Sunday, March 31, 2019

Online Ticket Booking System Information Technology Essay

On job rag find go forth brass training engineering science EssayApart from the efforts of me, the success of whatever assignment depends largely on the encouragement and guidelines of m any(pre zero(prenominal)inal) others. I put peerless everyplace this opportunity to express my gratitude to the people who have been instrumental in the flourishing completion of this assignment.I would like to take my greatest appreciation to Lecturer, Ms. Nayeema Rahman. I cant say thank you enough for his tremendous support and help. I feel motivated and encouraged every fourth dimension I pay heed his meeting. Without his encouragement and guidance this assignment would non have materialized.AbstractThe draw a bead on of the online tatter booking musical arrangement is to provide a nonher way for purchase cinema tickets in advance. It is an automatic corpse. This paper presents a formal call of the Object Oriented analysis and Design, we leave behind illustrate our constit ution by providing utilisation slipperiness plats with Specifications, Activity diagrams, Class Diagrams, Sequence Diagrams, relegate Machines and discourse Diagrams on the functionalities of the system, overly we will provide some process definition and selective entropy dictionary.The goals of our system atomic number 18 drop off serveance detailsRecord node detailsRecord tickets sold write ticketsPrint aim labels for earpiece booking projection 1 Functional Modelling denomination of thespians example casefulsAnalyzing the existing system we figured out that, in that location argon two main scopes to be covered in the system. The scopes are transaction Planning and tag reserve. We used the below table to identify the p situationtarians and the using up facts for the system. drug userRole discourse matterTheatre Manager doing planningDefine the type of the performance and name it. achievement computer programmingDefine run across and time of the perfor mance. artisan bookingBook an creative person for the performance. tag pricingDetermine a legal injury for the ticket. clerk lay off schedule nock the performance schedule for a particular(a) bespeak on a date. scrap seat availability validations for available sit d give birthCapture customer learningRecord customer detailsCheck ticket outlayCheck for ticket price for particular show. lot ticketRecord tickets sold.Print ticketPrint ticket for the customer.Print shout out labelPrint address label for telephone booking. drill racing shell DiagramFollowing plat shows the overall view of the tatter Booking scheme for Theatre. regard 1 Use Case Diagram (Performance Planning slate Booking)Use Case Specification flurry 1 Use Case of Performance Planning momentUC01Req. Doc referee pertainPerformance Planning lieu factorsTheatre ManagerPre-requisites exploiter should be logged in the system. objectDefining the performance type and label it.Use Case Relationships comportUC02, UC 03 accommodate tie-up evocation explanation office participant resultant role1substance abuser enters the name of the performance.2 drug user enters the type of the performance.3 organisation checks for all mandatory information entry.4 organisation connects to the database.5organization writes data into the database.6 dodging shows a verification message afterward successful database writes.AlternativesIndex player ups stiflingA 3.1Enter required selective information.A 4.1Check meshwork connectivityA 4.2Check database connectivityA 4.3Check database user roleA 5.1Theatre four-in-hand gets card of empty-handed operation. send back 2 Use Case of Performance Scheduling goUC02Req. Doc Ref callPerformance Scheduling stanceActorsTheatre ManagerPre-requisitessubstance abuser should be logged in the system.Performance planning (UC01) should be inserted into the system. finisDefine date and time of the performance.Use Case RelationshipsExtend involve sleeperGeneralizationverbal descriptionIndexActor Event1 exploiter selects the sought after performance from the system.2User enters the date of the performance.3User enters the time of the performance.4 formation checks for all required data entry.5System connects to the database.6System writes data into the database.7System shows a confirmation message after successful database writes.AlternativesIndexActor EventA 3.1Enter required information.A 5.1Check interlocking connectivityA 5.2Check database connectivityA 5.3Check database user roleA 6.1Theatre winr gets notification of unsuccessful operation. skirt 3 Use Case of operative BookingNumberUC03Req. Doc Ref gain offArtist BookingStatusActorsTheatre ManagerPre-requisitesUser should be logged in the system.Performance planning (UC01) should be inserted into the system.GoalBook an artist for the performance.Use Case RelationshipsExtendIncludeAssociationGeneralizationDescriptionIndexActor Event1User selects the desired performance from the system.2User enters the name of the desired artist.3System checks for all required data entry.4System connects to the database.5System writes data into the database.6System shows a confirmation message after successful database writes.AlternativesIndexActor EventA 3.1Enter required information.A 4.1Check network connectivityA 4.2Check database connectivityA 4.3Check database user roleA 5.1Theatre manager gets notification of unsuccessful operation. add-in 5 Use Case of memorial CheckingNumberUC04Req. Doc Ref squallSchedule CheckingStatusActorsClerkPre-requisitesUser should be logged in the system.Performance programing (UC02) should be inserted into the system.GoalCheck the performance schedule for a particular show on a date.Use Case RelationshipsExtend UC01IncludeAssociationGeneralizationDescriptionIndexActor Event1User selects a desired performance and a date.2System shows a confirmation message for the availability of the performance.3System allows the user to perform the next event (UC06) .AlternativesIndexActor EventA 1.1System notifies the user that the performance is unavailable on the desired date.Table 6 Use Case of Check Seat AvailabilityNumberUC05Req. Doc RefNameCheck Seat AvailabilityStatusActorsClerkPre-requisitesUser should be logged in the system.Schedule checking (UC05) should be performed by the user.GoalChecks for available seats.Use Case RelationshipsExtendIncludeAssociationGeneralizationDescriptionIndexActor Event1User selects a desired performance and a date.2System shows a confirmation message for the availability of the seat.3System allows the user to perform the next event (UC07).AlternativesIndexActor EventA 1.1System notifies the user that the seat is unavailable for the desired performance.Table 7 Use Case of Capturing customer InformationNumberUC06Req. Doc RefNameCapture Customer InformationStatusActorsClerkPre-requisitesUser should be logged in the system.Seat checking (UC06) should be performed by the user.GoalRecord customer details.Use Ca se RelationshipsExtendIncludeAssociationGeneralizationDescriptionIndexActor Event1User enters the name, address and telephone number of the customer.2System checks for all required data entry.3System connects to the database.4System writes data into the database.5System shows a confirmation message after successful database writes.AlternativesIndexActor EventA 2.1Enter required information.A 3.1Check network connectivityA 3.2Check database connectivityA 3.3Check database user roleA 4.1User gets notification of unsuccessful operation.Table 8 Use Case of Checking shred PriceNumberUC07Req. Doc RefNameCheck Ticket PriceStatusActorsClerkPre-requisitesUser should be logged in the system.Ticket pricing information (UC04) should be entered into the system.GoalCheck for ticket price for particular showUse Case RelationshipsExtend UC01IncludeAssociationGeneralizationDescriptionIndexActor Event1User selects a desired performance form the system.2System shows the defined pricing for the ticke t.AlternativesIndexActor EventA 2.1Price not found is notified to the user.Table 9 Use Case of Selling TicketNumberUC08Req. Doc RefNameSelling TicketStatusActorsClerkPre-requisitesUser should be logged in the system.Check ticket price (UC08) should be performed by the user.GoalRecord tickets sold.Use Case RelationshipsExtendIncludeAssociationGeneralizationDescriptionIndexActor Event1User selects the desired performance from the system.2User enters ticket selling date and the ticket price for the desired performance.3System checks for all required data entry.4System connects to the database.5System writes data into the database.6System shows a confirmation message after successful database writes.AlternativesIndexActor EventA 3.1Enter required information.A 4.1Check network connectivityA 4.2Check database connectivityA 4.3Check database user roleA 5.1Theatre manager gets notification of unsuccessful operation.Table 10 Use Case of Printing TicketNumberUC09Req. Doc RefNamePrinting Tick etStatusActorsClerkPre-requisitesUser should be logged in the system.Check ticket price (UC08) should be performed by the user.GoalPrint ticket for the customerUse Case RelationshipsExtendIncludeAssociationGeneralizationDescriptionIndexActor Event1User triggers the print command for the sold ticket.AlternativesIndexActor EventA 1.1 printer not found notification will be given to the user.Table 11 Use Case of Checking Ticket Booking fictitious characterNumberUC10Req. Doc RefNameCheck Ticket Booking TypeStatusActorsClerkPre-requisitesUser should be logged in the system.Print ticket (UC10) should be performed by the user.GoalDetermine the ticket booking type.Use Case RelationshipsExtendIncludeAssociationGeneralizationDescriptionIndexActor Event1User selects the booking type to identify whether the ticket was booked over phone.AlternativesIndexActor EventTable 12 Use Case of Printing Address LabelNumberUC11Req. Doc RefNamePrint Address LabelStatusActorsClerkPre-requisitesUser should be logged in the system.Ticket booking type (UC11) should be performed by the user.GoalPrint address label for telephone bookingUse Case RelationshipsExtend UC11IncludeAssociationGeneralizationDescriptionIndexActor Event1User triggers the print command to print the address label.AlternativesIndexActor EventActivity DiagramBased on the system observation, a high level activity diagram is drawn modelling the process of ticket booking for theatre. The activity diagram will bring everybody on a common ground for understanding the system functionalities. foretell 2 Activity Diagram (Performance Planning Ticket Booking)Task 2 Structural ModellingClass Diagram (attributes operations)The following diagram depicts the relationships between the classes for Ticket Booking System along with the attributes and the operations.Figure 3 Class Diagram (Performance Planning Ticket Booking)Task 3 behavioral ModellingSequence DiagramThe following diagram is a season diagram for buying ticket. There are few things I need to state, that this is unsloped one of the periods of buying ticket. There could be more selection sequence for buying ticket. For example, we can choice a performance onwards buying ticket. But the overall structures of all buying ticket sequence are similar, so, others sequence will not be shown.Figure 4 Sequence Diagram (Create Performance)Figure 5 Sequence Diagram (Schedule Performance)Figure 6 Sequence Diagram (Set price)Figure 7 Sequence Diagram (Sell tickets)State Machine Diagram downstairs diagram is used to give an abstract description of the doings of the ticket booking system. This behaviour is canvas and represented in series of events that could occur in one or more possible states. Hereby each diagram usually represents objects of a single class and tracks the different states of its objects by dint of the system.Figure 8 State Machine Diagram (Performance Planning Ticket Booking) converse DiagramCommunication diagram is similar to seque nce diagrams, but it provides an overview of the relationships between objects, rather than cogitate on the order of messages between objects, as the software executes.Figure 9 Communication Diagram (Performance Planning Ticket Booking)Task 4 data Protection LawIntroductionIn Bangladesh Cyber Acts are in a process to be implemented. The Government of Bangladesh has formed National Council for Science and Technology (NCST). The Executive Committee for NCST has also been formed to implement policies formulated by the Council. Currently NCST is working with the general boundaries to encourage the ICT industry and specific laws are yet to be decided. For our application we can follow the acts and regulations from UK.Laws, Regulations and Best PracticesThe entropy Protection Act gives individuals the right to know what information is held about them. It provides a framework to en current that own(prenominal) information is handled properly. The Act works in two ways. Firstly, it s tates that anyone who processes personal information must keep up with eight principles, which confuse sure that personal information isFairly and lawfully processedrefined for limited purposesAdequate, relevant and not excessiveAccurate and up to dateNot kept for longer than is necessaryProcessed in line with your rightsSecureNot transferred to other countries without adequate security systemThe second