Gas Chromatography

Science has developed a lot since the invention of fire by the ancient cavemen. Now a days we use various types of high-tech instruments for the precision of our scientific experiments. Gas Chromatography (GC) is one of the most common procedures used in analytical chemistry. It helps us analyze compounds through evaporation. One of the best features of this process is the compounds are not decomposed. Some of the more expensive GCs also detects the element for us, which later can be used to prepare pure compound from a mixture. Compounds present in a volatile liquid or gaseous solute are isolated after traveling through a coated column based on the substance’s size and intermolecular interactions. When a compound tends to bind to the column through intermolecular interactions, it takes a longer time to emerge than compared with a compound that does not tend to stick onto the column. The level of binding experienced between the substances and the column is determined based on the number and strength of intermolecular interactions between the two species. Substances that pass quickly through the column exhibit fewer intermolecular interactions with the column.

The development of Gas Chromatography first started with the Russians scientist Mikhail Semenovich Tswett in the year 1903.1 Later after many years German scientist Fritz Prior improved the techniques and was able to do solid state Gas Chromatography.2 And years later in 1941 Archer John Porter Martin got noble prize for his work on this field.3 He was also able to produce liquid-gas chromatography. Hence he laid the foundation of GC.

A gas chromatographer is the instrument used in this process. It helps to separate chemicals in a complex sample. The complex sample is passed through a narrow tube in gas stream, they pass depending on their physical and chemical properties and interact with a specific column filling. As all the compounds in that sample reach the end of the tunnel they are identified electronically. The main task of the column is to make the compounds pass through different times depending on their properties, this helps to detect them. In the beginning of this process a micro syringe is used to inject the known volume of the complex compound to be analyzed.

Gas Chromatography helps us to analyze contents of a substance very accurately. For example, it helps to determine the quality of products in chemical industry and determine toxic substances in a mixture. The more expensive GC instruments can measure up to picomoles of a substance in a 1 ml liquid sample.4 Gas Chromatography is used in forensic science, solid drug dose identification, arson investigation, paint chip analysis, toxicology cases, quantify various biological specimens and crime-scene evidence.5 With the expansion of science popular culture has adopted various sides of it. The use of gas chromatography is widely seen on TV shows, movies and books. But often their capabilities is exaggerated. For example, I myself use to watch CSI a lot when I was younger and they portray GC as a magical instrument which can identify any unknown sample within minutes and it would even give all the details of its origin and the day it was used. In real world it takes way longer. And to be more accurate the tests are to be performed quite a few times. Thus after doing the experiment in class I understood it is not at all the way described in the books.

Citations

1. Berichte der Deutschen botanischen Gesellschaft, vol. 24, pp. 316’326.

2. Martin, Archer, and Richard Synge. “Theory and Instrumentation If GC.” Theory and Instrumentation of GC Introduction to Gas Chromatography (n.d.): n. pag. CHROMacademy. Crawford Scientific. Web.

3. Lovelock, James. “Archer John Porter Martin CBE. 1 March 1910 – 28 July 2002.” Archer John Porter Martin CBE. 1 March 1910. Royal Society Publishing, 1 Dec. 2004. Web. 18 Apr. 2015.

4. “Biomedical Chromatography”. 2012 Journal Citation Reports. Web of Science (Science ed.). Thomson Reuters. 2013.

5. “How Is Gas Chromatography Used in Forensics?” – May 26 2014 12:00 AM. Chromatorgraphy Today, 25 Apr. 2014. Web. 19 Apr. 2015.

Animal testing: essay help

Every year thousands of animals are tested on for human safety and die of agonisingly long and painful deaths. Animal testing is a valuable asset in scientific research, drug development, health and medical research and cosmetic manufacturing. Animals are frequently used as a test subject since their body are very similar to the humans and will react in a similar way to different substances. Do you want innocent animals suffer painful deaths just for your beauty?

Not surprisingly, many types of animals tested on are mice, rats, rabbits, monkeys, dogs, cats, guinea pigs, hamsters, birds and mini pigs. Mice are the most popular animal to be tested on due to their size, ease of handling, fast reproduction rate, availability and low cost. 7342 mice are used in worldwide labs everyday- one every 12 seconds! They are widely considered to be the prime model of inherited human disease and share 99% of their genes with humans. In 2012, 3,045,690 mice, 262,641 rats and 28,677 other rodents were used in the UK alone (83.1% of total animals used that year). In 2011, the statistics show animal use totalled to 3,792,857 animals. This equates to 10,391 per day, or one every 8.3 seconds.

Even though many people oppose to the idea of animal testing, it has saved so many human lives and helped with our knowledge of different drugs, cosmetics(etc.). For example, we now have the technology for organ transplants. Organ transplants have improved the quality- and length- of life for millions of people across the world. For example, the first human cornea transplant took place over 100 years ago, following research using rabbits. In 2007, 2,403 people had their sight restored by cornea transplants. In addition, of the 5,000 people to develop kidney failure every year in the UK, 1 in 3 would die without a transplant. The surgery behind transplantation itself but also method of tissue-typing and anti-rejection drugs were developed using dogs, rabbits and mice from 1950 onwards. In 167, the first human to human heart transplant finally took place. Few people knew it took 60 years to prepare for this using animal research. Professor Christian Barnard carried out nearly 50 animal heart transplants over 4 years. Heart-lung transplants were later developed using monkeys.

The animals tested on can either survive; they won’t react to the product or the animal will suffer in great pain a die from a reaction from the product. They can be infected with a disease, poisoning, burning skin, brain damage, implanting electrodes into the brain, and blinding. They are abused and tortured. Over 100 million animals are burned, crippled, poisoned and abused in US labs every year. When used in cosmetic tests, mice, rats, rabbits and guinea pigs are often subjected to skin and eye irritation tests were chemicals are rubbed onto shaved skin or dripped into the eye without any pain relief given. Some tests can involve a killing of a pregnant animals and testing on their fetus. This is inhumane.

Animals in labs live stressful, monotonous, and unnatural lives of daily confinement and deprivation. The only changes in their lives may come from being called into a research or testing protocol- which may include an invasive experiment, or a procedure whose endpoint id death. Imagine spending your whole entire life as a hospital patient or a prisoner.

Would you pay a high amount of money for designer make-up when an animal has suffered in great pain and lost their life for something that isn’t necessary in life?

Use of fossil fuels and global warming

Due to global warming and other ill-effects of conventional energy sources, there is a need to produce energy by clean and environmental friendly ways. Fuel cell is one of the effective solution to produce energy without polluting the environment. There are various types of fuel cells viz. solid oxide, proton exchange membrane, alkaline fuel cells, etc. We are going to discuss more about solid oxide fuel cells. A solid oxide fuel cell (SOFC) is a device which generates electricity by using chemical energy stored in the fuel viz. hydrogen or hydrocarbons. SOFC consists of three parts ‘ electrolyte, anode and cathode. SOFCs have fuel flexibility, are low cost and have long-term stability. Operating temperature is the main disadvantage of the SOFC. To overcome this disadvantage, nanomaterials are used for electrolytes, anodes and cathodes of SOFC in order to improve their performance. Various fabrication and preparation methods are used to integrate different nanomaterials in the different parts of SOFCs. In this research, different fabrication methods along with their applications are discussed. [1, 2]

‘ Problem statement or gap:

The high use of fossil fuels like coal, gas and oil in last 100 years has increased the carbon dioxide and other poisonous gases emissions from power generation devices. This is considered to be an important factor for some of the environmental problems like global warming. The energy demand is always increasing and fossil fuels are depleting at faster rate. The power generation by using fossil fuels would not be sustainable. Thus, there is a need to find alternative or renewable energy sources that can meet this demand. The fuel cell is considered to be the one of the efficient and clean power generating device. Now, as we are considering fuel cells as replacement for the current power generating devices, the efficiency and durability of the fuel cells should be ideally equal or higher than those devices. To increase the efficiency and durability, different nanomaterials can be used in three different parts i.e. electrolyte, cathode and anode of fuel cells. Thus, in summary, there is need for better understanding of how these nanomaterials can be integrated on these parts in an efficient, fast and low cost ways. [1, 2, 4]

The research questions that the paper is going to address are:

1. What are some of the efficient methods to integrate the nanoparticles?

2. What are some of the applications of above methods along with the results to show the power output and durability of the fuel cells? [2, 3, 4, 5]

3. What future work needs to be done in order to improve the long term performance of the fuel cells? [6]

‘ Objectives of your research:

The objective of the current study is to provide a comprehensive review of literatures related to the application and advantages of each fabrication method of SOFCs. The fabrication methods discussed in the current study are photolithography process, sintering process and infiltration process. These processes are used for fabrication of nanomaterials on electrolyte, anode and cathode respectively. In this research, the methods are discussed using one nanomaterial for each fabrication method. The nanomaterial used for photolithography is YSZ (yttrium stabilized zirconia) [1, 2], for sintering is NiO/YSZ [3, 5] and for infiltration is metal salt nitrate [4]. These materials would increase the power output and performance of SOFCs. Different nanomaterials can also be used other than the mentioned, for improving the performance. The long term goal of the research is to help the researchers to understand the impact of use of nanomaterials in SOFCs.

‘ Expected solution or anticipated results of your research:

The results of this research will be shared in a form of paper, power point and poster presentation. The results would primarily include the schematic diagrams of the fabrication methods. They would also include the preparation methods for a particular nanomaterial used in the fabrication. The results for nanomaterial in electrolyte would include tables and graphs related to performance of SOFCs with respect to crystalline sizes, temperature, durability and cell voltage. For anode, the results would include performance of fuel cells with respect to temperature and cell voltage. The results for cathode would include performance with respect to temperature. In summary, the performance and durability of SOFCs are expected to increase with addition of nanomaterials.

‘ Timetable for completion:

February 28, 2015 ‘ Literature review and start research from the reference papers.

March 13, 2015 ‘ Proposal for Final Project.

March 27, 2015 ‘ Progress Report for Final Project.

April 17, 2015 ‘ Present Results in Poster Presentation.

April 24, 2015 ‘ Submit Final Paper.

‘ Your qualifications:

I am pursuing Master of Science in Electrical and Computer Engineering. I am writing this research paper as a part of curriculum for TCM 460.

‘ Limitations, discussion, conclusion:

In this research paper, we will see how nanomaterials can be used by using fabrication methods for electrolyte, anode and cathode of SOFCs. Introducing these nanomaterials will increase performance and durability of SOFCs. But, there are some limitations of this research. We are going to see only limited number of fabrication methods for integration of nanomaterials in fuel cells and only one application of the nanomaterial used for electrolyte, anode and cathode. There might be several other fabrication methods and nanomaterials which are not covered in this research paper. Degradation of performance after a certain number of working hours of SOFCs should also be considered while doing future work. [6]

Situated learning: essay help online free

Situated learning is a type of learning that allows individual learners to learn through socializing with other people, or with knowledgeable people or through observing and imitating real activities in real life situations. The above mentioned practice builds on participation and observation in activity.

Situated learning is based on practical activities whereby learners gain beneficial knowledge that they ought to get from schools. In the past years, learners were taught things that were not really useful to them in their everyday life. Learners need to learn or acquire skills or knowledge that are relevant to their lives, and that might be related to the career that they are going to choose in the near future.

Situated learning declared that thinking, learning and doings cannot be separated from the practical and social situations in which they occur. They work in harmony

When the teacher allows learners to have an opportunity to participate, demonstrate and interact their own thoughts, this will build their cognition abilities. Learners will acquire specific skills by observing, visualize, hear and listen by having someone to imitate or follow.

In situated learning, learner’s works through participating in a particular activity of a certain community. Participation involves joining in with the community or group of people who are performing that activity. For example, if a learner wants to know to design clothes or wants to become a fashion designer, he will probably join a group of people who design different types of clothes. In this way a learner will gain his designing experience through doing and from there, he will be able to become productive in his life after mastering the designing skills.

Teaching method -Demonstration

The teaching method that I will use in situated learning perspective is demonstration. It is the process of teaching through giving or showing examples, or acting out situations or carries out experiments. Demonstration can be used as a proof or evidence about whatever theory or situation explained to the learners, through a combination of visual evidence (of things that you can really see with your eyes) and associated reasoning.

Demonstration gives learners an opportunity to relate to the presented information individually and reinforce memory storage, because they provide the link between facts and real world implementation of those facts.

Heather (2009) on his education reference article when he explained the demonstration method of teaching stated that: ‘when using the demonstration model in the classroom, the teacher or some other expert on the topic being taught, perform the tasks step-by-step so that the learner will be able to complete the same task independently. After performing the demonstration, the teacher’s role becomes supporting students in their attempts, providing guidance and feedback and offering suggestions for alternative approaches.

Implementing the practice in my teaching, using demonstration method to improve learning

According to the situated learning perspective, people learn through participation and we participate by joining the group of people who are experts or experienced in carrying out a particular activity. To implement the practice of working to bring authentic practice into the classroom, a learner need to be able to do things or carry out tasks appropriately in real life situations . And the teacher or an expert from a certain community of practice will act as a scaffold in this situation, by carrying out demonstrations.

In English language teaching under the speaking domain, I will implement this practice in teaching my learners about how to give (deliver) a speech in public. Firstly I will teach my learners about what is a speech, how people present speeches and what is the layout of a speech, in presenting it as well as in writing, and also about the main components of a speech such as: The speech should be logically written (should have an introduction, body and conclusion) speaker should be relaxed and try to be calm even when he knows that he is nervous, speech should be interesting, the speaker should use the body language correctly. I will also demonstrate to learners by giving them a short speech as an example.

Secondly I will invite an expert from the community of practice, a person who deliver speeches at different occasions to my class. This person will demonstrate to my learners about how people present speeches, so that they can improve their skills. After the expert’s presentation, learners will be given an opportunity to ask questions, I will also ask them questions to check what they have captured from the presentation. Then I will ask them to work in collaboration with each other in groups, to come up with a speech following the layout that I taught them, and then they should choose a presenter from their groups to present the speech to class. After the group’s presentations, they will be given a chance to comment or make suggestions about others presentations.

