Merry Christmas!†). When finally spared with the goodness of the household, the caroling team will sing: â€Å"Thank you, thank you! Ambabait ninyo (You’re so kind), thank you!† If not spared, the Ambabait will be replaced with Ambabarat (stingy) before moving on to the next victim. In our caroling team, we had a guitar along with other improvised instruments such as a tambourine made from flattened metal caps from glass bottles of soft drinks. A hole will be drilled on the center of these caps where a metal wire will be inserted. This metal wire will be tied on the o ther end and voilà  , a tambourine! An improvised drum can be made out of a huge empty can of milk, then two sticks wrapped with several layers of thick rubber bands at one end can serve as drumsticks. The other tradition is Misa de Gallo or Simbang Gabi (Evening Mass) which starts on December 16 and ends December 24. These devotional masses usher in the event of Jesus birth. Back in the Spanish era, the Friars held these masses very early in the morning because the locals were farmers who woke up very early to work in the fields (Saint Catherine of Siena Parish, n.d.). Regardless, the cool December breeze brings me to deep slumber that I often miss the masses. Good thing churches begin including actual evening Simbang Gabi in their schedules and I can somehow attend. There is a superstition that when a person attends all sessions of the Simbang Gabi, his/her wish will come true. Not that I actually believe it. Simbang Gabi is a matter of opportunity cost on your early sleep or extended sleep, especially if you are coming home exhausted from school or work, or you have school or work very early the next day. Yet back in 2013, I actually completed Simbang Gabi. And guess what? My no t-so-serious wish was granted the next year – to have a boyfriend. After Simbang Gabi, the preparation moves on to Noche Buena or the feast on Christmas Eve. Its a time for extended families to gather around for a feast. Back in the 16th century, the Friars required local churchgoers to fast until Christmas morning. This was why they conjured up a feast in the midnight before going back to bed (Pepper PH, 2014). This year in our household, our table has fruits, fried chicken, fruit salad, soft drinks, cake, and the yearly pancit canton ration from our neighbor. I love going out during the Christmas Eve as I want to watch fireworks lighting up the skies. When I was younger, I could buy firecrackers as early as September. Mama often scolded me because I might lose several body parts with the firecrackers. I even had a few pranks with firecrackers. One time I saw a man urinating in front of the wall. I lit up my piccolo and threw it between his feet where it exploded. As I ran away, eyes tearing up suppressing my laughter, I heard the man’s curs es. Just this 20th of June 2017, President Rodrigo Duterte signed the Executive Order No. 28 that bans private citizens from staging fireworks displays at their homes. EO28 limits the use of firecrackers to community fireworks displays which must be permitted by the municipality or city concerned, and should be done under the supervision of a trained person duly licensed by the Philippine National Police. This is a reasonable regulation as there have been a huge number of injuries and spike in air pollution before when fireworks display was not yet regulated (Ranada, 2017). This explains why I do not see nor hear fireworks these holidays. So, I resolve into being informed on the venue of fireworks displays in our barangay for the upcoming New Year’s Eve. Then here comes the Christmas Day. One interesting activity on this day is when children start hunting down for their godparents to expect gifts, and the godparents will start hiding under the rocks never to be heard from again. Traditionally, godparents were responsible for carrying out a childs religious education, and for caring for the child should something happen to the parents. Yet that is not so much the case today (Willis, 2015). So, what really marks the Christmas season in the Philippines? Is it the decorations, the gifts, the food? With various activities that can be done in celebration of Christmas holidays, what is it that we truly celebrate this season? As I understand it, Christmas is to celebrate our ability to still be happy despite the setbacks in the past, and more so to share this happiness with others, especially with the less fortunate. Its the meaning and our clean intentions that makes Christmas holidays more enjoyable and memorable to celebrate. SOURCES Filipino Christmas Traditions. (n.d.). Retrieved: 29 December 2017, from https://www.tagaloglang.com/filipino-christmas-traditions/ Ong, B. (2002). Bakit Baliktad Magbasa ng Libro ang mga Pilipino? Mga Kwentong Barbero ni Bob Ong. Visual Print Enterprises. Makati City, Philippines. Ranada, P. (2017).   Duterte limits use of firecrackers to community displays. Retrieved: 29 December 2017, from https://www.rappler.com/nation/173562-duterte-executive-order-limit-use-firecrackers-community-displays Saint Catherine of Siena Parish. (n.d.). History of Simbang Gabi. Retrieved: 29 December 2017, from http://www.sienachurch.org/scsf/Events/History%2520of%2520Simbang%2520Gabi.pdf Pepper PH. (2014). The Origins of Noche Buena and Other Filipino Holiday Feasts. Retrieved: 29 December 2017, from http://www.pepper.ph/origins-filipino-feast/ Willis, O. (2015). What does it mean to be a godparent in 2015? https://www.independent.ie/life/family/family-features/what-does-it-mean-to-be-a-godparent-in-2015-34161424.html

Sunday, May 17, 2020

Energy Consumption Layer - Free Essay Example

Sample details Pages: 33 Words: 9846 Downloads: 1 Date added: 2017/06/26 Category Statistics Essay Did you like this example? ABSTRACT This research demonstrates that the optimization for lower energy consumption leads to cross layer design from the two ends namely physical layer and the application layer. This optimization for quality of service requirements demands integration of multiple OSI layers (Open Systems Interconnect) Beginning from the physical layer the probability of successful radio packet delivery is first explored. This probability along with network energy consumption is traded off to let CTP-SN (Cooperative Transmission Protocol for Sensor Networks) demonstrate that sensor nodes co-operative radio transmission exponentially reduces the outage probability when the node density increases. Don’t waste time! Our writers will create an original "Energy Consumption Layer" essay for you Create order On the other hand in MSSN (Sensor Networks with Mobile sinks) the probability of successful information retrieval on the mobile sink is explored. Optimal and sub-optimal transmission scheduling algorithms are then studied to exploit the trade-off between consumption and probability of successful radio packet delivery. In both the cases, optimizations lead to compound link layer and physical layer design. In the application layer Low Energy Self Organizing Protocols (LESOP) are studied for target tracking in dense wireless sensor networks. The application quality of service (QoS) under study is the target tracking error and network energy consumption. A QoS knob is utilized for controlling the tradeoffs between target tracking errors and network energy consumption. Direct connections are found between the top application layer and bottom MAC (medium Access Control)/ Physical layers. Moreover, unlike the classical OSI paradigm of communication networks, transport and network layers are excluded in LESOP in order to simplify the protocol stack. The Embedded Wireless Interconnect (EWI) which has been proposed to replace the existing OSI paradigm as the potential universal architecture platform is an effort towards standardization. EWI is built on two layers which are wireless link layer and system layer, respectively. A brief study of EWI is also carried out. CHAPTER: INTRODUCTION GENERAL A network is a series of points or nodes interconnected by communication paths. Networks can interconnect with other networks and contain sub networks. There are different types of networks. This chapter discusses briefly about adhoc network, mobile adhoc network (MANET) and wireless sensor networks (WSN) respectively. WNS is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions at different locations. Sensor node deployment, power consumption, topological changes are some of the differences between WNS and MANET .There are various applications of wireless sensor networks, among which is target tracking. ADHOC NETWORK An ad-hoc (or spontaneous) network is a local area network or other small network, especially one with wireless or temporary plug-in connections, in which some of the network devices are part of the network only for the duration of a communications session or, in the case of mobile or portable devices, while in some close proximity to the rest of the network. In Latin, ad hoc literally means for this, further meaning for this purpose only, and thus usually temporary. The disadvantages of ad-hoc networks: An ad-hoc network tends to feature a small group of devices all in very close proximity to each other. Performance suffers as the number of devices grows, and a large ad-hoc network quickly becomes difficult to manage. Ad-hoc networks cannot bridge to wired LANs or to the Internet without installing a special-purpose gateway. MOBILE AD HOC NETWORK A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links.