region covered by the Act provides individuals with important rights, including the right to find out what personal information is held on computer and most paper records. information shelter laws should be adequate enough to maintain the below options at a minimum-How to access informationThis allows one to find out what information is held about him/her on a computer and within some manual(a) records, such as medical records, files held by public bodies and financial information held by credit reference agencies.Correcting informationThis allows one to apply to a court to ord er a data concurler to correct, block, remove or destroy personal details if they are inaccurate or manipulate expressions of opinion based on inaccurate information.Preventing processing of informationThis gist one can ask a data controller not to process information about him/her that causes substantial unwarranted damage or distress. The data controller is not always bound to act on the request.Preventing unsolicited merchandiseThis recalls a data controller is required not to process information about one for direct marketing purposes if he/she asks them not to.Preventing automated decision makingThis centre one can object to decisions made lonesome(prenominal) by automatic means. For example, where there is no human involvement.Claiming compensationThis allows one to claim compensation through the courts from a data controller for damage, and in some cases distress, caused by any breach of the act.Exempt informationThis allows one to ask the information commissioner to check out and assess whether the data controller has breached the act.There should be a commission (in our case NCTS could be the choice) that will have legal powers to ensure that organizations comply with the requirements of the data protection laws. It is notable here that these powers are focused on ensuring that organizations meet the obligations of the act.To promote best practices the regulation-The committee should carry out consensual audits with data controllers to assess their processing of personal information.The committee should see auditing as a constructive process with real benefits for data controllers.The committee should adopt, wherever possible, a participative draw near including working closely with the data controller to gybe the timing and scope of the audit.Comply with selective information Protection LawA short checklist can help us to comply with the data protection laws in our system. Maintaining all the items in the checklist does guarantee complian ce but it should mean that we are heading in the right direction.We should store only the link up information about the customer and the personnels involved with the system. And we need to befuddle sure that we know what we are going to do with the information.The person should know, what are the information we are holding. He/she should understand what it will be used for.Information should be held securely whether its on the paper or on computer.The system should sustain any unwanted access of its resources.The information should be deleted as soon as there is no need for it.Access control list should be created with a strict need to know to prevent data access from all kind of users of the system.We should train the stuff in their duties and responsibilities under the act that we are putting them in to practice.RecommendationsBeing a strategic regulator means that, in so far as we have a choice, we have to be selective with our interventions. We will consequently apply our li mited resources in ways that deliver the maximum military issue in terms of a sustained reduction in data protection risk. That is the risk of harm through unseasonable use of personal information.There are priorities we have to set. We need to focus most solicitude on situations where there is a real likelihood of serious harm. We also need to focus on situations where our intervention is most likely to make a long term as sound as a short term difference. When we intervene we must do so in a way that gives us the best possible return and flirt with that we will often be at our most effective when working closely with others. We are entitled to have legitimate expectations of those who are in a position to lure data protection risk. Our effectiveness depends on them assaying and welcoming our reasonable interventions. Furthermore we have an important planetary role. Data protection risk in the Bangladesh is increasingly influenced by events worldwide.Our risk-based court i s in line with good regulatory practice. It does not mean that we seek to remove all data protection risk. We do what we can to hash out the most serious risks and protect those who are most vulnerable to improper use of their information. But we will not try to take away freedom of choice and will remember that individuals themselves ought to be best lay to make decisions about their own interests. Part of our job is to equip individuals with the familiarity and tools to enable them to make their own well-informed decisions about the use and revelation of their personal information.Being a strategic regulator also means extending our approach beyond simply improving (through guidance, persuasion and regulatory action) the behaviour of organisations that handle personal information. We also have a legitimate role in informing and influencing the market or political environment in which they operate. Thus we will seek to have long term influence over government and the legislatur e at Westminster and in the devolved administrations as well as over representative bodies and other stakeholders, to ensure privacy couthy outcomes.We will also seek to influence the legal framework that governs our own work to ensure that data protection requirements are simple, meaningful and proportional and that we have the flexibility and tools to regulate effectively.Building public confidence in data protection is the key in our approach. We protect people, not just information. This means we need to engage with the public and explain what we do in a way that they can easily understand and relate to.This lading is at the heart of how we approach our job as data protection regulator and will inform all our data protection tasks including complaints handling and the provision of advice.Task 5 Ticket PrintingProduce TicketsTo protect the tickets from being forged or copied we can use a barcode on each ticket. Well print a unique 10-digit number as a barcode on the tickets, w hich will be checked at the entranceway with the software and a simple barcode scanner. As each barcode can only be used once to enter, copied or forged tickets are rejected and the revenues are protected. By default, the tickets will be labeled with random verse with 10 digits, which will serve as copy protection.Figure 10 Sample barcode to print on ticketsSeat AllocationTickets will be printed with seat numbers, with serial numbers. Section names can be in different colours to facilitate orientation. For sections with an aisle a seat description can be added to the seat number (e.g. left, right), which helps the visitor to find the seat.Figure 11 Sample barcode to print on ticket with seat no.Hardware for printing ticketsThere are numerous tickets available in the market but I found D-Link printers suitable for our system. Below are the details of the hardware-Description With the DSA-3100 and the DSA-3100P Ticket Printer, businesses and organizations can provide free or fee-bas ed broadband Internet access to their customers or members. No complex care system is required, guaranteeing a quick and convenient Internet experience for operators and their hot spot users. The DSA-3100P is hassle-free hot spot ticket printer that communicates with the DSA-3100 Public/ confidential Gateway to generate and print log-in usernames and passwords for the hot spot customers. secure for easy loading, the DSA-3100P is connected to the DSA-3100 gateway via its RS-232 serial communication. With the DSA-3100P, the DSA-3100 gateway can manage and store up to 2,000 user accounts in its internal database and support up to 50 logged-in users at any time.FeaturesPrinting Method Thermal acid Line PrintingPrint Speed 80 mm/ heartbeatConnectivity RS-232 SerialCompatibility D-Link DSA-3100 Public/Private GatewaySpecificationmanufacturing businessD-LinkManufacturer Part DSA-3100PDevice TypeThermal Line Label PrinterMedia HandlingMedia TypeReceipt Paper gook Media Size2.2Max Printin g Width1.9Roll Maximum Outer Diameter3.3 add up Capacity1 RollConnectivityInterfaces1 x RS-232 Serialinclude Cables1 x Serial CablePower RequirementsPower impartExternal, 3.5 V DCDimensions(H X W X D)Unit4.6 x 3.8 x 6.3WeightUnit0.9 lbsPrice $375Figure 12 D-Link DSA-3100P Ticket PrinterTask 6 Database DesignDatabase DesignFigure 13 Database Design (Performance Planning Ticket Booking)Data DictionaryTable ArtistAttributeData Type distancePrimary come uponRef. TableArtistIDwhole numberYesArtistNameVarchar100Table PerformanceAttributeData Type distancePrimary happen uponRef. TablePerformanceIDwhole numberYesPerformanceNameVarchar100TicketPriceID integerTicketPriceArtistIDIntegerArtistTable TicketPriceAttributeData TypeLengthPrimary KeyRef. TableTicketPriceIDIntegerYesPerformanceIDIntegerPerformanceTicketPrice mathematical(18,2)Table PerformanceScheduleAttributeData TypeLengthPrimary KeyRef. TableScheduleIDIntegerYesPerformanceIDIntegerPerformancePerformanceDateDateTable CustomerAtt ributeData TypeLengthPrimary KeyRef. TableCustomerIDIntegerYesNameVarchar100AddressVarchar250TelephoneVarchar20Table SalesAttributeData TypeLengthPrimary KeyRef. TableSalesIDIntegerYesPerformanceIDIntegerPerformanceScheduleIDIntegerPerformanceScheduleTicketPriceIDIntegerTicketPriceCustomerIDIntegerCustomerBookingTypeBooleanTable SeatAllocationAttributeData TypeLengthPrimary KeyRef. TableSeatIDIntegerYesSalesIDIntegerSalesSeatNoFromIntegerSeatNoToIntegerTask 7 Object-Orient Approaches vs. Standard ApproachesStandard ApproachesStandard approach includes many variations based on techniques used to develop information system with structured and modular programming. Standard analysis and design techniques are a software engineering methodology for describing systems as a hierarchy of functions. Below are the characteristics of Standard Approaches.Approach for structured analysis consists of the following objectsData Flow Diagrams (DFD)Shows processes and flow of data in and out of these processes.Does not show control structures (loops)Contains 5 graphic symbols (shown later)Uses layers to decompose complex systemsCan be used to show logical and physicalIs a quantum leap anterior to other techniques at the time, I.e. monolithic descriptions with globs of

Saturday, March 30, 2019

Chronic Disease In St Lucia Health And Social Care Essay

continuing Disease In St Lucia wellness And Social Cargon EssayChronic un healthiness is a unsoundness of a broad duration and generally s minuscule progression (WHO, 2010). The U.S. national Center for Health Statistics states that a invete treasure disorder is unitary endure 3 months or to a greater close. These continuing sicknesss normally can non be prevented by vaccines or cu rosy-cheeked by medication, nor do they just vanish. Chronic ailments be principally sourced by three study bump component part tobacco use, ridiculous ingest habits and somatogenic inactivity. Majority of these jeopardize factors atomic number 18 themselves worsened by poor socioeconomic determinants, much(prenominal)(prenominal) as lack of education and poverty. Most a great deal these determinants ar a indication of the main forces driving kindly, economic and pagan handing over, including globalisation, urbanisation and an aging states.Chronic sicknesss atomic numb er 18 affecting population health as the epidemiologic renewing progresses and argon the lead arrest of mortality world-wide and pose increasing problems for the freight of disorder and quality of purport in certain and develop countries (WHO, 2003). Non communicable unhealthinesss admit a giant-minded range of conditions, including cardiovascular disease, diabetes, crab louses, degenerative respiratory disease, mental-health problems and musculo- skeletal disorders. The first foursome mentioned above account for slightly 50% of mortality globally, and sh be behavioral stake factors, much(prenominal) as excess calorie outgo, fares high in hard and trans expoundty acids, excessive consumption of alcohol, physical inactivity, and tobacco smoking. Approximately 35 one thousand million population defecate died from warmth disease, stroke, cancer and other inveterate diseases in the socio-economic class 2005. The burdens of these diseases are equally shared a mong men and women, and are much preponderant in people under the board 70 (WHO, 2004). 