Sunday, March 15, 2020

Electronic Voting Machine Essay Example

Electronic Voting Machine Essay Example Electronic Voting Machine Essay Electronic Voting Machine Essay International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 A Preview on Microcontroller Based Electronic Voting Machine Diponkar Paul and Sobuj Kumar Ray, Member, IACSIT Abstract- Voting is most pivotal process of democratic society through which people determine it’s government. Governments around the world are increasingly considering the replacement of traditional paper-based voting schemes with electronic voting systems. Elections of Bangladesh are conducted most exclusively using electronic voting machines developed over the past three years. In this paper we describe the design, construction and operation of a digital voting machine using a microcontroller profoundly. Again we also portray counting system of votes, market survey and cost analysis. Index Terms- Voting system, atmega16l microcontroller, voting analysis, security of EVM. I. INTRODUCTION Voting is a crucial device to reveal the opinion of a group on an issue that is under consideration. Based on the promise of greater e? iency, better scalability, faster speed, lower cost, and more convenience, voting is currently shifting from manual paper-based processing to automate electronic-based processing. The term â€Å"electronic voting† characteristically depicts to the use of some electronic means in voting and ensure the security, reliability, guarantee and transferency[1],[2]. Now a day the wide range of application of voting inclu de its use in reality student body elections, shareholder meetings, and the passing of legislation in parliament. Perhaps the most important, in? ential, publicised, and widespread use of voting is its use in national elections. Compared to its traditional paper-based counterpart, electronic voting is considered to have many greater potential bene? ts. These bene? ts include better accuracy by eliminating the negative factor of human error, better coverage for remote locations, increased speed for tally computation, lower operational cost through automated means, and the convenience of voting from any location Whether or not electronic voting is a necessary replacement for the traditional paper-based method, it is irrefutable that the conduct of voting as been shifting to the use of electronic medium. To date, electronic databases are used to record voter information, computers are used to count the votes and produce voting results, mobile devices are used for voting in interactive television shows, and electronic voting machines have been used in some national elections. Generally, the term â€Å"electronic voting† refers to the de? nition, collection, and dissemination of people’s opinions with the help of some machinery that is more or less computer supported. Despite Manuscript received August 15, 2012; revised October 12, 2012. The authors are with the Department Electrical and Electronic Engineering, World University of Bangladesh, Dhaka, Bangladesh (e-mail: [emailprotected] com, [emailprotected] edu. sg) the transition from traditional paper-based systems to electronic medium, the purpose and requirements for voting remain. Voting is a decision making mechanism in a consensus-based society and security is indeed an essential part of voting. The critical role in determining the outcome of an election, electronic voting systems should be designed and developed with the greatest care. However, a number of recent studies have shown that most of the electronic voting systems being used today are fatally defective [3], [4], [5] and that their quality does not match the importance of the task that they are supposed to carry out. Flaws in current voting systems, which were discovered through testing and other analysis techniques, have stimulated a number of research efforts to mitigate the problems in deployed voting systems. These efforts focused on ameliorating security primitives, such as the storage of votes [6], [7] and auditing [8], and on formally assessing and making procedures more effective [9], [10]. Finally, the standards that set the functional and performance requirements against which the systems are developed, tested, and operated have often been found to be inadequate [11], [12], [13]. Among the reasons for concern, critics include vague and incomplete security guidelines, insufficient documentation requirements, and inadequate descriptions of the configuration of commercial software. An electronic voting machine has been designed by a microcontroller for which the code is written in assembly language. Various code protection schemes specified by the manufacturer of the microcontroller are used to prevent inadvertent or deliberate reading and reproduction of the code contained in the microcontroller. The election data contained in the EEPROM of the microcontroller can download into a central computer for tabulations. The security of data in this computer is enforced by generating digital signatures for each data file created. This process makes it impossible for anyone to substitute wrong or deliberately altered data files at any intermediate stage between the capturing of voter’s intent by the machine and the final results tabulations. Prior to the election, all con? guration data is set up on the counting server. The con? guration is then transferred to the ballot-box server. Con? guration data include: candidate names, polling station identity, and a list of barcodes. During the voting period, voters are authenticated as per the traditional paper-based voting, and asked whether they wish to vote electronically or use the traditional paper-based method. A voter choosing to use the traditional paper-based method proceeds by being given a ballot paper, casting the vote on the ballot paper, and placing the ballot paper in a ballot-box. On the other hand, a barcode is chosen at random and is given to the voter choosing to use eVACS. Voter authorisation on the electronic voting booth computer is by 185 DOI: 10. 7763/IJIEE. 2013. V3. 