[] As the nodes are mobile, The network topology may vary unpredictably and rapidly over time. The network is decentralized, where the nodes themselves must execute all network movement together with delivering messages and discovering the topology, (i.e., routing functionality will be integrated into mobile nodes). Ranging from small, diverse, static networks that are controlled by power sources, to large-scale, highly dynamic networks, mobile are the applications for the MANETs. The main disadvantages of MANET are listed below: Regardless of the application, efficient distributed algorithms are needed by MANETs to determine link scheduling, routing and network organization. In a static network, the shortest path is based on a cost function given from a source to a destination is usually the optimal route; the idea discusseed is not easily extended to MANETs. The design of the network protocols for these networks is a problematic issue. Factors such as propagation path loss, fading, variable wireless link quality, multi-user interference, topological changes and power expended, become relevant issues. WIRELESS SENSOR NETWORKS The term wireless network may technically be used to refer to any type of network that is wireless, the term is most commonly used to refer to a telecommunications network whose interconnections between nodes is implemented without the use of wires, such as a computer network. A sensor network is a computer network of many, spatially distributed devices using sensors to monitor conditions at different locations, such as temperature, sound, vibration, pressure, motion or pollutants. A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions at different locations. WSNs differ in many fundamental ways from MANETs. Among the differences that may impact the network and protocol design are The number of sensor nodes in a sensor network can be several orders of magnitude higher than the nodes in an ad hoc network. Sensor nodes are densely deployed. Sensor nodes are prone to failures. The topology of a sensor network changes very frequently. Sensor nodes mainly use a broadcast communication paradigm, whereas most adhoc networks are based on point-to-point communications. Sensor nodes are limited in power, computational capacities, and memory. Sensor nodes may not have global identification (ID) because of the large amount of overhead and large number of sensors. Constraints of WSN The following are the constraints of WSN which have to be consider while developing an application in wireless sensor networks. Fault Tolerance: Individual nodes are prone to unexpected failure with a much higher probability than other types of networks. The network should sustain information dissemination in spite of failures. Scalability: Number in the order of hundreds or thousands. Protocols should be able to scale to such high degree and take advantage of the high density of such networks. Production Costs: The cost of a single node must be low, much less than $1. Hardware Constraints: A sensor node is comprised of many subunits (sensing, processing, communication, power, location nding system, power scavenging and mobilizer). All these units combined together must consume extremely low power and be contained within an extremely small volume. Sensor Network Topology: Must be maintained even with very high node densities. Environment: Nodes are operating in inaccessible locations either because of hostile environment or because they are embedded in a structure. Transmission Media: RF, Infrared and Optical. Power Consumption: Power conservation and power management are primary design factors. Challenges of WSN In spite of the diverse applications, sensor networks pose a number of unique technical challenges due to the following factors: Adhoc Deployment: Most sensor nodes are deployed in regions which have no infrastructure at all. A typical way of deployment in a forest would be tossing the sensor nodes from an aeroplane. In such a situation, it is up to the nodes to identify its connectivity and distribution. Unattended Operation: In most cases, once deployed, sensor networks have no human intervention. Hence the nodes themselves are responsible for reconfiguration in case of any changes. Unethered: The sensor nodes are not connected to any energy source. There is only a finite source of energy, which must be optimally used for processing and communication. An interesting fact is that communication dominates processing in energy consumption. Thus, in order to make optimal use of energy, communication should be minimized as much as possible. Dynamic Changes: It is required that a sensor network system be adaptable to changing connectivity (for e.g., due to addition of more nodes, failure of nodes etc.) as well as changing environmental stimuli. Thus, unlike traditional networks, where the focus is on maximizing channel throughput or minimizing node deployment, the major consideration in a sensor network is to extend the system lifetime as well as the system robustness. Since many of the constraints of WNS are to deal with usage of sensor nodes its necessary to know about the sensors and sensor network architecture. Sensor Network Architecture The sensor nodes are usually scattered in a sensor field.Each of these scattered sensor nodes has the capabilities to collect data and route data back to the sink. A sensor is a type of transducer. It is a device that responds to a stimulus, such as heat, light, or pressure, and generates a signal that can be measured or interpreted. It is also known as a mote, that is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network. Components A sensor node is made up of four basic components a sensing unit, a processing unit, a transceiver unit, and a power unit as. They may also have additional application-dependent components such as a location finding system, power generator and mobilizer. Sensing units are usually composed of two subunits: sensors and analog-to-digital converters (ADCs). The analog signals produced by the sensors based on the observed phenomenon are converted to digital signals by the ADC, and then fed into the processing unit. The processing unit, which is generally associated with a small storage unit, manages the procedures that make the sensor node collaborate with the other nodes to carry out the assigned sensing tasks. A transceiver unit connects the node to the network. One of the most important components of a sensor node is the power unit. Power units may be supported by power scavenging units such as solar cells. There are also other subunits that are application-dependent. Most of the sensor network routing techniques and sensing tasks require knowledge of location with high accuracy. Thus, it is common that a sensor node has a location finding system. A mobilizer may sometimes be needed to move sensor nodes when it is required to carry out the assigned tasks. Sensor Network Protocol Stack The protocol stack used by the sink and sensor nodes shown in Figure2.1 is given in Figure 2.3. This protocol stack combines power and routing awareness, integrates data with networking protocols, communicates power efficiently through the wireless medium, and promotes cooperative efforts of sensor nodes. The protocol stack consists of the physical layer, data link layer, network layer, transport layer, application layer, power management plane, mobility management plane, and task management plane. The physical layer addresses the needs of simple but robust modulation, transmission, and receiving techniques. Since the environment is noisy and sensor nodes can be mobile, the medium access control (MAC) protocol must b e power-aware and able to minimize collision with neighbors broadcasts. The network layer takes care of routing the data supplied by the transport layer. The transport layer helps to maintain the flow of data if the sensor networks application requires it. Depending on the sensing tasks, different types of application software can b e built and used on the application layer. In addition, the power, mobility, and task management planes monitor the power, movement, and task distribution among the sensor nodes. These planes help the sensor nodes coordinate the sensing task and lower overall power consumption. Wireless Sensor Networks Application Typical applications of WSNs include monitoring, tracking, and controlling. The specific applications are habitat monitoring, target tracking, nuclear reactor controlling, fire detection, traffic monitoring, Environmental monitoring, Acoustic detection , Seismic Detection , Military surveillance ,Inventory tracking ,Medical monitoring ,Smart spaces ,Process Monitoring ,Structural health monitoring ,Health Monitoring . Among these applications we will mainly study about target tracking in WSN. Target Tracking Target Tracking is estimating the location of the target and then proceeding to find the path or track of the target. The movement of the target is monitored by sensor nodes in WSN. SUMMARY Thus we see that though there are many kinds of networks like adhoc network, MANET accuracy is higher in WNS. So with the help of the sensor nodes target tracking can be done accurately using WNS. There are many different types of protocols and methods to perform target tracking, which will be discussed in next chapter. The LESOP protocol design will be discussed in fourth chapter. The implementation of the protocol and the end result will be discussed in the fifth chapter. The future enhancement and conclusion will be discussed in sixth chapter. CHAPTER: LITERATURE REVIEW INTRODUCTION Target tracking is one of the applications of WNS. Many different method, protocol and algorithm were adopted to detect and track the target. This chapter discusses briefly about the different algorithm, method, and protocol that were used to perform target tracking. They may include Distributed Online Localization, Cooperative Tracking, Collaborative Target Tracking, binary sensor model, Building and Managing Aggregates, Lightweight Sensing and Communication Protocols, on-Linear Measurement Model, Distributed State Representation, Optimizing Tree Reconfiguration ,Energy-Quality Tradeoffs, Entropy-based Sensor Selection Heuristic, An Activity-based Mobility Model and Trajectory Prediction. DISTRIBUTED ONLINE LOCALIZATION A distributed online algorithm is used here. The sensor nodes put to use geometric constraints. These are induced by radio connectivity and sensors in order to minimize the uncertainty of their locations. In order to improve their and moving target positions distributed online localization uses online observation of a moving target using sensor nodes. The nodes that act as reference nodes are pre-positioned into the network. The target is placed in an unknown position. Sensor nodes normally communicate with adjacent nodes. Size, ratio of known nodes, range of the radio and sensing rage