80% of inveterate disease deaths occur in funky and midway income countries.Figure 1 Global distri hardlyion of amount deaths (58 million) by cause in 2005.The jump on-specific death range amid the geezerhood 2005 2015 are intercommunicate to fluctuate slightly, Neverthe little, the ageing populations exit result in an overall extend in chronic disease death judge for all ages combined. In 2005, all chronic diseases account for 72% of the total global burden of disease in the population aged 30 long prison term and honest-to-goodness. The total lost geezerhood of rosy intent due to chronic diseases, as measured by DALYs, are greater in crowings aged 30-59 years than for ages 60 years and one-time(a). More than 80% of the burden of chronic diseases occurs in people under the age of 70 years.Table 1 project global deaths and burden of disease due to chronic disease by age 200 5- 2015Deaths (Million) DALYs (millions) Deaths per 10000 DALYs per 1000002005 2015 2005 2015 2005 2015 2005 20150-29 years 17 15 220 219 48 40 6320 599430-59 years 7 8 305 349 311 297 13304 1337560-69 7 8 ci 125 1911 1695 27965 2639670 20 24 99 116 6467 6469 32457 31614All ages 35 41 725 808 549 577 11262 11380World Health Organization projects that, globally, NCD deaths will add-on by 17% over the next ten years. The greatest change magnitude of 27 %and 25 % respectively will be seen in the African locality and the Eastern Mediterranean region (WHO,)1.2 Types of chronic diseases1.2.1Cardiovascular diseaseCardiovascular disease CVD is the term used by the scientific community to embrace not just conditions of the marrow squash ischemic partiality disease (IHD), valvular, muscular, and congenital substance disease but withal high blood pressure and conditions involving the cerebral, carotid, and peripheral circulation. The stake of CVD is related to diet, physical activity, and body ( ). The patterns of food supplies and of food and nutrition that modify the guess of CVD are also well known.Whereas CVD was once to a greater extent often than not confined to high-income countries, it is now the add one cause of death worldwide as well as in number 1- and middle-income countries, where 80 per centum of the worlds 13 million annual CVD deaths occur. And at least 21 million years of disability-adjusted life years (or DALYs, a measure of future productive life) are lost globally because of CVD for distributively one year. The vast majority of CVD can be attributed to conventional hazard factors much(prenominal) as tobacco use, high line of reasoning closet, high declivity glucose, lipid brachydactylousities, fleshiness, and physical inactivity.Cardiovascular diseases are major cause of chronic disease death and were accounted for of 17 million deaths in 2002. It is estimated that by the year 2030, 24 million will die of CVD, of which 80% wil l occur in low and middle income countries (5).1.2.2 CancerCancer is a major and ontogenesis disease burden worldwide. The number of new cancer cases is projected to increase from 10 million in 2000 to 15 million in 2020, 9 million of which would be in maturation countries. The epidemiology of cancer in developing countries clearly differs from that in developed countries in of the essence(predicate) respects. While developed countries often fuddle relatively high rates of lung, colorectal, breast, and prostate cancer (some of which is tied to tobacco use, occupational carcinogens, and diet and lifestyle), up to 25% of cancers in developing countries is associated with chronic infections. Seven characters of cancers account for approximately 60 percent of all newly diagnosed cancer cases and cancer deaths in developing countries cervical, liver, stomach, esophageal, lung, colorectal, and breast.1.2.3 respiratory DiseasesChronic with baby bird(p) respiratory diseases-such as c hronic obstructive pneumonic disease (COPD) and asthma-are a major and growing burden in equipment casualty of morbidity and mortality in the developing world. COPD (which includes emphysema, chronic bronchitis, and obstructive airways disease) is lifesizely cerebrate with cigarette smoking as well as exposure to unvented coal-fired cooking stoves it accounts for 2 percent of lost DALYs on a worldwide basis.1.2.4 Diabetes MellitusDiabetes affects people worldwide and is one of the oldest diseases known. in that location are 2 common types of this disease type 1and type 2 diabetes. Type-1 diabetes accounts for 5-10% of all diagnosed diabetes. Type-2 diabetes is the approximately common form of diabetes. It accounts for 90-95% of diagnosed diabetes.The World Health Organization (WHO) estimated the worldwide preponderance of diabetes in adults to be around 173 million in 2002 and predicted that there will be at least 350 million people with Type 2 diabetes by 2030. At present about devil-thirds of someones with diabetes live in developing countries and the majority of new cases will strainate from these areas. The global increase in the incidence of diabetes is related to high levels of obesity associated with a change from handed-downistic diets, diminishing levels of physical activity, population ageing and increasing urbanization.Diabetes Mellitus is the nearly habitual form of diabetes on the global scale (6). For the then(prenominal) few decades, Diabetes Mellitus has reached epizootic proportionalitys in many parts of the world. The World Health Organization (WHO) has predicted the global prevalence of all Diabetes will increase from 194 million in 2003 to 330 million in the year 2030 (7).1.2.5 hypertensionAnother commonly occurring chronic disease is hypertension. high gear blood closet increases the risk of heart disease and stroke. Hypertension is sustained high blood insistency (140/90mmHg).Blood pressure itself is the pressure exerted by the blood on the walls of the blood vessels. Each quantify the heart beats (about 60-70 times a minute at rest), it pumps blood into the arteries. Blood pressure is at its highest when the heart beats, pumping the blood. This is called systolic blood pressure. When the heart is at rest, between beats, blood pressure falls. This is diastolic pressure. Blood pressure itself is not harmful it is essential as it is the force that drives blood with the blood vessels to interpret oxygen and nutrients to the bodys organs and tissues and carry away fumble materials. However, when blood pressure becomes too high it has damaging effects on almost eitherpart of the body and can lead to knockout illness and death. Hypertension is an important public health challenge worldwide because of its prevalence and its map as a risk factor for cardiovascular disease. around of the risk factors of hypertension include obesity, alcohol, family history, and smoking.thither are two types of hypertension, namely primary hypertension and secondary hypertension. Primary hypertension is to a greater extent common, occurring in 90-95% of the hypertension population. in that respect is no identifiable cause and it develops piecemeal over many years. Secondary hypertension occurs in 5-10% of the hypertension population. ()In the year 2000 it was estimated that the total number of adults with hypertension was 972 million. Of these, 333 million were estimated to be in developed countries and 639 million in developing countries (0). Kearney PM et al., predicted that by the year 2025, the number of people with hypertension will increase by approximately 60% to a total of 1.56 billion. (Kearney PM et al., 2005) the reasons are the continuing population increase and changes in lifestyle, which includes a diet high in prick and high- productive processed foods and sedentarism.1.3 Impact of chronic disease in the CaribbeanCaribbean countries are in epidemiological transition, w here not only nutritional deficiencies gather in considerably declined but infectious diseases induct also been disappearing. However, over the last thirty years, nutrition-related chronic non-communicable diseases nourish slowly emerged as the major public health problems. Non-communicable diseases (NCDs) take hold gradually displaced communicable diseases in the Caribbean. Rates of chronic non-communicable disease such as diabetes, hypertension, cardiovascular disease and cancer have been increasing in the Caribbean and are the leading cause of mortality and mobility in the region (Ragoobirsinghet al., 1995, 2002 Wilkset al., 1998, 1999 Figueroaet al., 1999 Rotimi et al., 1999 Cruickshanket al., 2001, Figueroa, 2001 Sargeantet al., 2001 Henniset al., 2002a,b Corbinet al., 2004 Wolfeet al., 2006). Of take is the fact that while the prevalence and mortality rates of these diseases are highest in the elderly, they are not restricted to any one age group. An estimated 10% to 20% of the Caribbean population over 20 years of age suffers from diabetes and hypertension, respectively, with prevalence more than doubling at older ages (Hennis et al., 2002a, b). Hypertension and diabetes rank as the two leading chronic disorders among Caribbean populations and are also major risk factors for other diseases such as cerebrovascular disease (stroke) and coronary heart disease.Prevalence of chronic diseases in the Caribbean region over the pass 3 decadesAnother striking epidemic among the Caribbean population is the high prevalence of leaden body mass index (BMI) 25 kg m2 and obesity (BMI 30 kg m2). Approximately half of the adult Caribbean population is over angle and 25% of adult Caribbean women are obese (Henry, 2004). The escalating trend in obesity is considered to be a major causative factor in chronic disease prevalence in the region. The increasing obesity levels, in general among women, maybe associated with the changes in traditional diets and the adoptio n of sedentary lifestyles. In some the islands more than half of adult women are reported to be obese. Data from Barbados highlights the importance of obesity as a risk factor in chronic diseases. Based on available evidence, obese mortals, (BMI30) of 40-79 years had a 2.6 times greater risk of hypertension than persons with BMI1.4 Impact of chronic disease in St. LuciaSt. Lucia has undergone a fundamental demographic transition in the last 3 decades (Wilks, et al., 1998). Some features of this transition include the rise in the median age of the population from 20 years to 15 years between 1970 and 2010, the doubling of the proportion of persons older than 60 years old from 5000 to over 17,000 and the increase in life expectancy at consume from less than 50 years in 1950 to greater than 73 years in 2010 (World population prospectus, 2008). As a result, the main causes of illness and death in St. Lucia and many other Caribbean islands and regions at a similar state of development are the chronic non-communicable diseases (Sargeant et al., 2001). in that location is an increased prevalence of diet-related chronic non-communicable diseases, such as cardio-vascular diseases, diabetes and obesity. (Wilks et al., 1998). Between 1992-1999 in St. Lucia, preventable chronic diseases such as cardiovascular and circulatory systems accounted for 20.8% of deaths, with the major causes being cerebrovascular disease, ischemic heart disease, and hypertensive disease. Other major causes of death were cancers (14.5%), disease of the digestive system (8.7%), and diabetes (7.2%) (8). Approximately 1,304 deaths were due to diseases of the circulatory system and was accounted for 33% of all reported deaths, death due to cerebrovascular was (35.9%), hypertensive disease (14.8%), and ischemic heart disease (13.6%) (Health in America, 1998).There were 731 deaths due to cardiovascular disease from 1996 to 1999, accounting for 19% of all deaths and 53 % of deaths ratio of 5.81. Mos t (21 or 62%) occurred in the 15-44 years age group, and had a male-female ratio of 9.51. Cardiac arrest caused 268 cardiovascular deaths (37%), ischemic heart disease 174 (24%), pulmonary circulation and other forms of heart disease 134 (18%), and heart hardship 153 (21%). Females accounted for 359 (49%) of deaths due to cardiovascular disease, and persons 60 years of age or older accounted for 588 deaths (80%). (WHO statistics). Based on PAHO statistic St. Lucia is the tenth leading island in the Caribbean with high rates of non- communicable chronic disease, accounting for approximately 63%.Over the years prevalence of non communicable diseases have been increasing, in a survey do by the Kairi consultants limited in association with the national assessment squad of St. Lucia concluded the following findings for the year 2005 to 2006 for the distribution of chronic disease in St. Lucia. Irrespective of per capita consumption quintile, high blood pressure was the most prevalent lifestyle disease affecting persons with diseases in St. Lucia. In every quintile group, it also shows that the prevalence of diabetes ranks second to high blood pressure as a life time disease affecting persons with diseases in St. Lucia. In each of the quintile groups, more than three fifths of the persons with diseases reported suffering from high blood pressure while more than one quarter reported suffering from diabetes.In the year 2007 diabetes and Hypertension were the two the most pervasive and worsening health problems facing the island of St Lucia. The diseases afflict a broad swath of people, young and old.St. Lucia has a population of approximately 160,000 thousand people, and of this 28.1%of the population have abnormal blood glucose or high blood swag and 8.1% have diabetes (Graven et al., 2007). 