Saturday, January 25, 2020

Encoder Viterbi Matlab

Encoder Viterbi Matlab Implementation of Convolutional Encoder and Viterbi Decoder Using Matlab and FPGA Abstract Channel coding is widely used in digital communication. By using channel encoding methods we can minimize signal noise and signal interference in our system. These techniques also utilize less bandwidth for error free transmission. In our project we have implemented convolutional encoder and viterbi decoder for channel coding. Convolutional encoding is vastly used for error correction in digital communication. We have implemented these techniques on matlab and performed a lot of simulation to check their performance. Chapter 1 DIGITAL COMMUNICATION SYSTEM INTRODUCTION Early communication was based on implicit assumption that messages signal is continuous varying time signal waveform. Such continuous time signals are referred as analog signals and there corresponding information sources are called analog sources. Analog signals are transmitted using carrier modulation over communication channel and accordingly demodulated at receiver. Such communication system is called analog communication systems. In digital transmission analog source output is converted to digital form. Message can be transmitted using digital modulation and at receiver demodulated as digital signal. The basic feature of digital communication system is that during finite interval of time it sends a waveform from possible number of waveforms. Important measure of system performance in digital communication systems is probability of error. 1.2 WHY DIGITAL COMMUNICATION Digital communication is preferred over analog communication because digital circuits have a less probability of distortion and interference than analog. Digital circuits are reliable than analog and have low cost. Digital hardware is more flexible to implement than analog. In digital signals time division multiplexing is simpler then FDM in analog signals. DIGITAL COMMUNICATION In digital communication system functional operations performed at both transmitter and receiver should be expanded to add messages signal bias at transmitter and message signal synthesis or interpolating at receiver. Additional functions include redundancy removal and channel encoding and decoding. 1.3.1 Source Nature Information is knowledge. Information can be of two types either analog or digital. We can collect information through listening or watching. Receiver newer know what it will receive in advance but only when some source generates an output towards it. The main responsibility on any communication channel is to send error less information towards receiver. 1.3.3 Source Encoder/Decoder What is source encoder? It is a technique which changes an analog signal into sequence of bits. This sequence of bits that is produced can also be used for the reconstruction of the signal. These bits contain information about the original signal. If we use this encoding technique it can also be helpful in appropriate bandwidth utilization. The sequence of bits is such that it can be used for data compression. 1.3.4 Quantization It is a process in which we sample the amplitude of a analog signal. Irreversible mechanism in which we erradicate redundant bits is called QUANTIZERS. The disadvantage of quantization is that it introduces noise in the sampled signal. Whereas while sampling distortion donot occur. But inspite of all that, quantizers and quantization is still widely used in determining the bit rate. And in any coding procedure of speech, amplitude quantization is the most important step. X8 X7 X6 X5 X4 X3 X2 X1 Figure 1.2: 8-level quantization 1.3.5 Modulation and Demodulation What is modulation and demodulation? Modulation is a process in which a baseband signal is mixed with a carier and converted into bandpass signal. And demodulation is a process in which original signal is recovered from modulated signal. And modulator and demodulators perform the above information. The modulator changes the signal into the form representing the required information. And reverse operation is performed by demodulator. The purpose of these devices is to produce and convey messages with minimum bit error rate. NOISE IN COMMUNICATION SYSTEMS Noise refers to something which is always present in the entire communication world. Noise is something that can be created or produced from variety of possessions. If noise is present in any system it makes the system ambiguous and less efficient. It also makes our receiver capability less efficient. And therefore also confines the transmission rate. Noise can be minimized by efficient designing technique which is not desired through different methods such as filtering. Noise which is caused by the thermal motion of electrons in all dissipative resistors is called thermal noise. These electrons are also responsible for thermal noise as a zero mean Gaussian random process. CHAPTER 2 CHANNEL CODING 2.1 INTRODUCTION Channel coding is used in communication system to improve the signal reliability in communication systems. By performing channel coding we can protect our signal from different types of noises and distortion. These methods of signal processing are tools for accomplishing desirable system tradeoffs. By using large scale integrated circuit and high speed digital processing methods it had made possible to provide as much as 10db performance improvement at much less cost. Shannon showed that by the addition of redundant bits to source information we introduce a method to minimize error in channel without disturbing information transmission rate provided that the information rate is less than channel capacity. Average number of information bits per unit time can be reduced by using function of the speech code. Minimum number of information bits should be transmitted. The input to encoder is the output of speech code. Radio link performance is improved by using Channel coding in mobile communication by the addition of redundant bits to source information. At the transmitter channel code maps the digital information which is produced by a data source into a form that can be decoded by the receiver with minimum errors. Channel coding mechanism insert noise to the codes in a controlled manner by adding extra bits so that the receiver can do detection and correction in a noisy channel. Channel codes which are produced are classified as block codes and convolution codes The hamming distance (minimum), dmin of a code is used as criteria for determining error correction ability. The minimum hamming distance is defined as smallest value of d. if minimum hamming distance is dmin ,(dmin -1)bit errors can be detected and we correct the integer [(dmin-1)/2] bit errors .raw data transmission rate can be reduced additional coded bits. Using Error-Correction