are taken into consideration when this algorithm is implemented. It has been verified that this algorithm can track targets with more accuracy over time by better estimation of nodes and target positions through sensor observations. When the ratios of reference nodes are high, this method can be applied to enhance position estimation accuracy. COOPERATIVE TRACKING A binary detection sensor network is used in this area wherein the network sensor nodes can only establish if an object is within the maximum detection range. Information exchange between adjacent nodes refines location estimates improving precision of tracking. This algorithm is in two levels. In level one, local target position estimation is carried out. In the initial phase the target is assumed to be equal to the position of sensor node. The position data is recalculated as weighted averages to sensor location when new information about the node is made available. Closer nodes get more weight age. These estimations are aggregated to obtain the path of the object. In level two, a linear approximation of the path is calculated. This is done using the line-fitting algorithm on positions obtained in the previous level. The comparability of this approach to others such as distance measurements or angle of arrival measurements from sensors is confirmed by simulations. Because this approach puts to use binary-detection sensors it ends up being simpler and cheaper. COLLABRATIVE TARGET TRACKING This method is used to derive the effect of wireless network impairments on performance of the target tracking algorithm. It is applied in collaborative target tracking by using acoustic sensors. Target tracking by acoustic sensors demands multiple range or range estimation in order to carry out location estimation. Estimations are obtained by using a minimum of three range measurements. These are needed for a triangulation to precisely locate the target position. However, simultaneous range measurements are not possible as the target is mobile. Besides, over large networks maintaining measurements is tricks. Some measurements may be dropped or get delayed. Accuracy suffers because of this. SCAAT Kalman filter is used to manage global time synchronization. The Kalman filter maintains a time-stamped target state and updates the state when a single range or line of bearing is received. The de-jitted buffer is used to store the received measured with a time-out. These buffer storages sa ve a huge amount of unnecessary measurements. Two types of nodes are found in this network. First type estimates a targets range/angle. The second one called fusion nodes fuse the individual measurements. This results in a network without any packet loss or reordering. In more practical networks that suffer packet loss and re-ordering the location error decreases as the buffering latency increases. Therefore the de-jitter buffer helps save out of order packets. BINARY SENSOR MODEL This models works on the assumption that each sensor in the network detects one bit of information and this information is broadcast to the base station. This bit examines if an object is travelling away or towards the sensor. While this predicts the direction accurately, it does not yield the correct location. In order to do this a particle filtering style algorithm is used for target tracking. Besides the one bit information an additional bit is also gathered from proximity sensors to point out the exact location of the object. This tracking algorithm works on three assumptions namely: sensors in a region can detect the target travelling towards or away from sensor, bit information from every sensor is available in the central repository for processing and finally additional sensor supplies proximity information as a single bit is present. The error in trajectory prediction is rather low and the broadcast of a single bit over the whole network is easily feasible. The base station w as also able to respond to the sensor values broadcasting at higher rates. This solution is very practical to simple tracking applications. BUILDING AND MANAGING AGGREGATES This method introduces a decentralized protocol that constructs sensor aggregates in order to identify/count distinct nodes or targets in the field. Sensor aggregates are nothing but nodes that satisfy group predicate. Task and resource requirements are the parameters for grouping predicate. These aggregates are used for performing a task in a collaborative manner. The DAM(Distributed Aggregate management) protocol was introduced to support a representative and collaborative signal processing tasks. The DAM protocol forms many sensor aggregates in the sensor field. The following are assumptions are made about the networks : targets are single point sources of signal, sensors can mutually transfer information on the wireless within a fixed radius that that is higher than the mean inter-node distance, sensor times are synchronized to a global clock, and finally that the battery power limits network bandwidth. Within a variation of parameters this protocol has been observed to be effective in simulations. LIGHTWEIGHT SENSING AND COMMUNICATION PROTOCOLS There are quite a few lightweight sensing and protocols such as Expectation-Maximization like Activity Monitoring (EMLAM), Distributed Aggregate Management (DAM), and finally Energy-Based Activity Monitoring (EBAM). Protocol DAM was developed for target monitoring. Sensors used low cost amplitude sensing. DAM carries out its purpose of electing local cluster leaders. The sensors in the network are classified into clusters on the basis of their signal strength, with each cluster having only one peak. Every peak represents a target as well as multiple targets that are close together. Each peak is identified by comparing heights of neighboring sensors. Sensor nodes exchange information to their one-hop neighbors. The cluster head leader is elected in the first phase as described above. Each sensor node is joint with a cluster that is defined by the highest peak that can reach that sensor through a path. Every leader can communicate with one or more targets in a defined period. DAM would not be capable to differentiate when there are many targets in a single cluster. To solve this problem, EBAM calculates the number of targets within each cluster. It also provides a solution to count targets within every sensor clutter made up by the DAM protocol. They assume each target has equal amounts of power. Since a single target is known the number of target sensors in the clutter can be calculated from the total signal power calculated in the cluster. The third protocol EMLAM uses expectation maximization technique for intra-cluster target counting. It assumes targets are not clustered while entering the field. When moving together sensor leaders will exchange information to track targets. The new target positions are estimated using a prediction model. Minimum mean Square estimation(MMSE) is used for estimating location and target signal powers. NON-LINEAR MEASUREMENT MODEL In the nonlinear measurement model a particle filter approach is used for tracking targets in presence of spurious measurements, which provide information such as target wakes, multi-path and tethered decoys. In order to resolve the problem of intermittent measurements appearing behind the target a measurement function is derived. The centroid of one of the sensors may be disturbed to point behind the actual target position due to environmental effects this is called wake effect. This particular filter accommodates this bias and models the filter with discrete hidden Markov model. Simulation results show that intermitten corruptions of measurement process can still track a target using particle filtering. DISTRIBUTED STATE REPRESENTATION In this method the state space model of physical phenomena is exploited. The dimension of the network increases with the presence and interaction of multiple targets. The issue of distributed sensing system to support monitoring in network has been dealt with in this method. Multiple target tracking is dealt with as an estimation problem. The position of target at time t is estimated using the state. Based on data collected, the actual location can be computed. Each target affects a local region of sensors in a distributed sensor network. In a multiple target neighborhood, the data will be shared across the network. Higher dimension tracking problem is broken into simple problems. Target states are decoupled into locations and identities. A joint estimation like centralized tracking approach is carried out when two targets move close to each other. While targets move away from each other, it will go back to single target tracking. However sorting out the confusion of two targets will require identity management. OPTIMIZING TREE RECONFIGURATION This method focuses on energy efficient detection and tracking mobile targets in introducing the concept of convoy tree based collaboration (DCTC) whose framework is to track the target as it moves. Along with the target, the sensor nodes move around. The tree is reconfigured to add and remove nodes as the target moves. DCTC is an optimization problem that solves to find a convey sequence with the lowest energy consumption in two steps. The first level involves an interception-based reconfiguration algorithm that reconfigures the tree for energy efficiency. The next step is for root migration. Results demonstrate that this scheme has the lowest energy consumption. ENERGY-QUALITY TRADEOFFS Here the energy efficient tradeoff of random activation and selective activation of the sensor nodes for localization and tracking of mobile targets has been studied. Many approaches namely nave activation, randomized activation, selective activation based on trajectory prediction, and duty-cycled activation are applied here. This method gives the impact of activation/deployment of sensor nodes, their sensing range, the capabilities of activated/un-activated nodes, and the target mobility model. It was found in simulations that selective activation plus a good prediction algorithm provides more energy saving while tracking. Besides, duty-cycle activation displays