Friday, May 31, 2019

Standardized tests in Illinois Essay example -- Standardized Testing Es

Standardized tests atomic number 18 administered to allow reliable and valid comparisons to be made among pupils taking the test. 2 major types of standardized tests be currently in use norm-referenced and criterion-referenced. A norm-referenced test is a test that has been wedded to representative samples of bookmans such that norms of performance be established. Each student taking the test receives a score that groundwork be compared to the norm or normal or sample of students. The scores are then reported in percentiles. The main purpose of these tests is to rank students along a distribution of performance. Because of this tests are likely to have items that are very backbreaking for the grade level so students can be ranked. A criterion-referenced test looks like a norm-referenced test but multiple choice items are utilise and directions are standardized. The reason these tests are administered is based upon the content that all students are expected to learn. Scores are based on the amount learned by the student and a passing score is then given. These scores are not compared to other students. Standardized tests are used to show how a student is doing. They can show if a program is working well and can show if the educators are using effective teaching methods. Schools are graded to settle if there overall program is helping the student to achieve their goals. In the next paragraphs I am going to explain to you about the purpose of the American College Testing Program (ACT) and the Scholastic Aptitude Test (SAT).Learned helplessness is a phenomenon containing three components contingency, cognition, and behavior. Contingency addresses the uncontrollability of the situation. Cognition refers to the attributions that people make regarding their situation or surroundings of which they are a part. Behavior allows individuals to decide whether they will give up or proceed with the obstacle set before them (Peterson, Maier, & Seligman, 1993 Firmin, Hwang, Copella, & Clark, 2004). When a student thinks about college he must take either the ACT or the SAT test to be admitted into the college. Students have a lot of decisions to make that can be stressful. Failure is an aspect that students fear and can determine whether they will succeed in life.The ACT was founded in 1959. A l... ...t you are allowed to guess on the ACT and on the SAT if you are unsure you want to leave it blank because getting it wrong will give you a lower score. If you are graduating high school in 2006 and beyond there will be a new SAT test. The test will contain three portions Math, comminuted Reading, and Writing. The math section will have 44 multiple-choice questions and 10 in-grid questions. You will be allowed 70 minutes to complete this section. The critical reading section will have 67 multiple-choice questions and you will be given 70 minutes to complete. The writing section has 49 multiple-choice questions and you are given 60 minutes. You ar e graded on Grammar, usage, and word choice.The need, as we view it, is to develop a number of different alternative evaluation instruments and strategies that provide heavy data but are not in the form of the standard paper-and pencil multiple-choice tests now being used in most examen programs. What we advocate are assessment instruments that support proven methods in the visual arts and also take advantage of all the newer imaging technology (Medeja, Dom, & Sabol, 2004).

Thursday, May 30, 2019

Occupational Stress and Health Essay example -- Business Management St

Occupational Stress and wellnessIntroductionIn recent years, occupational stress and health have gained goodish importance to people in all forms life. Keeping in mind,the excessive transaction load, amount of time spent at work and the recentchanges that be affecting the nature of work, it is not surprisingthat work stress today is increasing (Szymanski, 1999). Stress can becaused due to a number of reasons and in many ways and those thingsare known as stressors which may vary from person to person. Accordingto the United States National Institute of Occupational Safety andHealth (1999), job stress can be defined as the harmful physical andemotional responses that occur when the requirements of the job do notmatch the capabilities, resources, or needs of the worker. It can alsolead to poor health and even injury.http//www.ilo.org/public/ side of meat/protection/safework/stress/whatis.htmPeople should be made more(prenominal) aware about the symptoms of stress and tryto precaution ary measures before it affect their lives. Stress at workcan affect people both mentally and physically. Excessively highlevels of stress need to be controlled in order to avoid these healthrelated problems. A number of things can be through by employees andemployers to prevent workplace stress. Also, there are a number ofstress management techniques that can be used by people to plug thatthey lead a stress free life. Job related stressors should beidentified and dealt with so that an organisation and its employeescan operate efficiently and effectively.Identifying stressors at workThe list of potential stressors is limitless. There may be times whenthese are actually of use to us, creating simply a pressure s... ...herwise, when unplanned things happen, itllcause you fair(a) as much stress as trying to work without a plan.References & BibliographyInternational labour organisation safe work programhttp//www.ilo.org/public/english/protection/safework/stress/whatis.htmKendall, E., Murphee, P., ONeill, V. & Bursnall, S. (2000). A reportto the workers compensation and rehabilitation commission (WesternAustralia).Occupational Stress Factors that contribute to itsoccurrence and effective management. Centre for Human run (GriffithUniversity).http//www.workcover.wa.gov.auNational Institute for Occupational Safety and Health (NIOSH)http//www.cdc.gov/niosh/stresswk.htmlSzymanski, E. M. (1999). Disability, job stress, the changing natureof careers, and the career resilience portfolio. Rehabilitation Counselling Bulletin. 42, pp 279-284.

Wednesday, May 29, 2019

Utopia by Thomas More and The Prince by Machiavelli Essay -- More Utop

Utopia by Thomas more than and The Prince by MachiavelliThomas Mores Utopia and Machiavellis The Prince both concern themselves with the fundamental issues of how a society works and maintains itself. The goals behind the two works,however, differ considerably. The goal of Utopia is to illustrate the maintenance of an ensample society and the goal of The Prince is to instruct a prince, or ruler, on how to maintain his state. On the surface these two goals may seem similar but the going away lies in the way the authors handle the subject of might. As a manual, or handbook if you will, Prince treats power as a necessity, a goal, to be worked towards and maintained, almost at all costs. Utopia, a fantasy,treats power as something all individuals have rather, they are empowered. By comparing the way both works use and treat indicate of view and form, governmental systems and inclinationls thedifferences in perspective on power becomes clearer. Ideas are brought forth differen tly in both works through narrative range of view and style. These two different ways reflect the views of power the authors hold. The Prince is told in a matter of fact tone, its purpose being to inform a prince on how to run his kingdom. Inherentin this purpose is a key to Machs view of power. Because it was written for the use of one manto dominate over and check over his kingdom/state, it was obviously not meant for lesser mortals. Itin itself is a tool of power which could be used for only the good of the prince who uses it. Whether or not the hoi polloi are empowered does not matter, it is irrelevant. It only matters that theprince uses it to maintain his own power. In contrast, Utopia is a fanta... ... word virtu over and over again, it is made clear that his impartiality is not that of Mores. Power is implied in the very essence of Machiavellis writing. It is tied in with the greed,selfishness, and his do anything to maintain the state attitude. Even though Machi avelli stormily invokes the idea of his Italy brought back to life in the Exhortation, his motives are still selfish in nature to look at an even broader term, his motives are nationalistic which is the idea of a nation being egocentric. In this respect he is also contradictory to More in that Moresideas are for the good of human race kind, not just for one nation. Ideals like justice and truth, which are the basis for Mores invention, make it impossible for him to do anything but claim power as the source of corruption in society while Machiavelli praises it.