Codes These codes are very useful to use.Without implementing these codes in our communication system our data delievered will be very noisy and corrupted.Below is the graph which showz comparison between uncoded and coded data error performance. Chapter 3 CONVLUTIONAL CODING INTRODUCTION TO CONVOLUTIONAL ENCODING The idea is to make all code word symbols to be the weighted sum of the input message symbols. And that is similar to the convolution used in linear time invariant systems where the output of system is found, if you know about the input and impulse response. So in convolutional encoder we usually get the output of the system, by convolving the input bits. Basically, convolutional codes do not reduce much noise as compared to an equivalent block code. In most of the cases, they generally offer more simple implementation upon block code of same power. The encoder is a simple circuit which contains the memory states and feedback logic, normally supported by XOR gates. The decoder is usually implemented in software. The Viterbi algorithm is the most favourable algorithm which is used to decode convolutional codes. It is found that they generally give good results in environment of lower noise. OVERVIEW OF CONVOLUTIONAL CODES Convolution codes represent one method within the general class of codes. Channel codes which are also called error-correction codes allow reliable communication of an information sequence over that channel which adds noise, bring in bit errors, or otherwise deform the transmitted signal. These codes have many applications which include deep-space communication and voice band modems. Convolutional codes are commonly prà ©cised by the following three parameters; (n, k, m). n = output bits k = input bits m= memory registers L=constraint length The quantity k/n which is called code rate is a measure of the capability of the codes. Usually range of n and k is from 1 to 8 and range of m is from 2 to 10 and the code rate from 1/8 to 7/8 except for deep space application where the code rates as low as 1/100 or even longer has been engaged. Often the manufactures of the Convolutional code chips specify the codes by the following parameters n, k, L. The quantity L is the constraint length of the code and is defined by Constraint length, L = k*(m-1). The constraint length L stand for the bits in the encoder memory that effects the production of n output bits. The constraint length L is also indicated by the letter K. 3.2.1 CONVOLUTIONAL ENCODING ENCODER STRUCTURE Convolutional codes protect by adding unwanted bits as any binary code. A rate k/n Convolutional encoder develops the input series of k-bit information symbols through one or more binary shift registers. The convolutional encoder calculates every n-bits representation (n > k) of the output series from linear process on the present input symbol and the contents of the shift register(s). Therefore, a k-bit input symbol is processed by a rate k/n convolutional encoder and computes an n-bit out put symbol with every shift update. Figure shows a non recursive convolutional encoder having rate of 1/2. For the encoder above, shows state variations and resulting output code words. Sequence U for the message sequence m=1 1 0 1 1 Solution Table 3.1 Branch word at time ti u1 u2 State at Time ti+1 State at Time ti Register Contents Input Bit mi 0 0 0 0 0 0 0 1 1 1 0 0 0 1 0 0 1 1 0 1 1 1 0 1 1 0 1 1 0 0 1 1 1 0 1 1 0 0 0 1 0 0 1 1 0 1 1 1 0 1 1 1 0 1 1 0 1 1 0 0 1 1 1 0 1 1 0 1 1 0 0 0 1 0 0 1 0 U = 1 1 0 1 0 1 0 0 0 1 0 1 1 1 POLYNOMIAL REPRESENTATION Sometimes, the encoder characters are characterized by initiator polynomial. Representation of an encoder can be done with a set of n initiator polynomial, one for each of the n modulo-2 adders. Each polynomial is of degree K-1 or less and tell about the connection of encoding shift register to that modulo-2 adder as the connection vector normally do. The coefficient of all the terms is either 1 or 0 of the degree polynomial depending upon whether connection exists or doesnt. For example in figure 4.1, we can write the generator polynomial g1(X) for the upper connections and g2(X) for the lower connections as follow. g1(X) = 1+X+X2 g2(X) = 1+ X2 The output sequence is found as follow U(X) = m(X) g1(X) interlaced with m(X) g2(X) Let the message vector m = 101 as a polynomial is represented as m(X) = 1+ X2 Then output polynomial U(X), of the figure 4.1 encoder can be calculated for the input message m is given as under. m(X) g1(X) = (1+ X2 )( 1+X+X2) = 1+X+X3+X4 m(X) g2(X) = (1+ X2 ) (1+ X2 ) = 1+ X4 m(X) g1(X) = 1+X+0X2+X3+X4 m(X) g2(X) = 1+0X+0X2+0X3+ X4 U(X) = (1, 1) + (1, 0) X + (0, 0) X2 + (1, 0) X3 + (1, 1) X4 U = 11 10 00 10 11 We demonstrated the encoder with polynomial initiators as also described for cyclic codes. Graphically there are three ways in which we can look at the encoder to gain better understanding of its operations. These are (a) State diagram (b) Tree diagram (c) Trellis diagram 3.2.2 STATE DIAGRAM Convolution encoders are finite-state technology. Hence state diagram offers significant insight into their performance. The states showed in the diagram symbolize the probable contents of right most K-1 stages of register, and paths represent the output symbols coming from such state changes. The states of registers are nominated as a=00, b=10, c=01 and d=11. There are only two conversions originating from every state, corresponding to two probable input bits. Output branch word is written next to every path state that is linked with the state transition. In below figure, we have used the complete line which denotes a path linked with input bit, 0 and a doted line is to a path with an input bit, 1. Observe that it is impossible in a single transition state to move forward from a given state to any random state. 