better flexibility and dynamic tradeoff in energy expenditure while used with selective activation. ENTROPY-BASED SENSOR SELECTION HEURISTIC This method proposes a novel entropy based heuristic for sensor selection based on target localization. This involves selecting informative sensors in each tracking step which is carried by using a greedy sensor selection strategy. This involves repeatedly selecting unused sensors with maximal expected information gain. Its purpose is to evaluate the expected information gain that can be attributed to each sensor. This should yield on average the greatest entropy reduction of target location distribution. In developing this wireless network the uncertainty in localization reduction attributable to a single sensor is primarily effected by entropy distribution of sensors view on the location of the target and entropy of sensors sensing model for actual location. The heuristic is calculated by simulation to yield a reduction in the entropy while providing previous target location, its distribution, sensor locations, and sensing models. SUMMARY All the methods discussed in this chapter uses OSI architecture and the protocol stack has application layer, transport layer, network layer, data link layer and physical layer respectively. But the proposed LESOP protocol does not use OSI architecture but cross-layer architecture. Transport and network layer are being excluded in LESOP protocol stack. CHAPTER: DESIGN AND ALGORITHM INTRODUCTION A cross-layer design perspective is adopted in LESOP for high protocol efficiency, where direct interactions between the Application layer and the Medium Access Control (MAC) layer are exploited. Unlike the classical Open Systems Interconnect (OSI) paradigm of communication networks, the Transport and Network layers are excluded in LESOP to simplify the protocol stack. A lightweight yet efficient target localization algorithm is proposed and implemented, and a Quality of Service (QoS) knob is found to control the tradeoff between the tracking error and the network energy consumption. This chapter discusses briefly about the modules and overall design of the LESOP protocol. LESOP MODULES The system module architecture of LESOP node is shown diagrammatically in Figure 4.1. The modules are named following the OSI tradition. The LESOP architecture virtually conforms to the proposed two-layer EWI platform. Inter-module information exchanges are done by messages and inter-node communications are done by packets and busy tones. Packets go through the primary radio, while busy tones are sent by the secondary wakeup radio. A set of inter-module messages, inter-node packets/tones, and module states for LESOP are defined. In wireless communications specifically, the Transport and Network layer are omitted to simplify the protocol stack. All the radio packets have one source address, which is the location coordinates Li of the source sensor node. They do not have a destination address, and are wirelessly broadcasted to the source neighborhood. In the LESOP design, the radio range is assumed to be two times larger than the sensing range. The assumption keeps the nodes set i.e., target detection nodes, within the range of each other. Application Layer The role of the Application layer is the overall control of the node functionalities. All the inter-node communications (packets or busy tones) start and end at the particular node Application layer. IDLE State: Initially all the deployed sensor nodes are in IDLE state. In this state, it is assumed that the target is undetected in the neighborhood region of the node. The Application layer periodically polls the sensor (sending SEN_POLL message) and read the sensing measurement (retrieving SEN_MEASURE message). The time period indicates how fast the target can be detected after appearing in the surveillance region. More specifically, the random variable denotes the detection delay, which is the time difference between the time the target appears, and the first time that the target is detected. Once the target is detected, the Application layer sends through the wakeup radio the busy tone Ba, and transfers to HEADI state. Ba forces all the neighboring sensor nodes become active. On the other hand, if Ba arrives first, the Application layer sends SEN_POLL and transfers to WAIT state. Wait State: In WAIT state, the Application layer first retrieves SEN_MEASURE message from the sensor. If the sensed measurement greater than the threshold measurement, it returns to IDLE state at the end of the track interval. Otherwise the detection coefficient is calculated locally and included in the DEC_INFO packet and forwarded to the MAC layer. The first busy tone Bb indicates that the leader node H2 has been elected in the neighborhood. When the DEC_READY message is received from the MAC layer, the specific node becomes H2, if H2 has not been elected. Correspondingly, the Application layer transfers to HEADII state, and sends DEC_CANCEL message to the MAC layer to cancel the current DEC_INFO packet. If it is known that H2 has been elected upon receiving DEC_READY, the Application layer replies to the MAC layer with the confirmation DEC_SET message. The second busy tone Bb indicates that the target location estimation procedure has ended. When it arrives, the Application layer sends DEC_CANCEL message to the MAC layer, and transfers to IDLE state. HEADI State: In HEADI state, the node behaves as the H1 node. The Application layer waits for the second busy tone Bb from the wakeup radio. As the desired Bb arrives, it sends TRACK_INFO packet through the primary radio, and waits for the acknowledgement, TRACK_ACK packet, from H2 node. After the exchange, the Application layer goes to the IDLE state. If the second Bb does not arrive within the track interval limit, the node decides that the target has disappeared or errors have occurred. Application layer transfers to IDLE state, and the track record is then forwarded to the sink by other mechanisms. HEADII State: In HEADII state, the node behaves as the H2 node. First, Bb busy tone is broadcasted through the wakeup radio, which announces that H2 has been elected. RADIO_ACT message is then sent to set the Physical layer in RECEIVE/IDLE state (turning on primary radio). The Application layer receives DEC_INFO packets from the neighborhood in sequence. The detection information fusion process is then executed as described in LESOP protocol algorithm. Once the terminating condition is met (i.e. determining optimal number of nodes), or the track interval time limit is reached, the target location is estimated by Optimal Linear Combing method. The second Bb is then broadcasted through the wakeup radio, indicating that the estimation procedure has finished. After the broadcasting of the second Bb, the Application layer waits for TRACK_INFO packet from H1, and responds with the acknowledge, TRACK_ACK packet. The Application layer then sends a RADIO_SLE message to set the Physical layer in SLEEP state (turning off primary radio). When the track interval time is reached, Ba is broadcasted though the wakeup radio and the Application layer transfers to HEADI state. MAC Layer The MAC layer receives the DEC_INFO packet from the Application layer. It calculates a time delay for the DEC_INFO packet. It waits until the expiration of the time delay to perform radio carrier sensing. If the primary radio channel is busy, the MAC layer waits for another time delay which is the DEC_INFO packet transmission delay. When the radio channel is free, DEC_READY is sent to the Application layer. If the response is DEC_SET, the DEC_INFO packet is forwarded to Physical layer and broadcasted. Else, if the Application layer response is DEC_CANCEL, the DEC_INFO packet is deleted in MAC. At anytime when DEC_CANCEL message is received, the current DEC_INFO packet waiting in the buffer is deleted. After receiving TRACK_INFO or TRACK_ACK packets from the Application layer, the MAC performs radio carrier sensing, and waits until the radio channel is free. The TRACK_INFO or TRACK_ACK packets are then forwarded to the Physical layer and broadcasted. The MAC layer also forwards all the received packets from the Physical layer to the Application layer. A collision of DEC_INFO packets can occur when the difference between the MAC time delays of two nodes is less than the range of the radios. Since range is small in sensor networks, the collision probability is practically small. The LESOP protocol is virtually robust to the collision, since H2 can ignore the collision, and wait for the next successfully received DEC_INFO packet. The channel error control coding (ECC) functionality is added to the MAC layer. Traditionally, ECC is defined at Data Link layer, and MAC is a sub-layer of Data Link layer. It provides us with an efficient way of presentation. Physical Layer The Physical layer of primary radio is responsible for broadcasting the radio packets to the nodes neighborhood, which in our simplified model is a circular region with radius as range of radios. It also supplements carrier sensing capability to MAC layer, and detects radio packets collision on primary radio. The Physical layer can be in one of the three states, TRANSMIT, RECEIVE/IDLE, and SLEEP, which correspond to the three modes of primary radio, transmitting, receiving/idle, and sleeping, respectively. When receiving the forwarded packets from the MAC layer, the Physical layer goes to TRANSMIT state, and returns to the previous state after transmission. The Application layer configures the Physical layer in RECEIVE/IDLE or SLEEP states, by RADIO_ACT or RADIO_SLE messages, respectively. Wakeup Radio and Sensors The wakeup radio and the sensor modules are under control of the Application layer. Wakeup radio broadcasts the busy tone forwarded from the Application layer, and sends the detected busy tone to the Application layer. After receiving SEN_POLL message from Application layer, the sensor module is activated, senses and responds the sensing measurement by sending SEN_MEASURE message.