20% of people over 40 years of age suffer with the disease (the ministry of health 2007). At least 35% of those with Type 2 Diabetes Mellitus do not know that they have the c ondition (The Ministry of Health, 2008). In rural area of St. Lucia the proportion with undiagnosed diabetes is considerably higher(prenominal) (St. Lucia Diabetic Society, 2008). At the time of diagnosis, every tenth person with diabetes has already developed one or more micro- or macro-vascular complications (Ministry of Health, 2008).Diabetes is among the leading cause of death. If inadequately treated, diabetes can cause blindness, kidney disease, face disease, amputations, heart disease, and stroke. Even conscientious and well-treated diabetics frequently suffer from these complications and have above-average medical costs.If observed, the Native St. Lucian has many barriers to health education, which basically involves their culture, lifestyle, accessibility and socio-economic status. For instance, St. Lucian is currently experiencing a crisis of poverty. People from lower socioeconomic status have poorer health than those in higher socioeconomic positions. Various studies ha ve reported the relationship between low socioeconomic status and the development of chronic disease ((Lynch et al, 2000 Stelmach et al, 2009 Supriya et al, 2009). upstart poverty assessments in St. Lucia estimate that 18.7% of households and 25% of the population live in poverty. Income inequality is high, with 26% of the population characterized as chronically poor (MPDEH, 2003). That same(p) report estimated that a decade later in 2005/06 the poverty rate had increased to 28.8% of the population( Government of St. Lucia( GOVST), The assessment of Poverty volume1, 2006) .The highest poverty rates in2005/06 were in the districts of Anse La Raye/Canaries (44.9%), Micoud (43.6%),Soufriere (42.5%) and Laborie (42.1%). The poverty gap and poverty severity also occurred in these same districts (GOVST, 2006)Furthermore, because of poverty and living in rural areas, most people consume less expensive and often high fat foods, and less fruits and vegetables (Henchy et al, 2000). Brown et al, (2005) described how socioeconomic position influences health among persons with diabetes. Diabetes is twice more prevalent in low income populations compared to wealthy populations (Stelmach W et al 2009). Some explanations for this increased risk among people of low-income or resource-poor areas include increased stress, low access to medical and preventive care, and poor environment.1.5 provender, nutrition and chronic diseasesThere are clear associations between the various biomedical and behavioural chronic disease risk factors, and it is well established that diet quality and healthy eating practices play an important role in both preventing and managing chronic diseases and the factors that increase their risk (Kant A.K, 2004). The links with food and nutritional status are especially strong in the case of cardiovascular disease, diabetes and their risk factors (metabolic syndrome, obesity, hypertension and hyperlipidaemia). The food we eat, in all cultural selection, de fines ones health, growth and development. Risk behaviours, in particular smoking and sedentarism, alter the result (). All this takes place in a social, cultural, political and economic environment that can exacerbate the health of populations.Diet is a key component in predisposing to chronic disease, mainly where diet is energy dense causing positive energy balance and obesity. credence of western diet which are high in fats , aminal protein, refined carbohydrates and low in fibre, fruits and vegetable can further increase one risk of developing no of more chronic disease(). Several studies have exhibit a prudent diet rich in fruits, vegetables, fish and wholegrain to be associated with a decline in chronic disease risk such as diabetes (Van Dam et al., 2002 Anne-Helen Harding et al., 2004)CarbohydratesCarbohydrates food source are the most important source of calories for the worlds population mainly because of their low cost and wide approachability (). Although Carbohydrat es is easily accessible and widely eaten carbohydrate is a key dietetic component affecting insulin secretion and postprandial glycemia and is implicated in the aetiology of many chronic diseases (Brand-Miller JC et al., 2004). Both the quantity and type of carbohydrate eaten have consequences on insulin secretion and postprandial glycemia. Foods with a rich glycemic index (or glycemic load) bugger off high rates in blood glucose.Diets including large quantities of high GL foods increase the risk of diabetes, breast cancer, colorectal cancer, endometrial cancer, and overall chronic disease (Barclay AW et al., 2008).Dietary fibresEpidemiological evidence has shown that foods rich in fibre befriend glycaemic pull wires in diseases such as type 2 diabetic patients(). A diet high in fibre helps in control blood sugar levels in those with type 2 diabetes. It also helps with colon health as the high fibre diet with smoothing the stool and facilitates to weight loss ().FatsDietary fat is one of the most influential nutrients in health. Fats has many functions in the human body, As well as to providing more than twice the energy supplied by carbohydrates and proteins and supplying essential butterball acids, fats slows digestion of carbohydrates in order to fuel the brain he fats serve as carriers for fat soluble vitamins (A, D, E and K) and as parts of cell membranes().The overconsumption of fat, mainly saturated fat, has been linked to six of the 10 leading causes of death worldwide ().Coronary heart disease and cancer ().There is a strong link between dietary fat consumption and risk of chronic diseases such as cancer, such as colon, breast, prostate, and ovary cancer (). Several studies over the past 30 years have verified the relationship of high dietary fat intake with higher mortality due to various cancers (). Some saturated fatty acids raise blood cholesterol levels and, thus, increase the risk of atherosclerosis (). High fat, intake is a main cause of obesity, hypertension, diabetes, metabolic syndrome and gallbladder disease ().Studies have show that countries with higher per capita intakes of fat, especially animal fat, have higher incidence rates of certain cancers, including breast, colon, prostate, and pancreas.41 Migrational studies show that when individuals move from a country of low fat intake to one of high fat intake, the risk of some cancers increases 42 .VitaminsVitamins are essential nutrients hey are required in small amounts, but have important and specific functions such as promoting growth, reproduction and the maintenance of health. Nutritionally, they form a cohesive group of perfect compounds that are required in the diet in small amounts (micrograms or milligrams per day) for the maintenance of normal health and metabolic integrity. They are thus secern from the essential minerals and trace elements (which are inorganic) and from essential amino and fatty acids, which are required in larger amounts.Vitamin deficiency however, may increase the risk of chronic diseases (). Suboptimal folic acid levels, along with suboptimal levels of vitamins B(6) and B(12), are a risk factor for cardiovascular disease, neural tube defects, and colon and breast cancer() and low levels of the antioxidant vitamins (vitamins A, E, and C) may increase risk for several chronic diseases. .Nutritional TransitionThere are now approximately 350 million obese and more than 1 billion overweight people in the world, living in both developed and developing nations. Previously, underdeveloped nations grappled with undernutrition. Now many of these countries like St. Lucia are in a transitional state and are dealing with the reduplicate evils of under- and over nutrition. In the Caribbean nations between the 1970s and 1990s, the prevalence of overweight/obesity increased from 7% in men and 20% in women in the 1970s to 22% in men and 58% in women (Ragoobirsingh D et al., 2004).The global prevalence of overweight amon gst preschool children is estimated at 3.3%. Within the Caribbean region and St. Lucia has one of the highest incidences for this age group with St. Lucia having 2.5% of the 0-5 yr. population ( De Onis M et al.,October 2000) .Obesity in children and adolescents is known to have significant impact on both physical and psychosocial health, these soaring rates of obesity leads to an increase in hyperlipidaemia, hypertension, insulin impedance and abnormal glucose tolerance later in life (Reilly et al., 2003 Weiss et al., 2004).Urbanization, industrialization and transformation processes have been the main cause of this public health accomplishment. In modern cultures, demographic factors interact with social and economic factors and lead to changes in the patterns of health and diseases as hypothesized by Omrans epidemiological transition theory in the early 1970s (Orman et al., 1971). Omrans theory describes the changing pattern of mortality from the predominant communicable diseas es to the emerging non-communicable diseases. In his study, Omran be three stages of epidemiological transition, i.e. the age of pestilence and famine, the age of receding pandemics, and the age of degenerative and man-made diseases (Orman et al., 1971).1.6 Dietary habits of St. LuciansFood habits reflect the plantation past the typical diet contains a lot of starches, animal protein content that varies by location, and until recently, little in the way of green vegetables. Starches include various kinds of yams, dasheen, eddos, bananas and plantains, wise potatoes, cassava and breadfruit. Most of these are boiled, served with some kind of stewed fish or meat, and accompanied by a sauce. Pepper (capsicum) sauce is unendingly present at the table, as most dishes are not active spicy hot. Animal protein sources reflect the historical scarcity of this element porc hocks, pig tail (fresh and salted), chicken back, and saltfish, (cod) salted beef, fish (tuna, flying fishing, red sna pper, barracuda, sharke, sardines, jack fish). Most of the dishes are prepared with fats such as coconut meat oil, lards, yellow butter. As much as St. Lucia has a wide mixing of fruit they are only eaten Fruits such as mangoes, golden apple, papaya, grapefruit, oranges, cherries, cashew, sugar apple(love apple).Main dishes are accompanied by vegetables such as, avocado, calaloo, spinach, tomatoes, okras, carrots, pigeon peas and lentils,Imported processed foods have been available for decades, but more recently account for larger parts of many meals. Foods such as pasta, rice,1.7 Cause for chronic non-communicable diseases in St. LuciaChronic diseases have numerous risk factors, which function at different levels, from the most proximal (i.e. biological), to the most distal (i.e. structural). These risk factors can be sort out as modifiable and non-modifiable risk factors. Modifiable determinants include factors that can be altered, such as individual and community influences, l iving and working conditions and socio-cultural factors, non-modifiable determinants include those factors that are beyond the control of the individual, such as age, sex and genic factors.1.7.1 Biological factorsSome populations are susceptible to chronic disease because of catching genes. In a south Africa a tribal group Afrikaners have been found to have familial hypercholesterolemia, a rare genetic disorder, characterised by very high low-density lipoprotein, cholesterol and early cardiovascular disease.