3.2.3 THE TREE DIAGRAM One cannot easily use the state diagram for tracing back the encoder transitions as a function of time because it has only one disadvantage i.e. it cannot maintain the history record while the state diagram fully characterize encoder. State diagram is the advance form of tree diagram; it adds the dimensions of time than tree diagram. As the custom these trees also traverse from left to right at each bit inputs and each branch of the tree is describing the output branch. Following rule can be used to find the sequence of codeword; for an input bit of zero, its related branch word can be obtained by advancing to subsequent rightmost branch in the up direction. For an input bit of 1, its branch word can be obtained in the down direction. If we assume that the major contents of encoder are zeros, the diagram shows if initial input bit to the encoder is set to zero, the output will be 00 and if the initial input bit is a one, the output will be 11. Also if the initial bit input is one and next input is zero, the next output bit is one; the next output branch word is 01.By following these steps we observe that input bit stream 11011 traces bold line on the tree. This path matches to the output codeword sequence 1101010001. CHAPTER 4 VITERBI DECODER 4.1 VITERBI DECODING ALGORITHM This algorithm was revealed by Viterbi in 1967. The Viterbi algorithm performs maximum likelihood decoding. By taking benefit of the structure in the code trellis it also reduces the computational load. The benefit of Viterbi decoding is that its difficulty is not a function of the information of symbols in the code word sequence. The algorithm includes calculating a distance, or measure of resemblance b/w the received signal, and every the trellis paths entering each state at the same time. Those trellis paths that could not possibly by candidates for the maximum likelihood choice, viterbi algorithm removes them from consideration when two paths are entering the same state then the one having the best metric is selected and that path is called the surviving path. This choice of surviving path is carry out for every state. The complexity of the decoder is reduced by the remove paths with maximum unlikeliness. The decoder continues in this way to go forward into the trellis and making decision by eradicating the slightest likely paths. In fact in 1969, Omura also demonstrated that the Viterbi algorithm is maximum likelihood. The objective of selecting the optimum path can be articulated by selecting codeword which as minimum distance metric. 4.2 EXAMPLE OF VITERBI CONVOLUTIONAL DECODING Binary Symmetric Channel is assumed for simplicity thus hamming distance is a suitable measured distance .A similar trellis which we are using in encoder can also be used in decoder, as shown in figure 4.5. We set up at time t1 in 00 state referring to trellis diagram. Flushing in encoder is very important because it tells the decoder about the starting state because in this example there are only two likely transitions departing any state and not all the branches need to shown firstly. The full trellis structure starts after time t3. Central idea following the decoding procedure can be demonstrated by seeing the figure 4.1 encoder trellis in contrast with the figure 4.2 decoder trellis. It is suitable at each time interval, for the decoder to label every branch with hamming distance b/w the received input code symbols and the current transition word matching to the same transition at encoder end. The example in figure 4.2 shows the equivalent codeword sequence U, a message sequence m, and a noise distorted received sequence Z = 11 01 01 10 01 †¦Ã¢â‚¬ ¦. . Code symbols that will come from the encoder output which are results of state transitions are the encoder branch words As the code symbols are received they are accumulated by the decoder and are labeled on trellis branch. That is for each and every branch of the decoder trellis it will be marked with a matrix of likeliness i.e. Hamming distance. From the received sequence Z, we observe that code symbols received as the convolutional output at time t1 are 11, shown in figure 4.2. With the aim of labeling the decoder branches at time t1 with the least Hamming distance metric, we glance at the encoder state diagram figure encoder trellis. At this point we observe that a state 00-00 transition gives an output branch word of 00, but we are receiving 11. Consequently, on the decoder trellis we label 00—00 transition with hamming distance of 0. Observing encoder trellis, a state 00—10 transition yields an hamming distance of 1 with the output of 11. Hence, on the decoder trellis, we also label the state 00—01 transition with a Hamming distance of 0. So, the metric entered on the decoder trellis branch tells compares the corrupted and correct distances received associated with the branch transmitted with the branch word. To all intents and purposes, these metrics describes a correlation. The decoding algorithm finds the minimum distance path in order to correctly decode the data. The foundation of Viterbi decoding is that between any two paths which are ending up to the same state, path with minimum hamming distance will always be selected and other one will be discarded. Its example can be seen in figure 4.3 below. 4.3 Decoder Implementation In the decoding context the transitions during any of the time interval can be combined into 2^v-1 disjoint cells, where each cell is dissipating four of the possible transitions, where v is called the encoder memory. 4.3.1 Add-Compare-Select Computation Starting with the K=3, 2—cell example, figure 4.4 below shows the logic unit that corresponds to cell 1. The logic executes the special purpose calculation called add-compare-select (ACS). The state metric is calculated by adding the previous-time state metric of state a, to the branch metric and the previous-time state metric of state c, to the branch metric, this fallout in two possible path metrics as candidates for the new state metric. These two results are compared in the logic units of figure 4.4. The biggest likelihood (smallest distance) of the two path metrics is saved as the new state metric for the state a. Also shown in the figure 4.4 is the cell-1 add compare select logic that tells the new state metric and the new path history. This ACS process is also performed for the paths in other cells. The oldest bit on the path with the smallest state metric forms the decoder output. 4.3.2 Add-compare-select as seen Trellis Consider the same example for describing viterbi decoding. The codeword sequence was U = 1101010001, the message sequence was m = 11011 and received was Z = 1101011001. Figure 4.5 give a picture of a decoding trellis diagram. Most important point in the decoding through trellis tree is its hamming distance. This is the distance between received code symbols and their equivalent branch words. Trellis tells the value at every state x and for each time to time t1 to t6. We do ACS operation when we have two transitions ending up to the same state. And we get these types of situations after t4 transition and after that. For instance at time t4 the value for the state metric is obtained by incrementing sate t3. Similar operation is done for the state t2. The ACS process chose the minimum hamming distance path which also has maximum likelihood. The paths with minimum hamming distances are shown with bold lines and the paths with minimum likelihood are shown with faded lines. Trellis trees a re always observed from left to right. At any time when we want to check our decoder output we initiate with those states which has smallest paths. If we look at the figure below we can see that at time t6 path with minimum hamming distance has survived with distance =1. CHAPTER 5 SIMULATION METHODOLOGY 5.1 MATLAB