As the learners become able to perform the task on their own effectively, more tasks are given, until they master the tasks of speeches presentations. Learners will then be given a task to prepare their own speeches, individually. Before presentations, they will be given opportunities to rehearse. Firstly, they will submit their speeches that they wrote down (draft). I will give those comments and suggestions. In the second rehearsal they will present their speeches in class, this will be done with the purpose to increase their fluency in reading, and to remind them of speech presentation strategies such as: use of voice, facial expressions, and use of body language. Then I will ask them to make changes in their speeches where necessary. Finally they will present their speeches again with an expert observing them. The expert would give comments after the presentations. If possible the presentations should be recorded or videotaped.

From the situated learning perspective, learning is a process that does not take place in an individual mind, but it takes place in a situated learning. In the case of situated practice of speech presentation rehearsal, the teacher as an instructor and the learners constructed the changes in participation that were observed as the learners developed skills from peripheral to fuller participation. In these process learners participation was transformed through demonstration and the teacher’s participation complemented the learner’s learning.

Diabetic ketoacidosis

Introduction:

Diabetic ketoacidosis, or DKA, is one of the most serious metabolic disorders seen in both human and veterinary medicine. A severe complication of diabetes mellitus, DKA is characterized by a more concentration of blood sugar, the presence of substances called ketones in the urine, and decreased concentrations of bicarbonate in the blood. Some dogs with DKA will be less affected but the majority will be seriously ill and may have severe complications such as neurological problems due to brain swelling, acute kidney failure, pancreatitis, and anemia. DKA will lead to death in many cases, but aggressive diagnostics and treatment can be life saving.

DKA often develops in diabetes that had previously been unrecognized or untreated. Thus, it is essential to identify diabetes mellitus or the development of additional symptoms in a dog that is known to be diabetic to prevent DKA from occurring.

Clinical Signs:

Clinical signs include weight loss, lethargy, anorexia, and vomiting. Complications may include anemia, electrolyte abnormalities, neurological disorders, and acute renal failure.

Symptoms:

Some of the symptoms related to this disease are as follows;

‘ Increased thirst

‘ Loss of appetite

‘ Frequent urination

‘ Weight loss

‘ Tiredness

‘ Vomiting

Explanation:

In addition to diabetes mellitus, another most serious condition that may develop. Ketones, also called ketone bodies, are used for energy production in most body tissues. They are normally formed when fatty acids are released from fatty tissue and are transported to the liver. The liver then makes ketones from the fatty acids. Excessive production of ketones can occur in uncontrolled diabetes mellitus, and as they accumulate, ketosis, and eventually acidosis, develop. The four major factors that contribute to ketone formation in DKA are

1. insulin deficiency

2. fasting

3. dehydration, and

4. increased levels of “stress” hormones such as epinephrine, cortisol, glucagon, and growth hormone.

DKA is more common in animals with previously undiagnosed diabetes mellitus, but it can also be seen in dogs with established diabetes that are not receiving enough insulin. In these dogs, there may be an associated inflammatory or infectious disease. Other canines may develop conditions associated with insulin resistance such as hypothyroidism or Cushing’s disease. Dogs may be only mildly affected by DKA, or they may be close to death at the time of diagnosis. DKA develops at an unpredictable rate, and some diabetic dogs may be able to live fairly normal lives for several months with no treatment at all. However, once DKA develops, most dogs become seriously ill within one week.

The aggressiveness of treatment depends on how sick the dog is. While dogs with mild DKA may be successfully treated with intravenous fluids and insulin, dogs with severe manifestations of disease will need more significant intervention. Fluid therapy, potassium, bicarbonate, and phosphorus supplementation can be vitally important. Any accompanying disorders must be identified and treated specifically where possible to enhance resolution of DKA.

Complications during DKA treatment are common, and can include the development of hypoglycemia, neurological signs due to brain cell swelling, and severe electrolyte abnormalities. Anemia due to red blood cell breakdown can occur if the serum phosphorus concentration drops too low. Acute kidney failure also is possible.

DKA is one of the most serious metabolic disorders seen in both human and veterinary medicine. Many patients will die from it. However, the majority of patients can pull through a crisis successfully with aggressive diagnostics and treatment.

Diagnosis

The diagnosis of DKA is based on the clinical signs and the presence of elevated serum glucose concentrations and ketones in the urine, and reduced serum bicarbonate concentrations within the blood stream. Mild DKA is present when dogs with high serum glucose concentrations and ketones in the urine appear healthy, or have only mild clinical signs, or have mild decreases in serum bicarbonate concentration. These dogs do not require extremely aggressive treatment, and should be distinguished from dogs with severe DKA. Dogs with severe DKA have high serum glucose concentrations, ketones in the urine, extreme reductions in serum bicarbonate concentration, and often show severe signs of illness.

In addition to the serum glucose concentrations and urinalysis results, other key diagnostic procedures include measurement of venous total carbon dioxide, blood gas evaluation, and analysis of electrolytes and serum kidney values. In addition to a routine urinalysis, a urine culture should be performed on any dog with DKA, as urinary tract infections are very common complicating factors for this condition. A complete blood count, serum liver and pancreatic enzyme measurements, and cholesterol and triglyceride levels should also be obtained. X-rays of the chest and abdomen, and ideally an abdominal ultrasound, should also be used to investigate underlying or associated factors, as well as other abnormalities that might require specific treatment.

Prognosis

The prognosis for DKA is guarded. As many as five to 10 percent of humans with DKA die from this condition. Death rates for dogs may be as high as 30 to 40 percent in some environments.

Transfer:

DKA usually occurs in either dogs with diabetes that has been present but unrecognized and untreated for a long time, or in previously diagnosed diabetic dogs that have become ill with another problem or that are taking inadequate amounts of insulin

Cure:

Relatively healthy dogs with DKA can be treated with potent but regular short-acting crystalline insulin injections to help get the serum glucose levels back under control. It may take a few days for serum glucose and urine ketone levels to fall, but aggressive treatment may not be needed as long as the dog’s condition is basically stable.

Treatment of sick diabetic dogs needs to be more aggressive. Paramount to the treatment of DKA is the gradual replacement of fluid deficits, as well as the maintenance of normal fluid balance. Many dogs will seem substantially better after being treated by intravenous fluids alone. Phosphate supplementation may also be needed, since serum phosphorus concentrations can drop to dangerously low levels during the treatment of DKA leading to serious complications such as a red blood cell breakdown that results in anemia. Bicarbonate is given to help correct acid-base disturbances. Insulin also is vital in the treatment of DKA. In some situations, fluids need to be replaced quickly, while the glucose levels will need gradual adjustment.

Until safer serum glucose concentrations are obtained, most dogs with DKA are treated first with regular crystalline insulin, the most potent and shortest acting form of insulin, which may be given intravenously or on an hourly basis in the muscle. If the dog is not eating on its own, dextrose may be added to the fluids to keep the serum glucose level from dropping too low after insulin is started.

Concurrent illnesses must be identified and treated specifically where possible. Pancreatitis is extremely common in DKA, but there is no specific treatment for this disorder. Bacterial infections need to be identified and treated in a timely manner. Antibiotics usually are given even if a bacterial infection has not been confirmed, due to the problems that infections cause in DKA. Acute kidney failure may also accompany DKA, and needs to be treated aggressively with fluids. Drugs may be needed to stimulate urine production if it appears inadequate.

Complications during treatment of DKA that occur most frequently include the development of hypoglycemia, central nervous system signs, electrolyte abnormalities, and anemia. The best way to prevent these side effects is to aim for gradual correction of the multiple abnormalities associated with DKA. Excessively rapid correction of glucose concentrations and electrolyte abnormalities often leads to brain cell swelling and neurological signs. Electrolyte concentrations need to be monitored very carefully during the treatment of DKA, as frequent adjustments of fluid type and rate, and the amount of potassium supplementation, are often needed. Also, close attention must be paid to the serum phosphorus concentration, as supplementation with phosphorus is often needed to prevent the development of severely low serum phosphorus concentrations and the anemia that can result from this.

Once the dog is stabilized and eating and drinking on its own, longer-acting insulin types can be initiated. In addition, the supportive measures, such as fluid therapy and medications, can be tapered, as long as no other complicating issues surface and improvement continues. Eventually, the animal should be able to go home with an insulin regime designed for at home use, as well as any other treatments necessary to address additional disorders that might be present.

Preventive measures:

There is no specific method for preventing DKA, but careful treatment and monitoring of diabetic dogs is essential. Recognition of the common signs of diabetes mellitus in a dog–increased thirst and urination, increased appetite, and weight loss–also is important so the diagnosis of uncomplicated diabetes mellitus can b

Rhetorical Analysis of Jonathan Swift's 'A Modest Proposal'

A Modest Proposal is a satirical pamphlet that examines the attitude of the rich towards the poor starving children in their society. Jonathan Swift uses a number of rhetorical devices effectively as he highlights his proposal. He uses logical fallacies, metaphors, repetition and parallelism as well as humor, sarcasm and satire tone to highlight these negative attitudes.

Jonathan swift begins by mocking and blaming the mothers of the children by telling them that they should engage or find themselves in working to earn an honest living instead of strolling to beg for alms. He also predicts tough future for these children that when they grow up they will turn to be thieves. This is simply because the parents did not train their children the modest way of life.

Swift uses logical fallacies to make his argument in ‘A Modest Proposal’. His way of argument and thinking is incorrect and lack validity in what is proposing. This is evident in this pamphlet on line 69 to 73, ‘that a young healthy Child well Nursed is at a year Old, a most 71 delicious, nourishing, and wholesome Food, whether Stewed, Roasted, 72 Baked, or Boyled, and I make no doubt that it will equally serve in a Fricasie’. He notes down that a young healthy child is a delicious food to be roasted, stewed and boiled to be served and eaten. Secondly, he has computed twenty thousand children to be reserved for breeding. This dehumanizes the children to be like animals.

Jonathan swift uses emotional appeal in his argument by proposing slaughter houses to be erected or built in suitable places and butchers to be employed to do the work of slaughtering the children. He further exaggerates by saying that the children will be roasted like pigs. Jonathan knows clearly that this proposal will affect many because no person would want his or her child to be butchered. Beyond that, Swift captures the reader’s emotion on line 34 and 35 ‘prevent those voluntary Abortions, and that horrid practice of Women 35 murdering their Bastard Children’. This is a horrific behavior that is being opposed everywhere in this world.

Another rhetorical device that Jonathan Swift use in his work is irony. He says ‘I calculate there may be about two hundred thousand couple whose wives are breeders’ and ‘how this number shall be reared and provided for’. This suggestion is ironic because he compares women to animals. Also, this creates a good argument because human beings do not breed and cannot be reared. He therefore dehumanizes human beings and creates satire in this statement.

Jonathan swift in his scheme of supporting his argument, he is sarcastic that certain body parts of a child are good to eat. He further clarifies that in certain occasion, the body parts will be on demand. He further suggests that good and healthy children will be skinned and the skin will be used to make admirable gloves for ladies and summer boots for gentlemen. This idea is ridiculous to an extent that children will not only be a delicacy, but their body parts will be used to make ornaments. Secondly, he sarcastically suggests option to Ireland to counter its economic problems. Jonathan proposes that if the poor children can be food, this will create a good revenue to the country through exporting the surplus child’s flesh to the rich outside Ireland. Thirdly, Swift computes the selling price of one child to be ten shillings. This is recorded on line 103-105 ‘I believe no gentleman would repine to give Ten Shillings for the Carcass of a good fat child, which, as I have said will make four Dishes of excellent Nutritive Meat’. He proceeds and make fun of the mothers that they will get eight shillings profit to use until they will able produce another child.

Swift applies a sympathetic tone in his proposals, especially at the beginning. In paragraph two, he is requesting for amicable and a permanent solution to help these children from deplorable state they are living. He goes ahead to award anyone who will find cheap and easy method of making these children useful by building a statue in his or her memory. Jonathan’s tone is not constant in his recording of his proposals. He later changes to scary tone as he progresses to give his personal opinions about these children. For instance, he talks of butchering these children to be made delicious food and skinning of the children to make admirable gloves for ladies and summer boots for gentlemen. This tone shocks and creates fear for the reader.

To what extent the psychiatric services can be improved in the special observation ward in a general hospital under Hospital Authority by nurse leader?: college application essay help

What is leadership about?

There are many different people defined leadership in different ways (Heacock, 2013). According to Hickman (1998), leadership aimed to induce the followers to follow and take action in order to complete the specified goals, and it can helped to show the values of the leaders and the followers and also their motivations can be showed. According to Jooste (2004), leadership is more complicated and not simply acted as a role by how to control the followers, and leaders always tried to help and teach the followers to complete the task by step by step such as planning, leading, controlling and organizing. According to Northouse (2009), leaders can have the ability to affect the followers to complete a specified goal. Rogers (2003) stated that leaders can help the followers to become more aware of the uncertainty and possible outcome about the possible changes. The above information showed that a leader must have good leadership skills in order to affect the followers about what is happening and the values to change the current conditions. It can helped the followers to have a more and better understanding of the specified goal, as a result, the followers are more willing to follow and complete the tasks smoothly.

Importance of Leadership

According to the Strategic Service Plan of the Hospital Authority (2009-2012), health care workers and the frontline staff need to increase and enhance their related skills for the raising patient’s service’s needs, the number of patients, the complexity of medical devices and more complicated medical cases. In order to solve the above problems and needs, Hospital Authority has focused on three main different aspects such as including management skills, leadership skills and clinical competence. Hospital Authority emphasis the importance of leadership and put sufficient resources such as overseas training and classroom courses in order to enhance the leadership skills to current ward mangers, nursing officer, advanced practice nurse and future leaders. According to the Hospital Authority Annual Plan (2011-2012), one of the key objectives was ‘Build People First Culture’ and the one of the priority services for 2011-2012 was to ‘Enhance professional competencies and build up effective management and leadership’.

Overview of psychiatric services in Hong Kong

According to the Hospital Authority Mental Health Service Plan for Adults (2010-2015), there was estimated 1 million to 1.7million people were having psychiatric problem in Hong Kong and about 70,000 to 200,000 people were suffering from severe psychiatric problems. And around 40,000 of them with diagnosed schizophrenia and nearly half of them were treated at out-patient setting.

According to Chui, Mui and Cheng et al. (2012), the aim for public psychiatric hospital was to minimize the psychiatric admission rates and wanted to focus on psychiatric community services such as psychiatric out-patient clinic, psychiatric community out-reach team services and the Consultation Liaison team (CLT) in public general hospital for patients who needed to have psychiatric services. Hospital Authority tried to minimize the psychiatric admission rate by implementing some services since the year 2009.