( Steyn K et al.,1996). Genetic and lifestyle factors are considered to be the main contributors in causing type 2 diabetes (ORahilly et al 2005). The genetic makeup of a person is as essential to the development of the disease but a person lifestyle and environmental factors can contribute significantly. Some of the major change factors include overweight, abdominal obesity and physical inactivity and to lesser extent intrauterine and early childhood factors (Alberti et al, 2007)1.7.2 Early life originThe time between intrauterine growth and the development is the most vulnerable item in the life cycle and places major physiological, metabolic and psychological gather up on the mother to support the growth and the development of the fetus (Allen, 2001). right growth and development is dependent on a sufficient supply of energy and nutrients. Under nourishment during gestation period is linked with poor pregnancy and neonatal outcomes which can have negative long term implications for the baby such as a reduction in intelligence, growth disorder, low immunity, increased morbidity, mortality and the development of a range of diseases during adulthood (Rasmussen, 2001)It is proposed that type 2 diabetes results from relative intrauterine malnutrition and the latter leads to lifelong programming (Baker et al 1986). Children with low birth weight are most likely to hump growth restraint, whether due to intrauterine nutritional restriction or genetic pr edisposition to low birth weight similar associations of low birth weight have been made for the development of diabetes (Lindsay et al 2001). Babies who are innate(p) low birth weight tend to grow fast(a) after(prenominal) birth catch-up growth, often become overweight as young children. They are most likely to develop high blood pressure and abnormal blood glucose level early in life, which future increase their risk of developing chronic diseases, such as heart disease and diabetes (Barkeret al., 1997). The prevalence of Low Birth Weight (LBW) is approximately 6 and 9% in the Caribbean. The association between low birth weight and adult disease makes urgent the concern of these high LBW prevalence rates in the Caribbean (Henry 2000).An under-nourishes child is normally a smaller and shorter child (0) Stunting is an indication of long standing mal and under-nutrition and is often accompanied by fat deposition, particularly around the abdominal section when faced with food in abu ndance. Predisposing individuals to obesity in adulthood. ()Likewise children who are born to large mother and are large for their gestational age are most likely to induce insulin resistance and type 2 diabetes later in life (Bennett et al 2002). In Jamaica children shortness at birth and increased current weight are independent predictors of insulin resistance (Bennett et al 2002).There is significant amount of evidence, mainly from developed countries, that states intrauterine growth retardation is connected with an increased risk of coronary heart disease, stroke, diabetes and elevated blood pressure (WHO, 2002 Godfrey et al., 2000 Fors et al., 2000). It may be the pattern of growth, i.e. restricted fetal growth followed by very fast postnatal catch-up growth that is vital in the underlying disease pathways. Likewise, large size at birth is also associated with an increased risk of diabetes and cardiovascular disease (McCance DR et al., 1996 Leon DA et al., 1998).Behavioural ris k factors (lifestyle factors)Lifestyles play an important role in determining chronic diseases and lifestyle changes are likely to be responsible for a significant proportion of their increase over time.1.7.3 deplorable dietNutrition is a major modifiable determinant of chronic diseases, with scientific evidence supporting the view that modifications in diet have effects on health outcome of a person. Non-communicable diseases are linked to high consumption of energy dense foods, made of animal origin and of foods processed or prepared with added fat, sugar and salt.()St. Lucia is undergoing rapid nutritional transition (Boyne, 2008). There has been an increase of fast-food restaurants, and an increased in the consumption of meals high in fat, sugar, and salt and a reduction in the consumption of cereals, grains, fruits, vegetables, tubers, and legumes (Jacoby et al.,2008). The increased consumption of imported foods high in fat and sodium has led to a decline of the health status of people throughout the region, with an increase in health problems such as obesity and diabetes (Report from WHO, 2003).1.7.4 sensual inactivityPhysical inactivity and sedentary lifestyle is linked with increased levels of obesity, breast cancer, colon cancer

DSP-OFDM Modulator Project

DSP-OFDM Modulator ProjectChapter OneIntroduction to the DSP-OFDM Modulator Project1.1 IntroductionThe Orthogonal oftenness Division Multiplexing (OFDM) digital dialogue technique has been attracting a great tinge of researchers every last(predicate) over the world, referable to its unique characteristics. The designers and engineers of mobile radio receiving system communication systems and wireless mul measuredia broadband ar looking forward to curiosityeavour the OFDM to be the air interface of these devices and systems. This exploitation has already been d hotshot with several(prenominal)(prenominal) systems and standards much(prenominal) as Wireless Local Area Ne iirks 802.11a and Digital depiction Broadcast-Terrestrial (DVB-T).The DSP-OFDM Modulator project studies the essential neighborhoods of the OFDM modulator and sensor and utilises the OFDM modulator and demodulator on two sepa send DSP boards. For the OFDM modulator, the project studies the hardwargon DSP slaying of the OFDM modulators diametrical gets such as the QAM mapper and the IFFT. This applies on the OFDM demodulator too. Addition andy, for the OFDM demodulator, the project studies the carrier recuperation issue to recover the OFDM study augur from the carrier direct and the OFDM image timing recovery issue to elucidately pin top dog all(prenominal) OFDM figures boundaries.The Projects involves several aspects of the digital communications and the theoretical and pragmatical DSP and expenditures the MATLAB and the Code Composer Studio (CCS) to tumble and re suffer the designs to be practically implemented.1.2 The Aim and the ObjectivesThe aim of the DSP OFDM Modulator project is to implement OFDM modulator and demodulator on two separate DSP boards. The carrying out is non fastened to any existing OFDM standard such that apply in the DVB-T or other standards.The DSP hardware implantation comprises many DSP and digital communication trading operations to b e implemented with writing the C codes that per strain these operations i.e. the QAM mapping and de-mapping, the IFFT and FFT, the digital IIR filters and the synchronization. in that respectfore, the implementation pass on be stolon mistaken by MATLAB and the Code Composer Studio (CCS) part by part onwards and with the hardware implementation on the DSP boards. The CCS will be utilise to simulate not completely the modulator and demodulator but also the subparts of the hardware implementation such as the FFT and IFFT C codes. For precedent, the C code that will be economic consumption to per course of action N-Point IFFT to a Byzantine array containing N complex elements to sire N placeputs. These N outputs or discrete values will be compared with those N outputs or discrete values obtained from performing N-Point IFFT to the aforesaid(prenominal) N element-complex array in MATLAB in purchase methodicalness to check that this C code will work properly in the DSP rea l fourth dimension implementation of the OFDM modulator.1.3 The Research Background and MotivationsThe good presentation of the theoretical and practical DSP during the taught part of the course encouraged me to tackle this project, as I had not done any practical DSP before I enrolled in the disseminated multiple sclerosis Wireless Communication Systems course. The good understanding of the discrete Fourier transform (DFT) al clinical depressions presenting the conjugated cruciform approach. The design of the Conjugate Symmetric distribution of the subcarrier vectors on the IFFT scuttlebutt indicates makes the IFFT produce a multicarrier maneuver with a real part (In- variety) (I) only in the magazine landed estate, as the imaginary part (Quadrature) (Q) is al miens evolvedness to nobody. It is easier to play and demodulate the OFDM culture signal with a real part only, as the quadrature stirover is no longer required. The Conjugate Symmetric design allows applying the FM flection to potentiometeralize and receive the multicarrier OFDM information signal.1.4 The Thesiss OrganizationThe dissertation consists of louvre chapters. Chapter two is deemed as a literature survey. Chapter two explains the OFDM spectrum and the principles of the OFDM modulator and demodulator. It illustrates how the OFDM information signal carries or represents the digital info small-arms and how the IFFT N outputs (discrete values) are rattling the samples of the OFDM multicarrier information signal for the authentic OFDM attribute being induced. It will be shown how the OFDM figure has longer length than those of other digital communication modulation techniques without affecting the entropy rate to be more peppy with distributive dividing lines and many other aspects of the OFDM modulation technique. This project is not tie to any existing OFDM standard. However, it resembles these standards in equipment casualty of the general circumscribetleme nt plots of the OFDM systems and the use of the control carriers, so the employment of the OFDM in the DVB-T and the WLAN 802.11a are set forth briefly in chapter two.Chapter three shows and simulates by using MATLAB the approaches and ideas that will be apply for the hardware DSP implementation. It discusses the (Conjugate Symmetric) proposal that has come out of this project to drive the modulation and demodulation of the OFDM information signal and the use of the squared romaine system to recover the OFDM information signal from the modulated carrier signal. The use of the cyclicalal prefix (CP) to recover the OFDM token timing is also discussed in chapter three.Chapter cardinal presents the hardware implementation of the DSP OFDM modulator and demodulator on two separate DSP boards and shows the variant results of the hardware implantation on the oscilloscopes screen as well as it shows the results of the CCS simulation of the OFDM modulator and demodulator and compar es the OFDM spectrum of the generated OFDM information signal generated by the Conjugate Symmetric approach with that generated from the traditional method.Chapter basketball team is for the conclusion points that be in possession of come out of this project and the further work to be implemented in the future.The accustomed CD contains the real sentence DSP implantation CCS projects of the OFDM modulator (OFDM-TX project) and OFDM demodulator (OFDM-RX project) and the CCS simulation of the OFDM modulator and demodulator (Simulation project) as well as the MATLAB codes and an electronic copy of the thesis.Chapter TwoOFDM rudiments2.1 IntroductionIn the digital communications, the transmitted signal over a wireless channel is more preferred, when the symbolization while is significantly greater than the delay spread (s) of this channel to avoid the intersymbol interference (ISI) due(p) to the cartridge clip dispersion of transmitted symbols. But unfortunately, the symbol da te is reversely relative to the bit rate which means a great constraint when lofty info rate transmission is required over a wireless channel with a relatively high delay spread due to the multi bridle-path environment of that channel 1.The OFDM technique produces the solution to this problem, as it divides the high rate bit blow into (N) very low rate bit streams that are transmitted simultaneously using (N) orthogonal subcarriers for every OFDM symbol. Each of these low rate bit streams modulates an mortal subcarrier. in that respectfore, the symbol m is increased as many as (N) measure without reducing the real bit rate.2.2 The Spectrum of the OFDM Subcarriers token (2-1) y(t) (the dotted curve) is the algebraic total of the 5 sinusoidal wavesFigure (2-2) the spectrum of y(t) in the absolute relative relative frequency domain (tail fin stems or tones)Figure (2-3) the angular function with (?t) era in the judgment of conviction domainFigure (2-4) the spectrom of the rectangular function in the frequency domainFigure (2-5) the spectrum of the OFDM symbol with five subcarriersSuppose y(t) is a signal consisting of the algebraic summation of five sinusoidal waves (subcarriers) in the time domain with five different frequencies (f1, f2, f3, f4 and f5) respectively normal (2-1). Suppose these subcarriers feel the same frequency lay (?f) betwixt for severally one(prenominal)(prenominal)(prenominal) adjacent subcarriers in the frequency domain. The spectrum of y (t) in the frequency domain in monetary value of the magnitude has five stems at f1 to f5 respectively. Each stem ( ace tone) represents one of these five sinusoidal waves or subcarriers figure (2-2).Now, suppose an OFDM symbol (with symbol duration = (?t)) consists of the same five sinusoidal subcarriers mentioned earlier. The spectrum of this OFDM symbol in the frequency domain does not now consist of five stems instead the spectrum is like that one in figure (2-5). The spectru m in figure (2-5) consists of five overlapped sinc functions each of which represents an individual subcarrier.Actually, our OFDM symbol is not identical to y(t). More precisely, it is a ( cut y(t)) with truncation duration equal to the OFDM symbol duration (?t). When a signal is truncated in the time domain with equal gain over all the truncated points within the period (?t), that means mathematically multiplying this signal with a rectangular function in the time domain with a time duration equal to (?t) figure (2-3). The shape of the spectrum of rectangular function in terms of the magnitude is single sinc wave in the frequency domain abscission the horizontal axis at points equal to the integer multiples of the reciprocal of the time duration (1/?t) figure (2-4). Basically, when any two signals are multiplied in the time domain, the resultant signal of this multiplication has a spectrum in the frequency domain equal to the convolution of the spectrums of the two original signal s. Therefore the spectrum in figure (2-5) represents the resultant of the convolution operation between the five stems of y(t) figure (2-2) and the sinc of the rectangular function figure (2-4) in the frequency domain.Looking at figure (2-5) again, it is easy to notice that the peak of each subcarrier sinc occurs at a point where all other four sincs have magnitudes equal to zero at which. This situation is the condition of the orthogonality between the subcarriers as it ensures the least(prenominal) interference between the subcarriers in the frequency domain. The orthogonality between subcarriers is not achieved, unless the frequency spacing between the