Communism :: Communism Essays

Communism is a very abortive semipolitical theory. It has never been in practice in the United States of America. It has ordinarily been placed in practice among very unstable political environments such as Cuba and China. The general consensus on communism is that its a very trade good idea but falls short in practice because people have and always like to make decisions for themselves.Karl Marx is known as the Father of communism. He is recognized for this because in 1848 he wrote the Communist Manifesto. It is the basis for communism that has and is currently in practice, even though there are many different forms of communism. numerous communists believe that capitalism encourages the exploitation of the poor by the rich for cheap labor. Another communistic belief is that communism itself encourages workers to organize and to take over the political and economical world. Communists also believe that class privilege and every other vestige of this present system of economic ex ploitation and military organization and conceptualization must be eliminated. In order to explain this, you must understand that by class privilege they mean that their should be no poor, and no rich, that everyone gets the same opportunities as the next individual, and that by vestige of economic exploitation of this system of economic exploitation and military organization, they mean that their should be no trace or hint of the working class being exploited by the richer or more powerful.There were some very intriguing and thought provoking quotes in the book. One is Capitalism did not arise because capitalists stole the land or the workmens tools, but because it was more efficient than feudalism. It will perish because it is not save less efficient than socialism, but because it is self destructive-J.B.

Tuesday, May 28, 2019

Witnessing the Unwitnessable :: Essays Papers

Witnessing the Unwitnessable Against a black canvas glimmer countless particles of light. Some assert themselves as tiny pinpricks while others pool into swirls of color on the ebony backdrop. A cursory glance at these speckles might discern them as nothing but randomness, but a closer examination reveals a certain sense of artistic unity. Their palette is simple shades of black, ashen, yellow, blue, red, orange while their details ar elegant. A whirl of gold dances nears a splodge of sapphire a daub of dainty pink resembles a rose drops of ivory encircle a void like a pearl necklace lacy, white tendrils reach toward a spray of amber. These descriptions might hint at a painting, but in this case, the image in question has no artist it is a photograph of deep space produced by the Hubble Space Telescope known as the Hubble Ultra Deep Field. Taken of a random patch of set up no larger than a grain of sand over a period of three months, this photograph contains a n estimated 10,000 galaxies, each of them billions of years old. This single, tiny frame has captured the big(a) immensities and beautiful harmony of the universe in an image that defies comprehension. The blackness of the night sky belies the menagerie of color and light hidden from our eyes. Many cosmological objects ar too faint to be seen, many emit wavelengths of light our eyes do not know how to respond to, and many (the far side of the moon, for example) are impossible to behold from Earths surface. Astrophotography, which will here be broadly defined as the capturing of all images of space, provides a keyhole through which we may glance celestial spectacles we would never normally see. Photons, particles of light, are often the only evidence we have of the existence of the vast majority of the objects in the universe. By committing these photons to photographic plates or pixels, astrophotographers capture an imprint testifying that whatever emitted them ex ists somewhere in the infinity. Seizing photons gives us the power to transform a remote and unimaginable galaxy into a real and tangible photograph. Even more important, viewing astrophotography raises questions about the fundamental nature of both ourselves and the universe.

Witnessing the Unwitnessable :: Essays Papers

Witnessing the Unwitnessable Against a black canvas glimmer countless particles of light. Some assert themselves as tiny pinpricks while others pool into swirls of color on the coal black backdrop. A cursory glance at these speckles might discern them as nothing but randomness, but a closer examination reveals a accredited sense of artistic unity. Their palette is simple shades of black, white, yellow, blue, red, orange while their details are elegant. A whirl of gold dances nears a splotch of sapphire a daub of dainty pink resembles a rose drops of ivory encircle a void like a pearl necklace lacy, white tendrils telescope toward a spray of amber. These descriptions might hint at a painting, but in this case, the image in question has no artist it is a film of deep space produced by the Hubble Space Telescope known as the Hubble Ultra Deep Field. Taken of a random patch of sky no larger than a grain of sand over a period of three months, this photograph cont ains an estimated 10,000 galaxies, each of them billions of years old. This single, tiny frame has captured the profound immensities and stunning harmony of the universe in an image that defies comprehension. The blackness of the night sky belies the menagerie of color and light hidden from our eyes. Many cosmological objects are as well faint to be seen, many emit wavelengths of light our eyes do not know how to respond to, and many (the far side of the moon, for example) are unattainable to behold from Earths surface. Astrophotography, which will here be broadly defined as the capturing of all images of space, provides a keyhole through which we may view gossamer spectacles we would never normally see. Photons, particles of light, are often the only evidence we have of the existence of the vast majority of the objects in the universe. By committing these photons to photographic plates or pixels, astrophotographers capture an imprint testifying that whatever emit ted them exists somewhere in the infinity. Seizing photons gives us the power to transform a remote and unimaginable galaxy into a objective and tangible photograph. Even more important, viewing astrophotography raises questions about the fundamental nature of both ourselves and the universe.

Monday, May 27, 2019

Keys to success

There argon three key foundations to successful online learning organization, time management and intercourse. All three of these elements lick a role in both my doer field and for my online learning. After reading through articles based on these topics, the same underlying theme is unvarnished and I will discuss how this is uptaked in my career. First, it is highly beneficial to be organized when starting any task or sequence of events for my day.I larn to ca-ca and read through important e-mails that I may receive missed before leaving work the day prior. Then I get ahead all the information that I shoot to pass on to my leadership. In my Job, aircraft maintenance, leadership will ask for timeliness, or causes of events. Being organized is crucial to world able to relay information back in a timely manner. Organization also displays professionalism. If you go into a meeting shuffling through paper it wont go as well, as going with all your information on one direct shee t.I also stay organized by keeping a calendar on my outlook that shows my schedule for the day and any upcoming assignments. Second, there are only 24 hours In a day and work comes with deadlines. On top of deadlines, in my career I attend many different meetings throughout the day. In between these meetings It Is Important to also take care of my people. I use time management to set myself up for success for the day, week, and even month. By having a strict schedule, I know exactly how such(prenominal) free time I have to complete assignments and where I need to be at certain times.Lastly, communication ties organization and time management unitedly with staying engaged with leadership. This adds the extra confidence they have In me and my ability of getting the Job done. I make sure to follow-up to any questions I ay have non been able to answer at the time. I Immediately solvent back to e-mails, even If I havent been able to complete an assignment. Also, If I do need more Info rmation, or more help I am not afraid to ask the right people to get the Information.In conclusion organization, time management, and communication equally play Important roles In my career. They have been preached over and over again by teachers I have had maturement up, and have made queen-sized Impacts In the way I do business. I will continue to use these as keys to success In my career. Keys to success By Jeannine Second, there are only 24 hours in a day and work comes with deadlines. On top between these meetings it is important to also take care of my people. I use time staying engaged with leadership.This adds the extra confidence they have in me may have not been able to answer at the time. I immediately reply back to e-mails, even if I havent been able to complete an assignment. Also, if I do need more information, or more help I am not afraid to ask the right people to get the information. Important roles in my career. They have been preached over and over again by teac hers I have had growing up, and have made big impacts in the way I do business. I will continue to use these as keys to success in my career.