Why I chose the topic to discuss and how it is important to me and others

I chose this topic because I am working in a ward call special observation ward which strongly supported by the Consultation Liaison team (CLT) services in public general hospital for patients who needed to have psychiatric services. Some of the patients are not physically fit for transfer to psychiatric unit, some of them are patients who are transferred back from psychiatric unit for medical problem, some of them are elderly with newly diagnosed dementia with relatives cannot accept the reality even with poor social support. However, many problems such as placement problems, complaint cases, safety problem and long waiting lists for patients who needed to admit to my ward existed.

This paper will start with the introduction and my selected real case scenario in my ward (special observation ward). I will compare different leadership models such as laissez-faire leadership, transactional leadership and transformational leadership. I will discuss the leadership style of my leader in my case scenario. For the discussion part, force field analysis will be used for analysis the data and I will summarize the findings, and also, I will discuss how the situation can be more effectively with how to improve the situation. Reflective summary will be the last part of this paper with my comment.

Context

Case scenario:

I am working in a special observation ward in one of the general hospital under Hospital Authority and this ward aimed to receive patient with unstable emotion or some psychiatric problem, but they are not physically fit for transfer to psychiatric hospital or need some close observation in general hospital. There are only 24 beds available with long waiting list that patients needed a bit long time to be admitted to my ward. There are only 3 APNs, 13 RNs and 5 ward assistants to support the ward within 3 shifts with heavy workload and stress.

My ward manger wanted to improve the quality of service and reduce the long waiting time for admission. She carried out a lot of guidelines and policies for staff to follow. Some of the policies are: 1) Discuss with relatives whom patients got dementia to find a placement to reduce the length of hospital stay, 2) Team in-charge should screen out cases who can be early discharged or transfer to psychiatric hospital. 3) Writing detailed report in each patient’s record to reduce the chance of getting challenge when patient’s service department receives complaints.

One month later, 1) some relatives complained that nurses forcing them to find old age home within a short period of time and forcing patients to discharge even they were not yet prepared well. 2) Doctors felt unpleasant and complained that nurses overriding their decisions about the discharge plan as some newly upgraded nurses does not have sufficient knowledge to screen suitable cases which causing low morale and conflicts. 3) Nurses needed to spend a lot of time in writing patient’s record causing low morale because nurses always need to spend their own time after duty turnover to finished writing detailed patient’s record (usually more than one hour). Also, many junior nurses do not have sufficient knowledge about detailed and special required documentation skills which put the nurse in-charge in a very difficult position.

Analysis

I will compare different leadership styles and analyze the leadership style in this scenario. According to Hickman (1998), transactional leaders will only correct the problems or mistakes once it happened in which will threatens the leader’s management plan and no changes will be made if nothing happened. Hickman (1998) also stated that transactional leaders also avoid development and improvement as they do not have motivation to have any changes. According to Bass (1990), transactional leadership will use rewards or punishments to the followers in order to achieve the goals.

For the transformational leadership, Hickman (1998) stated that transformational leadership will try to motivate the followers to achieve the goals and needs to changes, and the morality of the followers could be higher. Transformational leader need not to use the authority or power to control the followers. According to Bass (1990), transformational leaders will acted himself/herself as role model to the followers in order to obtain trustfulness and loyalty of his followers. Besides, through mentoring and empowering, Transformational leaders also use the mentoring and empowering skills to let the followers to enhance and develop the potential power in order to complete the specified goals.

According to Gill (2011), there are no guidelines and protocols for the followers to follow for the laissez-faire leadership style. The morale of the followers may be high or low as the followers can do whatever they wanted. However, the followers will have their own style of work and therefore more easily to reach the specified goal.

However, both transactional leadership and transformational leadership will set a clear objectives and goals for their followers with clear guideline. As a result, the followers can have a better understanding of what they should do in order to achieve the goals.

The leadership style of my case scenario:

Firstly, in this scenario, the leadership style of my ward manager was autocratic leader style and she was as a transactional leader. She has the greatest powers and the highest position in order to influence all the staff including nurses, doctors and patients with their relatives. According to Bass (1990), transactional leader got the power to make the plan and ask the followers to perform that in order to achieve the specified goals with the authority power.

In this scenario, she used her power to set some guidelines and policies for the staff to follow in order to improve the quality of service and reduce the long waiting time for admission. The advantages were 1) Admission rates to special observation ward were increased from average 10 patients per days after one month time as evidenced by the admission book. 2) Patient’s Services Department sent an e-mail to department head to appreciate the detailed documentation written in patient’s record in order to minimize the investigation time to answer the complaint cases. 3) Discharge rates were increased as many elderly with placement or caring problem were directly discharged to aged home other than home. And also, the cases which were medically fit for transfer to psychiatric unit were screened out earlier. That evidences were showed in the discharge record. Although her goals were achieved, there were disadvantages such as 1) Low morale of the nurses as they have to spend a lot of time in writing documentation by using their own time. 2) Heavy workload for staff for writing detailed documentations together with the routine work. Junior staff may have difficulties in proper and special documentations and senior staff also felt fatigues by doing their own work together with teaching and supervising the junior staff. 3) Poor relationship between nurses and doctors together with the relatives. As they always said that nurses forcing early discharge of patients which leading to increase in complaints.

Discussion

Changes and Force Field Analysis

According to Carney (2000), the basic and essential skills for all nurse leaders are manage, implement and support the changing process in order to ensure the followers to adopt about the changes. If the leaders lack of the quality of leadership skills, the changing process may be not successful. Force Field Analysis (Lewin, 1951) stated that it can help to how and what were the difficulties about the followers encountered. In the year 1951, Force Field Analysis was done in order to assess the followers for how to the implement the Family-Centered Care Program from the original situation. There were some advises given to improve the leadership skills according to the analysis result of the Force Field Analysis.

Force field analysis is a model designed by Lewin on the year 1951. It is useful to determine the effectiveness of the variables included and also helped to develop some strategies to change or by intervene some of the variables. Lewin assumed that both driving and restraining forces will be occurred when there were any changes existed. Driving forces are equal to the forces in which it keeps the changes are going on continuously. And the restraining forces are equal to the forces that occurred to resist the driving forces. According to Baulcomb (2003), equilibrium can be occurred once the leader can be able to decrease the restraining forces and allow reaching to the desired status by increasing the driving forces.

From the analysis, restraining forces were 1) Poor documentation skills of new staff, 2) Poor communication skills between staff and relatives, 3) Heavy workload due to extra jobs such as teaching new staff and extra time for detailed documentations, 4) High stress from staff to choose potential early discharge patient would due to conflicts with doctors and relatives and 5) Increase in the number of complaint cases. And the pushing forces were 1) Reducing waiting time for admission, 2) increase discharge rate, 3) improve documentation skills of staff and 4) increase the quality of services.

What has been successfully done listed in the Force Field Analysis in this scenario?

1) Reduce the waiting time for admission to special observation ward.

2) Increase the discharge rates in special observation ward.

3) Increase documentation skills for some of the nurses in special observation ward. (but not all).

What has been addressed but failed to success at the beginning without changes?

1) Increase documentation skills for some of the nurses in special observation ward.

2) Reduce the rate of complaints (as increasing rate of conflicts about placement issues)

3) Improve the quality of care as the morale of nurses is low and they feel stressful with heavy workload.

After identify the restraining and pushing forces, some changes or solutions can be established in order to eliminate and minimize the negative factors to make improvement. For the stress issues, as many junior nurses needed a lot of time to handle the routine work because lack of experiences, so they needed to stay after duty off to finish the all the tasks including the detailed documentations. Senior nurses also have the responsibilities to supervise the junior nurses in which they also have to leave lately after off duty. Documentation class training can be implemented by some experienced staff to junior staff and some samples of special documentations can be shared for reference. For the discharge issues, there are communication problems and many doctors and relatives would not listen to nurse’s advice and leading to conflicts and complaints. This can helped by holding a meeting with doctors with agreement made before starting the program. And nurses can invite medical social worker and pre-discharge team if difficult to handle to placement problem in order to avoid conflicts and complaints from relatives. As a result, stress and workload can be reduced with the specified goals can also be achieved.

According to Cain and Mittman (2002), there should be promoting and supporting in changes within the health care setting, but should not greatly influence the existing situations. Conner and Patterson (1982) stated that the reason for the failed to changes were due to the lack of commitment for the followers to changes and it was important for the followers to accept and support the changes in order to success any changes.

In this scenario, although changes were necessary for improving the quality of services, but the leader did not provide adequate support, time and training before implemented the policies and protocol. As a result, the followers showed lack of energy and even felt stressful to support the changes.

Conclusion

Different leadership style such as laissez-faire leadership, transactional leadership and transformational leadership were introduced with a case scenario was shared. Force Field Analysis was used to point out the pushing and restraining forces which can help to improve the situation. There is also a discussion part to discuss the case scenario for improvement. A good leader should show the advantages to changes and to minimize the weaknesses. Regular review and support are essential and a good leader should be ready to accept feedback and suggestions.

Part2:

Reflective Summary

I am a Registered Nurse who is working in Medical Department for nearly nine years and rotated to the special observation ward under medical department for about seven years. I am the second highest appointment Registered Nurse working in this ward and always needed to perform the job as ward in-charge and mentors for new comers and student nurses. As my ward manager decided to implement the guidelines and protocols as stated in Part 1, the workload was increased and I felt very stress as I needed to choose some potential early discharge cases and presented to my ward manager and doctor-in-charge. Also, I needed to spend a lot of time to explain the importance of placement issues to the relative with caring problem during visiting hour with half of my colleagues went out for dinner time and some of them will scolded nurses for forcing patients to aged home. For the potential complaint cases, nurses involved needed to write detailed documentations in patient’s record in which sometimes involves three pages of papers to write. All of the nurses feel fatigue and stress about the new guidelines.

If I am my ward manager, I will choose to be a transformational leader. It is because transactional leadership only focuses on the goals achievement with punishment and rewards were made for the followers. Although Outhwaite (2003) stated that the transactional leaders must have their own abilities to achieve a common goal and the routine job should be done sufficiently. The followers have sufficient instructions from the transactional leader to ensure the work having done successfully and effectively. However, the moralities of the staff under transactional leadership were low as they will always tried to avoid punishment by following the standard guidelines to achieve the specified goals.

I think that transformational leadership is more suitable in nursing field because the followers can have more opportunities and freedom to involve in the decision making process. The transformational leader can allow the followers to implement some tasks with their specified abilities. It provides opportunities for the followers to learn the leadership skills and knowledge. The relationship between the leader and the followers will be better for transformational leadership.

Transformational leader always try to emphasis changes and encourage having commitments. Moreover, I believed that transformational leaders will spend more time to teach and provide coaching to the followers, as a result, the followers should be more satisfied and happier. Transformational leader will also provide the followers some training and for further development of the specified areas and helps to develop the strengths of the followers.

As all of the public hospitals are facing the problem of manpower insufficient already and the turnover rates are high due to heavy workload and poor working environment. It is not practical to implement some new guidelines without sufficient support to increase the workload of staff. If I am the leader, I will have sufficient information and suggestions before implement a new guideline or policy and I will provide adequate professional training and support to the staff in order to allow them to develop their strengths. I will also listen and allow staff to provide suggestions or advises for improvement and changes because the morality will be higher if the staff having the chance for involvement.

To improve my leadership skill, I will use a reflective diary to written down some special events which are happened in my ward together with the advantages and the disadvantages of the leadership style of my ward manager in order to have further improvement or what is good for learning. It can help me to summarize all the events and make an evaluation to be a role model before I can promote to Advanced Practice Nurse. Also, I can seek the approval of my ward manager to set some projects such as the topic ‘Documentation’ by using transformational leadership style to test the effect of performing projects and it can helped to observe the response of the followers for me for further development.

I will set a three to twelve months leadership developmental plan in special observation ward -by SMART. The SMART Objectives of the project as set below:

1) To implement a documentation training course for all of the nurses working in the special observation ward to enhance the documentation skills and special documentation style especially for the patients in special observation ward. For 100% of nurses working in special observation ward have the chance to join the training course within six months time.

2) To implement a communication skills training course for all of the nurses working in the special observation ward to enhance the communication skills especially for the patients and their relatives in special observation ward. For 100% of nurses working in special observation ward have the chance to join the training course within twelve months time.

3) To increase the morale of the colleagues in my ward by receiving feedback of the new guideline to allow their involvement to improve the services within three months time.

Manhole Rehabilitation

Manholes are underground loads assembled to give man- entry access for the maintenance of sewer and channel lines, water valves, metering gear, and so forth. They are liable to disintegration from ground water interruption, corrosion from fluids and gases and general decay from age.

With the introduction of successful manhole repair advancements, the imperfections and issues in sewer vents are getting into attention. During the pipelining process, the leaks are redirected to the manhole creation. It leads to the big infrastructure damage. So, it needs to be fixed in the early stage to lessen the hassle.

Manhole rehabilitation has become common. It costs less to rehab manholes that to replace them. It has become an important approach in the trenchless sector. Our keyword city state experts assist you in manhole inflow issues, restoring the structures etc. Manhole Rehabilitation is a service focused at repairing the damaged manholes rather than replacing them. Handling the manhole issue on your own is impossible. You need to call a reputable full-time servicing company to involve in keyword city staterather than replacement at competitive prices.

At Metro inspection, we offer major manhole rehabilitation services:

‘ Epoxy manhole rehabilitation

‘ Chemical grouting

‘ Tunnel and cementious Rehabilitation

‘ Manhole plugging solutions

‘ Manhole vacuum testing

‘ Fiberglass insertion

‘ Mortar Sealing

‘ Manhole casting rehabilitation

‘ Manhole chimney sealing

A manhole basically is the biggest source of infiltration in the sewer system. It is the manhole rehabilitation procedure which can stop the infiltration and stop the corrosion. Latest technologies are used by our keyword city state specialists to restore the manhole structural integrity. They indulge in proper inspection options and then repair the infiltration sources to rehabilitate the manhole perfectly at the best costs. Our well-trained contractors use timesaving latest trenchless methods to respond quickly. A lot of benefits are associated with our manhole rehabilitation services. It is beneficial to repair the existing manhole without involving any extra maintenance cost.