295 International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 using the barcode. The electronic voting booth computer communicates the barcode to the ballot-box server for validation and to inform that the voting process is initiating. Upon validation of an invalid barcode, the ballot-box server returns an error message to the voting booth computer. Otherwise, the ballot-box server returns the equivalent of a ballot-paper containing the names of candidates to the voting booth computer. The voter may select the candidates in a particular preference ordering, and restart or complete their selection afterwards. The selection is displayed on the screen forcon? rmation, and the voter is allowed to change or con? rm their selection. The voting booth computer returns a warning given invalid selection or informal vote, however casting invalid or informal vote is allowed. The voter con? ms the selection by using the barcode, and both the vote and a log of key sequence pressed are then communicated to the ballot-box server. The ballot-box server checks that the same barcode is used to initiate the server counts the votes, and produces a voting result. II. HARDWARE DEVELOPMENT OF ELECTRONIC VOTING MACHINE Fig. 1. Block diagram of digital voting system Fig 2. Circuit diagram of the digital voting system A. Circuit Description The high level digital voting machine built with ATmega16 Micro controller. The Micro controller port D uses for LCD display and port C. (pin 22) uses for voting power or presiding officers button. The candided button input from Port C. 1 – C. 4 (pin 23 to 26; 4 candided). The output LED and buzzer uses Micro controller port C. 5 and C. 6. The LCD backlight also connected to port C. 7 via a transistor. At the starting of voting the election commission offices setup the machine at the centre. Then power on the switch and sealed it that nobody can power off. The presiding officer identifies the original voter of that particular area and pushes the voting power button. The voting power LED glow then and continue it until once press the candided buttons. The voter then goes to the secret room where Voting unit placed and press button beside his candided symbol. Voter can watch success of voting by glowing confirmation LED and beep indication. The presiding officer can also hear beep sound watch a confirmation LED. Same time the voting power goes down and nobody can vote again. Mainly when presiding officer press voting power button, Micro controller start scanning from pin 23 to pin 26. When get response from a specific pin, increase the counter one of that candided and stop scanning. So it is not possible to voting twice or more. All the counter result store at Micro controller EEPROM. When the voting is under process it will showed at display â€Å"Voting under Process†. At the end of voting we need to know result. Then election commission or presiding officer presses the secret key (password). Now the Micro controller shows the result and supply the power to LCD backlight that it illuminated. If it needs to return voting process again one should press another secret key. There uses a transistor to operate buzzer and confirmation LED with proper current. There also uses a voltage regulator (7805) to supply 5v continuously. Here uses a dry cell 9V battery as power source. The power consumption of the system is very low (50mW150mW varying). After collected data and need erase recorded data from EEPROM just broken the sealed on power button and power off the system. Now the system is ready for next election. This measurement System includes the following components: Voting Unit Control Unit Confirmation Unit Display Unit (LCD) Power Supply Unit B. Voting Unit Fig. 3. Output circuit diagram of the digital voting system Fig. 4. Voting 186 International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 Fig. 5. Confirmation unit In this Voting unit we have been used five button switch and five 2. 2K? resister which connected to the five button switches. C. Buzzer A buzzer or beeper is an audio signaling device, which may be mechanical, electromechanical or piezoelectric. Typical uses of buzzers and beepers include alarm devices. These devices are output transducers converting electrical energy. As power is applied this mechanical device will energize and by doing so interrupt the power source and the cycle continue until the power is removed. The frequency of oscillation is strictly dependent on mechanical inertia. The piezo buzzer produces sound based on reverse of the piezoelectric effect. The generation of pressure variation or strain by the application of electric potential across a piezoelectric material is the underlying principle. These buzzers can be used alert a user of an event corresponding to a switching action, counter signal or sensor input. They are also used in alarm circuits. The buzzer produces a same noisy sound irrespective of the voltage variation applied to it. It consists of piezo crystals between two conductors. When a potential is applied across these crystals, they push on one conductor and pull on the other. This, push and pull action, results in a sound wave. Most buzzers produce sound in the range of 2 to 4 kHz. The Red lead is connected to the Input and the Black lead is connected to Ground. D. Light Emitting Diode (LED) A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices and are increasingly used for other lighting. Introduced as a practical electronic component in 1962, early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet, and infrared wavelengths, with very high brightness. When a light-emitting diode is forward-biased (switched on), electrons are able to recombine with electron holes within the device, releasing energy in the form of photons. This effect is called electroluminescence and the color of the light (corresponding to the energy of the photon) is determined by the energy gap of the semiconductor. LEDs are often small in area (less than 1 mm2), and integrated optical components may be used to shape its radiation pattern. LEDs present many advantages over incandescent light sources including lower energy consumption, longer lifetime, 187 mproved robustness, smaller size, and faster switching. LEDs powerful enough for room lighting are relatively expensive and require more precise current and heat management than compact fluorescent lamp sources of comparable output. Light-emitting diodes are used in applications as diverse as replacements for aviation lighting, automotive lighting (in particular brake lamps, turn signals, and indicators) as wel l as in traffic signals. LEDs have allowed new text, video displays, and sensors to be developed, while their high switching rates are also useful in advanced communications technology. Infrared LEDs are also used in the remote control units of many commercial products including televisions, DVD players, and other domestic appliances E. Controller Unit A control unit in general is a central part of the machinery that controls its operation, provided that a piece of machinery is complex and organized enough to contain any such unit. One domain in which the term is specifically used is the area of computer design. In this work