[1] HIGH LEVEL LESOP PROTOCOL DESCRIPTION A low-complexity processing algorithm for target tracking, which is based on the sensor measurements, is assumed. The high level LESOP protocol description, which is an iterative procedure, is diagrammatically represented in Figure 3.3. The process is described below. The node distribution can be modelled as POISSON PROCESS. The node that first detects the target is considered as first leader node. The neighbouring nodes are selected based on following two conditions : Sensing measurement of sensor node detection threshold of sensor node. Distance between leader node and sensor node range of radios. ] The Fusion-Detection Co-efficient are calculated using the following parameters: Sensing Noise Variance Sensing Measurement of sensor node Sensing Gain of Sensor Node The node with highest Fusion-Detection Co-efficient is elected as next Leader node. The detection information fusion is done at this newly elected leader node. A selected number of nodes from a node set that have detected the target participate in the fusion by sending the detection information to newly elected node. The nodes participating in the detection fusion are determined based on the Improvement Ratio of Accuracy calculated for set of nodes which is given as min value{ fusion-detection coefficient} Sum of all fusion detection coefficients The estimated target co-ordinates are calculated using Optimal linear combining. The leader node1 sends the old track information to leader node2 which includes a profile of target. The leader node2 generates the new track information. This continues until the target is tracked. Project Flow: Node detects the target Sets is as the First Leader Node (H1) Sends wake up message1 to RF channel Rf channel sends wake upmessage1 to all nodes The next leader node is elected (H2) And the next leader sends wakeup message1 Leader node2 is elected RFC transmits wakeup message 2 to all nodes Target estimation procedure is completed once the message2 has been sent The first leader Node (H1) sends the track information to the RFChannel to be transmitted to the( H2) H2 sends the track information acknowledgement to RFC which then sends to leader node H1 H2 now acts as the H1 and sends the wake up msg1 to all other nodes through RFC The next Leader node is elected and the procedure is continued until the target moves out of range The energy consumed by the sensor nodes remains constant at certain period of time. Though the number of nodes increases the network energy consumption is maintained constant. SUMMARY An LESOP protocol is proposed for target tracking in wireless sensor networks, based on a holistic cross-layer design perspective. Linear processing is employed for target location estimation. Compared with the optimal nonlinear estimation, the proposed linear processing achieves significantly lower complexity, which makes it suitable for sensor networks implementation. A QoS knob coefficient is found in optimizing the fundamental tradeoff. Moreover, the protocol is fully scalable because the fusion coefficient is calculated locally on individual sensor nodes. In the protocol design of LESOP, direct interactions between the top Application layer and the bottom MAC/Physical layers are exploited. The traditional Network layer and Transport layer have been removed, thus simplifying the protocol stack. Some traditional functionality of the two layers is merged into the top and the bottom layers. CHAPTER: IMPLEMENTATION INTRODUCTION This chapter discusses the implementation of modules and end result. The implementation is performed in simulation software, OMNeT++. OMNeT++ is a public-source, component-based, modular and open-architecture simulation environment with strong GUI support and an embeddable simulation kernel. It requires Microsoft Visual C++. It can be installed both in windows and Linux. The version 3.0 is used in this project.Its primary application area is the simulation of communication networks and because of its generic and flexible architecture, it has been successfully used in other areas like the simulation of IT systems, queuing networks, hardware architectures and business processes as well. Getting started To implement your first simulation from scratch we need to follow the following steps: 1. The working directory is created, its called as tictoc, and the cd to this directory. 2.By creating a topology file the example network is described. The networks nodes and the links between them can be identified by a topology file, which is in the form of text file. You can generate it with your preferred text editor. Lets call it tictoc1.ned: // // This file is part of an OMNeT++/OMNEST simulation example. // // Copyright (C) 2003 Ahmet Sekercioglu // Copyright (C) 2003-2004 Andras Varga // // This file is distributed WITHOUT ANY WARRANTY. See the file // `license for details on this and other legal matters. // simple Txc1 gates: in: in; out: out; endsimple // // Two instances (tic and toc) of Txc1 connected both ways. // Tic and toc will pass messages to one another. // module Tictoc1 submodules: tic: Txc1; toc: Txc1; connections: tic.out delay 100ms toc.in; tic.in delay 100ms toc.out; endmodule network tictoc1 : Tictoc1 endnetwork The file is finest to read from the bottom up. Heres what it defines: A network called tictoc1 is defined, which is an instance the module type Tictoc1 (network..endnetwork); Tictoc1 is assembled from two sub modules, which is tic and toc and its a compound module. The two sub modules, tic and toc are instances of the identical module type called Txc1. The tics output gate, which is named as out is connected to tocs input gate, which is named as in, and vice versa (module..endmodule). In both ways there will be a 100ms propagation delay; Txc1 is atomic on NED level,and it will be implemented in C++. So Txc1 is known as a simple module type. Txc1 has one input gate, and one output gate, which is named has in and out respectively (simple..endsimple). 3. By writing a C++ file txc1.cc we can achieve the implementation of the functionality of the simple module Txc1.The C++ file txc1.cc: // // This file is part of an OMNeT++/OMNEST simulation example. // // Copyright (C) 2003 Ahmet Sekercioglu // Copyright (C) 2003-2004 Andras Varga // // This file is distributed WITHOUT ANY WARRANTY. See the file // `license for details on this and other legal matters. // #include string.h #include omnetpp.h class Txc1 : public cSimpleModule { // This is a macro; it expands to constructor definition. Module_Class_Members(Txc1, cSimpleModule, 0); // The following redefined virtual function holds the algorithm. virtual void initialize(); virtual void handleMessage(cMessage *msg); }; // The module class needs to be registered with OMNeT++ Define_Module(Txc1); void Txc1::initialize() { // Initialize is called at the beginning of the simulation. // To bootstrap the tic-toc-tic-toc process, one of the modules needs // to send the first message. Let this be `tic. // Am I Tic or Toc? if (strcmp(tic, name()) == 0) { // create and send first message on gate out. tictocMsg is an // arbitrary string which will be the name of the message object. cMessage *msg = new cMessage(tictocMsg); send(msg, out); } } void Txc1::handleMessage(cMessage *msg) { // The handleMessage() method is called whenever a message arrives // at the module. Here, we just send it to the other module, through // gate `out. Because both `tic and `toc does the same, the message // will bounce between the two. send(msg, out); } The C++ class Txc1 represents the Txc1 simple module type, which has to be registered in OMNeT++ with the Define module() macro and sub classed from cSimpleModule. The two methods is redefined from cSimpleModule: handleMessage() and initialize(). From the simulation kernel they are invoked: the first one only once, and the second one whenever a module receives the messages. A message object (cMessage) is created in initialize(), and drive it out via gate out. From the time when this gate is linked to the other modules input gate, After a 100ms propagation delay assigned to the link in the NED file, the simulation kernel will convey this message to the other module in the dispute to handleMessage().It will result in continuous ping-pong because the other module just sends it back(another 100ms delay). CMessage objects (or its subclass) represent the events (timers, timeouts) and Messages (packets, frames, jobs, etc) in OMNeT++. Later than you send or schedule them, They will be held by the simulation kernel in the future events or scheduled events list in anticipation of their time comes and they are delivered to the modules using handleMessage(). We have to note that there is no stopping condition built into this simulation: it would carry on forever. From the GUI we will be able to stop it. 4. The compile and link our program to generate the executable tictocs done with the help of creating the Makefile. $ opp_makemake In the working directory tictoc, Makefile is now created with the help of this command. Note: Windows+MSVC users: to create a Makefile.vc, the command is opp_nmakemake. 5. Now link our very first simulation by issuing the make command and compile: $ make Note: # Lines beginning with `# are comments [Parameters] tictoc4.toc.limit = 5 # argument to exponential() is the mean; truncnormal() returns values from # the normal distribution truncated to nonnegative values tictoc6.tic.delayTime = exponential(3) tictoc6.toc.delayTime = truncnormal(3,1) tictoc9.n = 5 tictoc10.n = 5 tictoc11.n = 5 r The simulation program asks which even doesnt specify the network in a dialog when it starts. 7. Once the above steps are completed, by issuing this command you can launch the simulation and expectantly you should now get the OMNeT++ simulation window $ ./tictoc Note: Windows: the command we are used is just tictoc. 8. To start the simulation press the Run button on the toolbar. The simulated time is displayed in the main window toolbar displays. This is known as virtual time, it cant do anything with the wall-clock or actual time that the program takes to perform. The speed of your hardware and even more on the nature and complexity of the simulation model itself determines how many seconds you can simulate one real-world second. Note that the time taken for a node to process the message is zero simulation time. The propagation delay on the connections is the only thing that makes the simulation time pass in this model. 