No matter whether you need commercial sewer services or residential services related to keyword in city state, our contractors are here to get the job done quickly within your budget. With the advanced rehabilitation methods, we are in a position to offer you the best manhole solutions at reduced cost. If you are looking for a reputable service company in city state, you can contact us. Our keyword city state engineers will offer you the accurate services for manhole repair. We perform complete manholes’ repair instead of replacing them. Metro Inspection Inc has capability to find the manholes even if they are hidden. We use modern technology to rehabilitate the existing manholes in an effective manner. We are full-time servicing company to meet your requirements for municipal and industrial sewer line services. Our experts have experience to deal with residential as well as commercial keyword city state services.

We focus on fixing the following issues:

‘ Street restoration costs and problems with poor compaction

‘ Noise and the dragging of dirt into businesses and homes

‘ System Capabilities

‘ Structural restoration of deteriorated manholes

‘ Standard concentric manholes

‘ Eccentric cone sections

‘ Traffic tie-ups and detours

‘ Disruption of service to the community

‘ Disruption of other utilities in the path of excavation

There are a lot of methods used by the companies to fix the existing manholes. But we offer solutions using the latest patented technology i.e. Perma-Liner. Our perma-liner is uniquely designed to fit all the manholes to tackle with the problem in a perfect manner.

As our contractors have years of experience, they are capable of addressing the infiltration issues in manholes and ready to work within your affordability. We are expertise in repairing your old manholes using advanced repair technology. It will enhance the manhole’s life and add worth to manhole structure.

In order to get the trouble free manhole rehabilitation solutions, lessen your burden by availing our trouble-free services. As a reputable and reliable servicing firm, we serve contractors, homeowners, business owners and government across city state. Our team is trust-worthy and committed to deliver best solutions for manhole fixation. We help you to improvement the age of your infrastructure.

What you think? Is manhole rehabilitation an easy task? It is often a much complex task and for this, you need a genuine and friendly team to tackle with the manhole problems.

WHY METRO INSPECTION SERVICES’? Pocket friendly solutions

‘ Quick response

‘ Highly experienced staff

‘ Reliable solutions

‘ Low insurance costs

‘ Environment friendly technology

Your manhole repair services will always be tailored exactly to your specific situation. We’ll take into account your substrate condition as well as application conditions, including dust, water, and small spaces. Materials can also be suited for your needs:

‘ Adhesion

‘ Abrasion

‘ Chemical resistance

Choose us for long lasting manhole rehabilitation. Our skilled keyword city state technicians will assist you with the quality services to solve your problem in a hassle free manner. Metro Inspection offers pipeline inspection, trenchless sewer repair, sewer cleaning, drain cleaning, hydro excavation, manhole rehabilitation etc through knowledgeable experts. Our company uses the top quality repair products to perform the manhole repair. Our main emphasis is on the use of “no-dig” methods that are now in demand by majority of customers.

At Metro Inspection, we understand your need and offer flexible services accordingly. We are available at your doorstep even in any emergency. Our fully insured firm is capable of handling the manhole defects without involving any extra costs. We strive hard to make our clients satisfied by proving the right solutions at the right time. Our customers’ satisfaction is our top priority. So, we work according to the requirements and budget of our clients to keep them happy.

What we do’

Our comprehensive keyword in city state experts are user friendly, environment friendly and cost friendly. Our skilled contractors first, locate the manhole for cracking and corrosion repair. Then, we use our patented latest manhole repair methods to improve the life of the existing manhole. We even fix the small manhole problems so as to stop them to turn to big ones.

It’s the right time to avail the manhole repair services at affordable cost to save time and trouble!

Decentralisation: college essay help online

Over the past two decades a wave of decentralization to the local political bodies has been noticed all over the world. (Martinez-Vazquez, May 2007, p. 1) These worldwide trend towards decentralization is welcomed by the academicians and experts as a positive sign for democratic transformation and the process can be perceived in two fundamental observations,:’First, decentralization is most often associated with an increase in local autonomy. Second, the connotations and values attached to decentralization and local autonomy are almost exclusively positive.’ (Beer-T??th, 2009, p. 29)However, it is observed in most of the cases that political or administrative transfers of power were not followed by proper empowerment in fiscal affairs. Low fiscal autonomy has been a major policy problem in the decentralization process at local level both in developed and developing nations. Central control and supervision of local affairs also found to be a major obstacle in the trends of governing local governments around the world. Lack of fiscal autonomy is closely related to ensuring accountability and transparency for the local government bodies. For better governance at local level, it is urged that more emphasis should be given to local level fiscal decentralization so that local governments can have a certain level of financial resources to organize their internal affairs and ensure peoples empowerment at local level .This paper is designed to examine the major issues and concerns related to fiscal autonomy, accountability mechanism and decentralization at local level around the world and connect those issues to broder governance paradigm and find out the major challenges to advance democratic practices at local level. The paper will try to give an overall view of the trends of local level governance practices in both developed and developing world and will try to bring under a comparative lens of all the concurrent issues and challenges related to local level governances financing.

A) Financing by Central Government: central control and the question of autonomy

Dependence on central government in fiscal affairs is a worldwide trend in local government financing. Intergovernmental transfers are the important sources of local government financing around the world. It is thought that these government transfers have political dimensions as most of such kinds of transfers are designed from center with political motives. Therefore, it is important to assess the role of center government in financing local bodies around the world. In this part, the global trends of intergovernmental transfers, imbalance between center and local and its political dimensions around the world will be discussed and analyzed with the purpose to comprehend the magnitude of central government transfers to local government around the world.

1. Intergovernmental transfers for financing local governments

Intergovernmental transfers are the main source of local governmental finance around the world.

The transfers are especially important for developing nations because local government taxing powers are very limited in most of the developing world. In fact, many different types of transfers are in use around the world and it is difficult to settle on a best practice (Roy, 2008, p. 30). It is urged to reduce the flow of government grants to local governments and increase the scope of local taxation and resource mobilization. In fact, the share of government grants in local government budgeting is recognized as an indicator for financial autonomy at local level (Daniel Bergvall & Merk, 2006, p. 4) and bridging the gap between revenues and expenditures remain the main challenge for the effective execution of decentralization and democratic transformation. However, there is yet any consensus whether those transfers promote efficiency or misallocate resources at local level. In one view, lack of adequate resource transfers to local governments creates difficulties to finance their expenditure responsibilities, while in other view; overdependence of central grants can undermine local accountability. According to one analyst over-dependence can created perverse incentives at the local level to misallocate public resources in federal system. (Khemani, July 24,2001, pp. 5-6)

2. Political dimension of financial decentralization

Local autonomy is a fundamental base for making democracy work, and is often referred to as a ‘school in democracy.’ (Shimizutani, 2010, p. 99) People’s participation should come from the roots and decentralized and autonomous local body can equip the people at local level to promote democratic procedures .Nevertheless, it can backfire from its own strength. Decentralization which is believed to break down the asymmetric relationship of clientelism at local level can create a new type of clientical political practices in real world (Garc??a-Guadilla & P??rez, 2002, p. 104). Indeed, in many cases, decentralization simply empowers local elites to capture a larger share of public resources, often at the expense of the poor (Johnson, Deshingkar, & Start, 2005, p. 937). Recentralization process also can be noticed for political reasons. Nicholas Awortwi examines the administrative reform policy of Ghana and Uganda; and showed that recentralization and further weakening of LGs are likely to continue in both countries because the initial path that was created benefited politicians and bureaucrats and they are committed to staying on that course. (Awortwi, 2011) Political calculation is always a major factor in any policy setting. Even, in Developed world, like UK, political trend of targeting local government fund can be identified. (John & Ward, 2001).Central-periphery financial relations in different countries always evolved differently in different political perspective. Moreover, developing countries often reach their decision about intergovernmental transfers for political reasons as well. (Roy, 2008, p. 33) Bahl Roy explained the politics behind the intergovernmental transfers in three categories:

i. The Central authority likes to provide local governments with intergovernmental transfers that carry stringent conditions to bypass the decentralization demand.

ii. A reason for advocating intergovernmental transfers by central government is the goal of enforcing uniformity in the provision of public services.

iii. A transfer system may be put in place as part of a political strategy to hold open the option of offloading the budget deficit on to subnational governments (for example, underfunding a grant program). (Roy, 2008, pp. 33-34)

Thought, it is thought that there are political calculations behind the sanctions of government grants, it is the dominating trends in both developed and developing world and the trend of Intergovernmental transfers is likely to continue.

3) Financial Gap between local and central governance

Countries, both developed and developing, transfer funds to equip the local governments for providing services and generate development at local level .However; Developing and transition countries are characterized by wide disparities among regions in economic well-being. (Roy, 2008, p. 31) Nevertheless, vertical imbalance existed between centre and periphery is a common symptom of fiscal imbalance of developing nations which is believed to treat with taking policies of financial empowerment. An analyst emphasized the solution to adopt equalization measures of inter-regional differences in financial capacities and it can be accomplished by providing intergovernmental transfers. (Roy, 2008, p. 31) In a study of 9 major developed and developing countries , it is suggested to adopt more equalization formula to face the disparity problem. (Ma, 1997)Roy Bahl identified a reason behind transfers (subnational) is to offset externalities so that local governments can make their own decision and may underspend on services where there are substantial external benefits (Roy., 2000, p. 3). It is also argued by Roy that reducing administrative cost of taxing may be another cause to collect tax by central authority and then the central government transfers grants to local level. (Roy., 2000, p. 4)

In OECD countries 34.4 percents of revenues come from transfers. (Shah & Shah, 2006, p. 37). In a study of OECD countries , a growing trend of widening gap between sub-national tax and expenditure shares in the last twenty years is identified (Daniel Bergvall & Merk, 2006, p. 5)which caused a higher dependence of sub-national governments on grants. So fiscal decentralization in OECD countries, in fact, shrink the scope of fiscal autonomy as sub-national governments have become more dependent on central governments for their resources. Intergovernmental transfer from centre to state governments in USA constitutes a larger part of state budgeting. These transfers accounted for about 38% of all local government revenues, ranging from a low of 19.2% in Hawaii to a high of 70.2% in Vermont (Wildasin, 2009, p. 7).In developing countries, the dependence of fiscal transfers is more instrumental. Intergovernmental fiscal transfers finance about 60 percent of subnational expenditures in developing and transition economies. (Shah. A. , 2007, p. 1) In a study of World Bank on some selected countries, it is found that the average funding of local governments by government transfer is 50.9 percent. (Shah & Shah, 2006, p. 37)It is found that the fiscal transfers are much larger than average in Uganda (85.4 percent), Poland (76.0 percent), China (67.0 percent), Brazil (65.4 percent), and Indonesia (62.0 percent). (Shah & Shah, 2006, p. 37) It is also noticed in AND report that significant vertical fiscal imbalances prevails in Bangladesh, India, and Pakistan, and at the local level in the Philippines, the PRC, and Viet Nam. (Martinez-Vasquez, 2011, p. 5)In case of revenue autonomy, lower autonomy can be found as a common practice in many countries. Revenue autonomy is found low outside Japan and the Republic of Korea, and much less in Indonesia and the Philippines. However, autonomy at provincial level can be traced in India, Pakistan, and the PRC. (Martinez-Vasquez, 2011, p. 5)

4) Fiscal autonomy and the question of public service delivery of Local Government

Decentralization is recognized as a way to bring people closer to government services and also as a feedback mechanism to response the local people needs. This move reflects public preferences for more democratic and participatory forms of government in order to improve the level of public services to respond to the needs of users of those services. (Sayuri, 2005) Though the notion of fiscal autonomy is central in fiscal decentralization literature; the idea of fiscal autonomy did not get proper academic investigation at the beginning. The local autonomy concept can be traced from Tibeout model of 1956 as an arrangement for local competition. Probably the earliest attempt was from Clark who described autonomy as a relative concept with two specific powers: power of initiations and power of immunity. (Beer-T??th, 2009, p. 31) Early theorization was mostly involved to deal with the question of the capacity of local government following Clark and then later literatures incorporate other issues including local government autonomy. The European Charter of Local Self-Government taken by the Council of Europe in 1985 described local self-government (i.e. local autonomy) along the double characteristics of right and ability to manage local public affairs. (Beer-T??th, 2009, p. 36) Therefore, it is obvious that fiscal empowerment is an important part of decentralization and without it, the goal of effectively providing services from local level cannot be achieved.

Though a wave of decentralization is recorded around the globe in the last two decades, the decentralization of local bodies did not supported by proper autonomy in fiscal affairs. Low expenditure autonomy due to the central supervision lacks the local government to introduce or keep services by their own. A study on the local government finance of some OECD countries found that the most common way of transferring resources from central to subnational government is through earmark grants and these grants are used for the purpose of financing and subdivision of services and for equalization of tax or service capacity (Daniel Bergvall & Merk, 2006) The study affirmed that non-earmark grant can be more effective instrument for financial purposes. On the other hand, a study on fiscal decentralization of Asian countries found that many Asian countries exhibits the highest level of decentralization in the world in term of the share of subnational government in total expenditures. (Martinez-Vasquez, 2011, p. 3) It is showed in the report that 70% of total expenditure is allocated at subnational level in PRC, 66% in India, 60% in japan,45% both in republic of Korea and Vietnam. However, this data in many cases failed to interpret the actual level of autonomy at local level. Throughout the entire region, heavy reliance and dependence on transfers and revenue sharing can be found. Lower tier governments in most Indian states have a very little expenditure autonomy from their state governments. (Martinez-Vasquez, 2011, p. 3) It is also noticed that central government in many countries involved in local functions as well. Expenditure autonomy (percentage of own expenditure under effective control of sub-national governments), is on average higher (74% for all but 96% in Croatia, and 7% in Albania) in transition economies than developing countries (58% for all but 95% for Dominican Republic and 23% for South Africa. (Shah. A. , 2004, p. 17)

B) Financing by own: three major sources for local financing

There are different means of financing local needs by own resources of local governments. Three sources from which local level bodies mostly rely on are local level taxation, local government Borrowing and Public private partnership which have significant importance to enforce local financing.

1. Local level Taxation: empowered by own sources

Taxes are the most important sources of the local government revenues. Financial decentralization process provides the Local governments institutions with the necessary authority to change tax rate, initiate new tax and enhance the scope of the tax. It is thought that fiscal decentralization will increase taxation net and a greater share of GDP will be reached by tax system. Indeed, it is believed that increased subnational revenue mobilization will reduce the need for intergovernmental transfers from central revenues (Bird & Bahl, 2008, p. 4).