subcarriers (?f) is equal to the reciprocal of the OFDM symbol duration (1/(?t)) 2.2.3 The OFDM ModulatorThe OFDM Modulator uses the Quadrature Amplitude Modulation (QAM) Mapper and the Inverse Fast Fourier Transformer (IFFT) to simultaneously generate and modulate the subcarriers of each OFDM symbol. Figure (2-6) shows a general block plot of the OFDM modulator.The OFDM modulator builds and transmits each OFDM symbol consisting of a flesh of subcarriers equal to N as follows. The QAM mapper maps the data bits to (N) QAM vectors. Each of these vectors has real and imaginary components and represents a single subcarrier. The tot of data bits that are mapped to each QAM vector (subcarrier) depends on the QAM gear up (M) as shown in prorogue (2-1). Using QAM mapper with higher order produces higher data rate. However, this will be at the cost of the reaction quality as the conformation of higher order QAM allows higher snap Error Rate (BER) for a givenThe QAM Mapper detail maps data bits to QAM vectors in accordance with the QAM constellation.The successive to Parallel (S/P) buffers the QAM vectors of each OFDM symbol to prepare them for the IFFT operation.The IFFT pointedness modifys the buffered QAM vectors (the subcarriers) from the frequency domain to produce an OFDM symbol term same to the alg ebraic summation of these sinusoidal subcarriers in the time domain to be buffered in the next stage.Guard musical breakup founding and Parallel to accompanying stages add the withstand time musical interval to each buffered OFDM symbol sequence and produces it serially to the next stage.The DSP Low Pass Filter (LPF) and The Digital to one-dimensional convertor (DAC) stages are to smooth the signal and convert the digital sequence into parallel signal.The Up Conversion and The Power Amplification stages.Figure (2-6) general block diagram of the OFDM modulator.The 4-QAM constellation, which is identical to Quadrature Phase Shift Keying (QPSK) constellation, gives the receiver more border to the metamorphoses of the amplitude and signifier of any get QAM vector and allows the receiver to de-map it to the correct 2-bit-combination, as long as it still lies in the same string-circle from which it was originated at the transmitter, whereas 16 and 64 QAM constellations give less tolerance to the change in the phase and amplitude of the received QAM vector due to the noise and interference.Not all subcarriers of an OFDM symbol are utilise to carry the data bits, some of which are used as polisher carriers for the synchronization and channel estimation purposes and for providing the receiver with specific information such as the order of QAM being used by the transmitter.The Serial to Parallel (S/P) stage buffers the N vectors from the QAM stage for each OFDM symbol to produce them in parallel way to IFFT stage. The add together of IFFT points is always greater than the number of the subcarriers (N), so the (S/P) pads the remaining IFFT points, which have not been assigned QAM vectors, with zeroes.The IFFT stage is the heart of the OFDM modulator. It gives the QAM vectors the mathematical ability to be considered as the OFDM subcarriers in the frequency domain and converts them to the time domain to form the multi-subcarrier information signal. In ot her words, as all the (N) QAM vectors of each OFDM symbol are the parallel inputs of the IFFT operation, the IFFT stage considers these QAM vectors as tones or stems in the frequency domain and converts them into correspondent subcarriers in the time domain for the given OFDM symbol duration. Each QAM vector has a specific phase and amplitude which corresponds to the bit combination this vector represents in accordance with the QAM constellation. The IFFT coverts each QAM vector into a correspondent sinusoidal subcarrier in the time domain with amplitude and phase directly related to those of that vector and a frequency that is directly proportional with the sequence of IFFT point, to which the vector has been assigned. That means if a QAM vector with sequence (n) (assigned to an IFFT point with sequence n) generates a subcarrier with frequency equal to (f), the vector with sequence (n-1) generates a subcarrier with a frequency equal to (f ?f) and the vector with sequence (n+1) gen erates a subcarrier with a frequency equal to (f + ?f). The IFFT stage can simultaneously produce all the N-subcarriers for each OFDM symbol as it performs the conversion from the frequency domain to the time domain for N (QAM vectors) in one parallel operation for each OFDM symbol. The OFDM symbol signal in the time domain represents the algebraic summation of all subcarriers of that symbol. Now, it is obvious how the OFDM modulator divides the high rate bit stream into (N) take down rate bit streams which are simultaneously transmitted over (N times higher OFDM symbol duration) without reducing the actual bit rate.The Guard Interval Insertion stage appends a concord period at the starting line of each OFDM. The Guard Interval (GI) (also called the Cyclic Prefix (CP)) makes a dissolution between the consecutive OFDM symbols to contribute in the ISI reduction and to eliminate the Intercarrier dissonance (ICI) between the subcarriers. The guard interval essential be greater tha n the highest path difference duration. As a result, multipath signals with delay smaller than the GI cannot evidence ICI 3. The guard interval is generally equal to or less than the quarter symbol duration 4. Practically, the guard interval is generated by taking an use up copy of the end part of the OFDM symbol and adding it to the starting signal of the symbol. The guard interval (GI) can be used by the receiver to adjust the beginning and end of each received OFDM symbol through the cross correlativity operation.Now, the sequence of the OFDM symbol is converted into serial sequence. The Guard Interval Insertion and the Parallel to Serial (P/S) stages are shown as one stage in figure (2-6). The DSP LPF smoothes the information signal.The Digital to Analogue Convertor (DAC) converts the incoming digital sequence into line of latitude signal.Finally, the Up Conversion and Power Amplification stage mixes the information signal with a locally generated carrier and boosts the re sulted signal to be transmitted.The input data bits to the OFDM modulator in figure (2-6) may be first scrambled for the security purposes, encoded for the Forward Error Correction (FEC) purposes and interleaved (to randomize the bursts of misplay 5). Therefore, scrambler, encoder and interleaver blocks may precede the other stages to provide the OFDM modulator with scrambled, encoded and interleaved coded bits 6.It is also possible to up convert the signal whilst it is still in the digital signal bear upon domain before converting it to the analogue form.The Carrier Recovery and the Down Converting stage recovers the information signal from the carrier signal.The Sample and Hold circuit and the Analogue to Digital Convertor (ADC) stage converts the information signal from the analogue form to produce the digital sequence for the DSP processing.The Guard Interval Removal and the Serial to Parallel (S/P) stage removes the cyclic prefix (CP) and produces all the useful samples of th e current OFDM symbol being processed to the FFT stage simultaneously.The FFT stage converts the subcarriers of the OFDM symbol from the time domain to the frequency domain and produces them to the QAM De-mapper as vectors through the (P/S) buffer. One water tapdance Equalizer can be used to equalize the vector constellation after the FFT stage.The Parallel to Serial (P/S) stage buffers the vectors of each OFDM symbol to produce them serially to the QAM De-mapper.The QAM De-mapper assigns each vector to the correspondent bit combination to produce the data bits.Figure (2-7) general block diagram of the OFDM demodulator.2.4 The OFDM DemodulatorThe OFDM modulation operation is completely reversed in the demodulator. At first, the information signal moldiness be recovered from the carrier. This is done by the carrier recovery and down converting stage. Figure (2-7) shows a general block diagram of the OFDM demodulator.The analogue to digital convertor (ADC) converts the information s ignal into a digital sequence.The guard interval removal stage removes the inserted guard interval or cyclic prefix from the beginning of each OFDM symbol. The OFDM demodulator could use the cyclic prefix at the beginning of each OFDM symbol to pinpoint the beginning and end of each symbol, as the cyclic prefix at the beginning of each OFDM symbol is identical to the end part of that symbol within a duration equal to the cyclic prefix duration.Now, the digital sequence of each OFDM symbol, which represents the algebraic summation of the subcarriers signals in the time domain, is simultaneously presented to the FFT stage to convert these subcarriers into their correspondent vectors in the frequency domain. The parallel presentation of the symbols digital sequence to the FFT stage involves the idea of serial to parallel conversion of this sequence.The subcarriers may also be equalized before being presented to the QAM de-mapper using a one tap equalizer.The QAM de-mapper assigns each vector in the frequency domain to the correspondent binary program bit combination in accordance with the QAM constellation being used in the transmitter and receiver.The serial sequence of the received coded bits must be de-interleaved and then decoded and descrambled, if the scrambling, encoding and the interleaving are applied in the transmission side.The number of data bits per each OFDM symbol can be easily measured by multiplying the number of subcarriers that are used to carry the data bits (Payload subcarriers) by the number of bits represented by the QAM vector in accordance with the QAM constellation table (2-1). The carrier recovery operation can also be done after the sample and hold stage within the digital signal processing unit.2.5 Digital Video Broadcasting-Terrestrial (DVB-T)The DVB-T employs the OFDM due to its excellent public presentation in the multipath environments which are common in the terrestrial broadcasting, as the OFDM distributes a high bit stream o ver a high number of orthogonal subcarriers, each of which carries a low bit rate stream simultaneously, which makes the symbol duration much higher than the delay of the indirect paths 7.The DVB-T has two regularitys 2K and 8K. As 2K and 8K rooms have the same data rata, selecting which mode should be used depends on the requirements. The 2K mode has about(predicate) 250 S symbol duration and 4 kc spacing between its subcarriers, whereas the 8K mode has about 1 m S symbol duration and 1 KHz spacing between its subcarriers. These characteristics make the 8K mode with its higher symbol duration more resilient with multipath situations and channels with a high delay spread but the 2K mode resists better the shift in the frequency caused by Doppler effects due to the relative mobility between the transmitter and receiver, as it has higher frequency spacing between its subcarriers. The DVB-T has (FEC) similar to that of the DVB-S (Satellite) 8. It has the following code rates (1/2, 2/3, 3/4, 5/6 and 7/8). Not all subcarriers are used as onus carriers to carry the coded bits (data bits + redundant bits) some subcarriers are used for channel estimation and correction. These subcarriers are the pilot carriers which have vectors lying on the I (In-phase) axis of the QAM constellation with angles equal to either 0 degrees or clxxx degrees, hence they have only real components unlike the freight vectors which have real and imaginary components in order to recognize between them. The mapping of the pilot carriers to be delivered as vectors to the IFFT stage in the OFDM modulator is achieved through the BPSK modulation which uses the I (in-phase) axis of the constellation. Figure (2-8) shows the locations of DVB-T subcarriers on the 4-QAM constellation.The locations of the loading carriersThe locations of the revenant and sprinkling pilot carriersThe locations of the TPS pilot carriersFigure (2-7) general block diagram of the OFDM demodulator.The DVB-T uses 4, 1 6 or 64 QAM to modulate the coded bits to be represented as consignment subcarrier vectors, thitherfore each shipment subcarrier can carry 2, 4 or 6 coded bits every OFDM symbol respectively. The DVB-T uses a guard interval length equal to (1/4, 1/8, 1/16 or 1/32) of the OFDM symbol duration 8.2.5.1 The DVB-T OFDM SubcarriersThe DVB-T 2K mode has 2048 subcarriers, but it only uses 1705 subcarriers and sets the rest to zero. The 1705 carriers are numbered from 0 to 1704. It uses 1512 subcarriers as payload carriers and the remaining 193 subcarriers as pilot carriers. There are three types of the pilot carriers the continual pilots, pick pilots and the (Transmission Parameter Signaling) (TPS) pilots. The continual pilots have frozen(p) positions in the OFDM symbol spectrum. For example the sequences 0, 48, 969, 1683 and 1704 in the couch (0 1704) are reserved as positions for the continual pilots. The continual pilots are used by the receiver to estimate the amount of phase rota tion of the received QAM vectors. Every group of 12 subcarrier vectors has only one decompose pilot. The pass around pilots do not have fixed positions. Among each 12 carriers positions there is one variable position for one scatter pilot. The position of each scatter pilot regularly varies from symbol to symbol by parachuting 3 positions forward with respect to its position in the previous symbol. The scatter pilots are used to estimate the channel too. The TPS pilot carriers have fixed positions and are used by the transmitter to inform the receiver about the transmission parameters such as.The DVB-T mode (2K or 8K)Modulation type of the payload subcarrier vectors (4, 16, or 64) QAMFEC code rate (1/2, 2/3, 3/4, 5/6 or 7/8)Length of the guard interval (1/4, 1/8, 1/16 or 1/32)Like the continual and scatter pilots, the TPS pilot carriers lie on the I (in-phase) axis. Each OFDM symbol in the 2K mode has 17 TPS pilot carriers with fixed positions. Within the same symbol all the 17 T PS pilots are either at 0 degrees or 180 degrees. The receiver determines the state of TPS pilots whether the TPS pilots of the received symbol are at 0 degrees or 180 degree based on the majority voting rule. Through the TPS pilots, the transmitter sends the receiver 67 information bits every OFDM kind. The OFDM frame consists of 68 OFDM symbols. The TPS pilots are Differential Bi-Phase Shift Keying (DBPSK) modulated. That means the receiver considers receiving an information bit = (0), if the state of the TPS pilots change from the previous symbol to the current symbol and considers receiving an information bit = (1), if the phase or state of the TPS pilots does not change from the previous symbol to the current symbol. 