Sunday, May 26, 2019

Teaching Preschool Children Reading

Phonological sensation is an important aspect in the rompdamentals of reading. It is the first step in literacy. Children can learn phonologic ken in a strain of ways. Rhyming, sentence and phrase recognition, sound knowledge, phonemes, letter identification, spelling, and games which require active listening are a few of the techniques utilise by teachers in the classroom. All of these methods help in a baby birds reading and speech fluency.All children need to learn how to read and write in order to survive in todays society. There have been many different methods used in order to teach phonemic awareness to preschool children. Phonemic awareness is the cap capability of an individual to differentiate, identify and manipulate specific sounds. An example would be a child combining and blending the sounds in the wanton awayscript cat. Many people believe that phonics and phonemic awareness are the same thing. However, phonic awareness is recognizing that talking to come fr om sounds with in turn make up a language. Phonics is knowing that sounds are composed of garner which compose a writing style.In order to teach a child phonic awareness and to read, a teacher must comprehend the procedure that the brain formulates in order to understand the printed data. The brain undergoes three functions which facilitate understanding. First, there is information retention which has to manus with spurs of the environment. Second, language articulation is where a child uses prior knowledge in order to associate its meaning and the third process is modeling and making connections with agent information . Reading comprehension occurs in the frontal lobe of the brain. When this process takes place, it leads to an understanding and knowledge of what a person has seen and read.Phonological bear upon is a persons ability to listen andcomprehend dialect as well as printed terms. Hence, it is to say that the child recognizes the sound each letter makes. Mechanic bothy our brain unconsciously processes literal communication. Instantly a child derives phonemes in order to pronounce the word and decomposes it to grasp the oral language. In contrast to speech, reading involves a childs knowledge in the process of associating written delivery with the alphabet and in turn producing spoken words. Therefore, a child has to be of conscious mind in order to learn reading. A teacher must instruct a child in the phonologic sequences of letters in order for the child to convey phonological processing.There are many different techniques a teacher can utilize in order to build phonological awareness. One technique would be merging words and sounds collectively in order to construct new words. The words composed can be silly or factual. This technique facilitates the childs use of phonemes, which was a study conducted by McCandlies, Cohen, and Dehaene in 2003 . Having a child combine letters and then sepa green goddessing them is another form of building phonological awareness. It will also help them in recognizing the letters of the alphabet. Examples of the activities mentioned above are having a child say the first sound in the word rat and then saying each letter sound individually. Blending would consist of telling a child say at and then stating to them to put an r in front and say the new word.These activities can been done with a transition of materials such as chalk, boards and markers. Remember preschool children are very visual. The more stool they utilize, the better they retain the information. Image is a phonic awareness 3 letter word game.Many people do not see imaginative fit as a means of larn. However, it is during play that children are at their most influential developmental stage according to Vygotsky, a Russian psychologist. Since the children are imaginativeness different situations, they are associating everyday activities and assigning meaning to them. During this era, individuals and items can transfor m themselves into different things. For example, a child can become a cat, or a baby and a piece of construction paper can be converted into a notepad for taking orders in a restaurant. Through the childrens interactions and language, they gather and exchange knowledge, experiences,and vocabulary which enhance their verbal communication through mutual exchange (Genishi and Dyson, 2009).Collaborative songs and games can also be a means to teach phonological awareness. Nursery rhymes can be utilized as a tool for phonological awareness. Rhyming activities such as questing a child which words rhyme or which ones do not rhyme will enhance their awareness. A teacher may also say a word and ask a child which word rhymes with it (Phillips, Clancy-Menchetti, Lonigan, 2008). Some examples would be this old man, head shoulder knees and toes, one two buckle my shoe and Humpty Dumpty. Games that constitute phonological awareness do not have to come from a book. They can be invented from ones e veryday activities. Examples of these activities would be a trip to the grocery warehousing or beauty salon.Children can be asked which items in the store begin with the same letter sound or which nail polishes have the same letters in them. If a child does not respond or say the correct answer, be sure to mirror the correct response and not order that they were wrong. The teacher should support the child through the attainment process. The following illustration explains the steps of phonological awareness.Activities which implement pattern recognition are also good at phonological awareness. This is an excellent tool to utilize in the classroom due to the fact that children learn how to read by identifying patterns. When a child associates words from letter patterns and connects the sounds, this is called patterning. A teacher should replicate, rehearses, and observe the children when teaching pattern recognition in order to determine the childs advancements in this area. Asses sments should cover word subdivision, sound combinations, and sorting new data into patterns. Repetition is the key in the learning process.Preschool children have a short attention span therefore, keep activities fun and exciting in order to facilitate the best learning environment. Not all children have the same literacy background and predisposition they come from a variety of environments and cultural upbringings. Consequently, teachers must adapt to each individual childs style of learning and pace. There will always bevariations in the learning process.Technology is a part of our everyday lives. Children have computers, iPhones, iPods, and tablets. Since technology surrounds children twenty -four hours of the day, seven days a week, parents need to take advantage of the situation and use the time wisely. There are many games online which can help children build their phonological awareness. Websites which parents can utilize are starfall.com, PBSkids.com, ABCmouse.com, learnin ggamesforkids.com, sheppardsoftware.com, and ezschools.com.All these websites suffer educational games for preschool children. They have a variety of subjects such as math, reading, and science. Also they cover the fundamentals of the alphabet, phonics, sounds, and blending. These games are especially interesting for those children who are visual and auditory learners.Percentage of children who are going online daily for educational purposes As stated above, there are many different techniques that a teacher can employ in order to educate a child. opposite methods such as repeated reading, modeling fluency, and leap frog are also useful tools in phonological awareness. Children imitate and mimic adult behavior. Therefore, it is life-sustaining that a teacher speaks to a child in the appropriate grammatical matter. They will store the information and use it later in other situations that arise. Although a preschool child does not know how to read, they do make associations with wo rds. Hence, reading every day for thirty minutes will build a childs vocabulary.Books which have tape recordings and CDs are also good sources for vocabulary buildings, rhyme, and word segmentation. In these days, parents are not concerned about their childrens education. They spend cubic decimetre or more dollars on video games instead of providing educational support. It is ignorant for them to believe that programs like VPK and Head Start are providing a child to play and interact socially. Although social interaction is vital to a preschool child, education stimulation is also crucial. Teachers go through countless training sessions in order to provide their students with high standards. There are a variety of sources that parents and teachers can use. Computer games, internet sites, books, rhymes, music and movement, and activities created by the teacher or parent are all ways to provide phonological awareness.Parents and teachers alike have to remember that every child isdiff erent and each child has his or her way of thinking and processing information. Thus, educators and parents have to learn their childs learning style whether it is audio, visual, or kinesthetic in order to provide a grade a learning environment. Reading, writing, and spelling are the principles of fluency. If children are provided with the proper tools now, they will be better equipped for the future. Remember, the children of today will be the leaders of tomorrow

Saturday, May 25, 2019

Oedipus Fate and Outline Paper Essay

The play Oedipus the King, translated by Robert Fagles, is a story of drama and tragedy. Oedipus superciliousness and morals cause him to take fate into his feature hands and it ends up blowing up in his face. He was abandoned as a baby and was raised by the king and queen of Corinth. When he reached manhood, he was informed by an oracle that he would one day kill his father and marry his mother. He left Corinth forever and along his way he came to cart carrying his real father. Out of rage, he killed everyone including his father. In Thebes, he defeated the Sphinx. His reward was kingship and the dead kings wife, his mother. Oedipus try to change his future alone eventually fate caught up with him.Oedipus, as a king, was both caring and conceited. He talked as though everyone should know his name but at the identical time worked to solve the illness that plagued his people. As an tec, he was harsh, determined, and at times mean to the ones that he interrogated. As a husband and father, he was loving and caring, and as an arch-criminal, he was humble and accepting. His most predominant singularity is being moral. He ran when he was told that he destined to kill his father and marry his mother. He gouged his look out when he found out that he was married to his mother and fathered her children. The characteristics that soften his as being moral were that he was prideful and determined. His pride and endeavor caused the events of his life to be brought to light and made him look unmoral.His personality causes him to continue with the investigation because he is prideful, determined, and in denial. His determination drives him to push the investigation into who killed King Laius. His pride keeps him from being the royal scapegoat when asked to be. His denial that he actually killed his father, married his mother, and fathered her children kept him investigating the death of King Laius. Eventually in the end he accepts his fate which hetried to avoid for a long time. He accepted his fate which was a humble and noble act by a king. Thats what makes his act the greatest act of kingship of all. He sacrificed himself for the betterment of his people knowing that he had done wrong and needed to be punished.In this play, Oedipus tried so very hard to control his own fate from the time he reached manhood to when it caught up to him. His fate caught up with him. Everything he didnt pauperization to become and tried to avoid came true in the end. It was a tragic ending for a man who tried so hard not be who ended up being.Oedipus Fate OutlineThesis Oedipus the King tries to take fate into his own hands and it backfires. I. Discuss the character Oedipus as king, investigator, husband, father, and arch-criminal A. King is caring, investigator he is determined, as a husband and father he is loving, and as an arch-criminal he is reluctant to give up powerII. What seems to be his predominant characteristicA. the Kings predominant characteristic is that he moralIII. Under what circumstances does he exhibit this characteristic A. He feels for his people and tries to find a cure for them to heal their sufferingIV. What additional characteristics does he have that soften this predominant characteristic A. Pride and Determination, they were the down fall of Oedipus V. How does his personality essentially force him to first begin his investigation A. He is caring and determined to find a cure for his people, which turned into an investigation into who killed King LaiusVI. In what way is this terminal acceptance perhaps the greatest act of kingship of all, thus showing forth his arte in the best light possible A.