9. We can run by making it quicker with the slider at the top of the graphics window or with slowing down the animation. The simulation can be stopped by hitting F8 (equivalent to the STOP button on the toolbar), F4 is used to single-step through it , F5 used to run it with or F6 is for without animation. F7 is for express mode, which are fully turns off tracing features for maximum speed. Note the event/sec and simsec/sec gauges on the status bar of the main window. 10. By choosing File|Exit or clicking its Close icon you can exit the simulation program. SNAPSHOTS In the omnet++ 3.0 environment the following command is being used to generate the makefile. % Opp_nmakemake The object files for all the cpp files are generated using the following command. The executable file for running the simulation network is also generated. % nmake -f Makefile.vc The executable file is run which generates the simulation network. The working includes various steps. STEP: 1 The node that first detects the target is considered as first leader node. The node[31] sends wakeup message1 to the RFChannel. Figure 5-1 Sensor node[31] Elected as H1 STEP: 2 The wake up message1 is transmitted to all the other nodes. This is done through RFChannel. STEP: 3 The next leader node is elected. The node[17] sends wakeup message1 to the RFChannel. STEP: 4 The first wake up message2 is transmitted to all the other nodes to indicate that the leader node2 has been elected. STEP: 5 The second wake up message2 is transmitted to the RFChannel from sensor node[17] once it finishes the target location estimation procedure. STEP: 6 The second wake up message2 is transmitted to all the other nodes through RFChannel. STEP: 7 The sensor node[31], H1 sends the track information to the RFChannel to be transmitted to the H2 which is sensor node[17]. STEP: 8 The sensor node[17], H2 sends the track information acknowledgement to RFC which then sends to leader node H1, sensor node[31]. Figure 5-8 Sensor node[17] sends Track ack to RFC STEP: 9 The sensor node[17] now acts as the H1 and sends the wake up msg1 to all other nodes through RFC. STEP: 10 The next Leader node is elected and the procedure is continued until the target moves out of range. STEP: 11 The energy consumed by the sensor nodes remains constant at certain period of time. Though the number of nodes increases the network energy consumption is maintained constant. SUMMARIZATION The OMNeT++ 3.0 is being implemented in window XP to generate the simulation environment. C++ programming language is being used and the desired output is examined.The sensor network is created with 80 nodes and the corresponding messages are transferred between the nodes. The vector graph is generated once the simulation ends. The conclusion and future enhancements are described in the sixth chapter. CHAPTER: CONCLUSION AND FUTURE ENHANCEMENTS GENERAL This chapter discusses the future enhancements and the conclusion of the target tracking in wireless sensor network. Conclusion The idea behind sensor networks cross layer design is to optimize the basic trade off in sensor networks the tradeoff between application specific QoS gain and energy consumption expenditure. As of now cross layer optimizations need to done in a holistic manner as research communities are trying to reach a acceptable new architecture. However the holism may not necessarily be affordable in the future. As complexities in the networks grow it is the hierarchical layers provide long-term efficiency and propagation. The alteration on layer of protocol stacks does not require the rewriting of entire protocol stack. This dissertation research rests heavily on an organized study of the sensor networks cross layer design. The second chapter discusses the overall description of the project and the area in which the project is carried out. The different types of protocols and methods used to perform target tracking are explained in Chapter 3. The LESOP protocol design has been discussed in the fourth chapter along with algorithm of each module. The implementation of the protocol and the end result has been discussed in the fifth chapter Future enhancements Future enhancements in wireless sensor networks are seen in Embedded Wireless interconnect (EWI) area. The EWI is used for replacing the existing OSI structures. It is built on two layers which are system layer and wireless link layer respectively. The experimental and theoretical background studies lead to an explanation of the general interface syntax between the two layers and suggests that the separate dealing of source and channel coding in wireless link layer and system layer can achieve optimal twist and energy consumption trade off in reach-far wireless sensor networks, asymptotically. Summary The conclusion statement and future enhancements are discussed in this chapter. APPENDIX MAIN MODULE The main module includes sub modules of application layer, mac layer, Physical layer, Sensor, Recorder and the target. // MAC ModuleInterface(SensorHostMac) // parameters: Parameter(txRate, ParType_Numeric ParType_Const) Parameter(TD_MAX, ParType_Numeric ParType_Const) // gates: Gate(toPhy, GateDir_Output) Gate(toApp, GateDir_Output) Gate(fromApp, GateDir_Input) Gate(fromPhy, GateDir_Input) EndInterface Register_ModuleInterface(SensorHostMac) // APP ModuleInterface(SensorHostApp) // parameters: Parameter(Location_X, ParType_Numeric ParType_Const) Parameter(Location_Y, ParType_Numeric ParType_Const) Parameter(Lambda_app, ParType_Numeric ParType_Const) Parameter(Dec_Interval, ParType_Numeric ParType_Const) Parameter(MicNoise, ParType_Numeric ParType_Const) Parameter(DetPkLen, ParType_Numeric ParType_Const) Parameter(MicSample, ParType_Numeric ParType_Const) Parameter(Sensing_Interval, ParType_Numeric ParType_Const) Parameter(DecayComponent, ParType_Numeric ParType_Const) Parameter(TrackPkLen, ParType_Numeric ParType_Const) Parameter(ACKPkLen, ParType_Numeric ParType_Const) // gates: Gate(toMac, GateDir_Output) Gate(toSen, GateDir_Output) Gate(fromMac, GateDir_Input) Gate(fromSen, GateDir_Input) EndInterface Register_ModuleInterface(SensorHostApp) // CHANNEL ModuleInterface(WirelessChannel) // parameters: Parameter(DecayComponent, ParType_Numeric ParType_Const) Parameter(Shadowing, ParType_Numeric) Parameter(Number_Host, ParType_Numeric ParType_Const) Parameter(Propagation_Delay, ParType_Numeric ParType_Const) Parameter(RF_Range, ParType_Numeric ParType_Const) // gates: Gate(In, GateDir_Input) EndInterface Register_ModuleInterface(WirelessChannel) //RECORDER ModuleInterface(SystemRecorder) // parameters: Parameter(Number_Host, ParType_Numeric ParType_Const) Parameter(Interval, ParType_Numeric ParType_Const) // gates: Gate(In, GateDir_Input) EndInterface Register_ModuleInterface(SystemRecorder) // TARGET ModuleInterface(TargetLocation) // parameters: Parameter(Energy, ParType_Numeric) Parameter(DecayComponent, ParType_Numeric ParType_Const) Parameter(Number_Host, ParType_Numeric ParType_Const) Parameter(Interval, ParType_Numeric ParType_Const) Parameter(Max_V, ParType_Numeric ParType_Const) Parameter(Sen_Range, ParType_Numeric ParType_Const) Parameter(Range, ParType_Numeric ParType_Const) Parameter(Propagation_Delay, ParType_Numeric ParType_Const) Parameter(Enter_Time, ParType_Numeric ParType_Const) Parameter(Leave_Time, ParType_Numeric ParType_Const) EndInterface Register_ModuleInterface(TargetLocation) // PHYSICAL ModuleInterface(SensorHostPhy) // parameters: Parameter(RFNoise, ParType_Numeric ParType_Const) Parameter(RFPower, ParType_Numeric ParType_Const) Parameter(P_Activate, ParType_Numeric ParType_Const) Parameter(P_Transmit, ParType_Numeric ParType_Const) Parameter(Threshold, ParType_Numeric ParType_Const) // gates: Gate(fromMac, GateDir_Input) Gate(RFIn, GateDir_Input) Gate(toMac, GateDir_Output) EndInterface Register_ModuleInterface(SensorHostPhy) // SENSOR ModuleInterface(Sensor) // parameters: Parameter(MicNoise, ParType_Numeric ParType_Const) Parameter(MicSample, ParType_Numeric ParType_Const) Parameter(E_SEN, ParType_Numeric ParType_Const) // gates: Gate(SenIn, GateDir_Input) Gate(fromApp, GateDir_Input) Gate(toApp, GateDir_Output) EndInterface Register_ModuleInterface(Sensor) // submodule mac: modtype = _getModuleType(SensorHostMac); cModule *mac_p = modtype-create(mac, mod); int mac_size = 1; // parameter assignments: mac_p-par(txRate) = mod-par(txRate); mac_p-par(TD_MAX) = mod-par(TD_MAX); _readModuleParameters(mac_p); // submodule app: modtype = _getModuleType(SensorHostApp); cModule *app_p = modtype-create(app, mod); int app_size = 1; // parameter assignments: app_p-par(Location_X) = mod-par(Location_X); app_p-par(Location_Y) = mod-par(Location_Y); app_p-par(MicNoise) = mod-par(MicNoise); app_p-par(MicSample) = mod-par(MicSample); app_p-par(DetPkLen) = mod-par(DetPkLen); app_p-par(TrackPkLen) = mod-par(TrackPkLen); app_p-par(ACKPkLen) = mod-par(ACKPkLen); app_p-par(Sensing_Interval) = mod-par(Sensing_Interval); app_p-par(DecayComponent) = mod-par(DecayComponent); app_p-par(Lambda_app) = mod-par(Lambda_app); app_p-par(Dec_Interval) = mod-par(Dec_Interval); _readModuleParameters(app_p); // submodule sen: modtype = _getModuleType(Sensor); cModule *sen_p = modtype-create(sen, mod); int sen_size = 1; // parameter assignments: sen_p-par(MicNoise) = mod-par(MicNoise); sen_p-par(MicSample) = mod-par(MicSample); sen_p-par(E_SEN) = tmpval.setDoubleValue(new Expr0(mod)); _readModuleParameters(sen_p); // submodule phy: modtype = _getModuleType(SensorHostPhy); cModule *phy_p = modtype-create(phy, mod); int phy_size = 1; // parameter assignments: phy_p-par(RFNoise) = mod-par(RFNoise); phy_p-par(RFPower) = mod-par(RFPower); phy_p-par(Threshold) = mod-par(RFThreshold); phy_p-par(P_Activate) = mod-par(P_Activate); phy_p-par(P_Transmit) = mod-par(P_Transmit); _readModuleParameters(phy_p); // submodule batt: modtype = _getModuleType(Battery); cModule *batt_p = modtype-create(batt, mod); int batt_size = 1; // parameter assignments: batt_p-par(EnergyLevIni) = mod-par(EnergyLevIni); _readModuleParameters(batt_p); // connections: cGate *srcgate, *destgate; cChannel *channel; cPar *par; // connection srcgate = _checkGate(phy_p, toMac); destgate = _checkGate(mac_p, fromPhy); srcgate-connectTo(destgate); // connection srcgate = _checkGate(sen_p, toApp); destgate = _checkGate(app_p, fromSen); srcgate-connectTo(destgate); // connection srcgate = _checkGate(mac_p, toPhy); destgate = _checkGate(phy_p, fromMac); srcgate-connectTo(destgate); // connection srcgate = _checkGate(app_p, toSen); destgate = _checkGate(sen_p, fromApp); srcgate-connectTo(destgate); // connection srcgate = _checkGate(mac_p, toApp); destgate = _checkGate(app_p, fromMac); srcgate-connectTo(destgate); // connection srcgate = _checkGate(app_p, toMac); destgate = _checkGate(mac_p, fromApp); srcgate-connectTo(destgate); // connection srcgate = _checkGate(mod, SenIn); destgate = _checkGate(sen_p, SenIn); srcgate-connectTo(destgate); // connection srcgate = _checkGate(mod, RFIn); destgate = _checkGate(phy_p, RFIn); srcgate-connectTo(destgate); // this level is done recursively build submodules too mac_p-buildInside(); app_p-buildInside(); sen_p-buildInside(); phy_p-buildInside(); batt_p-buildInside(); } // submodule target: modtype = _getModuleType(TargetLocation); cModule *target_p = modtype-create(target, mod); int target_size = 1; // parameter assignments: target_p-par(Energy) = tmpval.setDoubleValue(new Expr1(mod)); target_p-par(Number_Host) = mod-par(Number_Host); target_p-par(Propagation_Delay) = mod-par(A_Propagation_Delay); target_p-par(Interval) = mod-par(Sen_Interval); target_p-par(Max_V) = mod-par(Max_V); target_p-par(Sen_Range) = mod-par(Sen_Range); target_p-par(Range) = mod-par(Range_Square); target_p-par(DecayComponent) = mod-par(A_DecayComponent); target_p-par(Enter_Time) = mod-par(Target_Enter_Time); target_p-par(Leave_Time) = mod-par(Target_Leave_Time); _readModuleParameters(target_p); // submodule recorder: modtype = _getModuleType(SystemRecorder); cModule *recorder_p = modtype-create(recorder, mod); int recorder_size = 1; // parameter assignments: recorder_p-par(Number_Host) = mod-par(Number_Host); recorder_p-par(Interval) = mod-par(Record_Interval); _readModuleParameters(recorder_p); // submodule rfchannel: modtype = _getModuleType(WirelessChannel); cModule *rfchannel_p = modtype-create(rfchannel, mod); int rfchannel_size = 1; // parameter assignments: rfchannel_p-par(DecayComponent) = mod-par(DecayComponent); rfchannel_p-par(Shadowing) = tmpval.setDoubleValue(new Expr2(mod)); rfchannel_p-par(Number_Host) = mod-par(Number_Host); rfchannel_p-par(RF_Range) = mod-par(RF_Range); rfchannel_p-par(Propagation_Delay) = mod-par(Propagation_Delay); _readModuleParameters(rfchannel_p); // submodule sensors: modtype = _getModuleType(SensorHost); int sensors_size = (int)(mod-par(Number_Host)); _checkModuleVectorSize(sensors_size,sensors); cModule **sensors_p = new cModule *[sensors_size]; for (submodindex=0; submodindexsensors_size; submodindex++) { sensors_p[submodindex] = modtype-create(sensors, mod, sensors_size, submodindex); // parameter assignments: sensors_p[submodindex]-par(txRate) = mod-par(R_RF); sensors_p[submodindex]-par(EnergyLevIni) = mod-par(EnergyLevIni); sensors_p[submodindex]-par(DetPkLen) = mod-par(L_d); sensors_p[submodindex]-par(TrackPkLen) = mod-par(L_t); sensors_p[submodindex]-par(ACKPkLen) = mod-par(L_a); sensors_p[submodindex]-par(RFNoise) = mod-par(RFNoise); sensors_p[submodindex]-par(MicNoise) = mod-par(sigma_i2); sensors_p[submodindex]-par(RFPower) = mod-par(RFPower); sensors_p[submodindex]-par(RFThreshold) = mod-par(RFThreshold); sensors_p[submodindex]-par(MicSample) = mod-par(Sen_N); sensors_p[submodindex]-par(P_Activate) = mod-par(P_Activate); sensors_p[submodindex]-par(P_Transmit) = mod-par(P_Transmit); sensors_p[submodindex]-par(Location_X) = tmpval.setDoubleValue(new Expr3(mod)); sensors_p[submodindex]-par(Location_Y) = tmpval.setDoubleValue(new Expr4(mod)); sensors_p[submodindex]-par(P_SEN) = mod-par(P_SEN); sensors_p[submodindex]-par(TD_MAX) = mod-par(TD_MAX); sensors_p[submodindex]-par(Lambda_app) = tmpval.setDoubleValue(new Expr5(mod)); sensors_p[submodindex]-par(Sensing_Interval) = mod-par(T_Sen); sensors_p[submodindex]-par(Dec_Interval) = mod-par(T_Track); sensors_p[submodindex]-par(DecayComponent) = mod-par(A_DecayComponent); sensors_p[submodindex]-par(Sensor_Fs) = mod-par(Sensor_Fs); _readModuleParameters(sensors_p[submodindex]); } // this level is done recursively build submodules too target_p-buildInside(); recorder_p-buildInside(); rfchannel_p-buildInside(); for (submodindex=0; submodindexsensors_size; submodindex++) sensors_p[submodindex]-buildInside(); delete [] sensors_p; } PACKETS DEFINITION There are several packets, messages, and busy tones that get transferred between the nodes for every event. The definition and specification of the packets include various attributes. The RFPacket includes the following data txRate // Transmission Rate sending_power // Transmitting power receiving_power // Receiving Power location_x // X-Coordinate location_y // Y-coordinate The DecInfoPacket includes the following data Data // Fusion Co-efficient The TrackInfoPacket includes the following data track_x // X-coordinate track_y // Y-coordinate recordtime // Time Of Recording true_x // Original X-coordinate true_y // Original Y-coordinate The above message packets are transmitted between the nodes during corresponding events. For example consider that the sensor node 17 [H1] sends the track information to node 3[H2]. The TrackInfoPacket resembles as given below. //NODE 17 SENDING TRACK_INFO TO NODE 3 double txRate = 20000.000000 double sending_power = 1.000000 double receiving_power = 0.048157 double location_x = 16.652397 double location_y = 19.143103 int number = 1 double track_x = 15.996901 double track_y = 18.059343 int ncount = 3 double recordtime = 30.899702 double true_x = 14.933409 double true_y = 18.713991 Similarly the packet includes various different information depending on the type of packets sent received.

Wednesday, May 6, 2020

Ocd Essay - 1631 Words

These symptoms, mentioned previously, all lead to the conclusion that the person experiencing or performing them may be suffering from OCD; however, the more important question is what has led that patient to these symptoms? OCD may be caused due to biological factors. People with first-degree family members that have been diagnosed with OCD are more likely to experience OCD than other people with no OCD on their family members’ medical records. Some studies suggest that OCD is heritable as genes have potential to contribute â€Å"27%-47% of the patient’s likelihood to be diagnosed with OCD (Abramowitz and Taylor, 2009), but specific genes have not yet been identified. The other ≈50% are linked to environmental factors. Some aspects of the†¦show more content†¦With all these symptoms mentioned, and alterations within the body, there is a wide range of treatment that OCD patients can undergo. Unfortunately, OCD cannot be cured, and many researchers consid er it to be a life-long disorder; however, its symptoms can be managed through the proper medication. Selective serotonin reuptake inhibitors are used as part of treatment, as they reduce depression by increasing the levels of serotonin in the brain. SSRI’s block the reuptake of serotonin, making more serotonin available for further use. Anti-depressants are also used when the patient reaches a point of helplessness, and possibly depression. On the other hand, anti-anxiety medication can also be utilized to help ease the patient’s anxiety when bombarded with discomforting obsessions that lead to compulsions. Exposure and response prevention therapy is utilized during cognitive-behavior therapy, where the psychologist or psychiatrist expose the patient to situations that provoke certain obsessions and anxiety, where the patient feels the urge to perform certain compulsions in order to reduce or end the anxiety he/she is feeling. The medical caregiver’s job is to help the patient overcome these obsessions by not performing the compulsions. The purpose of this type of therapy is to teach patients that abstaining from performing these compulsions will not result in these perceived harmful consequences (Abramowitz and Taylor, 2009). The therapy helpsShow MoreRelatedEssay On Ocd1199 Words   |  5 PagesAll grown-ups and youngsters with OCD report that their fixations cause them huge pain and tension and that they are more regular rather than comparative, nosy contemplations in people without OCD[31]. As far as QoL, people with OCD report an unavoidable lessening contrasted with controls[28]. Youth indicate tricky companion relations, scholastic troubles, rest issues, and take an interest in less recreational exercises than coordinated peers[32,33]. By and large, there is a lower QoL in pediatricRead MoreOcd Essay827 Words   |  4 Pagesexplain is known as Obsessive-compulsive disorder (OCD). As the name suggests, obsessive compulsive disorde r is characterised by obsessions and compulsions. There are two explanations for this disorder; psychological and biological. The biological explanation of OCD focuses on genetics .i.e. role of certain chemical imbalances and family increasing likelihood of developing OCD. Family studies have shown that people with a first-degree relative with OCD have a five times greater risk than the normal populationRead MoreEssay On OCD1289 Words   |  6 PagesSet Free From OCD This is to show It was made to be, put in place, established earlier that any all OCD is not bad anymore in any all ways. This is to show It was made to be, put in place, established earlier that any all OCD is not bad anymore in any way shape or form. This is to show It was made to be, put in place, established earlier that any all OCD doesn’t have control over me anymore in any all ways. This is to show It was made to be, put in place, established earlier thatRead MoreThe Identification and Treatment of OCD Essay1221 Words   |  5 PagesThere are many different aspects to the identification and treatment of OCD and this paper attempts to identify classic symptoms and theorized risk factors/causes. In addition it explores the viable treatment options and evaluates the efficiency of each in alleviating symptoms while discussing how