Microcontroller ATMEGA 16L is used as the controller unit which controls the sensed signal. A single highly integrated chip that contains all the components comprising a controller. Typically this includes a CPU, RAM, some form of ROM, I/O ports, and timers. Unlike a general-purpose computer, which also includes all of these components, a microcontroller is designed for a very specific task to control a particular system. As a result, the parts can be simplified and reduced, which cuts down on production costs. Microcontrollers are sometimes called embedded microcontrollers, which just mean that they are part of an embedded system that is, one part of a larger device or system. F. Power Supply Unit Power supply is a very important part of electronic circuit this circuit required fixed +5 V supply so to fix this voltage we needed voltage regulator. In this work used 7805 Voltage regulator which output fixed +5 volt. A voltage regulator generates a fixed output voltage of a preset magnitude that remains constant regardless of changes to its input voltage or load conditions. There are two types of voltage regulators: linear and switching. A linear regulator employs an active (BJT or MOSFET) pass device (series or shunt) controlled by a high gain differential amplifier. It compares the output voltage with a precise reference voltage and adjusts the pass device to maintain a constant output voltage. G. Display Unit Display device shown the result of the measuring instrument. A observer can see the result and observe the temperature of electrical machine. In this work we used a 216 character LCD (LM016L) display. A liquid crystal display (LCD) is a thin, flat electronic visual display that uses the light modulating properties of liquid crystals. H. Printed Circuit Board A printed circuit board, or PCB, is used to mechanically International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 support and electrically connect electronic components using conductive pathways, tracks or signal traces etched from copper sheets laminated onto a non-conductive substrate. It is also referred to as printed wiring board (PWB) or etched wiring board. A PCB populated with electronic components is a printed circuit assembly (PCA), also known as a printed circuit board assembly (PCBA). Printed circuit boards are used in virtually all but the implest commercially produced electronic devices. PCBs are inexpensive, and can be highly reliable. They require much more layout effort and higher initial cost than either wire wrap or point-to-point construction, but are much cheaper and faster for high-volume production; the production and soldering of PCBs can be done by automated equipment. Much of the electronics industrys PCB design, assembly, and quality control needs are set by standards that are pu blished by the IPC organization. Pin descriptions of ATmaga16L Microcontroller VCC: Digital supply voltage. GND: Ground. Port B (PB7 PB0) Port B is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for each bit). The Port B output buffers have symmetrical drive characteristics with both high sink and source capability. As inputs, Port B pins that are externally pulled low will source current if the pull-up resistors are activated. The Port B pins are tri-stated when a reset condition becomes active, even if the clock is not running. Port B also serves the unction’s of various special features of the ATmega16. Port C (PC7 PC0) Port C is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for each bit). The Port C output buffers have symmetrical drive characteristics with both high sink and source capability. As inputs, Port C pins that are externally pulled low will source current if the pull-up resistors are activated. The Port C pins are tri-stated when a reset condition becomes active, even if the clock is not running. If the JTAG interface is enabled, the pull-up resistors on pins PC5 (TDI), PC3 (TMS) and PC2 (TCK) will be activated even if a reset occurs. Port C also serves the functions of the JTAG interface and other special features of the ATmega16. Port D (PD7 PD0) Port D is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for each bit). The Port D output buffers have symmetrical drive characteristics with both high sink and source capability. As inputs, Port D pins that are externally pulled low will source current if the pull-up resistors are activated. The Port D pins are tri-stated when a reset condition becomes active, even if the clock is not running. Port D also serves the functions of various special features of the ATmega16. Port A (PA7 PA0) Port A serves as the analog inputs to the A/D Converter. Port A also serves as an 8-bit bi-directional I/O port, if the A/D Converter is not used. Port pins can provide internal pull-up resistors (selected for each bit). The Port A output buffers have symmetrical drive characteristics with both high sink and source capability. When pins PA0 to PA7 are used as inputs and are externally pulled low, they will source current if the internal pull-up resistors are activated. The Port A pins are tri-stated when a reset condition becomes active, even if the clock is not running. RESET Reset Input. A low level on this pin for longer than the minimum pulse length will generate a reset, even if the clock is not running. Shorter pulses are not guaranteed to generate a reset. AVCC Fig. 6. Printed circuit board (pcb) of this voting system I. Pin Configurations Discription Fig. 7. Pin configuration of Atmega16L microcontroller[14] AVCC is the supply voltage pin for Port A and the A/D Converter. It should be externally connected to VCC, even if 188 International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 he ADC is not used. If the ADC is used, it should be connected to VCC through a low-pass filter AREF AREF is the analog reference pin for the A/D Converter. III. SOFTWARE DEVELOPMENT FOR ELECTRONIC VOTING MACHINE Flowchart of Program: user. In both of the systems that we analyzed, we found major security vulnerabilities that could compromise the confidentiality, integrity, and availability of the voting process. The results of our study suggest that there is a need for a drastic change in the way in which electronic systems are designed, developed, and tested. Researchers, practitioners, and policy makers need to define novel testing approaches that take into account the peculiar information flow of these systems, as well as the combination of computer security mechanisms and physical procedures necessary to provide a high level of assurance. Electronic voting software is not immune from security concerned. Here we describe Hack-a-vote, a simplified DRE