SIMULATION 5.1.1 CONVOLUTONAL ENCODER VERTERBI DECODER We have implemented Convolutional encoder and viterbi decoder as source code. Matlab code also compares our viterbi decoder output with the built in decoder output by comparing bit error rates in our project. Making Matlab code and generating different code words for different symbols using convolutional codes and then decoding them with errors using viterbi decoder was the first step in our project. We have taken input from the user which will be coded by the convolutional encoder. Here we have generated random bits. Then the coded data will be decoded at the viterbi decoder. At the decoder side we have corrupted different bits by simply inverting them manually. Just to check what will be the bit error rate if different bits will be corrupted. Then we have compared our built in decoder function with our decoder code efficiency. In the receiver side we have used viterbi decoding algorithm to decode the transmitted signal. After these two steps (encoding and decoding) original data is obtained, which have errors if low SNR is used. 5.2 VHDL SIMULATION Our second step regarding to this project was to make synthesizable code of encoder and decoder in vhdl. For this we have used modelsim. Here we have implemented same logic as we used in matlab. 5.3 FPGA In the end we have burned our code in field programmable gate array. We made a synthesizable code in vhdl of our matlab logic and implemented on fpga. MATLAB RESULTS Here is the result of our matlab codes. If one bit is corrupted data_str = 111011010101000001111101101010101000101100111011010001000100011001111111110101100010101111100101010011101011101001000110 conv_code_str = 100110010001000010001000111100000011001010100100000100100010011000101100101000010111100110010001000010110011111100111011011101011111001010101010111001001000000111001110011000011010110111111000110010111101110100100001110100101111111100110101 msg_rec = 11101101010100000111110110 101010100010110011101 10100010 0010001 10 011 1111111010110001010111110 0101010 01110101110 1001000110 Message/ber retrieved with Verterbi_link_cont1 ber = 0 Message/ber retrieved with Vitdec ber =0 If two bits are corrupted data_str = 100010111000000011101000101100010010100110101101110110110010001100010010010011111001100001101000001001111000101011011101 conv_code_str = 100011001110011110011100011000001101111100101100100000010111010110111110010011110101010000010100000001000101011101111110101011010111010110111110100110111101110010011111001111000011001100101100011011101111000010011100100000100001001001100100 msg_rec = 10001011100000001110100010110001001010011010110 1110110110 0 10 001100010 010010011111001100001101000 001 0011110001 010110 11 1 0 1 Message/ber retrieved with Verterbi_link_cont1 ber = 0 Message/ber retrieved with Vitdec ber = 0.2667 if 3 bits are corrupted data_str = 101100011101110010110100100110010010001010111010011011111000000000110110000110101111100000100010100011001001111110001100 conv_code_str = 100110010111010011100100000111111110011011001011100101110101100000111110101101100010011000010010100011010001110100011100011110000000101011000101101110110101010110011010111001000000100101001110010101001101000001101111000100101001101101010111 msg_rec = 1110011111 01110 0 1 0 11010010011011 0 01010101011101 000 111 011 10 00100000110110100110111010100000100010 11011001110 0111110101100 Message/ber retrieved with Verterbi_link_cont1 ber = 0.1750 Message/ber retrieved with Vitdec ber = 0.2000 As the errors in bits increases bit error rate also increases. Appendix A Matlab Code %*********************************************************************************** %** CONVOLUTIONAL ENCODING TRELLIS DIAGRAM IMPLEMENTATION %************************************************************************************ function [code]= Conv_Enc(message1) % K=3 Length of Shift Register % # of states = 2^(K-1) = 4 % State can be considered as first two or last two bits of the shift register % 1/n Convolutional Encoder, Rate = 1/2 % n= length of generated codeword for i=1:length(message1) message(i)= num2str(message1(i)); end state=00; next_state=00; code1=[]; message=[message 00]; message=[message]; for t=1:length(message) inp= message(t); state=next_state; if(state==00) if(inp==0) next_state=00; outp=00; else next_state=10; outp= 11; end elseif(state==10) if(inp==0) next_state=01; outp=10; else next_state=11; outp= 01; end elseif(state==01) if(inp==0) next_state=00; outp=11; else next_state=10; outp= 00; end elseif(state==11) if(inp==0) next_state=01; outp=01; else next_state=11; outp= 10; end end code1= [code1 outp]; end for i=1:length(code1) code(i)= str2num(code1(i)); end % code=code1; %*********************************************************************************** %***************** DECODER IMPLEMENTATION*********************** %************************************************************************************ function [messa

Friday, January 17, 2020

Organizational Ethics Essay

In the industrial era, organizations have created untenable problems for moral experts by becoming bothersome illustrations of the dynamic social processes that defy attempts to apply traditional moral theory and detached philosophical wisdom. Kaufman (1973) observed that bureaucratic managers often privately approve of behavior that they acknowledge publically as illegal or unethical. Expectations for loyalty to the organization and for obedience to managerial direction set the a priori guidelines for moral conduct, and a given organization can develop and impose its own form of influence on the individual with an organizationally specific moral order that can seem to pre-empt external social order. Organization members can defy common social or religious morality when they are acting on behalf of the organization and feel justified in doing so because their behavior is judged within the context of the organization (Jackall, 1988). Yet, employees rarely exhibit unacceptable behavior in society that is acceptable inside the organization’s boundaries. Society holds the organization accountable as a rational actor, but rarely are the individuals actually responsible for creating organizational outcomes entailed in that accountability. Modern understanding of ethics emphasizes the behavioral aspects to the extent that the words ethics and morals are commonly used interchangeably by philosophers to refer to behavioral standards, codes of conduct or principles upon which these standards and codes are based. But, the different words imply different things. According to Bauman, ‘ethics is something more than a mere description of what people do; more even than a description of what they believe they ought to be doing in order to be decent, just, good – or, more generally, â€Å"in the right†Ã¢â‚¬Ëœ (1994: 1). All organization members