each treatment functions to facilitate recovery. Furthermore, it assesses the extent to which the treatments may be used together to maximize effectiveness and then provides a probable prognosis. VerifyingRead MoreTreatment Plan for Obsessive Compulsive Disorder (OCD) Essay1334 Words   |  6 PagesThis essay will cover what obsessive-compulsive disorder (OCD) is and how leisure education can be used to help these individuals who have been diagnosed with OCD. This essay will discuss the various characteristics that can be noticed with an individual who has been diagnosed with OCD and also introduce different leisure activities that can be used to help these individuals. The overall goal for this essay is to provide strong evidence showing that leisure education can be useful in helping individualsRead MoreCollege Writing And High School Writing941 Words   |  4 Pages Throughout the semester, I have definitely improved my diction and how I organize my essays and my introductions, but I feel as though my time management skills could use some enhancement. English was always my strongest subject, especially when it came to vocabulary tests. I had a talent for memorizing words and definitions and it always came easy to me. So when I would review my work on these previous essays, I noticed how strong my writing sounded, all because I had included enhanced vocabularyRead MoreObsessive Compulsive Disorder (OCD) Essay1627 Words   |  7 Pagesdisorders are brought on due to both psychological and biological problems. Many of these are anxiety or behavioral disorders. Obsessive Compulsive Disorder (OCD) is one of these disorders that is an issue in both anxiety and behavioral issues. Its causes may be psychological, biological, or, in most cases, both. Many studies have been conducted on OCD and show that it is a complex disorder with many different symptoms. There have been treatments and medications to help reduce the symptoms and help peopleRead MoreObsessive Compulsive Disorder (OCD) Essay800 Words   |  4 Pages Obsessive Compul sive Disorder And Its Effect On Life Obsessive-compulsive disorder, or OCD, involves anxious thoughts or rituals one feels and cant control. . For many years, OCD was thought to be rare. The actual number of people with OCD was hidden, because people would hide their problem to avoid embarrassment. Some recent studies show that as many as 3 million Americans ages 18 to 54 may have OCD at any one time. This is about 2.3% of the people in this age group. It strikes men and women inRead MoreEssay on Obsessive Compulsive Disorder (OCD)875 Words   |  4 Pagesfind the missing puzzle pieces and solve the mystery of Obsessive Compulsive Disorder. Works Cited Abramowitz, Ph.D., Jon. OCD 101 (Demystifying This Complex Problem) | Psychology Today. Psychology Today: Health, Help, Happiness Find a Therapist. All Things OCD, 1 Nov. 2010. Web. 03 June 2011. http://www.psychologytoday.com/blog/all-things-ocd/201011/ocd-101-demystifying-complex-problem. Familydoctor.org Editorial Staff. Obsessive-Compulsive Disorder: What It Is and How to Treat ItRead MoreMy Favorite Class1331 Words   |  6 Pageswith these new challenges of life. Registering for an English 1101 class, I would never have thought my writing was remotely exceptional. On the first day of class, we had to write these diagnostic essay (I wrote about picking my major) to see where we were at in our writings. The day I received the essay back was the moment where I truly considered the being a writer. Besides my grammar and spelling errors my teacher, Mrs. Emma Perry, wrote â€Å"very powerful and emotionally descriptive writing - are

Tuesday, May 5, 2020

Diverse People in a Group for Americans- myassignmenthelp.com

Question: Discuss about theWorking with Diverse People in a Groupfor Americans. Answer: My group is made up of people from different cultural backgrounds. Apart from the local students, there are learners from overseas mainly Africans, Asians, and Americans. These are people who have different beliefs and traditions regarding health care. Each of these members value the cultural traditions held by the respective community because it is important to them in many ways. The fact that each of the group members originate from a different background implies that they have differing views regarding health care. The Africans in the group appear to be conservative people who believe in traditional healthcare services such as bush medicine. On the other hand, the Asians in the group hold different views because, unlike the rest of the group members, they believe that healthcare issues should be, to some extent, related to spiritual beliefs. According to the Asians in the group, healthcare issues cannot be discussed without involving the divine powers. As Muslims, the Asians believe that God can play a central role in the healing process (Braithwaite Schrodt, 2014). On their part, the Americans believe in western culture. According to the western culture, diseases are common because they are caused by environmental, genetic, and pathogens. At the same time, people should rely on modern healthcare services to help in addressing the illnesses affecting them. The use of modern medicine can be of great contribution in handling the ailments that affect people. The ways in which the Africans, Asians, and Americans communicate differ from one person to the other. Although each of the group members value communication as an important tool in the society, they have different views regarding the usage of verbal and non-verbal communication strategies. The Africans in the group believe that believe that communication should be perfectly used to deliver a message to the audience. During communication, the Africans believe that there should be a close distance between the communicating individuals. Meaning, they should feel free to touch and shake hands without any restrictions (Craig, 2013). Gender is not an issue of concern when it comes to communication because people are treated in a similar way. This view is almost similar to the Americans who believe in the use of proximity during communication. The Americans also value closeness and the use of eye contact. When communicating, it is normal for an American to have and maintain a direct contact. However, the Asian members of the group demonstrated different beliefs regarding communication (Bylund, Peterson Cameron, 2012). Unlike their American and African counterparts, the Asians discourage the use of direct eye contact, hand shake and close proximity between the people of diffe rent genders. Islamic culture does not encourage a free interaction between the males and females because they should keep some distance while interacting with one another. My interactions with the group members sensitized me to learn that there are certain problems which are only experienced by people depending on their location. What I found is that the Africans have serious health issues like HIV/AIDS, malnutrition, and mental illness. These are diseases which have been causing lots of problems to the Africans. The diseases are prevalent amongst these people because of their socioeconomic status. For example, malnutrition has become a major issue because of food insecurity that has been fueled by climate change. However, when I interacted with the Americans, I found out that they face health challenges like obesity and diabetes (Almutairi, McCarthy Gardner, 2014). These are lifestyle diseases which are associated with harmful behaviors such as physical inactivity, poor eating habits, and smoking. These have become common practices amongst the American population. Meanwhile, from my interaction with the group members, I learnt that the Asians have certain health issues like cancer and mental illnesses which needs to be addressed. My interaction with the colleagues from overseas was indeed a good experience. It made me to learn a lot about people from other countries. One of the lessons I learnt is that each of the members has specific needs which are unique to them. Therefore, as a serious student, I know I should make some positive contributions towards enhancing the learning process of these students (Grant, Parry Guerin, 2013). What I can do is to teach the students about communication. Since I know that these students can face similar challenges when it comes to communication, I will take my time to teach them about intercultural communication. I will adequately sensitize them on cultural awareness, cultural intelligence, and the significance of fostering cultural tolerance, acceptance, and appreciation. It will give the learners important skills to use in interacting and communicating with people from diverse cultural backgrounds. Australia has been receiving an influx of foreign students because it has created a favorable environment for each of them regardless of their diversities. There are many resources which can be availed for these overseas students. These include interpreters, counselors, and mentors. Interpreters, for instance, can help in facilitating the communication process in case of any linguistic barriers (Arnold Boggs, 2015). References Almutairi, A.F., McCarthy, A. Gardner, G.E. (2014). Understanding Cultural Competence in a Multicultural Nursing Workforce Registered Nurses Experience in Saudi Arabia.Journal of Transcultural Nursing, p.1043659614523992. Arnold, E.C. Boggs, K.U. (2015). Interpersonal relationships: Professional communication skills for nurses. New York: Elsevier Health Sciences. Braithwaite, D.O. Schrodt, P. eds. (2014). Engaging theories in interpersonal communication:Multiple perspectives. New York: Sage Publications. Bylund, C.L., Peterson, E.B. Cameron, K.A. (2012). A practitioner's guide to interpersonal communication theory: An overview and exploration of selected theories. Patient education and counseling, 87(3), pp.261-267. Craig, R.T. (2013). Constructing theories in communication research. Theories and models of communication, 1, pp.39-57. Grant, J., Parry, Y., Guerin, P. (2013). An investigation of culturally competent terminology in healthcare policy finds ambiguity and lack of definition. Australian and New Zealand journal of public health, 37(3), 250-256.