voting system that we initially developed to demonstrate how easy it might be to insert a Trojan horse into a voting system. In case of a discrepancy, there either must be a row with the fresh random number. But without a mark of the voter or the alignment information on the ballot and on the receipt must differ. The proof consists either of a row containing the fresh random number but no mark without revealing which row this is or the proof consists of the two differing alignment bar codes without showing the mark at all. After the publication of the receipts the situation is analogous to the paper based schemes above as the voter possesses a correct receipt as electronic evidence. In addition to using unforgivable receipts with a special paper one can assume a trusted printer containing a chip card this printer could have the chip card and print the signature to the receipt. Having two in dependent ways to proved receipt to be not a forgery is a big advantage. REFERENCES D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, R. A. Kemmerer, W. Robertson, F. Valeur, and G. Vigna, â€Å"An Experience in Testing the Security of Real-World Electronic Voting Systems,† IEEE Transactions on Software Engineering, vol. 36, no. 4, 2010. [2] A. Villa? orita and K. Weldemariam, and R. Tiella, â€Å"Development, Formal Veri? ation, and Evaluation of an E-Voting System with VVPAT,† IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, 2009. [3] Y. D. Wagner, M. Bishop, T. Baker, B. D. Medeiros, G. Tyson, M. Shamos, and M. Burmester, â€Å"Software Review and Security Analysis of the ES I Votronic 8. 0. 1. 2 Voting Machine Firmware,† Technica l report, Security and Assurance in Information Technology Laboratory, 2007. [4] T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach, â€Å"Analysis of an Electronic Voting System,† in Proc. of IEEE Symp. Security and Privacy, pp. 27-40, 2004. [5] E. Proebstel, S. Riddle, F. Hsu, J. Cummins, F. Oakley, T. Stanionis, and M. Bishop, â€Å"An Analysis of the Hart Intercivic DAU eSlate,† in Proc. of Usenix/Accurate Electronic Voting Technology Workshop, 2007. [6] D. Molnar, T. Kohno, N. Sastry, and D. Wagner, â€Å"Tamper-Evident, History Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract),† in Proc. of IEEE Symp. Security and Privacy, pp. 365-370, 2006. [7] J. Bethencourt, D. Boneh, and B. Waters, â€Å"Cryptographic Methods for Storing Ballots on a Voting Machine,† in Proc. of Network and Distributed System Security Symp, 2007. 8] S. Garera and A. Rubin, â€Å"An Independent Audit Framework for Software Dependent Voting Systems,† in Proc. of ACM conf. Computer and Comm. Security, pp. 256-265, 2007. [9] J. Hall, â€Å"Improving the Security, Transparency and Efficiency of California’s 1 Percent Manual Tally Procedures,† in Proc. of Usenix/ Accurate Ele ctronic Voting Technology Workshop, 2008. [10] K. Weldemariam and A. Villafiorita, â€Å"Modeling and Analysis of Procedural Security in (e) Voting: The Trentino’s Approach and Experiences,† in Proc. of Usenix/Accurate Electronic Voting Technology Workshop, 2008. [11] R. Hite, â€Å"All Levels of Government are needed to Address Electronic Voting System Challenges,† Technical report, GAO, 2007. [1] Fig. 8. Flowchart of program IV. RESULTS AND ANALYSIS This work contributed to three very basic research questions arising: in the context of verifiable elections. First, we discussed the problem of keeping ballot secrecy to a certain extent in the case of a corrupted doting machine or voting authority. Our contribution to this is an approach where all secret information is encapsulated in the voting machine. Second, we considered the attack of receipt stealing and manipulation of the corresponding votes. Here we proposed a novel approach of linking all receipts by a hash chain such that each single receipt guards the integrity of all receipts issued previously. Together with a display in the polling place this approach shortens the time window in which an adversary can perform the ballot stealing attack without almost zero risk. Third, we discussed in detail the possibility of contesting an election based on the evidence provided by the verifiable election scheme. We compared the situation for Bingo Voting to the evidence provided by paper based schemes. We shortly sketched an approach to prove an error or a manipulation in the voting booth without violating ballot secrecy. However, this was only a proof of concept and for a practical application the usability of this approach needs to be further improved. V. CONCLUSION As part of these exercises, we devised a testing methodology, developed new tools that are specifically tailored to the security analysis of these systems, and learned a number of lessons, all of which should be of use to other 189 International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 [12] M. Gondree, P. Wheeler, and D. D. Figueiredo, â€Å"A Critique of the 2002 FEC VSPT E-Voting Standards,† Technical report, Univ. of California, 2005. [13] R. Mercuri. Voting System Guidelines Comments. [Online]. Available: http:// www. wheresthepaper. org/VVSGComment. pdf, 2005. [Online]. Available: [14] Atmel. atmel. com/Images/doc2466. pdf Mr. Diponkar Paul is currently working as Assistant Professor in the department of Electrical and Electronic engineering at World University of Bangladesh, Dhaka, Bangladesh (www. wub. edu. bd ). After passing his master degree from March 2008 he was serving as Assistant Professor, EEE at Bangladesh University upto July 2010. He is having qualifications: B. Sc. Engg. , DISM (software engineering), M. Sc. Engg. His research interests are in the area of energy conversions, power system modeling and advanced control theories covering the application of IT. From 0ct 2004 to July 2006, he was working as Lecturer in department of computer science and engineering at Pundra University of science technology, Bogra. In Singapore during his master dgree at Nanyang technological university, he was involved in financial service operation integrated to IT system administration jobs from Dec 2006 to February 2008. Mr. Sobuj Kumar Ray was born in 1987, Bogra, Bangladesh. Mr. Ray received his Bachelor degree in Electrical and Electronic Engineering from the Rajshahi University of Engineering and Technology (RUET), Rajshahi, Bangladesh in April 2010. He is now Assistant Manager (Technical) in DESCO. Mr. Ray worked at Internal University of Business Agriculture and Technology in the department of Electrical and Electronic Engineering, Dhaka, Bangladesh (www. iubat. edu) from 12th July 2010 to 1st October, 2012. He is enthusiastic on researcher on control system and Power System. 190