Friday, May 24, 2019

Literary Anaylisis John Donne

Terra Goodfellow Mrs. Ashmore English Dual Credit IV 14 November 2012 Literary psychoanalysis of Sweetest Love by crapper Donne John Donne was believed to be one of the greatest poets and preachers of the 1600s. He was truly add-inty and educated, but also very emotional. These characteristics are very predominant in his writing (Stringer 1). This phenomenal poet, John Donne was born in the earlier part of 1572 in London. His parents were both very devout Roman Catholics, kilobytegh he barely knew his father because he passed just before Donne turned four years old.Donnes m other was from a good family and when she was involved in the Church she and her family endured much for the Roman Catholic doctrine (Kermode 2). In 1593, John Donnes brother passed away, and made Donne start to question his faith. John Donne stock-stilltually became an Anglican (Jokinen 1). While staying at the Lincoln Inn, John Donne had become friends with Christopher Brooke and in 1596 joined him on a n aval transit to Spain. He went on another expedition to the Azores in 1597. During his expedition to Azores he wrote The Calm (Jokinen 1).In 1598 John Donne was hired to be the secretary for Sir Thomas Egerton, who, at the time, was a very predominant government official. In 1601 John Donne secretly married Sir Thomas Egertons niece, Ann More. When Ann Mores father found out he was furious. John Donne had tried to apologize and even wrote him a letter, but that wasnt enough and he had John Donne fired and eventually imprisoned (Jokinen 1). Donne had trouble supporting himself and his family for the next fourteen years. In 1615, however, John Donne became an Anglican priest.During this time, John Donne went on to receive a Doctor of Divinity degree from Cambridge University (Stringer 1). In 1616, John Donne was appointed reader in divinity at Lincolns Inn, where, over the years, he both gave and received satisfaction (Kermode 2). After his wifes death in 1617, John Donne celebrated her fund by writing a sonnet and giving a sermon over her. Donnes sermons took flight, and his career flourished. Donne was such a remark sufficient preacher, even preached in the Royal Court for King James I. In 1621, John Donne was appointed to be a dean of St.Pauls Cathedral and did so until his death on March 31, 1631 (Stringer 1). John Donnes influence to write was everywhere around him. This intimate poet used almost every situation to write about. His first give of poems, Satires, was written during the time when he was struggling with his faith, and is considered one of Donnes most important literary efforts (Jokinen 1). John Donne also wrote his love poems, Songs and Sonnets, at this time as well, which was close to the time when he met his wife, Ann More (Jokinen 1). During his expedition to Azores, John Donne wrote The Calm (Jokinen 1). Donnes style, full of elaborate metaphors and religious symbolism, his flair for drama, his wide learning, and his quick wit soon estab lished him as one of the greatest preachers of the Renaissance Era (Jokinen 1). Donne used literally everything around him to paint a picture of inspiration. The inspiring poet went by means of a lot of rough patches in his life and the show in his writings. If one studied his work, they could tell when Donne was going through a joyous time, a loving time, a rough time, or just a mediocre time.In his brilliant writing, we learn of his family anxieties (the death of a daughter, a son missing in action, his own departure abroad) and his remorse for past sins (Kermode 2). Donne also wrote when his wife passed during childbirth. A major part of John Donnes success was when he was a preacher. He was one of the most successful preachers of his time. His sermons cut deep to the core because he didnt just preach at stack, he talked to people. He discussed things rather than frame things in your face.Donne relied on everyday situations and morphed them into works of art. People craved thi s remarkable writers words, and they hung onto them desperately. Donne was very relatable to his audiences and I believe that is why he had so much success. He was a very talented and very intellectual man. My love, Im not leaving because Im tired of you. The manhood cannot show me a better love than you. Im leaving because I have to. The sun has already set last night and come up today. He cannot understand how to go a shorter way because he only knows the one.But believe me I will make faster journeys since I dont have so far to go. How weak is a mans power, that if his good fortune fails him he cant live any longer, or remember anything else. But if something bad happens, and we join together with our strength and we nurture it then we will overcome it. When you sigh, you sigh not the wind, but you sigh my reason away. When you weep, gloomyly, my blood will dry up. It cannot be that you love me as you say if in you, in my life, waste the best of me. Let not your heart approx imate Im bad.Destiny will play its part and may our tears fulfill. But think that were authentically just asleep, we keep each other in hearts alive, never to be parted (Song n. p. ) In John Donnes poem, Sweetest Love, John Donne is writing to his beloved wife Anne as he prepares to go on a long journey. Donne explains that he is not leaving to be cruel, or because of his wife, but because he needs to go on a journey. I would characterize the speaker as a man who loves his wife very much and wants what is best for her. He also doesnt want her to be sad while he is gone.John Donnes tone does not throw during the poem. His tone at the beginning of the poem is puffing and gentle. There is a slight change in the third stanza. It changes from a light, gentle tone, to a sad, slightly gloomy tone. Clearly, he loves his wife and wants to be with her, but he just isnt able to do so. The situation of the poem is that Donne and his wife will be parted physically, but not mentally. In the fi rst stanza, Donne uses a phrase that I really like, and I believe that it is vital to understanding the poem and the poets tone. The phrase says But since that I Must die at last, tis best To use myself in jest Thus by feignd deaths to die. (Song) Donne is locution here that the temporary parting is simply practice for when one will eventually pass. He is trying to tell Anne that she needs to act as if Donne had died, in influence to make it easier if he passes before her. Another phrase I love is When thou sighst, thou sighst not wind, But sighst my soul away (Song) I love how personal Donne is here with his wife by saying the he is so much a part of her that when she breathes, she breathes his soul.In the second stanza, Donne makes an analogy between his own personal journey, and the suns journey. Donne makes this analogy in order to comfort his wife by explaining to her that just like the sun goes away at night it will always come up in the morning. Donne is say his wife that he will come back to her. The poet uses short sentences in each of the six eight-lined stanzas. The syntax of the poem puts a comforting feeling, which is how I believe the author wanted it. It reveals an optimistic state of mind. The poems stanzas develop and get deeper the farther you get into the poem.Donne just continues to express his love for his wife and to comfort her. The poem does contain a rhyme scheme, and that helps the poem flow. It provides elegance to the poem. The theme in this poem evidently states that no matter how far away physically you are from your loved one, you will always be there in their heart, and you two will neer parted be (Song). John Donne was a phenomenal writer who wrote with not just a pen, but his heart and soul. His writing is very personal and when one reads his work, that person can definitely depend that in his powerful words.Donne was not just a writer or a preacher, but a person with an amazing talent to capture people with his words. Wo rks Cited Jokinen, Anniina. The Life of John Donne. Luminarium. 22 June. 2006. 14 Nov. 2012. Kermode, Frank. John Donne. British Writers Ed. Ian Scott-Kilvert. Vol. 1. New York Charles Scribners Sons, 1979. Literature Resource Center. Web. 7 Nov. 2012. Song. N. p. poemhunter. com. web. 19 November 2012. 2012. Stringer, Gary A. Donne, John. World intelligence Advanced. World Book, 2012. Web. 12 Nov. 2012.