make decisions, the collective manifestations of which fall into certain patterns that result in more or less consistent outcomes. The exploration of these patterns can be conducted using political frameworks. Deetz has asserted that organizations make most decisions regarding the use of resources, the development of technologies, the products available, and the working relations among people’ (1992: 3). While it can be argued that a substantial portion of industrial technology is developed at the behest of the military, it is clear that organizations have taken on many roles heretofore expected of government. Deetz further suggested that the state’s power is restricted to crude guidance through taxation and regulation. Philosophical Aspect of Organizational Ethics The examination of contemporary nature and functioning of organization could be considered in terms of Aristotle’s philosophical system. Clearly the structure of society Aristotle had in mind when he wrote The Politics (Aristotle, 1962) was something completely different than the structure of industrial society. However, it may be possible to speculate on how he might have applied his fundamental principles of governance to modern times. Aristotle would certainly not regard a large and pluralistic country such as the USA or any industrial European country as the equivalent of a city/state (hereafter referred to as a polis – a political community). A polis, he said, ‘must have a population large enough to cater for all the needs of a self-sufficient existence, but not so large that it cannot be easily supervised’ (1962: VII, 4). It is doubtful even that he would regard the USA as culturally homogeneous enough to provide support to a polis similar to that provided to Athens by Hellenic culture. He might, however, consider an organization to be a form of polis. If so, then there would be implications for what we regard as organizational ethics. To begin with, Aristotle advocated slavery as an important economic tool for support of the polis. While we in industrial society believe that owning people is immoral, we have no moral problem with the concept of the organization owning’ an employee for a specified period of time each day. Substituting the words supervisor for master and subordinate for slave, the characteristics of this intermittent ownership are scarcely discernible from Aristotle’s slavery: the master/slave relationship is a reciprocal relationship united by a common interest (they cannot do without each other); above all subordinates must be obedient – not being obedient is grounds for termination; subordinates must perform only tasks specified by their supervisors and not other tasks; subordinates may not slack from performing these tasks; subordinates must perform these tasks when ordered to perform them and within the time period allotted; and, except under certain conditions, subordinates may not supplement their work with activities of their own choosing. Many employers feel justified imposing restrictions on personal relationships, and on affiliations with other organizations. Slavery was not only important economically for Aristotle, but it represented the natural order of things: ‘He that can by his intelligence foresee things needed is by nature a ruler and master, while he whose bodily strength enables him to perform them is by nature a slave’ (1962: I, 2). The organizational chart is a sophisticated method for establishing, conventionalizing and validating the master/slave relationship. Because Aristotle considered business to be a ‘household’ activity and not a political activity, it is tempting to consider the organization as a representation of Aristotle’s household, which is the repository of slavery. Aristotle defined the polis in a number of similar ways, but we can accept that it is ‘a community of some kind, and every community is established with a view to some good’ (1962: I, 1). The purpose of the polis is of supreme importance in distinguishing it from other social entities; ‘the state or political community, which is the highest of all, and which embraces all the rest, aims, and in a greater degree than any other, at the highest good’ (1962:1, 1). The purpose of an organization is, or should be, much more than simply serving customers and making profits (Deming, 1986). The organization is defined by its constitution, and it has a number of specific characteristics. For one, it is of a manageable size, as alluded to above. For another, it has a limited membership of citizens: ‘We do not for a moment accept the notion that we must give the name citizen to all persons whose presence is necessary for the existence of the state’ (1962: III, 5). States have little in common, so in each case the citizen is defined by the constitution. Aristotle would limit citizenship in a number of ways, but he defined a citizen as One who has the ability and the chance to participate in government’ (1962: III, 5). In a truly democratic organization (which Aristotle would not recommend) that might include all employees. In an ideal organization, Aristotle would limit citizenship to managers – what he would call an aristocracy. The constitution of an organization is defined by its charter and its strategic and operating plans, the sum of which include its mission, its standard operating policies and procedures, its organizational chart (structure) and its personnel manual – covering all three of the elements cited above. Deming (1986) would suggest that the constitution of an organization provides for its ‘constancy of purpose’ – the point of being in business in the first place. There are basically three types of organizations: (1) monarchies, run by entrepreneurs or autocrats; (2) aristocracies, run chiefly by some combination of boards of directors, executives and organizational managers (this type has many varieties); and (3) democracies, run by some constitutional form of employee consensus. Determination of a specific organization’s type for the purposes of measurement should be guided by some assessment of attitudes toward the supervisor/subordinate relationship from both sides of that relationship. There were many beloved masters in the history of slavery. True democracies will have few, if any, symbols used to determine and to enforce differences in status, and will have institutionalized methods of achieving consensus. Two essentials for the state (1962: VII, 4) are a supply of labor, and a territory. The workforce supplies the labor for an organization, and the territory is defined by organizational boundaries, assets and market share. Additional essential parts (1962: VII, 8) include (a) food – the sustenance, in the case of organizations we can cite products (profits? ) as that which sustains the striving for goals; (b) tools and crafts – the technology