Friday, February 28, 2020

Article Summary Essay Example | Topics and Well Written Essays - 250 words - 7

Article Summary - Essay Example The author herself says that she combines all these, incongruous at the first sight, painting styles and cultures trying to find the lost identity. Hayv Kahraman is twenty eight, she was born in Baghdad and she is very proud of being an Iraqi; at the age of ten she mowed to Sweden with all her family, then she started attending school at the Academy of Art and Design in Florence; Hayv studied graphic design, but displayed a great interest in classical arts. In the academy she met her future husband and together they moved to Arizona. For the first time Hayv Kahraman felt depressed and was so to say isolated from the world of Art so, she put all her energy into her pictures. Five of her works were bought by Charles Saatchi a lot of other pictures were displayed and sold during different exhibitions held in the Third Line gallery in Dubai and the New York gallery. The Kahraman’s recent works consolidated under the name â€Å"Domestic Marionettes† reflect the authors consi derations about the women’s life in the

Tuesday, February 11, 2020

Supply Chain Management and Logistics Assignment

Supply Chain Management and Logistics - Assignment Example From this discussion it is clear that Toyota should adopt Omni-channel systems by focusing to change organization, which is the execution of developments relating to heightening delivery. The way to go is Omni-channel configuration, which is propelling impact of having attributes and information open over all channels. Organization incorporates leveraging customer experience chances, process upgrades.This paper stresses that one explanation behind changing supply chains are new circulation methodologies, which are controlled by expanding client administration desires, developed business sector scope, immediate channel structures, long haul channel connections, and developing gainfulness, stabilization, and vindication. Directors should unequivocally characterize the aspects and necessities of any key organization. Exact methods and guidelines must be created with the goal, control, and consistency of yield increment across all the departments. Moreover, supervisors have to play their part by instilling trust and responsibility among employees through Corporate Social Responsibility (CSR) codes.  Toyota is a multibillion-dollar company that manufactures and supplies motor vehicles. They have a supply chain management categorized under operational and strategic. They use Strategic decisions for choices over a longer period horizon.  Production decisions are made based on the products to be produced and the various production centers, allocation of various suppliers to production plants, and to customer markets.

Friday, January 31, 2020

Cell Phone in Life Essay Example for Free

Cell Phone in Life Essay In modern life, cell phone is an indispensable tool to all people. To everyone, a cell phone is a magic tool, which is a mean of telecommunication, an entertainment device and a great work supporter. To me, I cannot imagine how I can live without my phone. The basic function of a cell phone is to connect people. We use our cell phones to communicate with the other ones. For example, we can talk to parents and send our love to them in a thousand mile away in a second. We can help people who are in an emergency with a finger. Or simply, we can gather our friends to hang out have fun with easy calls or texts. A cell phone is a magic tool, which can help us contact people only with a hand. Moreover, a cell phone is an excellent tool we need for our studying and business. At school, some applications of cell phone help us solving the problems in class. For example, we can record the lectures of professors in class and watch his lecture again at home in order to better understand the knowledge, or when applying knowledge, we can take some pictures in the lab class to observe our lab results better. At work, our cell phones can be a USB to store data, or a mini computer to send our report, and even a small portable computer to surf the Internet, which is essentially important to every businessman. A cell phone is vital to an entrepreneur or a student‘s career. Finally, another advantage of cell phones is to entertain. In our cell phones, we can store our favorite songs to listen to when feeling sad, videos and pictures of our beloved ones to view when we miss them, which makes us happier. We can also play games in our cell phones, helping us burning off stress and starting to feel happy again. Without cell phones, our life would be much less enjoyable. For instance, your best friend is upset about problems of her or his family. You can comfort her or him by your favorite songs, and then look for something fun, like game or funny video to relax. With a cell phone, we will never have to be sad for a long time. Today, everybody prepares himself or herself with a cell phone, like a vital thing in his or her modern life. As the cell phones are improved with advance functions, they will make our lives more convenient and comfortable. People are advised to equipped themselves with a cell phone to improve their lives.