Thursday, May 23, 2019

Cultural Issues in Middle School Essay

Middle school is superstar of the most difficult situations of transition. Middle schoolers atomic number 18 awkward, hard to deal with and confused. They arent children solely certainly not adults. They are egocentric to say the least and have little concern for the consequences of their actions. Yet, they are also one of the best ages to report with, if one is de bumping to try to understand their difficult lives. The culture in middle school can be broken down as such sexuality, intellect, and genial status. Sexually, these students have to deal with their changing bodies and feelings.They also have to try to understand how these feelings and changes fit in appropriately within the community. This is the area they are most light-sensitive toward. Intellectually, students have to decide if being smart is something they are willing to do. In some surrounds, being smart is cool, so those students who are gifted have no trouble fitting in. In other schools, these students are ou tcasts. When it is not cool to be smart, many students have a hard decision to make. If they show their gifts, they may sacrifice social standing.When it is cool, the struggling students feel even more left out and troubled. At times, these students may even act dumber to try to hide how such(prenominal) they truly struggle. Social status varies with each school environment. Wealth, possessions, address, family legacy and athletic ability are all indicators of success. Middle school is a contest and students are constantly scrutinizing each other to see who will win, popularity being the prize, of course. There are leadership and followers the status symbols then change as the leaders themselves change.Whether it is the newest clothing label, shoe or track star, the culture of middle school is dominated by judgment. Evaluation The Illuminative Model of Evaluation rests its assessment on process. It appraises establish on qualitative analysis of a situation in order to understand its initiation as clearly as its conclusion. Thus, in order to valuate a situation, one must ob act the effects of the process not simply look at data. The following tools of assessment are based upon that sham and are applied to the political program overall. Several lessons will be used that typify the learning environment created within the yearroom.Evaluation One How does this lesson provide skills that work outside the testing environment? To evaluate this lesson, the calendar of lessons was assessed. Questions were asked such as, how do the lessons flow and what overall messages are the students receiving? Can they define, find and reach the concepts discussed in class? Upon reviewing the lessons, they seem to present isolated concepts. The entire unit is research process and narrative writing techniques which are two genres and should be taught separately. These lessons are trying to do way too much too fast.Middle school students are more successful when you break the p rocess down and connect it to real military personnel reasons for completing the work. If they wouldve started with day five, reading the memoir, then they could use the text to help define and find the spoken language. Once they can do that, then they can apply the concepts such as writing dialogue, good word choice and using sensory language. The lesson plans as they are, present interesting skill sets but they arent attached to the question of, how do I apply this to reading and writing outside school.These skills might help them pass a test, but if you ask them to write dialogue, they will not know how. The non-fiction author board is a great idea but is not developed. They are completing tasks that have a function. This project should be enhanced by having students read Georgia authors and doing actual research and a research project on their author. This schedule needs to be totally revamped in order to serve the real world needs of the students. Evaluation Two Does this le sson connect to a kin environment? As is, there is no continuative with the home environment.This will lessen the importance of the work and disconnect the families from what the students are learning. To enhance the process, when having the students write narratives, why not have them collect narratives from family members? This validates the home environment while creating an interest in the school environment at home. For the research section, they could research their family tree or conduct a survey at home regarding their familys favorite authors. The greater the involvement from the home, the greater opportunity to work with the family for the students well being.Evaluation Three What purpose does technology serve? This also needs improvement. There is no use of technology which works against evaluative point number one. In the larger society, students must be technologically literate. Students should research using the internet, present their projects via power point, and u tilize online oral history collections to hear memoirs. Computers should not only be used to type in language arts but should be used as a tool for diversification of learning styles and presentation methods. Conclusion Overall, the learning process in this curriculum model needs to be improved.The questions of evaluation, based on the Illuminative Model, show that the process is flawed. Although there are many interesting lessons, they dont flow in concert to teach an entire concept that can be applied to a real world learning situation. The terms need to be taught as part of an entire concept. Students can then define, find and apply what they have learned rather than simply be occupied for a 45 minute counteract of time. According to this model, students are more successful when the process is improved. The product should be the last point of evaluation rather than the first.

Wednesday, May 22, 2019

From the Nature of the Education System Depicted by the Organizational Structure, Critically Discuss Problems That Can Result from Such a Structure and Suggest Solutions.