used to make products; (c) arms – for protection and acquisition of new territory, provided for organizations by marketing and legal departments; (d) wealth – capital; (e) religion – that which guides normal behavior and explains the unexplainable; and finally that part which is most essential (f) a method of arriving at decisions about policy and about right and wrong – defined by the constitution. Organizational Ethics: Contemporary View Ethics are sources of identity and motivation for mature individuals, representing some sense of prevailing telos. A person develops an ethic by learning cultural convention and then modifies what has been learned according to insight and personal experience. The point is often taken for granted; a good deal of that which influences the development of an ethic is not likely to be grasped consciously by the individual. Ethics establish states of existence for individuals that make them, for example, more or less predisposed to accept or reject authority and supervision of their activities. Ethics induce people to seek out the association of others who share similar ethics. Organizations, to varying degrees, represent political associations and opportunities for political activity that cannot otherwise be experienced or constructed by individuals within the greater society. While conventional knowledge holds that organizations are narrowly purposeful and rationally managed entities, research reveals processes that can best be explained as political activity (Barker, 1994; Jackall, 1988): (a) functional groups compete for ascendancy of ideas, influence and resources, which is characterized by conflict; (b) the level of power and influence of any one manager depends upon that individual prevailing in conflicts regularly; (c) the corporate and bureaucratic structures are set up by and for those with the most controlling power; (d) success or failure of managers has little to do with actual accomplishments, but rather with arbitrary perceptions of one’s ability by others and with supportive alliances (that is, success and failure are socially defined, not empirically measured); (e) truth is socially constructed and the organization mobilizes to support manufactured reality promoted by those in power; (f) uncertainty in the organization and in managem ent processes facilitates redefinition of organizational reality; and therefore, (g) decisions are based in political agreement, and agreement is based in comparative power and influence. Jackall found that the moral system for managers in bureaucratic organizations includes some of the following principles: (a) striving for success is a moral imperative; (b) rising stars serve to validate the moral system; (c) criteria for success are bounded by the system and can be based in illusion rather than in reality – success is often the result of taking credit for the good and avoiding blame for the bad; (d) self-control, and not necessarily rule-following behavior, is a moral imperative; (e) morality is determined by flexibility and adaptability to changing political realities, and not by strong convictions; (f) bad things must be covered up or reframed in order to protect the system; and, (g) morality is a matter of survival and gaining advantage. For the citizen of this polis, morality has different implications than it does for those we may call employees, which Aristotle might recognize as slaves. While all employees may be initiated as organizational members, only a select few will undergo extensive initiation to achieve the status of citizen. In the General Dynamics study, employees at lower levels of the organization expected their quality of life to improve as a result of the Ethics Program (Barker, 1993). The failure of their expectations to be realized was commonly attributed by them to immoral behavior on the part of managers. These employees had not been indoctrinated into citizenship. Most never would be. Consequently, they understood the basic customs that govern the masses, but not the protocol of the political elite. Middle and senior level managers at General Dynamics, who were citizens, commonly viewed the Ethics Program as simply another political obligation. Instead of an opportunity for improvement, most managers experienced the program as yet another uncertainty to be managed in their quest to succeed. Their conformance to the rules established by the program was established by the constitution, and their experience of justice was directly related to which of their behaviors were measured and rewarded by the polis. Supervisors were citizens-in-training, and were caught between their understanding of the desires of employees for improved quality of life and their realization that the political goal of the program was to improve customer relations with the Navy in particular and with the Pentagon in general – that is, to improve the quality of life for citizens and not necessarily for the masses. The decisions of the polis were governed by the need to survive and to protect territory. The welfare of the masses was secondary to this goal, and was considered ultimately irrelevant should the polis fail. Organizational Ethics: Gender Aspects Diversity in the work place is among the issues important to contemporary business concerns. Diversity itself is a large agenda, within which issues of inclusion, personnel advancement, and appropriate work relationships for all employees emerge. The ability of all employees to work in ways that build upon their competencies, to allow them to advance for the betterment of the corporation, and to provide and contribute to the individual’s best advantage are important for management. Recent reports suggest that firms illustrating diversity through company-wide inclusion are more competitive in the current marketplace (Gilbert, 1999). When sub-groups of employees, such as males and females within a corporation, are revealed to have quite differing perceptions of their work life, however, it garners the attention of management. There is always the possibility that such differences highlight other potential problematic areas such as discrimination, harassment, or ceiling effects that will ultimately emerge, thereby reducing a company’s competitive edge. From the critical point of view, gender as it pertains to ethics is one aspect within the larger context of business ethics. One reason to focus on this question is the increasing attention given to diversity in the work place (Gilbert, 1999). There is also an increase in the number of women in the work force, women entering business schools, and women in management positions. Additionally, there is a suggestion that women, in general, are more ethical than men (Clark and Barry, 1997). Several studies examine the differences between men and women in business. These