68 OFDM symbols are required to transmit the 67 information bits, as the first symbol is used to determine the initializing state of the TPS pilots. The 67 bits inform the receiver about the transmission parameters, for exampleBits 26 and 27 represent the QAM ord er (00=4, 01=16, 10=64)Bits 31, 32 and 33 represent the code rate (000=1/2, 001=2/3, 010=3/4, 011=5/6, 100=7/8)The DVB-T 8K mode has 6817 subcarrier per each OFDM symbol. The subcarriers of the 8K have the same principles and use of those of 2K with difference in their numbers only. circumvent (2 2) shows the different subcarriers of both 2K and 8K modes.The scatter pilot carriers have two different numbers of the subcarriers, as the scatter pilot carriers coincide with fixed locations of the continual pilot carriers due to their jump 8.2.6 WLAN 802.11aWireless Local Area Networks (WLANs) 802.11a employ OFDM as a digital communication technique for reliable and high data rate transmission. Each OFDM symbol is expressed by 64 subcarriers, but the actual used subcarriers are (52) (64 52 =12 subcarriers are set to zero). There are 48 payload carriers to carry the coded bits (data and redundancy bits) and 4 pilot carriers. The frequency spacing between the subcarriers is (?f = 312.5 KHz). The required channel bandwidth can be calculated by multiplying the total number of subcarriers by the frequency spacing = 312.5 K * 64 = 20 MHz. To achieve the orthogonality between the subcarriers the OFDM symbol duration (?t) must be equal to the reciprocal of (?f) (?t = 1/ ?f), hence ?t = 1/312.5 KHz = 3.2 s. 802.11a appends a guard interval (GI) equal of (1/4) the OFDM symbol duration at the beginning of each OFDM symbol (GI = 0.25 * 3.2 s = 0.8 s), therefore each OFDM symbol occupies (3.2 s + 0.8 s = 4 s) time interval. That means a wireless device transmits 250,000 OFDM symbol per second. 802.11a allows wireless devices to have (8) transmission data rates or modes (6, 9, 12, 18, 24, 36, 48 and 54) M bits/sec. 802.11a uses (BPSK, QPSK, 16-QAM or 64-QAM) to modulate the payload carriers and uses (1/2, 2/3 or 3/4) code rate for the FEC in accordance with transmission data rate being used.The different (8) modes use different modulation types and different code rates as sho wn in table (2-3) 6. 802.11a uses BPSK modulation to modulate the payload carries in modes 1 and 2 unlike the DVB-T which only uses QAM modulation to modulate the payload carriers. For each mode, the OFDM symbol has the same total duration (4 s) (250,000 OFDM symbol/Sec) and the same channel bandwidth (20 MHz), as it has the same number of subcarriers (48 payload carriers and 4 pilot carriers).Looking back at table (2-3) (Mode (8) 54 Mbps), as the 64-QAM modulation is used to modulate the payload carriers, each payload carrier in the OFDM symbol carries (log2 (64) = 6 coded bits). Each OFDM symbol carries (48 payload carriers/OFDM symbol * 6 coded bits/payload carrier = 288 coded bits / OFDM symbol). The number of data bits per each OFDM symbol = 288 * (code rate = 3/4) = 216 data bits / OFDM symbol. There are 250,000 OFDM symbols / Sec, hence the data bit rate = 216 * 250,000 = 54 Mbps.Chapter ThreeThe MATLAB Analyses for the Hardware capital punishment Approaches3.1 IntroductionT hroughout this chapter the ideas and approaches that will be used for the DSP hardware implementation of the OFDM modulator and demodulator on two separate DSP boards will be discussed and copy by using the MATLAB.There are mainly three approaches.The use of the (Conjugate Symmetric) with the carrier vectors which are the inputs of the IFFT stage in the OFDM modulator to produce an OFDM information signal in the time domain with a real part only for easier modulation and demodulation, which is the proposal that has come out from this project.The use of the squared cosine to recover the OFDM information signal from the carrier signal in the receiver (the synchronization of the carrier frequency signal).The make use of the guard interval (GI) or the cyclic prefix (CP) for the synchronization of the OFDM symbol (i.e. The Symbol clock Recovery) to allow the receiver to know the correct boundaries of each received OFDM symbol to set the FFT window at the correct positions of the receive d OFDM signal.3.2 The Mathematical summary of a Multicarrier SignalTo understand the idea of the (Conjugate Symmetric) and the role of the IFFT and FFT in the OFDM system, lets consider y(t) as a continuous multicarrier signal with a real part only in the time domain consisting of the algebraic summation of five sinusoidal waves or subcarriers which have the following frequencies (1, 2, 3, 4 and 5) KHz and phase shifts (p4,,3p4, 5p4, 7p2, 9p4) respectively with equal amplitude = (28) for each. For our y(t), each two adjacent subcarriers (in the frequency domain) have 90 degrees phase shift. y(t) can be expressed in the time domain as in Eq. (3-1)It is not necessary for the five subcarriers forming y(t) to have the same magnitude. It is just to simplify this discussion.Now, if y(t) is sampled with sampling frequency (Fs). Fs must be greater than (2 * 5 KHz = 10 KHz), where 5 KHz is the highest frequency of y(t) according to the Nyquist-Shannon theorem. Nyquist-Shannon theorem stipul ates that the sampling rate or frequency must be at least two times greater than the highest frequency of the sampled signal to avoid the aliasing which prevents providing the DSP system with a right copy of the sampled signal 9. When a continuous signal in the time domain is sampled, a sample is taken at every (t = n * Ts). Ts is the sampling interval (Ts = 1 / Fs) and n is zero or positive integer number representing the sequence of the sample. y(t) is no longer continuous. Now, y(t) represents a sequence of discrete values. In Eq. (3-1), y(t) is replaced by y(n) in the left hand side and (t) is replaced by (n * Ts) or (n / Fs) in the right hand side as in Eq. (3-2).If Fs is set to 16 KHz (16 KHz 10 KHz) and 16-point FFT operation is performed to y(n) to produce y(n)s spectrum in the frequency domain in order to study it.The 16 point FFT operation needs 16 discrete values or samples of y(n) for n = 0, 1, 2,13, 14, 15. The results of 16 point FFT operation are 16 complex vectors i n the frequency domain. The 16 discrete values (samples) of y(n) are the inputs of the FFT in the time domain and the outputs are 16 complex vectors of Y(m) which represents y(n)s spectrum in the frequency domain. Table (3-1) lists the 16 discrete values of y(n) in the time domain and table (3-2) lists the 16 vectors

Friday, March 29, 2019

The Liberation Of The Peon Film Studies Essay

The Liberation Of The hack Film Studies EssayThe Liberation of the Peon uses art to communicate a political fundament, much like Osiris and Isis by Kiefer. Although similarities do non end there. Both small-arms feel relatively earthy. Riveras piece is earthy because of the right smart he chose to do his mural, in fresco. This is a proficiency of mural painting d unrivaled on plaster right later on it has been laid.2We enamor this in Kiefers piece as well. However, the main difference is that Kiefer uses it a paint application and contributes meaning to his piece, while Riveras decision was based on doing a mural for the purposes of reaching protrude to as legion(predicate) community as possible. Although, the earth tones do add to the themes of origin and history as both pieces suggest similar themes. In Kiefers piece, he is relating to his own knightly and the past of Germany. The struggles he faced as an individual in a society that was not precise kind toward Germans .Kiefer portrays a stepped temple that is the of import focal point of the piece. The work is physic aloney overwhelming, measuring 150 inches by 220 inches. The piece feels very messy, the colour atomic number 18 all over the place. parachuting out yet, they still chit-chatm to produce a strong image. For example, on the middle-left on the piece, there are vertical strokes going over from the john of the page at the way to the sky. Yet, it still feels like its a depart of the piece, creating a glowing-like effect.It is painted with an array of earth tones, grays, browns, beiges. All the colours soak up a little bit of each other of them. For example, if you look at the highlights, the whites arent pure white they use up a mixture of the colours well-nigh them. He also includes mixed media into the piece. At the top of the piece, one butt joint find an odd use of a television circuit control board. The board connected by copper wires to pieces of what seems to be plumbing fixs. These pieces of porcelain plumbing fixture burn down be found all over the canvas. Furthermore, they represent Osiriss disordered body parts. This use of multi-media adds layers of meaning to the piece, in which one has to slowly scroll back to really know what he intended.Rivera designed his composition such(prenominal) that it reflects the mourning. Similarities can be found on the naked body of the peon, and the fabric used to surround him. It draws on a piece by Giotto di Bondones Lamentation at the Capella degli Scrovegni of which Rivera had studied early-hand.3References to Mexican artistic traditions specifically, the Pre-Columbian influence, which can be seen in the rounding of the hands on the revolutionary soldier who is covering the Peon with a red blanket, add to Liberation of the Peons impact. In his portable mural, Rivera carefully depicts the individual whip-wounds that cover the peons broken body. The piece seeks to purpose the purpose of the Mexican R evolution.He uses muted greens, browns and yellows with an earthy tone because it emphasizes the brighter colours and thus the objects like the blanket. The blanket is a symbol of comfort and warmth. devil things that a peon would not be familiar with and the people providing this would be the Rebels. The use of colour does add to the propaganda theme of the piece. It also simply isnt connective that the blanket is the similar colour as the dominant Communist Red. This indeed increases the popularity of the current government. Using those colours in that way, it also creates a touch on of interest around the Peon. The knockouts eye is drawn to it because the blanket pops out and the theme becomes even easier to attend as a result as the slave now becomes the center of interest, not the soldier or the electrocution buildings.All movement leads to the focus. For example, that revolutionary soldier is using a poke to cut the rope. Movement is also created when the viewer follow s the direction in which the revolutionaries are looking-directly at the peon. This ultimately creates visual movement toward the focus. Interestingly, the eyes of the horses are not pointing toward the slave, but the horses look directly at the viewer. This cunning trick draws the viewer into the grouping of figures and horses.Now, with Kiefer size is normally not an issue with mixed media paintings or paintings of any sort of that matter, size does play a role and does have a connection with his theme. Unlike Rivera who did his piece enlarged because it was to be a public piece and because he wanted it shared with as many people as possible. Kiefer may have done a large painting because it could have reflected the large issue he was dealing with.4In terms of colour, Kiefer uses dirty, earthy and undesirable colours creating a doomsday aura over the painting. He uses computer boards and other mixed media to specifically give a different wad of meanings adding more depth to the value of his piece. beforehand the Mexican Revolution, haciendas, were large farms owned by very wealthy individuals, dominate the countrys social