Significant tax assignment to subnational governments has become prevalent in developed countries (Bird R. , November 2010, p. 1). Bird & Bahl examines different country cases and identified the trend of developed world. (Bird & Bahl, 2008, p. 6)US State governments and Canadian provinces have almost complete autonomy in choosing any tax base, so long as there is no interference with interstate commerce. In Denmark and Sweden, local taxes account for nearly one-half of local government spending. Revenues from subnational government taxes in Switzerland are greater in amount than revenues received from grants. Though, Japan had a conservative tax policy which allow little to local government in term of taxing capabilities but the country is planning to introduce new intergovernmental reform to shift taxing power significantly to local governments (Bird & Bahl, 2008, p. 6) However, it is noticed that in most developing countries, central governments have been reluctant to reform the taxing system for subnational governments. (Bird & Bahl, 2008, p. 7) The subnational tax share in total taxes in developing countries is only about 10 percent while it is 20 percent in industrialized countries. These figures have changed little in the last 30 years. (Bird & Bahl, 2008, p. 7) Local governments in countries like Cambodia, China and Vietnam get less than 5 percent of their total revenues from their own sources (Talierciao, 2005, pp. 107-128) On the other hand, in a few developing countries, like the Philippines, Brazil, and Colombia, a third or more of subnational government expenditure is met up by own sources (Bird & Bahl, 2008, p. 7)

It is thought that increased fiscal autonomy would improve the efficiency and responsiveness of the public sector governance. (Fjeldstad & Semboja, 2000, p. 28) However, strengthening autonomy by providing more taxation power to local government can cause greater mismanagement and corruption in local authorities. In developing country like Tanzania where Local taxes represent less than 6 per cent of total national tax revenues (Fjeldstad & Semboja, 2000, p. 7), it is strongly recommended to restructure the revenue system combined with capacity building and improved integrity mechanism. In case of India, it is noticed that decentralization of fiscal power to local Panchayat Body eventually decreases the volume of taxes and also shrink the tax base. The chiefs of the Panchayats always count the elections factors which is one of the cause of declining taxes. So it is recommended to undertake more accountability measures and provide intensives in tax collection of the Panchayat. (Jha, Kang, & Nagarajan, 2011) Therefore, in case of tax autonomy, it can be assumed that capacity building and ensuring accountability and transparency are crucial while transferring power to local authority.

A major part of local revenues is collected from property taxes around the world. OECD countries raise 54 percent of local revenues from property taxes, 23 percent from personal income taxes, 14 percent from corporate taxes, and 9 percent from other taxes. (Shah & Shah, 2006, pp. 37-39) Therefore, it is apparent that local governments in OECD countries depend more on property and income taxes than other sources. But developing word lacks proper tax autonomy because of the unwilling political elites and capacity problems. For all developing countries, revenues from property taxes constitute only 0.5percent of GDP which is about 2 percent (1 to 3 percent) of GDP in industrial countries. (Shah & Shah, 2006, p. 39) Therefore, property taxes may represent significant untapped potential for funding local affairs in developing countries.

2. Local government borrowing: Challenges and promises

Unavailability of government grants and Lack of local funding sometimes compelled local governments to take loans from public and private sectors. Local government bodies usually collects loans from banking sector ( both national and international development program loans) or issued bonds. (Bucic & others, 2011, p. 2) Developments projects are designed with such type of borrowing options for emergency situation. Large infrastructure deficiencies in developing countries call for significant access to borrowing by local governments. (Shah & Shah, 2006, p. 40) Local access to credit requires well-functioning financial markets and creditworthy local governments; however, in most of the local governments in developing countries lacks both. (Shah & Shah, 2006, p. 40) Heavy reliance on borrowing also can jeopardize macroeconomic stabilization. For example, perversely structured intergovernmental systems destabilized the economy of Argentina in the late 1990s. (Yilmaz, Beris, & Serrano-Berthet, 2008, p. 281) After the 90es Japan took some initiatives to empower local governments by issuing bonds with guarantees, uniform issuing conditions, and secured finance from public funds to meet up the gap between revenues and expenditure. But it was proven ineffective and unproductive in most of the cases and it is suggested to adopt accrual-based accounting system instead of cash-based accounting system. (Sayuri, 2005)Most countries follow the policy to limit, control, or even prohibit the issuance of debt by local governments. A World Bank study report found none of the local governments of ten country’s health and education sectors that are surveyed in the study was given full discretion to borrow. However, it is noticed in the study that local governments in Burkina Faso, Ethiopia, Kerala, Philippines, Rwanda, Tanzania and Uganda, have partial authority over borrowing. (Bank, 2009, p. 55)

3. Public Private Partnership (PPP): A New Window of local Financing

Public-Private Partnerships (PPP’s) have been hailed as the latest institutional form of co-operation between the public sector and the private sector. (Greve & Ejersbo, 2002, p. 1) If local government enjoys necessary autonomy from central government, PPP can be used as effective instrument to respond to the local demand without looking funding from central government. For example, Mandaluyung city of the Philippines build a new Market place using the PPP formula which had lacking of fund at that time. But PPP has some instrumental risks concerning the possibilities of misuse of power, corruption and transparency. The Danish local government of Farum in Denmark was considered as one of the success story of PPP at local level governance in 90s.But later, a huge scandal of corruption and irregularities were erupted in the organization in 2002. Clash between central government and lack of democratic accountability mechanism were thought to be responsible for the failure of the local governance. (Greve & Ejersbo, 2002) In an article on the PPP taken by Morogoro municipality in Tanzania, Lameck analyzed various PPP project by the city and urged that there should be a framework of rule and regulation to undertake such practice; otherwise Government will lose control over the whole procedure. (Lameck, 2009).As private organizations are more profit oriented, the local governments should be more careful about the accountability and responsiveness of the project. John Hood and N Mcgarvey showed that the local Government PPP initiatives taken by Labour Government in Scotland lack proper risk management procedures which might jeopardize the whole arrangement. (Hood & Mcgarvey, 2002)

C) Corruption, accountability and Fiscal decentralization

Decentralization of fiscal affairs is thought to be a panacea for corruption and to promote accountability and transparency at local level. However, it has some significant policy risks as it can open up new windows of nepotism, corruption and mismanagement.

1. Does fiscal decentralization combat corruptions?

It is assumed that fiscal devolution to local governments creates space to bring the services to the people and installs a way of trustworthiness which can decrease the culture of corruption practice. A flow of increasing intergovernmental and political competition installed by decentralization can reduce rent seeking and monopolistic behavior and improve service deliveries. (Fisman & Gatti, 2002) But there is huge debate on the effectiveness of fiscal reforms to bring accountability and transparency by installing decentralized structure. Some researchers have an optimistic assessment on the effect of decentralization of fiscal affairs on corruption while some other explained decentralization as a way of corruption. Treisman argued that decentralized government creates many levels of governments and a more complex system of governance reduce accountability and increase corruption. (Treisman, 2000) Prud’homme stated that there is more opportunity for corruption at local level as local bureaucrats have more powers to execute and they are influenced by the local interest groups. (Prud’homme, 1995) Goldsmith argued that it is easy to hide corruption in local level than center level. (Goldsmith, 1999) But most other studies found a negative relationship between the two variables. An exclusive study on 24 countries in the time frame of 1995-2007 found that fiscal decentralization has a positive impact in reducing corruption. (Padovano, Fiorino, & Galli, 2011) In another rigorous study of 182 countries, it is founded that decentralization and corruption has a negative relationship. (Ivanyna & Shah, 2010)

In Malawi, a move to decentralize the local government body in 2000 following the act of 1998 opened up a huge window of corruption in the country. (Tambulasi & Kayuni, 2007) After the fiscal reform and devolution of fiscal power to local bodies, the new-patrimonial leadership became reinforced exploiting the opportunities which eventually broke down the accountability system. (Tambulasi & Kayuni, 2007) Tambulasi in another article expressed the view that adaptation of new public management strategy is the policy problem of the whole process and suggested to take public governance reform model with more participation and transparency. (Tambulasi R. I., 2009) Some argues that using bribery as an indicator of corruption is problematic and other social and economic indicators should be examined. (Bardhan & Mookherjee, 2005) He summarized that the relation between corruption and decentralization is very complex as a lot of variable is involved in the process and single one approach is not enough to unveil the underlying relationship. He also mentioned that the problem of capture and lack of accountabilities are the major obstacles in developing countries. Robert Klitgaard (1988) explained the principle’agent theory and argued that monopoly and discretion can exacerbate corruption while accountability has a reducing effect. (Witz, 2011, p. 5)A report on the corruption of Local governments in Latin American countries also suggested taking legal and institutional reforms to combat the problem. (Bliss & Deshazo, 2009) The Report emphasizes on the availabilities of information and urged for performance management efforts to be undertaken. (Bliss & Deshazo, 2009, pp. 14-15) Nina Witz in a paper showed that accountability in local level water governments is relatively higher than central government in Sweden and described decentralization as an antidote of corruption. (Witz, 2011)Arikan also found evidence that decentralization can lower the level of corruption. (Arikan, 2004) .Furthermore, fiscal decentralization believed to have positive impact on the citizen behaviors regarding the corruption issues and can boost social capital by increasing trust among the citizens to the government officials and bring the government closer to the people. Oguzhan Dincer found a positive correlation between fiscal decentralization and trust using data from US states. (Dincer, 2010) Following the seminal work of Putnam, a good number of empirical studies found a positive impact of social capital on the economic growth of a country and it is suggested to follow fiscal decentralization as a policy to increase social capital and trust in both developing and developed countries. (Dincer, 2010, p. 189). In case of Zambezia of Mozambique, Akiko Abe found that Social trust (one dimension of social capital) was formed in a shorter period of time than Putnam has outlined. (Abe, 2009, p. 77)

2. Risks of Local fiscal Autonomy and accountability mechanism

Financial devolution of power is thought to empower the local leadership and provides accountability and transparency to the whole settings. However, providing financial autonomy at local level has some potential risks. Fiscal decentralization depends on the ability of local governments to manage revenues and expenditures effectively and requires strong institutions for financial accountability. (Yilmaz, Beris, & Serrano-Berthet, 2008, p. 23) Financial accountability seeks transparency in the management of public funds. It also requires that governments manage finances prudently and ensure integrity in their financial reporting, control, budgeting and performance systems. (Sahgal & Chakrapani., 2000., p. 3) In an article, Serdar Yilmaz, Yakup Beris and Rodrigo Serrano-Berthet explained two methods of downward accountability (Public accountability approaches and Social accountability approaches) of local financial organization along with other methods .They examined different experiences of financial autonomy and accountability from different countries and identified different issues arising from the lack of internal controls. (Yilmaz, Beris, & Serrano-Berthet, 2008) They showed that many nations impose central control over local governments as a policy to restructure subnational relations observing the capacity problem of local governments around the world. They suggest not taking only upward accountability mechanism which may limit local government autonomy in decision-making and service delivery negating the intended empowering of local governments. (Yilmaz, Beris, & Serrano-Berthet, 2008, p. 26) Yilmaz and Felicio examined the decentralization and low accountability problems of Angola and urged for a checked and balanced policy to cope with the tendency of abusing of discretion power. (Yilmaz & Felicio, 2009) Though citizen participation is ensured at local level there, Provincial and Municipal administrators did not genuinely embrace the spirit of the citizen councils. It is suggested to incorporate appropriate advocacy efforts to ensure quality participation processes at the municipal and provincial levels and emphasis on strengthening civil society’s skills that will incrementally increase accountabilities in public expenditure management activities and will ensure proper oversight. (Yilmaz & Felicio, 2009, p. 21)In Ethiopia, it is noticed that progressive features of fiscal decentralization were not followed by political management. A strong upward accountability structure without the accompanying discretion and downward accountability mechanism was the main feature of the system which failed to ensure the accountable nature of organization. (Yilmaz & Venugopal, 2008, pp. 23-24) It is evident from different experiences that a combination of upward and downward accountability arrangement and a participatory nature of governance only can ensure democracy, better management and transparency at local level. Anwar Shah, in an article, urged for judicial accountability measures in developing countries where laws on property rights, corporate legal ownership and control, bankruptcy, and financial accounting and control are not fully developed. (Shah. A. , 2004, p. 34) He also emphasis on traditional channels of accountability such as audit, inspection and control functions should be strengthened, since they tend to be quite weak in transition and developing economies. (Shah. A. , 2004, p. 34)

3. Participatory local budgeting for more accountability and transparency

Budgeting at local level is a significant instrument for the fiscal health of a local body. Traditional municipal budgets which is in fact, focused with incremental line-item budgeting practice, have historically been constructed on giving emphasis on accounting staffs to face the audit requirements and it said by one analyst mentioned that it is aimed to the audited financial statements required to be submitted by municipal authorities after the fiscal year. (Schaeffer & SerdarYilmaz, 2007, p. 8)Over the last two decade, it is observed that different reform measures have been taken incorporated with the traditional budgeting to ensure more transparency and accountabilities. Program budgeting at local level brought different planning and accountability measures differing from the traditional line-item approach in preparing, reviewing, and presenting the budget. In recent changed global world, participatory local budgeting becomes a powerful good governance tool to integrate citizens in government’s matters. Participatory budgeting is considered as a direct-democracy approach to budgeting and by enhancing transparency and accountability participatory budgeting can help reduce government inefficiency and curb clientelism, patronage, and corruption. (Shah, Overview, 2007, p. 1) However, Participatory budgeting has some significant risks. Participatory processes can be captured by interest groups. Such processes can mask the undemocratic, exclusive, or elite nature of public decision making, giving the appearance of broader participation and inclusive governance while using public funds to advance the interests of powerful elites. (Shah, Overview, 2007, pp. 1-2)

4. E-Governance for strengthening decentralization

The potential of e-government in advancing good governance is increasingly being recognized. (Bank., 2004) E-governance is identified as an efficient tool to generate transparency and ensure accountability in government procedures. Moreover, one of the strength of e-governance is that it is cost effective. E-procurement creates a highly competence and transparent environment of procurement and a faster method of getting quotes which can narrow the scope of corruption and also reduce the cost as well. E-procurement can even cut 50 % municipalities public procurement cost. In this backdrop, it is highly recommended to induce electronic methods in government procurement and other administrative procedures for transparency and ensure easy access of the citizens.