studies involve, for example, students, managers, and professionals in business endeavors. One assumption that is explored is whether females have a greater propensity for ethical behavior than males. In a study of attitudes of practitioners regarding ethical judgment, females are found to adopt a more ethical stance than their male peers (Weeks, 1999); findings that support an earlier study on gender related to business intent and judgment (Robin and Babin, 1997). In the latter study, there is no difference on ethical judgment between male and female professionals in business. Schminke (1997) reports that male and female managers do not differ on their underlying ethical models, but they differ in the manner in which they evaluate others. Another report from these data reveals that men and women are different in business and non-business settings regarding their ethical decision models (Schminke and Ambrose, 1997). In a study among undergraduate business students, males and females offer different perceptions of a just society (Prasad, 1998). Studies of ethical climate and gender reveal that female business students are significantly more predisposed to a positive ethical climate than are male business students (Luthar, 1997). Lastly, a study exploring differences of male and female managers reveals that in some situations females are more ethical, but in others they are not (Hoffman, 1998). Another dimension of organizational ethics that has been examined involves behavior surrounding the reporting of a co-worker for an ethics issue. Gender and supervisor support are two variables found to be related to willingness to engage in external whistle blowing in business (Sims and Keenan, 1998). Females are more willing than males to participate in whistle blowing in their place of employment. In summary, the results of studies in business ethics that examine differences between males and females reveal mixed results, but the predominance of findings suggest that females are more predisposed to ethical situations than are males. The results are true both for students and for employees in business.

Thursday, January 9, 2020

Group Counseling Program For Inner City Minority Youth

Group Counseling Program for Inner City Minority Youth It is often believed that only adults experience stress and anxiety, however stress is something that does not have an age requirement. Adolescent stress and anxiety are important health issues that often go unnoticed. Early adolescence is defined, as a period between 11 and 14 years of age (Carlozzi, Winterowd, Harrist Thomason, Bratkovich, Worth, 2010, p. 446). These years are usually marked by rapid changes. For most students, stress can stem from puberty, new demands of school, changing peer relationships, and responsibilities to families. Not to mention, early adolescence is period of development where identities, social skills, and personal values are being established.†¦show more content†¦One way this is accomplished is by â€Å"closing the achievement gap between high- and low performing children, especially the achievement gaps between minority and nonminority students, and between disadvantaged children and their more advantaged peers† (No Child Left Behin d Act, 2001, Section 101). Because there is a great emphasis placed on closing the achievement gaps of those who are disadvantage, it is important to pay attention to all factors that affects the student’s academic performance. If students are experiencing chronic stress and anxiety due to community violence and/or poverty-stricken living conditions, they will experience difficulties with performing academically. Under the NCLB act, the school counselor focus on all aspects of the student, specifically their developmental needs. Teachers are responsible prepping and improving students’ academic achievement. As practicing professional school counselor, it is important to utilize the American School Counselor Association (ASCA) National Model. According to the ASCA national model, effective school counselors focus their time, skills, and energy on direct and indirect services to students. Furthermore, the school counselor serves as a leader and advocate that supports sys tematic change as necessary (ASCA National Model, n.d., para. 4). Background In the case of many inner city youth who are often confronted with numerous external stressors (i.e. low-income urban setting) and developmental stressors, theyShow MoreRelatedSweet Dreams - Cookies And Coffee For A Cause Project Proposal1684 Words   |  7 Pagesthe poorest zip codes in the city are less than $30,000 per household. In addition to low household incomes, many of these zip codes are the highest in minority population density, contain homes with low property values, offer few livable wage job opportunities, have higher than average unemployment rates, and encompass other issues that plague poor inner city neighborhoods like violence and graduations rates. Moreover, too often the parent(s) or guardians of the youth in the neighborhood do not orRead More Adolescent Girls at Risk Essay1945 Words   |  8 Pagesimagine. Adolescent girls growing up on the border or in a multicultural area are generally from lower income homes, which in itself introduces an enti re set of risk factors. The main focus, but certainly not the only ones at risk, being that of minority groups, such as Hispanic and American Indian girls. In general, they are at a risk for teen pregnancy, drug and alcohol abuse, gang affiliation, and academic and social challenges at school. Now this might not seem entirely foreign or surprising toRead MoreThe Causes of Post-Traumatic Stress Disorders Essay1807 Words   |  8 Pagesclinical assistance. Psychoanalysis determines patient’s problems with identifying critical stressors to avoid serious health complications. This paper will review two research events that affect selected participants within particular socioeconomic groups. The research findings examined gender differences in PSTD and examined daily stress processes with relationship to health disparities. The methods are different experiences whereby those who experience PTSD symptoms should ultimately seek professionalRead More affirmative action Essay19 79 Words   |  8 Pagesit today? nbsp;nbsp;nbsp;nbsp;nbsp;Much of the affirmative action debate is, and should be centered on education. Many of the critics whom at one time also believed that the preferential treatment shown to lower the discrimination towards minority groups is something that should be eliminated. Being that American society has become less discriminatory, affirmative action may be less necessary. Discrimination is something that will always be an issue; there will always be backwards individualsRead MoreGuidance and Counseling1885 Words   |  8 Pagesthe researcher examined the qualification of personnel providing guidance and counselling services, availability of materials for the successful execution of Nigerian secondary school guidance and counselling services and the impact of guidance programs on students’ adjustment. 