Thursday, January 23, 2020

Viacom Essays -- essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Viacom formed when FCC rules had forced CBS to spin off some of its cable TV and program operations, this happened in 1971. Viacom then buys WAST-TV in 1979, in 1985 Blockbuster Video is founded, in 1981 the NAI buys majority interest ( Sumner Redstone owns this), in 1994 Viacom announces multi-transponder, multi-satellite agreement with PanAmSat. Also in 1994 Viacom and Paramount announces 8.4 billion dollar merger, Viacom then sells its 33% share of Lifetime. In 1995 Viacom spins off its cable systems for Tele-communications, in 1999 Viacom bought CBS for 50 billion dollars. There are other acquisitions and selling’s through which Viacom became so large, but I did not include every little thing.   Ã‚  Ã‚  Ã‚  Ã‚  Sumner M. Redstone has been chairperson since 1987, he did not become CEO of the company until 1996. However, Mel Karmazin became president and CEO of Viacom in May 2000. He was previously the president of CBS and he oversees all the operations of the corporation. He joined CBS in 1997 where he was chairperson and CEO and when Infinity merged with CBS radio he was chairperson there from 1981, until Infinity became a full subsidiary of Viacom in Feb. 2001.   Ã‚  Ã‚  Ã‚  Ã‚  Viacom is a leading global media company, with many positions in broadcasting cable, television, radio, outdoor advertising, and online. With programming it appeals to audiences in every category across all media, the company is a leader in the creation, promotion, and distribution of entertainment, news, sports, music, and comedy. Viacom’s well known brands include CBS, MTV, Nickelodeon, Nick at Nite, VH1, BET, Paramount Pictures, Infinity Broadcasting, Viacom Outdoor, UPN, TV Land, Comedy Central, CMT: Country Music Television, and Showtime.   Ã‚  Ã‚  Ã‚  Ã‚  Some of the Broadcast and Cable Television that were by Viacom are some of the following: CBS Television Network is the Number one most watched network with more than two hundred stations providing viewers with some of the nation’s best entertainment, news and sports programming. Popular programs include CSI: Crime Scene Investigation, Everybody Loves Raymond, Survivor, the Late Show with David Letterman and 60 Minutes. Sports stations however, include the NFL and the NCAA Basketball Championship. Daytime drama The Young and The Restless leads a daytime pr... ... however promise by Viacom itself. The $50 billion merger between Viacom and CBS Corporation was completed in May 2000. Viacom is now the second largest media worldwide after AOL Time Warner, with 1999 sales of over $12 billion. The CBS-Viacom merger creates the second largest media conglomerate, controlling more TV and radio stations than any other and the feature of the announced takeover of CBS by Viacom was how little public attention it attracted. There the deal was announced by Viacom Chairman Sumner Redstone and CBS President, Viacom now has its eye on synergy, one of the world's largest media companies in the world. Viacom spans movies, television, radio, the internet, and it owns BET (Black Entertainment Television), CBS, Paramount Pictures, the United Paramount Network (UPN), MTV.   Ã‚  Ã‚  Ã‚  Ã‚  However, Viacom productions is used everywhere in the world today, many of it’s business are dealt with motion pictures, broadcast television, cable television, radio and outdoor, retail and recreation, publishing, online, and many other things around us. Viacom is one of the best programs I think we have as far as the TV programs much more.