From the nature of the precept constitution depicted by the organizational structure, critically discuss problems that provide turn expose from such a structure and suggest solutions. Introduction Zimbabwe as a nation believes in nurture for all. Systems atomic number 18 in place to ensure everyone has portal to education. This paper will examine the structure of the Zimbabwean education brass, highlighting problems which may arise because of its nature, and attempt to give solutions. Two terms, education organisation and organizational structure, are defined. Definition of terms Education systemAccording to Wikipedia, Education in its broadest sense is any act or experience that has a fictile effect on the mind, character, or physical ability of an individual and in its technical sense education is the process by which society deliberately transmits its accumulate k straightledge, values, and skills from one generation to a nonher through institutions. Wikipedia in add ition defines a system as integrated an integrated whole which has a structure, behaviour, interconnectivity of various parts which permit functional as well as structural relationships between each other.The term system may excessively refer to a set of rules that governs look or structure. Education system therefore refers to the structure and behaviour as well as functionality of the entity through which children acquire knowledge, values and skills through a declare set-up. Organizational structure Structure is, according to wikipedia, a fundamental and sometimes intangible nonion covering the recognition, observation, nature, and stability of patterns and relationships of entities. A structure defines what a system is made of. It is a configuration of items.It is a collection of inter-related components or services. The structure may be a hierarchy (a cascade of one-to-many relationships) or a profit featuring many-to-many relationships. Organisational structure therefo re refers to the nature, patterns and relationships within an entity or social arrangement. Nature of the Zimbabwean education system Structure The Zimbabwean education system is a bureaucratic system, which has a hierarchal governing structure which goes from the top to the bottom. The hierarchy begins at the head office where the Permanent Secretary and his team of directors are housed.The Permanent Secretary, is the ripened civil servant, and reports to the Minister, who is a politician and is in charge of indemnity making. The directors are in charge of the various elements within the system, such as quality control, administration, course of instruction and human resources. Below the national, is the provincial train, whose hierarchy is headed by the Provincial Education Director (PED). He has two deputies, one in charge of Quality self-assertion and the other of Professional Administration. There are several provincial level education officers below them.The provincial office also houses other professionals in finance and other departments who report to the PED. At the district level, the District Education Officer (DEO) heads a team of Education Officers (EO)s who supervise education activities within the district. At train level, the head is in charge of the school, and is deputized by the deputy head. Teachers fall below him but they too have seniority levels. This body at school level is responsible for the direct teaching of the child. Other ancillary staff falls below the professionals at school level but report to the head or whoever is assigned, by the head, in the finance office.Having completed base education, which includes early childhood elementary education, children graduate automatically into secondary school, where they are demand to complete quaternion years of schooling leading to an Ordinary Level pass. If successful at this level, they can hold back to high school where they attain Advanced Level passes and proceed to uni versity, or choose to go to other colleges and tertiary institutions. Problems of the Organisational structure, and possible solutions One major problem which may occur because of the bureaucratic nature of the education system is delay in the decision making process.The hierarchical structure poses the major problem associated with bureaucracy. This means that if a problem occurs at the school level or even at district level, answers have to be sought from the top, which may take time. A practical exemplar is when partners want to carry out programmes in districts and have to wait long as education personnel explore authorization from headquarters. This can be solved however by allowing officials at get off levels to make appropriate decisions or designing mechanisms through which decisions can be expedited.The Minister, being the person in charge of policy, may choose to act without very practically consultation with others below him or with stakeholders. Sometimes hasty dec isions are made, and these impact negatively on the ministry. When school fees were denote during the first term 2009, not much consultation was done, resulting in exorbitant fees being charged per term. The majority of parents could not afford to pay the fees for first term, which was pegged at US$150 for urban primordial schools. A teacher, or any other civil servant, whose child went to these urban schools could therefore not pay.Ministers must be accountable to their constituencies, and encouraged through workshops and trainings to get hold of their stakeholders in policy formulation exercises. The popularity of the minister is enhanced through consultation. The problem of non-consultative policies has also occurred with policies such as that of uniforms at schools. A former minister announced a few years ago that there would be a universal uniform for all schools. This caused an uproar, and was never implemented, mostly because the modalities had not been thought out or cons ulted on.The country has a policy that all school children must wear a uniform, though it is the duty of the head to enforce this. There is also a policy which bars schools from exclusion a child on the grounds of non-wearing of uniforms. Such contradictions arise from non-consultation. Encouraging policymakers to have an ear for the public could solve this. Where public opinion is not sought, they can involve key stakeholders, who may be better informed. Headmasters and teachers who are on the ground, are a source of spanking information on practicalities of policies.The curriculum is centralised and determined by subject panels of teachers, education officers, and representatives from the teachers association, universities, churches, and other stakeholder groups. The Curriculum Development Unit within the Ministry of Education and nicety coordinates the subject panels. The primary school curriculum includes mathematics, English, agricultural and environmental science, physical e ducation, social studies, moral and religious education, music, craft and art, and the indigenous languages (Ndebele and Shona).Indigenous tribal languages of the Kalanga, Tonga, Shangaan, Venda, and Nambya are taught during the first three years of elementary education within their communities. A school is not at liberty to determine its own curriculum. There has been a shift in public schools from the Cambridge based curriculum, to a local curriculum whose examinations are administered by ZIMSEC. Subject syllabi are therefore deduced from this national curriculum. The major daub in this is that everyone is restricted to the same education standards, regardless of the nature of education which is academia oriented.Only recently, there has been a thrust for technical and vocational education in schools, with importance also being given to introduction of these subjects in primary school. Expanding technical vocational education can improve the quality of graduates produced from th e education system. This will ensure employable and relevant people for the Zimbabwean economy which is largely agrarian. In view of recent challenges in the economy, a purely donnish curriculum will not help the country.Increased and improved internet use in the education system will also ensure students produced have a wider world view in light of globalisation. The organisational structure within the education system can stifle the grievance process. A teacher is required to report grievances he or she faces through the headmaster (in the event that the headmaster cannot help him or her). The problem lies where the headmaster is the source of the teachers problem. It may be a case of misconduct and the same headmaster is required to forward the reports of the teacher to the DEO.This will see the process taking long. A system can be put in place, which ensures that when grievances are targeted at the headmaster, a teacher can follow-up directly with superiors. Counseling or confi dence teams can also be set up at school level to cater for reporting of issues and their follow-up. The teacher may also be encouraged to seek the advice of the DEO directly. A ministry hotline can also be established to cater for this. Where partners are interested in contributing to the education sphere, there have often been problems associated with the bureaucratic system.Interest is expressed but decisions or authorization takes long in coming. Non governmental organisations (NGOs) usually come with interventions in mind, and donations, whose programmes must be implemented within a specific period. Often, programmes are stalled and the NGO gets to the end of the reporting period without implementing, resulting in failure to liquidate and the funding being returned. A practical example is when one NGO implementing capacity building programmes faced challenges trying to take a senior officer at provincial level within the ministry on an exchange programme to another country .Whi le this system fosters accountability and is ideal for easier monitoring, it can frustrate the efforts of those willing to contribute to the sector where procedures are not explained clearly, or where their efforts are stifled. A change in attitude is needed, where NGOs seize to be seen as enemies of government, as exacerbated by certain political environments. Meetings which clearly explain the operations of NGOs and targets they seek to fulfill also need to be held so as to clarify areas of concern with the ministry.Stakeholder dialogues are important as seen in Manicaland, which now holds them regularly . The education sector is an public organization which is non-profit making. Revenue comes from national treasury. As such, the system is such that remuneration of staff is within public sector standards which stipulate modest payment. Overpayment would result in an uproar by taxpayers. Problems which teachers and other civil servants are currently facing are largely because the sector is not generating profits and therefore cannot afford to pay teachers what they want.Privatization of the sector could contribute to better payment, but this is a phenomenon yet to be explored as even developed countries also have public schooling systems which are in place. The government will have to lobby with external partners to fund education programmes or contribute in the education budget. The structure of the education system in primary school has been said to be ineffective with regards expertise sharing. The structure is such that one primary school teacher is assigned to teach all subjects in a class. In high school, there are various experts specializing in particular subjects.Researchers advocating for the communion Teacher Expertise through Subject Specialisation (STESS) programme at primary school are lobbying for the change in system from one teacher all subjects to specialisation as practised in secondary school. In 2002, an education commission sanctioned the piloting of STESS in a few schools in each province, and the system was adopted by others who have also reported the success as seen by better results. Advocates also note that it will then be easier for children to adapt to the situation when they get to secondary school.The system requires teacher support in the form of capacity development so they keep up on(predicate) of methodologies in subject delivery. Rennie L. J (1985), explains the effects of in-service training on Science teaching and motivation in the classroom. This will go a long way is rejuvenating teaching methodology and enhance delivery effectiveness. The U. S. Agency for internationalistic Development (USAID), in cooperation with the Salvadoran Ministry of Education, has developed a training program aimed at introducing these modern teaching methods into hundreds of schools around the country http//usinfo. tate. gov. The same can happen in Zimbabwe, if these private players are invited to do so. Conclusion The Zimbabwean education system is hierarchical and that poses a lot of challenges with regards setting up of policies, grievance procedures, curriculum decisions, and issues of collaboration with partners such as non-governmental organisations. These challenges can be solved if decision making is decentralized, and the policy formulation process is done consultatively with stakeholders.The government can also lobby with partners so they participate by funding education programmes in the country. References 1. Peace army corps 24 July 2007, New Teaching Methods Stir Enthusiasm in Salvadoran Classrooms USAID train teachers in interactive teaching styles, 2. Web site http//usinfo. state. gov), Bureau of International Information Programs, U. S. Department of State. 3. Rennie L. J (1985), ED280867 The Effect of In-service Training on Teacher Attitudes and Primary School Science Classroom Climates. Research Report Number 12. 4. http//www. wikipedia