1.3. Significance of the study Guidance and counselling is the bedrock for achieving self-actualisation. It is a process of helping individuals to understand themselves by discovering their own needs, interests and capabilitiesRead MoreAcademic Achievement And Advancement For Students1914 Words   |  8 PagesUnited States and Muslim children, less than 3% (National Center for Education Statistics). Keeping this in mind, students from cultural minorities can be at risk of academic failure due to the environment they are raised in. As schools educate such a vast array of students, it is crucial that educators and support staff be competent in working with a diverse group of students. School counselors, personnel, and educators need to be able to collaborate with students in helping them reach their potentialRead MoreCultural Sensitivity From Healthcare Professionals1960 Words   |  8 Pagesrelationships is essential. This is a perfect example of why Aspire stresses cultural competence to their staff. Cultural competence in program staff is seen as an issue that should be addressed and assessed to increase Hi spanic enrollment into the Aspire afterschool programs. Evidence shows a lack of minority professionals and a lack of sensitivity toward minorities among health care professionals (Perez Cerminara, 2010). The recommendation is for cultural sensitivity from healthcare professionalsRead MoreYouth Development Programs4107 Words   |  17 PagesYouth Development Programs - Historical Development of Youth Development Programs, Youth Development Programs in the Early Twenty-First Century Youth development programs seek to improve the lives of children and adolescents by meeting their basic physical, developmental, and social needs and by helping them to build the competencies needed to become successful adults. Examples of youth development programs include community service, mentoring programs, and neighborhood youth centers. ItRead MoreMy Path Towards Higher Education1337 Words   |  6 Pages4:00 A.M. in the morning and in the hours immediately following the school notified all students, had counselors available at multiple locations, including the university counseling center and the Alpha Xi Delta sorority house. Despite the majority of the student population leaving campus for spring break they organized support groups and continued communication with the student body throughout the break. Upon the end of break they organized campus and community wide memorial services and continue toRead MoreThe Problem Of Teenage Pregnancy Essay2119 Words   |  9 Pageshave witnessed many friends, and community members become pregnant at a young age. With government funded programs that help teen mothers learn safe sex methods, and family counseling for distressed mothers and teens, the rate of teen pregnancy would be reduced. Background of the Problem Teenage homelessness, as defined by the National Conference of State Legislatures, are unaccompanied youth who lack parental, institutional, or foster care (Finzel, 2016). Pregnant teenage homelessness has been a

Wednesday, January 1, 2020

Regrouping and Carrying Over in Mathematics

When kids are learning two-digit addition and subtraction, one of the concepts theyll encounter is regrouping, which is also known as borrowing and carrying, carry-over, or column math. This is an important mathematics concept to learn, because it makes working with large numbers manageable when calculating math problems by hand. Getting Started Before tackling carry-over math, its important to know about place  value, sometimes called base-10. Base-10 is the means by which numerals are assigned place value, depending on where a digit is in relation to the decimal. Each numeric position is 10 times greater than its neighbor. Place value determines a digits numerical value.   For example, 9 has a greater numerical value than 2. They are also both single whole numbers less than 10, meaning their place value is the same as their numerical value. Add them together, and the result has a numerical value of 11. Each of the 1s in 11 has a different place value, however. The first 1 occupies the tens position, meaning it has a place value of 10. The second 1 is in the ones position. It has a place value of 1. Place value will come in handy when adding and subtracting, especially with double-digit numbers and larger figures. Addition Addition is where the carry-over principle of math comes into play. Lets take a simple addition question like 34 17.   Begin by lining up the two figures vertically, or on top of one another. This is called column  addition because 34 and 17 are stacked like a column.Next, some mental math. Start by adding the two digits that occupy the ones place, 4 and 7. The result is 11.  Look at that number. The 1 in the ones place will be the first numeral of your final sum. The digit in the tens position, which is 1, must be then placed on top of the other two digits in the tens position and added together. In other words, you must carry over or regroup the place value as you add.  More mental math. Add the 1 you carried over to digits already lined up in the tens positions, 3 and 1. The result is 5. Place that figure in the tens column of the final sum. Written out horizontally, the equation should look like this: 34 17 51. Subtraction Place value comes into place in subtraction as well. Instead of carrying over values as you do in addition,  you will be taking them away or borrowing them. For example, lets use 34 - 17. As you did in the first example, line up the two numbers in a column, with 34 on top of 17.Again, time for mental math, beginning with the digits in the ones position, 4 and 7. You cant subtract a larger number from a smaller one or youd wind up with a negative. In order to avoid this, we must borrow value from the tens place to make the equation work. In other words, youre taking a numerical value of 10 away from the 3, which has a place value of 30, in order to add it to the 4, giving it a value of 14.  14 - 7 equals 7, which will occupy the ones place in our final sum.  Now, move to the tens position. Because we took away 10 from the place value of 30, it now has a numerical value of 20. Subtract the place value of 2 from the place value of the other figure, 1, and you get 1. Written out horizontally, the final equation looks like this: 34 - 17 17. This can be a hard concept to grasp without visual helpers, but the good news is that there are ​many resources for learning base-10 and regrouping in math, including teacher lesson plans and student worksheets.