World Bank funded some pilot cases in developing world (some state in India) and found a positive result in widely used services, such as issuance of licenses and certificates and collection of payments and taxes (Bank., 2004). One of the strength of e-governance is that it provides transparency which acts as a viable tool against corruption. For example, Karnataka State of India digitalized the transfer system of teachers and it eventually reduced the scope of corruption in the transfer process. (Bank., 2004) In Andra Pradesh of India, the e-governance strive faced lot of difficulties due to manage huge information of complex administration which is related to a vast population. Reengineering and changing work processes across 70 departments in the secretariat have been a challenge even for the country’s largest information technology company, which is implementing the project. (Bank., 2004) Most e-governance project requires huge funding to automation the whole system and also huge population in developing countries are outside the internet facilities. In a report on African prospect to introduce e-governance, it is identified that adequate funding and low rate of literacy and PC penetration rate are the challenges to update the whole system under e-governance. (Kitaw, 2006, p. 8) Another study of six African southern countries (Ghana, Kenya, Tanzania, Namibia, South Africa and Swaziland) examined e-Readiness conditions and suggested to initiate more capacity building measures to strengthen the procedures. (Meyaki, 2010)Digital divide is a big challenge to integrate all the people in a more citizen centric structure of e-governance. Growing mobile networks around the world and also in developing countries can be easily recognized and m-Governance (providing services though mobile phones) can be an option to fight the digital divide. Integrating fiscal measures in local affairs can ensure accountability and transparency at local level as well. Kerala state of India initiated m-governance by launching varies services focusing on the utilization of mobile technologies to deliver citizen services which includes electricity and water services billing, road tax and vehicle registration. (Young, 2009)

Conclusion

Strengthening Local governments by providing more autonomous power in fiscal affairs and ensuring citizen involvement is believed to empower people at local level and can bring changes from root level as local governments only know the needs from grassroots. In this paper a wide range of literatures is examined to recognize the trends and issues concerning fiscal autonomy and financial accountability mechanism at local governments around the world. Most of the local government experiences indicate positive relations between financial decentralization and better governance. In this age of globalization and Information technology revolution, a more global world with localization of governments is emerging. This trend must be supported by financial empowerment of local bodies and accountability mechanism at local level. Access to untapped revenue sources and digitalization of organization procedures has become an important tool to cope with the challenge of globalization and Information technology revolution nowadays. Bangladesh, a developing nation which has a huge population living under local government bodies and the weakness of her local government is depicted as the root cause of her dysfunctioning democracy, can be benefited from the lessons of decentralization around the world and can reevaluate her policy regarding local government and decentralization.

The emerging role of distance bounding protocol in aerospace systems: college essay help near me

Abstract: RFID (Radio Frequency Identification) systems are vulnerable to replay attacks like mafia fraud, distance fraud and terrorist fraud. The distance bounding protocol is designed as a countermeasure against these attacks. These protocols ensure that the tags are in a distant area by measuring the round-trip delays during the rapid challenge response exchange. Distance Bounding protocols are cryptographic protocols which enable verifier to establish the upper bound on the physical distance to the prover. They are based on timing the delay between the sending out a challenge bit and receiving back the corresponding response bits. A timing based response followed by consecutive timing measurement provides more optimistic approach in authenticating the prover.

Index Terms: RFID, Mafia fraud, Distance fraud, Terrorist fraud, Distance Bounding protocol.

I. INTRODUCTION

A famous story of the little girl who played against two Chess Grandmasters’ How was it possible to win one of the games? Annie-Louise played Black against Spassky. White against Fisher. Spassky moved first, and Ann-Louise just copied his move as the first move of her game against Fisher, then copied Fisher’s replay as her own reply to Spassky’s first move, and so on.

This problem exploited by Anne-Louise is known in the cryptographic community as mafia-fraud. Mafia fraud is a man in the middle attack against an authentication protocol where the adversary relays the exchanges between the verifier and prover, making them believe they directly communicate together. The mafia fraud is particularly powerful against the contactless technologies. The most threatening systems are Radio Frequency Identification (RFID) and Near Field Communication (NFC) because the devices answer to any solicitation without explicit agreement of their holder. The vulnerability of these technologies has already been illustrated by several practical attacks [10]. The two attacks related to mafia fraud are distance fraud and terrorist fraud. The distance fraud only involves a malicious prover, who cheats on his distance to the verifier. The terrorist fraud is an exotic variant of the mafia fraud where the prover is malicious and actively helps the adversary to succeed the attack.

Measuring the physical distance between communicating parties is important for communication security. For example, we can imagine a building security system that allows a visitor to open the door to the building only when the visitor has an authorized radio frequency Identification (RFID) tag for entering the building. When authenticating the tag, the security system should also verify the upper-bound distance between the door and the tag to thwart the remote attackers who may desire to open the door from a distance between communicating parties [4].

To solve the above problem, Brands and Chaum have proposed a distance-bounding protocol. In this protocol, a verifier V seeks to authenticate a prover P while measuring the distance d between V and P. For authentication, most of these protocols rely on multi-rounds of single-bit challenge and response, also known as a fast bit exchange phase. They are also lightweight in the sense that they do not require an additional (time and resources consuming) slow phase to terminate the protocol. A timing based response followed by the consecutive timing measurement provides more optimistic approach in authenticating the prover.

II. SYSTEM ARCHITECTURE

By using distance bounding protocols, a device (the verifier) can securely obtain an upper bound on its distance to another device (the prover). The security of distance-bounding protocols was so far mainly evaluated by analyzing their resilience to three types of attacks. For historical reasons, these are known as Distance Fraud, Mafia Fraud and Terrorist Fraud. In Distance Fraud attacks, a sole dishonest prover convinces the verifier that he is at a different distance than he really is. In Mafia Fraud attacks, the prover is honest, but an attacker tries to modify the distance that the verifier establishes by interfering with their communication. In Terrorist Fraud attacks, the dishonest prover colludes with another attacker that is closer to the verifier, to convince the verifier of a wrong distance to the prover. So far, it was assumed that distance bounding protocols that are resilient against these three attack types can be considered secure. In case of hostile attackers, the dishonest prover can pretend to be closer to or further away from the verifier than it actually is by either jumping the gun or sending a response before the request, or pretend to be further away than it is by delaying its response. Hostile attacker could attach its own identity to the prover’s response, and pass off honest verifier’s location as its own [1], [13].

Finally, dishonest provers can conspire to mislead the verifier, one prover lending the other prover its identity so that the second prover can make the first prover look closer than it is. The idea is that the prover first commits to a nonce using a one-way function, the verifier sends a challenge consisting of another nonce, the prover responds with the exclusive-or of its and the verifier’s nonce’s, and then follows up with the authentication information.

Fig 1: System Architecture

METAR is constructed to analyze the Weather report and cloud base height of an airplane. These details or information is passed between the verifier and prover. METAR is Meteorological elements observed at an Airport at a specific time. The verifier uses the time elapsed between sending its nonce and receiving the prover’s rapid response to compute its distance from the prover, and then verifies the authenticated response when it receives it. Through the wireless, verifier raises an authentication query to the prover side. If the prover gives an exact answer to the question means he/she is able to receive the extracted information at the end.

III. RFID TECHNOLOGY OVERVIEW

RFID frequency identification (RFID) technology consists of small inexpensive computational device with wireless communication capabilities. Currently, the main application of RFID technology is in inventory control and supply chain management fields. In these areas, RFID tags are used to tag and track the physical goods. Within this context, RFID can be considered a replacement for barcodes. RFID technology is superior to barcodes in two aspects. First, RFID tags can store information than barcodes [3]. Unlike a barcode, the RFID tag, being a computational device, can be designed to process rather than just store data. Second, barcodes communicate through an optical channel, which require the careful positioning of the reading device with no obstacles in-between [12]. RFID uses a wireless channel for communication, and can be read without line-of-sight, increasing the read efficiency.

The pervasiveness of RFID technology in our everyday lives has led to concerns over these RFID tags pose any security risk. The future applications of RFID make the security of RFID networks and communications even more important than before. The ubiquity of RFID technology has made it an important component in the Internet-of-Things (IoT), a future generation Internet that seeks to mesh the physical world together with the cyber world. RFID is used within the IoT as a means of identifying physical objects [11]. For example, by attaching an RFID tag to medication bottles, we can design an RFID network to monitor whether patients have taken their medications.

IV. DISTANCE BOUNDING PROTOCOL

Verifying the physical location of a device using an authentication protocol is an important security mechanism. Distance Bounding protocol aim to prove the proximity of two devices relative to each other. Distance bounding protocol determines an upper bound for the physical distance between two communicating parties based on the Round-Trip-Time (RTT) of cryptographic challenge response pairs. Brands and Chaum proposed a distance bounding protocol that could be used to verify a device’s proximity cryptographically. This design based on a channel where the prover can reply instantaneously to each single binary digit received from the verifier [1]. The number of challenge ‘response interactions is being determined by a chosen security parameter, Distance bounding protocol not only in the one-to-one proximity identification context but also as building blocks for secure location systems. After correct execution of the distance bounding protocol, the verifier knows that an entity having data is in the trusted network. Distance bounding protocol can be dividing in three phase: the Commitment Phase, the Fast Bit phase and signing phase.

The first DB protocol suitable for resource-constrained devices example: RFID tags. This protocol is considered lightweight in the sense that a single computation of a hash function and a call to a Pseudo Random Number Generator (PRNG) are the most costly operations required for its execution. The simplicity and efficiency of this protocol yield to similar designs for other DB protocols which modify how answers are calculated in order to improve the security performance. The protocol first contains a slow phase in which nonce are generated and exchanged [4], [7]. From this nonce and a secret value x, the possible response used in the first phase are computed via a function f. Then the fast phase consists of n consecutive rounds. In each of these rounds, the verifier picks a challenge ci, starts a timer and sends ci to the prover. When the prover receives the challenge he computes the answer ri and sends it back to the verifier as soon as possible. Upon reception of the answer, the verifier stores as well as the round trip time. Once the n rounds are elapsed, the verifier checks the validity of the answers, i.e., the n rounds, the protocol succeeds. Initialization, execution and decision steps are presented below and a general view is provided in Fig. 2.

Fig 2: Distance Bounding Protocol

Initialization. The prover (P) and the verifier (V ) agree on (a) a security parameter n, (b) a timing bound ‘tmax, (c) a pseudo random function P RF that outputs 3n bits, (d) a secret key x.

Execution. The protocol consists of a slow phase and a fast phase.

Slow Phase. P (respectively V ) randomly picks a nonce NP (respectively NV ) and sends it to V respectively P). Afterwards, P and V compute P RF (x, NP , NV ) and divide the result into three n-bit registers Q, R0 , and R1 . Both P and V create the function fQ : S ‘ {0, 1} where S is the set of all the bit-sequences of size at most n including the empty sequence. The function fQ is parameterized with the bit-sequence Q = q1 . . . qn, and it outputs 0 when the input is the empty sequence. For every non-empty bit-sequence Ci = c1 . . . ci where 1 ‘ i ‘ n, the function is defined as fQ(Ci) = Lij=1(cj ‘ qj ).

Fast Phase. In each of the n rounds, V picks a random challenge ci ‘R {0, 1}, starts a timer, and sends ci to P. Upon reception of ci , P replies with ri =Rcii ‘ fQ(Ci) where Ci = c1…ci. Once V receives ri , he stops the timer and computes the round-trip-time ‘ti .

Decis.ion. If ‘ti < ‘tmax and ri = Ri ci’ fQ(Ci) ‘ i ‘ {1, 2, …, n} then the protocol succeeds.

V. SECURITY ANALYSIS

Being resistant to both mafia and distance fraud is the primary goal of a distance bounding protocol. An important lower-bound for both frauds is (1/2) n [6], which is the probability of an adversary who answers randomly to the n verifier’s challenges during the fast phase. However, this resistance is hard to attain for lightweight DB protocols. Therefore, our aim is to design a protocol that is close to this bound for both mafia and distance frauds, without requiring costly operations and an extra final slow phase[5],[2].

A. Mafia Fraud:

A mafia fraud is an attack where an adversary defeats a distance bounding protocol using a man-in-the-middle (MITM) between the verifier and honest tag located outside the prover.

Fig 2(a): Mafia fraud

Among the DB protocols without final slow phase, those achieving the best mafia fraud resistance are round dependent. The idea is that the correct answer at the ith round should depend on the ith challenge and also on the (i-1) previous challenges.

B. Distance Fraud:

A distance fraud is an attack where a dishonest and lonely prover supports to be in the neighborhood of the verifier.

Fig 2(b): Distance Fraud

In mafia fraud, the best protocols in terms of the distance fraud are round dependent. However, round dependency by means of predefined challenges fails to properly resist to distance fraud. Intuitively [9], [7], the higher control over the challenges the prover has, the lower the resistance to distance fraud is. For this reason, our proposal allows the verifier to have full and exclusive control over the challenges.

C. Terrorist Fraud

A terrorist fraud is an attack where an adversary defeats a distance bounding protocol using a man-in-the-middle (MITM) between the reader and a dishonest tag located outside the neighborhood.

Such that the latter actively helps the adversary to maximize her attack success probability, without giving to her any advantage for future attacks. Terrorist fraud attack is not considered in our proposed system.

Fig 2(c): Terrorist Fraud

VI. PREVENTION TECHNIQUE OF ATTACKS

Different methods are used for prevention of these attacks. In the distance fraud the location will not be sufficient because the verifier does not trust the prover [5]. He wants to prevent a fraud prover claiming to be closer. Different type’s location mechanism that prevent these attacks are:

A. Measure the signal strength

Node can calculate distance from other node by sending it a message and see how long it takes to return. If response authenticated, fraud node can lie about being further away than it is, but not closer. Sender includes strength of transmitted message in message; Receiver compares received strength to compute distance.

B. Measure the Round Trip Time

Another solutions measure the round trip time. The round trip time is the time required for exchange a packet from a specific destination and back again. In this protocol the verifier sends out a challenge and starts a timer. After receiving the challenge, the prover does some elementary computations to construct the response. The response is sent back to the verifier and the timer is stopped. Multiplying this time with the propagation speed of the signal gives the distance.

C. Measure the Consecutive Time

Timing based input information followed by consecutive timing measurement provides more optimistic approach in authenticating the user. The verifier uses the time elapsed between sending its nonce and receiving the prover’s rapid response to compute its distance from the prover, and then verifies the authenticated response when it receives it. Our proposed system provides a proof breaks down concept if the prover is dishonest.