and political landscape.5In under fire, hinting that these individuals were the ones that inflicted the wounds on the peon. The mural depicts the reasons for the Mexican Revolution, making the theme relatively obvious for individuals who probably did not induce a formal education and individuals whom were likely illiterate.Although both pieces are highly political, they both try to achieve completely different goals. In one sense they are similar because both pieces are about tell a story that has deep connections to the painters and they are both making references to the past. However, the way Rivera is depicting the past and Kiefer is depicting the past are two very diverse takes. For one, Kiefers piece is messy, dark, and somewhat mute. To someone without a terra firma in Kiefers life or Egyptian storyology would not be able to un derstand what hes really trying to say. However, with Rivera although he has a own(prenominal) connection to the piece, his undercoat is not required to understand what the piece is about. Based on what we see we can assume that this is taking place in Mexico and that the people in the foreground, are the approximate guys because they are freeing the Peon, an innocent slave to a cruel master. We know those individuals were cruel because of the lash marks on the back. And we besot the basic idea that these men likely burned the buildings in the emphasise and because we know these guys are good, they must have burned the masters home, the mischievousness guy.With Kiefer its a lot harder to peel back those layers without some form of background knowledge. There is no direct symbolism to the aftermath of Germany during the Post-WWII Era in the piece. His links are brilliant in that sense because the choosing of the Egyptian myth as an allegory for what took place could not be more fitting.Kiefer has pieces of porcelain all over the piece. Symbolically they represent the fragmented dismembered body of Osiris and he is literally in the piece because of this, Kiefer directly and physically links the tale of Osiris and his personal link, Germany after World War II.There is an obvious Pre-Columbian deviate to the Liberation of the Peon, seen in the rounding of the hands, the face and the fingers. Also, because this is a fresco, we tend to see a lot of washed out colours, this is because fresco is a proficiency of mural painting executed upon new plaster that has not set yet.Although, I personally feel that the Kiefers piece, Osiris and Isis, is cleverer in terms of how he depicts his artwork. He combines so effectively the different Egyptian and German civilizations and relates it all to his theme under multiple layers. However, if I had to choose which piece I matte up was the better artwork in terms of which artist had more efficiently met their goals I woul d pick the Rivera piece. There are a number of reasons, the first being the fact that it is very easy to understand the theme and what Rivera was proverb about the subject. Everyone who lived in Mexico would have been able to piece together precisely what Rivera wanted them to. He used the composition effectively, embracing a religious-esque barbel to the way the Peon was depicted. The piece would have also met its goal of advantageously helping the Party gain more members and the piece was very inspirational. The consanguinity between the background and the foreground is emphasized with what those sections depict. With the foreground containing the victim and the good guys. We assume that they must have burned the estate, owned by the same person that caused the harm on the Peon. Justifying the actions of the good guys. His genius relies on how the piece seems relatively simple, however in reality we are dealing with a very cunning and intelligent use of space.

Heat Transfer Within A Jacketed Reactor System

erupt Transfer Within A Jacketed Reactor ashesmodelling of high temperature slay of training within a detonating deviceed reactor requires basal knowledge on border warming transfer reactor corporeal body etc. literature review sum up the fundamental on energy balance, method of boilers suit warmheartedness transfer coefficient determination and primary understanding of quartz. These argon the basic methods which al piteous engineers to predict more completed capabilities during chemical transition as well as timing on the process.IntroductionHeat transfer is important in provoke vessels callable to still temperature is the most signifi do-nothingt factor for controlling the outcome of chemical, biochemical and pharmaceutical processes. 6Jacketed foment vessels for genus Oestrus up and cooling atomic number 18 comm precisely employ in vary casefuls of process applications. Engineers should have working knowledge of how heat transfer and temperature contr ol principles applied to such vessels. Cooling or heating agitated limpid in vessels is a basic technological carrying into action on the chemical, biochemical, pharmaceutical, food and processing industries. The cooling or heating sum up depends on how the heat is supplied or removed, the miscellany intensity and many new(prenominal) parameters. 5 The temperature needs to be controlled precisely at its desired to meet the need of downstream operations. Hence a mathematical model is essential which washbasin predict temperatures accurately.The rate of heat transfer to or from an agitated facile mass in a vessel is a function of the physical properties of that liquid and of the heating or cooling medium, the vessel geometry, and the degree of agitation. 8 other factors which may affect the rate of heat transfer include typewrite and size of the fomenter and agitator location in the vessel. Most of the jacketed agitated vessels be ingestion as reactor, thus chemical reacti ons with exothermic or energy-absorbing effects must be taken into account as well. In a vessel containing an agitated liquid, heat transfer takes appear mainly through conduction and forced convection, as it does in heat exchangers. 8Crystallization is a unit operation for separation and production of native solid materials with desired properties. To develop a batch cooling watch glass process, several(a) operation strategies need to be investigated in relation to seeding, cooling, admixture, fines dissolution, and so forth. 18 In commercial scale process, the reactor size grows larger. In this situation, various problems like ancillary nucleation, attrition, breakage, agglomeration, and dead zone may become severer in relation to the increasing inhomogeneities in the solution temperature and hydrodynamics.Literature ReviewModeling of reactors is useful for analyzing data, estimating performance, reactor scale-up, simulating start-up and shut down behavior, and control. 12 Uncertainties such as scale-up options, explosion hazards, runaway reactions, environmental emissions, reactor internals etc, may be explored through modeling. 12 A key aspect of modeling is to derive the appropriate momentum, mass or energy conservation equations for the reactor.One typical application in heat transfer with batch operation is heating the process fluid in reactor, maintaining temperature during the reaction period and cooling the product after reaction complete. 11 readiness BalanceThe overall caloric energy balance includes the heat move into the constitution, heat leaving the system, heat accumulation and heat loss. The equation go off be written asIn batch process, there is no liquid or fluid entering or leaving the system. If the system is assumed to be perfectly insulated, the energy balance equation sewer be simplified in 7By integration of both sidesFor a batch manufacturing process, heat transfer in an agitated vessel is apply to design a suitable pro cess or reaction. It is necessary to count the term to heat or cool a batch or the cooling capacity required to hold an exothermic or endothermic reaction at constant temperature. 1 The technique is to develop an expression which is relating succession for heating or cooling agitated batches to coil or jacket area, heat-transfer coefficient, and the heat capacity of the vessel contents. 11 By rearranging the energy balancing equation, the germane(predicate) equation to calculate time is as followThis equation only can be used in where the inferior fluid temperature body constant or the fluid temperature difference among inlet and passing is not greater than 10% of the log mean temperature difference between the average temperature of the jacket and the temperature of the vessels content. 8 Precisely, for heating and cooling condition, this equation must be represented in separatelyFor heatingFor coolingIf the situation is greater than 10% of the log mean temperature differen ce, the apply equation will beW = the mass flow rate through the jacket,C = the ad hoc heat of the fluid in the jacketK =Assumptions are do for solving energy balance equation 11 17U is constant for the process and over the entire surfaceLiquid flow rates are constantSpecific heats are constant for the processThe heating or cooling medium has a constant inlet temperatureAgitation produces a uniform batch fluid temperatureNo partial phase changes occursHeat losses are negligibleAgitated vessel heat transfer coefficientProcess side heat transfer coefficient can be situated by speed and agitator type. For low viscosity fluids, high-speed turbine type agitators will provide good performance. For high viscosity fluids and non-newtonian fluids, larger diameter agitators will be more suitable. 1Various types of agitators are used for mixing and blending as well as to promote heat transfer in vessels. The correlations used to estimate the heat transfer coefficient to the vessel wall. 2Fo r agitated vesselsWherehv = heat transfer coefficient to vessel wall or coil, Wm-2-1D = agitator diameter, mN = agitator, speed, rps (revolutions per second) = liquid density, kg/m3kf = liquid thermal conductivity, Wm-1-1Cp = liquid specific heat capacity, J Kg-1-1 = liquid viscosity, Nm-2s.The values of constant C and the indices a, b and c depend on the type of agitator the use of baffles, and whether the transfer is to the vessel wall or to coils. Some typical correlations are given below 2Flat marque disc turbine, baffled or unbaffled vessel, transfer to vessel wall, Re 400Flat blade disc turbine, baffled vessel, transfer to vessel wall, Re 400Overall heat transfer coefficientMost utility and process fluid will back down the heat transfer surfaces in an exchanger to a greater or lesser extent. The deposited material will normally have a comparatively low thermal conductivity and will reduce the overall coefficient.Fouling factors ordinarily are considered in determining the Overall heat transfer coefficient U. The overall heat transfer coefficient is calculated in this wayWhere and s are the heat transfer coefficients for the process and utility side respectively. On the utility side, fouling resistance 1/f can be found from local anaesthetic experience or from Kern (1950). 1Heat transfer utility fluidSyltherm 800 is a silicone heat transfer fluid. It is a highly stable, indestructible silicone fluid designed for high temperature liquid phase operation. It exhibits low potential for fouling and can often remain in service for 10 years or more. The recommended using temperature range is. 15CrystallizationCrystallization occurs with generating a sufficient level of supersaturation. The method of generation of supersaturation is to provide heat transfer, which is used in cooling and evaporative crystallization processes. There are cardinal essential steps for crystallization nucleation and crystal growth.The problems of scale-up in crystallization pro cess can be classified into induced, hydrodynamically induced, and mixes. For example, attrition, breakage, and agglomeration are related to solution mixing and are investigated from the hydrodynamic point of view. On the other hand, ancillary nucleation is caused by increased temperature gradient within the solution to failher with seed particles generated by attrition or fluid shear and can be considered as an example where the thermal and hydrodynamic effects are mixed. To improve the hydrodynamics deterioration during the scale-up, impeller type, agitation power, and baffle or draft tube design2,8,9 can be modified or newly designed as required. The thermal aspect improvement is performed by the heat transfer enhancement, but the remedies are limited because the heat transfer area to volume ratio decreases needfully during the scale-up unless other techniques such as vacuum or evaporative crystallization is introduced.MethodologyCalculation of time to heat or cool a fixed amoun t of liquid inside a batch reactor usually assume the process and utility heat capacity and the overall heat transfer coefficient to be constant throughout the calculations.Equations (liquid in jacket) heat input to reactor at T = heat loss by utility liquid with inlet temperature T1 and outlet temperature T2Rearrange the equation to figure unknown jacket outlet temperature T2The rate of temperature change of the liquid inside the vessel is given bySolving the above two equations to get process temperature as a function of timeFinally, solving for time t where T = TfConclusion