Wednesday, January 15, 2020

Inclusive Education Essay

This report details the role of educational inclusion, individual and general perspectives on inclusion and how the medical and social models have played a great part in the conception and in its application in regards to inclusion in the past and in recent times. Inclusion has different conception and used in certain terminology that relates to inclusion. It is used in different settings such as in social care and in the educational setting in the society today. In this report I will be focusing on the educational part. The Encarta English Dictionary defines inclusion as the addition of somebody or something to the rest of a whole. This definition has not specified who is to be included but a person or group being part and accepted by the rest of a whole. Inclusion have been defined and interpreted by many as just the integration of children with special educational needs (SEN) into mainstream school. According to (Rigby 2000) these kinds of misconception and viewpoints often lead to the misunderstanding and maltreatment in such a way that it creates room for continuous labelling, bulling and rejection by others without SEN. The term Inclusion according to (The Warnock 1978 Report) was initially used as integration, whereby children with SEN who have been educated in special schools where integrated into mainstream school provided they did not have any effect on adequate use of resources. The definition of inclusion is actually changing and moving, in the sense that, its concept and dynamism is now broader, people are now beginning to fully understand what it means and what it evolve in the society today. It is not just about people with special needs integrating or having the same capabilities to perform but having equal choices on where is more conducive they choose to live, having equal opportunity to engage in whatever they choose to do and being accepted the way they are (Giangreco 1997). Social Inclusion/ Social Exclusion There are no definite definitions for social inclusion and social exclusion, both of them has multiply definitions, it all depends on the context which it is used for and is still being developed. Exclusion can be defined as the act of excluding, or of shutting out, whether by thrusting out or by preventing admission; a debarring; rejection; prohibition; the state of being excluded (Inc Icon Group International 2008). According to the definition above, it indicates that social exclusion is multidimensional; people are not only excluded in the society because of their age, sex, religion, colour, disabilities, race and gender it can also be due to unemployment, homelessness, low income, poor mental health, locality, dysfunctional family, educational achievement, status in the society etc (SEU 2004). This group of people are said to be in a Cycle of Disadvantage ( Pope, Pratt and Hoyle, 1986). Article (136 and 137) of The (1997) Amsterdam Treaty was enacted in order to eliminate exclusion and promote economic and social cohesion. Social inclusion promotes integration and community cohesion, it builds the communities, promotes understanding and unity. Inclusive Education and Government Legislation According to (The 1944 Educational Act) it initially stated that, children’s education should be based on their age, aptitude and ability. During the Act establishment, there was a philosophy that children with special need were to be able fit in the school rather than the school making provision to accommodate them before gaining admission into the mainstream school. The (1944 Act) was in use until 1974, when the Warnock Committee was set up to review the provision that was available for children with Special Educational Need. This committee which was headed by Mary Warnock lead to the publication of the 1978 Warnock Report. The Report concluded that, they were about 20% of children in school population that might have Special Education Need and only 2% of which may require support in the mainstream school. The Warnock Report suggested that there should be a proper provision in place for children with Special Educational Need, which then will ensure that the 2% in mainstream school received the adequate provision. The 1978 Warnock Report had since lead to the enactment and development of various educations Act such as, (1981Education Act), (1993 Education Act), (1996 education Act) and the (2001 Special Educational Needs & Disability Act) All these Acts listed above reinforces government’s dedication and commitment to the fully inclusion of children with Special Education Needs into mainstream school and the society as a whole. Inclusive Education and Autism  Abraham Maslow formed a theory on ones personality that has a great influence on education. In his theory of human need, he emphasized that, the student with education need that has a wish or desire to belong to a normal group, that desire creates the motivation to acquire new skills, which the student can only achieve in a learning environment that is void of segregation. He further argued that the sense of belonging is the foundational need that that needs to be met in order to achieve the higher level self actualization. According to (Article 28) of the United Nations Convention on the Rights of the Child, it stated that every child has a right to education. No child should be discriminated, excluded or deprived on the basis of belonging to a particular group. Therefore Inclusive education can be defined as the integration of adults or children into mainstream school regardless their gender, age, disabilities, ethnicity, colour or impairment (Daniels and Garner 2000). Children with hidden disabilities like autism, which is a life time disability that affects the way a child communicates and interact within the society, are faced with difficulties of being fully included into mainstream school. Prior to the development of the Special Need Education, children with autistic spectrum were viewed under two models of disabilities, Medical or Social Model. These are ways how people viewed and acted towards people with disabilities. The Medical Model of Disability sees the illness in the person first and the individual second, this notion creates a bad and negative conception of disability (Cigman 2007). The Social Model of Disability sees the disable person first before their illness. This model sees the person as an individual, different and unique, who has an equal rights and opportunities to education and other essentials of life. The model recognises the fact that a disable person’s impairment does not regard him or her less than anyone else in the society.