D. Validation and Identification

i. Validate the authentication information provided by the user

ii. Extract the MAC address to validate the request origin location

iii. Consecutive Execution time duration on the request processing.

VII. CIPHER BLOCK RIVEST ALGORITHM

Cipher Block Rivest Algorithm is used in our proposed system for encryption process. Fast symmetric block cipher. Same key used for encryption and decryption algorithm. Plaintext and cipher text are fixed-length bit sequences.

In cryptography, RC% is a symmetric-key block cipher notable for its simplicity. Designed by Ronald Rivest in 1994. RC stands for ‘Rivest Cipher’, or alternatively ‘Ron’s Code’ (compare RC2 and RC4). A key feature of RC5 is the use of data-dependent rotations; one of the goals of RC5 was to prompt the study and evaluation of such operations as a cryptographic primitive. RC5 also consists of a number of modular additions and exclusive OR (XOR). The general structure of the algorithm is a Fiestel-like network. The encryption and decryption routines can be specified in a few lines of code. The key schedule, however, is more complex, expanding the key using an essentially one-way function with the binary expansions of both e and the golden sources of nothing up my sleeve numbers.

The RC5 is basically denoted as RC5-w/r/b where

w = word size in bits,

r=number of rounds,

b= number of 8-bit in the key.

Cryptanalysis 12-round RC5 (with 64-bit blocks) is susceptible to a differential attack using 244 chosen plaintexts. 18-20 rounds are suggested as sufficient protection. Block Ciphers plaintext is divided into blocks of fixed length and every block is encrypted one at a time. The number of rounds can range from 0 to 255, while the key can range from 0 to 2040 bits in size [7]. Cipher text involves

C = E (PUB, E (PUA, M)

Cipher text can be generated by the encryption of public key with the private key associated in the source place. De-cipher text involves

M = D (PUA, D (PRB, C))

Actual message can be generated by public and private key followed by the consecutive timings.

BLOCK CIPHER

Defined as a cryptosystem with large plaintext space

P=C=Z2n

Typically n’64 bits

Round structure

Apply same function on the intermediate cipher text repeatedly Nr time.

Use different key Ki defined from K on ith round.

Pseudo code 1

1. INPUT: plaintext x, key K

2. OUTPUT: cipher text y=ek(x)

3. ASSUME: round function g, last function h, key scheduling procedure Ki

w0=x

For i = 0 to Nr-1

wi = g (wi-1,Ki)

y = g (wNr-1, K Nr-1)

VIII. EXPERIMENTAL AND COMPARISON

A. Error free environment

The first lightweight DB protocol was proposed by Hancke and Kuhn’s [11] in 2005. Its simplicity and suitability for resource-constrained devices have promoted the design of other DB protocols based on it [2], [13]. All these protocols share the same design: (a) there is a slow phase4 where both prover and verifier generate and exchange nonces, (b) the nonces and a keyed cryptographic hash function are used to compute the answers to be sent (resp. checked) by the prover (resp. verifier). Below, we provide the main characteristics of each of these protocols, especially the technique they use to compute the answers.

a) Mafia Fraud

Mafia Fraud

a) Tradeoff with memory constraint

Hancke and Kuhn’s protocol [11]. The answers are extracted from two n-bit registers such that any of the n 1-bit challenges determines which register should be used to answer.

Avoine and Tchamkerten’s protocol [2]. Binary trees are used to compute the prover answers: the verifier challenges define the unique path in the tree, and the prover answers are the vertex value on this path. There are several parameters impacting the memory consumption: l the number of trees and d the depth of these trees. It holds d ‘ l = n, where n is the number of rounds in the fast phase.

Trujillo-Rasua, Martin and Avoine’s protocol [12]. This protocol is similar to the previous one, except that it uses particular graphs instead of trees to compute the prover answers.

b) Distance Fraud

Mafia Fraud

b)Tradeoff without memory constraint

Kim and Avoine’s protocol [13]. This protocol, closer to the Hancke and Kuhn’s protocol [11] than [12], uses two registers to define the prover answers. An important additional feature is that the prover is able to detect a mafia fraud thanks to predefined challenges, that is, challenges known by both prover and verifier. The number of predefined challenges impacts the frauds resistance: the larger, the better the mafia fraud resistance, but the lower the resistance to distance fraud.

Mafia and distance fraud analysis in a noise free environment can be found in [12]. Fig. 3(a) and Fig. 3(b) show that the resistance to mafia fraud and distance frauds respectively for the five considered protocols in a single chart. For each of them, the configuration that maximizes its security has been chosen: this is particularly important for AT and KA2 because different configurations can be used.

In case of draw between two protocols, the one that is the less memory consuming is considered as the best protocol. Trade-off chart represents for every pair (x, y) the best protocol among the five considered ones. Fig. 4(a) shows that our protocol offers a good trade-off between resistance to mafia fraud and resistance to distance fraud, especially when high security level against distance fraud is expected. In other words, our protocol is better than the other considered protocols, except when the expected security levels for mafia fraud and distance frauds are unbalanced, which is meaningless in common scenarios.

Another interesting comparison takes into consideration the memory consumption of the protocols. Indeed, for n rounds of the fast phase, AT requires 2n+1 -1 bits of memory, which is prohibitive for most pervasive devices.

We can therefore compare protocols that require a linear memory with respect to the number of rounds n. For that, we consider a variant of AT [10], denoted n/3 trees of depth 3 instead of just one tree of depth n. The resulting trade-off chart shows that constraining the memory consumption considerably reduces the area where AT is the best protocol, but it also shows that our protocol provides the best trade-off in this scenario as well.

IX. CONCLUSION AND FUTURE WORK

The time stamp based distance bounding protocol has been introduced in this paper which provides the optimistic approach to identify the relay attack. This protocol deals with both mafia and distance frauds with less computer memory and additional computation. The analytical expressions and experimental results show that the new protocol provides best trade-off between mafia and distance fraud resistance. Such a performance is achieved based on the round dependent design where the prover is unable to guess any challenge with a probability higher than the 1/2.

For computer-intensive systems, our consecutive timed response provides significantly better throughput for a broad variety of scenarios, including the mafia fraud, distance fraud and terrorist fraud attack. The encryption and decryption can use more than one different algorithm on each round of the resistance, which provides more confidential services in the system.

REFERENCES

[1] Ronalndo Trujillo-Rasua, Benjamin Martin, and Gildas Avoine,’Disrance-bounding facing both mafia and distance frauds,’IEEE Transactions on Wireless Communications,vol 9, May 2014.

[2] Sangho Lee, Jin Seok Kim,Sung Je Hong, and Jong Kim, ‘Distance Bounding with Delayed Responses,’ IEEE Communications Letters, vol. 16, september 2012.

[3] Kapil Singh,’Security in RFID Networks and Protocols,’ International Journal of Information and Computation Technology, vol.3, pp.425-432, 2013.

[4] Ammar Alkassar,Christian Stuble,’Towards Secure IFF:Preventing Mafia Fraud Attacks,’Sirrix AG security technologies, Germany Saarland University,D-66123 Saarbrucken,Germany.

[5] Srikanth S P,Sunitha Tiwari,’A Survey on Distance Bounding Protocol for attacks and frauds in RTLS system,’International journal of Engineering and Innovative technology(IJEIT),vol.3,April 2014.

[6] J.H.Conway,’on numbers and games,’AK Peters,Ltd., 2000.

[7] Claus P.Schnorr,’Efficient signature generation by smart cards,’Journal of Cryptology, vol.4, no.3, pp. 161-174, 1991.

[8] Capkun, Srdjan and EI Defrawy,Karim and Tsudik, Gene. GDB: Group Distance Bounding Protocols, arXiv.org, 2010.

[9] S.Brands and D.Chaum, ‘Distance-bounding protocols,’in 1993 EUROCRYPT.

[10] G.Avoine, C.Lauradoux,B.Martin,How secret-sharing can defeat terrorist fraud, The 4th ACM Conference on Wireless Network Security,WiSec’11,pp.145-156.

[11] G.Avoine ‘RFID, Distance Bounding Multiple Enhancement’, progress in cryptography, pp.290- 307.

[12] J. Munilla, A.Painado, ‘Distance Bounding Ptotocol for RFID enhanced by using void challenges and analysis in noise channels’, compute 8(2008) 1227- 1232.

[13] J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In Proc. 5th International Workshop on Security Protocols, volume 1361 of LNCS, pages 91{104. Springer, 1997.

Center Parcs

Strategy

A company has to stand for something in order to have success. You need to know where it is at this certain point and where you want the company to be in the future. To reach those goals in the future you have to have a strategy and so does Center Parcs.

The mission of Center Parcs is to let the guests experience a moment of happiness in a save and stimulating place. This is being created with the help of caring employees.

Their vision is that people need a place to connect with their friends and family. Therefore Center Parcs tries to offer a place where they can enjoy the simpel but yet special things in life and give the oppurtunity to just be yourself.

In the near future Center Parcs will be building new parcs. In 2015 they hope to open Center Parcs Vienne and in 2016 Village Nature (nearby Disneyland Paris). Center Parcs is innovative in the designs of their cottages. Some new cottages for example are tree houses, eden cottages and boats.

In the longer term they want to further develop their innovative desings and renovate the already existing parcs. In this way they want to distinguish themselves from the competition, offering short holidays which can not be found anywhere else. With this they want to be an inspiration towards their guests and be an recognizable ‘brand’.

Center Parcs’ most important visitors are families with children 0-11, this group accounts for 49% of the visitors, followed by families with children 12-18 and adults 18-54 with both 21%. Given the 49% of the families with children 0-11 it is presumable that this is the target group of Center Parcs. Center Parc is with 3.1 million visitors per year the European market leader. 1.3 million visitor have a Dutch nationality, this makes them the best represented nationality. Followed by the German with 806.000 visitors. The French account for 589.000 visitor and 372.000 are Belgian. the last 12.400 visitors have other nationalities.

The three biggest competitors of Center Parcs are Landal Greenparks, Dinseyland Paris and Roompot.

Landal Greenparks advertises the nature in their parks as well as Center Parcs. Landal Greenparks also focuses on young families and they offer many activities, outdoor and indoor. The parks are located in the Netherlands, Germany and Belgium and therefore they aim for the same group geographically speaking.

Disneyland Paris has several hotels in and surrounding the attractionpark. Each hotel has his own theme and atmosphere. They offer a attractionpark with mutiple activities and focusses on extended families, with this families with smaller childern.

Roompot also has parks in the Netherlands, Germany, Belgium and France. They also offer facilities for business people. Roompot’s parks are also located in nature enviroments and they advertise with the possibilty to cycling and hiking.

They are competitors of Center Parcs because they share the same target group. They focus on young families and are geographically all located in the same locations. They offer the same facilities and Landal and Roompot are cheaper than Center Parcs. This makes them competitors of Center Parcs.

3. Structure

Every organisation needs some sort of organisational structure in order to function. An orginasational chart shows how tasks are divided between departments and individuals. At Center Parcs they work according to the line and staff organsation. The most traditional organisational structure is a line organisation. Authority and accountibilty travel downwards from the top to the bottom. There is a strong hierarchy between the department managers and the department employees. One of the function at the top of the charts is the function of General Manager, the departments at Center Parcs all have to report back to the General Manager. Center Parcs has the following departments: Safety & Pool department, Leisure department, Technical department and the Houskeeping department.

In a line-and-staff organisation there are staff departments which support the line departments. In the staff departments there are experts in specific areas who advice and inform the line management in that specific area. The overall responsibilty belongs to the line manager and the staff departments are responsible for qaulitative advice. Center Parcs has two staff departments: Human Resource department and Finance department.

As you can see in de organogram up top the top manager is the General Manager, after that follows the manager of the department, after that the floor manager of the department and at the end of the chain comes de rest of the staff in that department.

If an employee of the Kids Club faces a problem he goes to the the Floor manager of the Kids Club. If the Floor manager cannot solve this problem alone he turns to the manager of the Leisure department. The Leisure manager reports the problem to the General Manager. If the Leisure mananger needs financial advice, he can contact the Finance department. If he has a question for the Human Resource department, he can also contact them.

As a Finance Manager you fulfil a management position as well as a executive position and carrie the responsibility for business analysis and reports of the park. He manages the budget of the park and pro-actively assist the other staff of the Management Team to meet set targets and budgets. Besides the responsibilty for an appropiate administrative organisation and internal control, the Finance Manager is also the financial oracle for the entire park organisation. Moreover the Finance Manager is partly responsible for the business implementation of the park, excluding the Horece & Retail Food activities.

5. Staff

Center Parcs has 11.600 employees of which 7.000 full-time and 4.600 are in part-time or other employement. Of all those employees, 66% is female and 34% is male.

19 % of the employees is under the age of 25. Most of the employees are between the ages of 25 and 45, in fact a large 51% is. Followed by the second biggest group of people over 45 with a 21%. Which leaves 9% left for the employees over 55.

The nationality that is most represented at Center Parcs are the French with 4960 employees. Followed by the Dutch with 2965 employees. Belgium accounts for 2511 employees, Germany for 926 employees and Spain accounts for another 238 employees.

The management functions are almost equally divided with 55% male managers and 45% female manangers. The techinal part is mostly in hand of the male employees and female employees overrule the housekeeping and reception departments.

Most of the employees of Center Parcs are native speakers. Especially in the higher positions, as for example the management positions. In those positions it is also expected that you speak more different languages, such as English, German, French or Dutch. All the positions in which you have contact with the customers it is important that you are a native speaker and in some cases it might even be necessary that you speak a little of the other lanuages. In the jobs such as housekeeping and maintenance it is not necessary to be a native speaker. Those jobs can also be performed by expats, since contact with the customer is exceptional.

7. Skills

A good hospitality performance will make your guests feel welcomed in your company, in this case in the park. As a company you should do everything within your power to let your guests have the most comfortable experience. This is important in all sorts of companies but even more so for companies within the hospitality industry such as Center Parcs. They can dustinguish themselve from the other competitors by offering quality service. Guests come to enjoy their holiday and with this comes a good experience of the park. For a stay at a bungalow park a big part of this experience is created by the behavior of the staff. Therefore ‘customer service’ skills is a requirement for the staff.

A good way to accomplish this is by offering good working conditions and rewarding them to the employees to keep them motivated. The employees will emit this positivity to the customers, which hopefully results in happier customers. Another way is by offer employees a training to learn about ‘customer service’ skills and how to put them into practice.