Tuesday, May 21, 2019

Changing of America and humanity’s responsibility to society

The challenges of the twenty-first century, whether economic or environmental, ethnical or biological will require new methods of thinking and behaving at both the individual and social levels. There must be an emphasis on changing the perceptions, especially in twenty-first century America, which mevery people have about the nature of personal office and personal empowerment.While it seems obvious enough to say, as Barack Obama asserts that new generations of Americans are waiting for a political relation with the maturity to balance idealism and realism, to distinguish between what can and cannot be compromised (Obama, 42) the ramifications of such a politics of maturity and realism extend to many important areas of American society including economics, technology, and philosophy adn religion. What is necessary for America to meet the challenges of the future is a social cultural acceptance of the fact that responsibility, and not merely the pursuit of self-interests, is a path t o personal empowerment.This last statement whitethorn seem contradictory to many Americans. A great number of people go through themselves in purely materialistic terms and insufficiency what they can get out of society without taking any personal responsibility for the consequences. For some people, invigoration holds no meaning outside of its material dimension and this loss of meaning in American culture has consequences beyond the immediately personal The loss of meaning is a product of modern thought. From Marx and Freud to neuroscience and evolutionary psychology, western thought has systematically undermined responsibility.We have no choice, we are constantly told, because of economic forces, our unconscious, or our genes. Yet, at the same time, we live in a world that presents us with endless choices. (Sardar) As strange as it sounds, the only way to bust the cycle of endless anxiety over our limitless freedom is by pass judgment responsibility for the choices we make. This is a kind of paradox in American society, We want to have it both ways, and so we end up confused and cynical.Our obsession with individuality and self-interest further erodes personal and collective responsibility (Sardar) which means, the less cardinal begins to value their own existence the less responsibility they will feel for their actions. To accept responsibility is, in itself, to accept that life is meaningful and to accept that life in meaningful is an act of self-empowerment. we must learn to derive that Freedom is both a gift and a challenge. It has value only when we respect it and sharpen it individually and collectively. And when we exercise it with responsibility. (Sardar).In this way, a change in the basic philosophical vision present in American culture may tending us to begin to make inroads against the challenges which face us in the new world. As Barack Obama points out, economics in the twenty-first century no longer manipulation along the same mode ls they had embodied for years. He writes that In this more competitive global environment, the old corporate formula of steady profits and stodgy focus no longer worked (Obama, 156). What Obama is driving at with this statement can be considered an aspect of humanizing economics, a must-needed step for America in the twenty-first century.By accepting responsibility for our actions we will understand the connections between the injustices and disparities in society and the damages which have been inflicted upon the environment. Though some of our challenges may be economic and some may be based in moral and honest issues, the unifying factor is always human responsibility. We begin to understand ourselves much more clearly and understand our challenges more clearly when we admit that we live in a world which desperately needs fixing and in which denial is seductively easy and cheap, at least(prenominal) for a time.We must acknowledge and seek to understand the connection between poverty, social injustice, and environmental degradation. (Orr 89) Barack Obamas insistence that the new economics has paved a way clear of the old economics which stressed only self-interests and profits is a key to understanding the kind of view of affair and corporate responsibility which will have to be embraced in American society as we move forward to accept our responsibilities and meet the challenges of the future.Instead of viewing purely bullion and material growth as the only forms of profit in business, corporations of the future will begin to realize that business behavior and government policy toward business requires, more than ever, an appreciation of the firms human dimensions, the dimensions left out of the neoclassical theory (Tomer 1).The future corporation will accept responsibility for its actions and view itself as shaped by not only market forces but by societal ones (Tomer 19) and in so recognizing other forms of success and profit namely, the maintaining of ethical and environmental standards which contribute to the overall growth and well-being of humanity may over-ride present-day obsession with self-interest and materialistic profit.If Barack Obamas writings in The Audacity of hope are any real indication of the politician of the future or the President of the future it si clear that America still has the capacity to cock-a-hoop adn recognize leaders who can summon a bold-enough vision as well as present workable solutions to meet the challenges we have at least partially created for ourselves.

Monday, May 20, 2019

Proper Conduct in a Classroom Essay

Being respectful in class is important to the social structure of the educational environment. Without a certain degree of respect it would upset a lot of our valuable attention, and direct it a vogue from our daily learning. This greatly would hinder our learning abilities and minimizes our educational benefits. The dilemma that we face is that a lot of student to non know how to present the proper sort in class. The good thing is good classroom educate is an easily obtainable skill, but a perishable skill as well before we learn how to demonstrate good classroom mien we must first learn the benefits of good expression. Disrespect in class causes havoc and disorderliness.For instance If angiotensin-converting enzyme were to speak out of turn not only would it upset the follow class mate because they did not get a fair chance to speak, but it would oblige the impression that other people muckle speak out of turn as well. If ever one spoke out of turn at that place would be no way to accomplish any thing. There go forth be too some(prenominal) interruptions, and some students will miss the opportunity to verbalise their ideas. Respecting other and proper educate is the only way to keep order in the classroom.So how do we establish order in the learning environment? It is too simple. It is vital to speak when called upon, so students can get a fair chance to express their ideas, and solution. Plus this helps to alleviate distracts and annoyances. Talking out of turn is not the only distraction. Students should not get up, or leave on their own accord as well. However it is acceptable to ask to be excused.It is in addition important to be mindful of other pupils thoughts, ideas, emotions, and feeling. Spite, and animosity just agitates the concept of learning. Students should give each other constructive criticism, and listen to each others thoughts. It is also important to address the instructor by title (Mr., Mrs., Ms., Miss., Dr., Prof., Sir, Maam .), and address all your comments, concerns, and questions towards the instructor in a polite manner.Respectful behavior in classrooms is easy. However just as easy as it is, it is even easier to forget to utilize this skill. peerless must make a habit of being respectful. It is a system you must employ on a day-to-day basis. If followed the method and example of classroom educate I have previously displayed will help make a more relaxing, and less stressful learning environment.