Tuesday, January 7, 2020

The Common Health Inequalities Of New Zealand Essay

Introduction Everyone should have equal rights and privilege to live and be treated fairly in every aspect of human life. Health in humans is the ability of each individual or communities to adapt and cope to challenges in relation to social, physical, or mental aspects. In this paper we will tackle about some of the common health inequalities that most Maoris and non-maoris have experienced while looking for healthcare services, and on how such healthcare inequalities can be reduced. New Zealand has a rich and fascinating unique history, depicting its early settlers from Maoris until the colonization of the British Crown. The discovery of New Zealand comes a long way back from more than 700 years ago. Learning ones history is like seeing the foundation of the past and how it actually get influenced by a lot of factors such as time, people, and many more. It all starts from the agreement signing of the Treaty of Waitangi or also called Te Tiriti o Waitangi in Maori language. It is a mutual agreem ent between the British crown and Maori tribes when the British crown claimed New Zealand as a colony in 1840 and it stays to be vastly significant in defining the connection between MÄ ori and Pakeha (non-Maori) until present. The health status of aboriginal people internationally differs from their peculiar, historic, administrative, and public circumstances. New Zealand is a multinational country which includes an amount of diverse ethnic groups such as European, Pacific Islander,Show MoreRelatedThe Health Issues Of Inequalities Within Healthcare Interaction Between Maoris And Non- Maoris Essay1550 Words   |  7 PagesIn this paper will shows the health issues of Inequalities within healthcare interaction between Maoris and non- Maoris in New Zealand, barriers in resolving the issues and measurement being implemented to solve this issue. Globally, healthcare practitioners encounter health issues whenever and wherever they work. There are common health issues practitioners may come across wherever they work such as inequalities within healthcare interactions; different cultures, practice, values and believe ofRead MoreHpv Immunisation Programme And The New Zealand Public Health And Disability Act 2000 Essay1578 Words   |  7 Pages HPV IMMUNISATION PROGRAMME According to the Ministry of Health, in New Zealand, about 160 women develop cervical cancer each year – and about 50 die from it. This has led to different programmes implemented to minimize the incidence of cervical cancer. These programmes include HPV immunisation before the exposure to the infection and regular cervical smear tests for adult once they are sexually active. This paper will focus on HPV Immunisation Programme, the reason behind its implementation, whoRead MoreCardiovascular Disease : The Common Health Issue Among Maori Essay1575 Words   |  7 PagesINTRODUCTION This essay consists of a health issue relevant to Maori population. I identified cardiovascular disease as the common health issue among Maori. The essay explores the details of CVD and relevant demographics. The importance of treaty of Waitangi in this contest and the historical factors relevant to CVD are explained. Finally, identified a significant health policy related to CVD and explained one community health service related to the identified health strategy. CARDIOVASCULAR DISEASERead MoreHealth Issues Of The New Zealand Essay1726 Words   |  7 PagesIn New Zealand Maori’s are facing many health related issues. This essay is about a health issue relevant to Maori population. Cardiovascular disease as the most common health issue among Maori. The essay explores the details of CVD and its relevant demographics. The importance of the Treaty of Waitangi in this context and explained the historical factors relevant to CVD. Finally, a significant health policy related to CVD is described and a community health programme is identified to implement theRead MoreThe Treaty Of Waitangi And The Rights Of The Maori People Essay1657 Words   |  7 Pagesthe principles behind it and the relevance to the health and wellbeing of the Maori people in New Zealand. The Cultural Safety and other principles that are considered in the healthcare practice will also be tackled. While most of the discussion is focused on the treaty, cultural safety and M aori health various concerns are also considered to provide a suitable foundation on the topic. The treaty of Waitangi is the founding document of New Zealand. It is meant to be a partnership of the Maori peopleRead MoreDifferences Between Gender And Social Division Essay1575 Words   |  7 Pages Any society displays a certain degree of inequality. Researches, studies or media analysis in various fields such as history, sociology, philosophy or anthropology highlight the existence of at least one social division at any given time in the history of mankind. The issue raised and analysis below is â€Å"to what extend is social division in Aoteroa New Zealand organised around gender relations†. Gender relation refers to differences that appear in all aspects of men and women lives and how theseRead MoreThe Medical Models Of Health1575 Words   |  7 PagesModels of Health Technology, inventions, science, cures, research, medicine and medical practice have all changed and grown over the past 150 years as the human race gains a greater understanding about the world around us. It is therefore undeniable that medical models of health should follow in this trend, from the introduction of generalised treaties such as the Alma Ata to specified reports such as that of the Black report have help guide models of health towards that of the social model and awayRead MoreInequality Of New Zealand s Society Essay1718 Words   |  7 PagesInequality in New Zealand s society is an ongoing issue in the present, prior to the 1980s, New Zealand was one of the most equal countries in the world but in the two decades from the mid-1980s onwards, the division between the rich and the underprivileged increased faster than anywhere else in the world. Inequality is both a relatively modern concept, and one which has existed for as long as humankind have been on earth, whether it’s Gender inequality, Racial and ethnic inequality, Age inequalityRead MoreCervical Cancer Screening Programmes For The Women Essay1365 Words   |  6 Pagespopular disease for the women. Different programmes has been made up to fight against this deadly disease. New Zealand has one of the best screening programmes in the world. The establishment of National Cervical Cancer Screening Programme in NZ in 1990 had reduced a significant number of 60% of women who develop cervical cancer and who die from it since it was built. More than 1 million New Zealander women are enrolled in this programme and 95 % are eligible. The Cervical Cancer screening programmeRead MoreEffects Of Alcohol On New Zealand1469 Words   |  6 PagesDRINK. Alcohol is the most commonly used recreational drug in Aotearoa New Zealand. While females traditionally consume less alcohol than males, there are a number of reasons for looking more closely at women and their consumption and related harm. Females may be more vulnerable to the effects of alcohol than males, with a number of factors that can contribute including body size and composition, age and genetics. The other health risks associated with high alcohol consumption by females, includes breast