Another important point is that if problems occur the staff needs to respond professionally, the problems needs to be solved according the situation and immediately.

Waiting times are need to be kept as short as possible and the staff needs to be on time for an appointment or meeting.

Enviromentally speaking there should always be enough and nearby parking space. The guests have to easily find their way around the property. In smaller businesses like a restaurant or caf?? this is not essential, but at Center Parcs the guests have to be able to find their way around the park, to the reception, their bungalow, the pool etc.

The company has to have a corperate identity. The guests have to recognise the staff by the cloting and so on. The uniforms need to be appropiate and clean. The hospitality performance can also be improved by greeting the guests at the welcome and the receptionist or spokesperson for the park needs to be a native speaker and preferably be fluent in English, even better would be if they speak several languages.

And at last the facilities should be in working order and clean.

Center Parcs askes you to respond immediately in case of a complain, you can file a complain in the park so the management gets the chanche to solve it right away. If you feel like your complain is not handled accordingly you can send an e-mail to ‘[email protected]’ or send a letter by mail, this can be done untill a month after leaving the park. Still not sattisfied? Then you can file a complain to the ‘Geschillencommissie Recreatie’ and they will look at it, this can be done untill three months after leaving the park.

This shows that Center Parcs always tries to solves problems immediately and if that cannot be done, the guests are given mutiple oppurtunities to complain. That they try to solve it immediately and the chanches the guests get to file a complain are according to the hospitality performance.

This picture shows that Center Parcs has clear indication signs to lead the guests around the park. the numbers of the cottages are reffered to as well as all the other facilities in the park.

Center Parcs got elected top employer 2014. They have be scored on 5 different critertia: primary conditions, secundary conditions, training & development, career perspectives and cultural management. The fact that they received this quality mark shows that employees have good working conditions. Happy employees results, most of the time, in happy customers.

This picture show the corporate identity. Most of the employees wear a blue shirt with a Center Parcs logo on the sleeve, this is very recognizable for the guests and in this way they will know who to approach. The logo can be found around the park, on the internetsite etc. which also cnotributes to the corporate identity.

If you would like to become a receptionist at Center Parcs in the Netherlands, there are a few job requirements you need to meet. One of them is that you have sufficient oral and written knowledge of the English and German language. This is to make sure you can help guests from different nationalities and that contributes to the hospitality performance.

Health and safety – Capstan construction site in Kutno, Poland: online essay help

This report is written on 07/02/2015 following Health and Safety inspection of Capstan construction site in Kutno, Poland. Capstan project involves approximately three hundred people working on ap. 20 000 square meters, the aim is to build a snack factory. The factory will include main production building, utilities building, waste water treatment plant and other facilities.

The factory main building is already erected, wrapped with sandwich panels. The project has already reached its milestone but there is still a lot of works performed on site. Most of them, inside of the building. Civils, mechanical works, pipe installation (hot works) and Manufacturing machinery installation are main activities at the moment. There are also pressure and other tests carried on. The works are being performed by 8 contractors and their subcontractors. Each has at least one works supervisor and one first aider with certification. Construction Management company with 25 engineers staff is managing the project on the spot and supervising all the works.

Executive Summary

Inadequate access and egress routes inside of the main building make it a high-traffic area with too many pedestrians and mobile elevating work platforms or forklifts passing by every hour. Outside is not bad, pedestrian paths and a road for vehicles are both separated and kept clean. There are signs informing about speed limit and a ‘zebra’ straps marked for crossing the road.

Every task must be first planned and introduced in a method statement including time and equipment used (Occupational Health and Safety Regulations 2007),

Despite a large amount of time spent on trainings, working at height is an issue to be solved. Some of workers were wearing their safety harnesses incorrectly, or did not anchor themselves while working. Mobile Elevating Work Platforms should be operated only by certified operators. There was equipment out of date for inspection found on site. Working at heights is one of the biggest killers in construction, therefore there must be an extra care and awareness along all the people involved.

Hot works is a big issue on this contruction site. Cutting, grinding and welding are only allowed when Permit-to-work has been issued. Permits are clear instructions and a source of information for both workers and supervisors, yet lack of firefighting accessories, lack of fire watch after works are completed and poor housekeeping are everyday threat.

Cabling and electrical works should also be improved. Many cables were found lying without protection on the floors easy to be damaged by MEWP, they are a trip hazard for people and, if destroyed, may cause an electric shock.

Main findings of the inspection

Working at height

There are MEWP (mobile elevation work platforms), scaffolds and ladders used every day on site. Despite of a monthly inspection, some of the above equipment was found damaged and missing manufacture manual instructions. Before using MEWP, all the documentation of each machine must be checked (Ustawa z dnia 21 grudnia 200r o dozorze technicznym Dz.U.z 2013, poz. 963) according to Polish law. Also, this documentation should be on the workplace for all times attached to the machine. All the works at heights, including MEWP are marked as a dangerous zone. Workers must use a safety tape to barrier they area and protect people from falling objects.

All works at height must be performed with fall protection system. International (Amendment of the Provision and Use of Work Equipment Regulation 1998/2005) and Polish (Rozporzadzenie Ministra Pracy I Polityki Socjalnej, 26/09/1997 no. 169, 1650) laws are clear about this matter. To prevent falling and death risk, no worker is allowed to work at heights without ‘harness training’. Workers are using safety harness when working above 1 meter height. This PPE must be not only visually inspected each time before and after use but also annually checked by a proper company / third party organization. This inspection should result with a mark or certificate as ‘good to use’. Without such proof, no harness should be used.

Mobile scaffolds must be erected, used and maintained according to its design and manufacturer instruction to prevent displacement and collapse ( ILO R175, art.17) Only after an inspection made by a certified engineer, works on scaffold are allowed. Workers should always check by themselves if the scaffold is levelled, wheels are blocked and authorised to use by an inspector.

Lack of anchoring, safety harness worn too loose or damaged, missing parts of scaffolds are one of the most common problems found during inspection. The management must take care of these matters every day putting pressure on daily inspections of the equipment, placing barriers where applicable and wearing safety harness according to manufacturer instructions. The indirect costs of WAT accident may be crucial for an organisation, moreover, potencial loss of a human life and living with responsibility of somebody’s death are higher cost than any money.

Fire

Fire is one of the main dangers on construction site. Along with WAT, it can cost life, time ‘ dalay, loss of property, materials, equipment. It is much cheaper and easier to prevent fire than maintain the workplace after fire occure.

When hot works performed, there must be Permit- to- work system introduced. Also, ongoing supervision is a must in order to execute all the actions/ preventive measurements included in a hot work, method statement, risk assessment, safety plan and a legislation of a country we work in.

Before working, all the flammable materials must be removed, area should be barried and marked as a Hot Works Zone/Workshop. Fire blankets and extinguishers must be always on the work place and gas cylinders kept properly: stored vertically, minimum 10 meters from the flame, secured in order not to fall. Works can be performed after supervisor check the workplace comparing to measures and information from a Hot Work Permit.

Electricity

Every activity with using electricity must be supervised. Labels, LOTO procedures, Work Permit, are one of the ways to avoid shock, death and burns. Only certified electricians and engineers should have access to life electricity. All the cables and electrical tools must be checked by an authorised inspector once a month, and labelled according to a ‘sticker system’. Each month has its own colour and all the equipment missing current label is being removed from a work place immediately. In order to avoid damage and tripping, all the cables lying on the floor must be protected.

Welfare

The temperature inside of the building was less than 10C. Hand function drops very fast in the cold. Workers are forced to perform activities with safety gloves which are not warm enough for them, and tend to restrict hand movement. Workers are also at risk of cold stress injuries. According to International Labour Organisation (Ambient Factors in the Workplace, paragraph 8.4.) the employer has a responsibility to lower the risks connected with cold workplace. The temperature held in the work area is unacceptable.Workers must be provided with more heating.

Moreover, the lighting went on and off during the inspection making it very difficult for people to work, and creating a very dangerous Environment.

With that amount of traffic and works at heights, problem with lightening is a huge risk. Tripping and falling along with collisions are more likely to happen, especially during late/night shifts.

A Lack of breakfast break was also noted, workers are only allowed to have a lunch break. This is inadequate, especially taking under consideration the low temperatures in the workplace.

Housekeeping

Housekeeping standards aren’t bad, but can be higher. Tripping and slipping hazards should be taken under consideration and removed.

Chemical Substances

Chemical substances must be stored properly, marked with safety signs, labelled and kept as the manufacturer recommends. Material Safety Data Sheet (MSDS) should be attached in the area and available for everyone involved to read.

Conclusions

The amount of supervisors on site would be enough if not for a poor safety culture among engineers. Health and Safety matters are only HSE department problem according to many people on site. Safety should be everyone responsibility and priority.

Working at heights must be taken seriously at all times, ongoing inspections of MEWP, scaffolds, laders and fall arrest PPE is very important, sharing awareness throughout contractors by trainings should be carried out.

Fire is a grate cost in many dimensions. Therefore, Hot Works must be done as carefully as possible. The area must be checked before, during and after performing works. This takes less time, than delay and loss caused by fire.

Welfare is a big issue, the organisation must improve lightetnig and rise the temperature in order to avoid workers sick leave payments or legal threats.

All in all, the safety culture and supervision must be improved, Hot Works, Electrical works must be authorised by a Permit- to- Work, WAT supervised. Each activity on site is a potential risk of harm for people working around.

Pesticides

Pesticides are designed to kill, supposedly insects but not humans. Numerous pesticides are sprayed upon crops to keep them glamorous enough until they reach grocery stores and last until consumption. Even though assessing detailed health effects is still a scientific challenge, the accumulated health risks and detriments cannot be completely ignored. These toxins have been developed to eradicate insects but are causing side effects to our health too. The pesticide residues remaining on what we consume each day have proven to be harmful and can be attributed as the source of many untraceable and unexpected health problems in the long run.

While leading a more natural and healthy lifestyle has been under the spotlight in this age of artificialization, pesticide usage could be targeted as a root cause for many chronic diseases and prolonged health effects. The chemical composition of certain pesticides has been discovered to hinder the biochemical processes of vital organs

As soon as a pesticide enters the passageways of the body and comes in contact with any cell, it chemically reacts with its newfound surroundings, lowering the toxicity. These counter effects occur to make it more water soluble and easier to excrete out of the system. The body reacts to each pesticide depending on its chemical structure and properties including its shape, size, electronic charge, and how stable it is, defining how soluble the pesticide will be in different solutions and surroundings. These unique characteristics can determine if the substrate, or the reacting pesticide molecule, can bind onto its complementary receptor site on cells. As electron distribution changes and energy transition states are lowered, chemical reactions via enzymes instigate the formation of products, in this case the catalysis of a biological process.

Enzymes are the proteins present in our body that speed up the reactions taking place within us at a desired rate for life to sustain. The presence of pesticides interrupts the rate of habitual routines that the body performs. Any interruptions or interferences in the midst of these enzymatic processes can trigger a toxic response, acting as an inhibitor to the natural reactions. Homeostasis is disrupted as a result, creating numerous imbalances that cause organs to respond in unpredictable manners.

Sodium bisulfite is one of the ordinary pesticides that prevent the browning and blackening of fresh fruits, vegetables. Known as sodium hydrogen sulfite, has a chemical formula of NaHSO3. Refer to its structural formula in Figure 1. This chemical combination has the properties of readily reacting against dissolved oxygen. In addition, it discharges sulfur dioxide as a byproduct in the presence of water, which inhibits bacterial and fungal growth caused by common chemical reactions (3).

Generally, any foreign substance that goes into the lungs elicits reactions which set off asthma attacks as the airways in the lungs contract and restrict airflow. The presence of pesticides in the respiratory system creates a more hyperactive and aggressive response as the constriction of airways causes bronchiole contractions to occur, causing wheezing and breathlessness. The high level toxicity of pesticides that engulfs the lungs through residues from food puts your respiratory system under enormous stress, which is detrimental to victims of asthma.

Organophosphates are a type of phosphoric acid consisting of the elements phosphorus, carbon, and hydrogen. Refer to the structural formula in Figure 2. Especially seen on fruits we eat every day, organophosphates are repeatedly sprayed on pounds and pounds produce to keep them insect-free enough to catch your eye at the grocery store even though the EPA classifies them to moderate to highly toxic. Tests conducted by the USDA in 2008 found that ‘95% of celery tested contained pesticides, and 85% contained multiple pesticides, 93.6% of apples, 96% of peaches, a single blueberry has residue from 13 different chemicals,’ (HuffPo).

The organic molecule, whose purpose is to function as a neurotoxin to insects has been now discovered as an inhibitor to multiple processes. Since cells aren’t physically connected to one another, the synapses of neuron relay messages to the brain. These ‘bridges’ forming the entire network throughout the body are broken when hit by organophosphates. In the nervous system, the organophosphate is accountable for restraining the flow of acetylcholinesterase (AChE), an enzyme crucial to nerve transmissions of impulses between our cells or a neurotransmitter. The breaking down of this particular enzyme signals when one transmission is completed and another is ready to begin. Figure 3 displays how the toxin enters the neuron and obstructs its path.

Synthetically composed pesticides in today’s industry are causing health deterioration greatly impacting children at a young age. Children in general are about twice as more vulnerable to intoxication by pesticides as eating and drinking more, they take in more pesticides and toxic chemicals relative to body weight. Their undeveloped organs are unable to filter out hazardous chemicals, which remain in their system and overtime produce a negative effect in several mediums.

The excess buildup of AChE makes young children whose bodies are still in growing stages, extremely susceptible to neurological damage and dysfunction, preempting problems in behavior and cognition. The conditions of an over-stimulated nervous system is the defining neuropathic cause of ADHD, holding about 5.9 million children captive in the United States (CDC 2015).

High percentages of residues present in common foods we eat daily, the vast use of these human-composed toxins is directly unsafe. The exact chemical arrangement of these, have been proved to collide with the cellular functions performed to sustain life within us. While organic foods are considered healthier but also more expensive, currently less than 1% of US farmland has been adopted for implementation of organic farming systems. As we wait for organic farming to amplify and become more affordable, an alternative resolution is the evolution of biopesticides. Recently, the federal government has proposed to increase research in alternate solutions using biotechnology under the National Bio-economy Blueprint. They have given their consent to find microbiological substances and microorganisms to synthesize chemicals replacing toxic pesticides.

× How can I help you?