Sunday, May 19, 2019

Ece Lab Manual Ece 315

science lab MANUAL ECE 315 MICROPROCESSOR BASED SYSTEM DESIGN LABORATORY 1 TABLE OF CONTENTS S. No. statute title of the examine Perform the pursuance utilize 8085 Simulator and 8085 Microprocessor kit in forum phraseology (i). compile a curriculum to add 2 8- secondment song. (Or) Write a class to add ii 16- bit moments. (ii) Write a political platform to cypher cardinal 8-bit numbers. (Or) Write a computer program to subtract two 16-bit numbers.Perform the following apply 8085 Simulator and 8085 Microprocessor kit in assembly language (i) Write a program to multiply two 8 bit numbers by repetitive addition method (Or) Write a program to multiply two 8 bit numbers by rotation method. (ii)Write a program to water parting 16-bit number by 8-bit number. Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language (i) interpreting 1s and 2s complement of an 8-bit number. (ii) Finding 1s and 2s complement of an 16-bit number.Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language (i) Write a program to count number of 1s in a program. (ii) rent hex entropy into two nibbles and swap the higher nibble and lower nibble of that number. Write a program to convert a 2-digit BCD number into its binary homogeneous number. Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language (i) Write a program for periling BCD down riposte. calculationer should count numbers from 99 to 00 and it should maturation aft(prenominal) every 1 sec. (ii) Write a program for displaying binary up antagonistic. sideboard should count numbers from 00 to FFH and it should increment after every 0. 5 sec. Interfacing of Seven segment display with 8085 microprocessor. Interfacing of D/A converter with 8085 microprocessor to move over RAMP wave. Interfacing and control of stepper motor using 8085 microprocessor. Design 8085 Microprocessor based Traffic luminousness co ntrol. foliate No. 1 3 2 7 3 11 4 15 5 17 6 19 7 8 9 10 21 23 25 26 2 Experiment 1 1. Aim Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. Write a program to add two 8-bit numbers. (Or) Write a program to add two 16bit numbers. ii.Write a program to subtract two 8-bit numbers. (Or) Write a program to subtract two 16-bit numbers. Equipment necessary 8085 microprocessor kit 2. erudition intention a. To acquaint with 8085 microprocessor performance. b. To determine the addition and subtraction of two numbers. 3. program Program ( i. a ) Program (i. b) 3 Program ( ii. a) 4 Program ( ii. b ) 5 4. demand Results Input 1st number . 2nd number Output Addition of two numbers . Subtraction of two numbers .. 5. Cautions a. in front register the program entreat RST key on 8085 kit. b. good care must be interpreted plot of land intervention the microprocessor kit. . information outcomes Mathematical operations using 8085 kit. 6 Experimen t 2 1. Aim Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. Write a program to multiply two 8 bit numbers by repetitive addition method (or) write a program to multiply two 8 bit numbers by rotation method. ii. Write a program to divide 16-bit number by 8-bit number. Equipment required 8085 Microprocessor kit. 2. instruction Objective a. To acquaint with 8085 microprocessor performance. b. To determine the division and multiplication of two numbers. 3. Program Program (i. a) 7 Program ( i. b) 8 Program (ii)MVI E, 00 Quotient = 0 LHLD 2200H Get dividend LDA 2300 Get gene MOV B, A put in divisor MVI C, 08 Count = 8 NEXT DAD H Dividend = Dividend x 2 MOV A, E RLC MOV E, A Quotient = Quotient x 2 MOV A, H SUB B Is roughly significant byte of Dividend divisor JC overleap No, go to undermentioned step MOV H, A Yes, subtract divisor INR E and Quotient = Quotient + 1 SKIPDCR C Count = Count 1 JNZ NEXT Is count =0 reiterate MOV A, E STA 2401H Store Quotient Mov A, H STA 2410H Store balance HLT End of program. 9 4. Required Results Input 1st number 2nd number Output contemporaries of two numbers .Division of two numbers .. 5. Cautions a. ahead work out the program iron out RST key on 8085 kit. b. Proper care must be interpreted time handling the microprocessor kit. 6. Learning outcomes Mathematical operations using 8085. 10 Experiment 3 1. Aim Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. Finding 1s and 2s complement of an 8-bit number. ii. Finding 1s and 2s complement of an 16-bit number. Requirements 8085 Microprocessor kit. 2. Learning Objective Complement of a number using 8085 kit. 3. Assembly language Program (i. a) Program (i. b) 11Explanation This program bumps the 2s complement of an 8-bit number stored in keeping location 3000H. Let us assume that the operand stored at reminiscence location 3000H is 85H. The operand is travel to storage battery from memory location 3000H. Then, its complement is found by using CMA instruction. One is added to storage battery by incrementing it to find its 2s complement. The number is stored at memory location 3001H. Program (ii. a) Explanation This program finds the 1s complement of 16-bit number stored in memory 3000H3001H. There is no direct way to find 1s complement of 16-bit number.Therefore, this can be accomplished by finding the 1s complement of two 8-bit numbers. Let us assume that the operand stored at memory locations 3000H-3001H is 45H-6AH. The operand is loaded into H-L pair from memory locations 3000H-3001H. The lower-order is go from memorialize L to accumulator. Its complement is found by using CMA instruction. The reply obtained is moved spikelet to exhibit L. Then, the higher-order is moved from register H to accumulator. Its complement is found by using CMA instruction. The result obtained is moved back to register H. Now, the final r esult is in H-L pair. 12 The result is stored from H-L pair to memory locations 3002H-3003H. Program (ii. b) Explanation ? ? ? ? ? ? ? ? ? ? ? ? ? This program finds the 2s complement of 16-bit number stored in memory locations 3000H- 3001H. There is no direct way to find 2s complement of 16-bit number. Therefore, this can be accomplished by finding the 1s complement of two 8-bit numbers and then incrementing it to get 2s complement. Let us assume that the operand stored at memory locations 3000H-3001H is 12H05H. The operand is loaded into H-L pair from memory locations 3000H-3001H.The lower-order is moved from register L to accumulator. Its complement is found by using CMA instruction. The result obtained is moved back to register L. Then, the higher-order is moved from register H to accumulator. Its complement is found by using CMA instruction. The result obtained is moved back to register H. H-L pair is incremented to get 2s complement. Now, the final result is in H-L pair. The result is stored from H-L pair to memory locations 3002H-3003H. 4. Required Results Input 8-bit number 16-bit number 13 Output 1s and 2s complement of 8-bit number . 1s and 2s complement of 16-bit number . . Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 6. Learning outcomes Student will be able to learn how to use logical instructions. 14 Experiment 4 1. Aim Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. Write a program to count number of 1s in a program. . ii. Split hex data into two nibbles and swap the higher nibble and lower nibble of that number. Requirements 8085 Microprocessor kit. 2. Learning Objective Swapping of lower and higher nibble of a number. . Assembly language Program ( i ) MVI B,00H MVI C,08H MOV A,D BACK RAR JNC SKIP INR B SKIP DCR C JNZ BACK HLT Program ( ii ) LDA 2200H Get the packed BCD number ANI F0H inter lower nibble R RC RRC RRC RRC Adjust higher BCD digit as a lower digit STA 2300H Store the partial result LDA 2200H Get the original BCD number ANI 0FH Mask higher nibble STA 2301H Store the result LDA 2300H Get the contents of memory location 2300H into accumulator MOV B, A save the contents in B register LDA 2301H Get the contents of memory location 2301H into accumulator.STA 2300H Store the contents of accumulator at voice communication 2000H. MOV A, B Get the saved contents back into A register STA 2301H Store the contents of accumulator at address 2200H HLT Terminate program execution 15 4. Required Results Input Enter the number Output number of ones in number . Result after swapping . 5. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 6. Learning outcomes Students will be able to learn mathematical operations using 8085 kit. 16 Experiment 5 1.Aim Write a program to convert a 2-digit BCD number into its binary equivalent number. Requirements 8085 Microprocessor kit. 2. Learning Objective BCD to binary conversion of a number. 3. Program Sample problem (2200H) = 67H (2300H) = 6 x OAH + 7 = 3CH + 7 = 43H Sample Program LDA 2200H Get the BCD number MOV B, A pitch it ANI OFH Mask most significant four bits MOV C, A Save unpacked BCDI in C register MOV A, B Get BCD again ANI FOH Mask least significant four bits RRC Convert most significant four bits into unpacked BCD2 RRC RRC RRC MOV B, A Save unpacked BCD2 in B register XRA A Clear accumulator (sum = 0) 7 MVI D, 0AH Set D as a multiplier of 10 Sum ADD D Add 10 until (B) = 0 DCR B Decrement BCD2 by one JNZ SUM Is multiplication complete? i if not, go back and add again ADD C Add BCD1 STA 2300H Store the result HLT Terminate program execution 4. Required Results Input Enter 2 digit BCD number Output Equivalent binary number . 5. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. . Learning outcomes Student will be able to learn the use of crapper pointer and roles. 18 Experiment 6 1. Aim Perform the following using 8085 Simulator and 8085 Microprocessor kit in assembly language i. ii. Write a program for displaying BCD down counter. Counter should count numbers from 99 to 00 and it should increment after every 1 sec. Write a program for displaying binary up counter. Counter should count numbers from 00 to FFH and it should increment after every 0. sec. Requirements 8085 Microprocessor kit. 2. Learning Objective Implementation of BCD down counter and Binary UP counter. 3. Program ( i ) LXI SP, 27FFH Initialize stack pointer MVI C, 99H Initialize counter = 99 BACKCALL Display handle display subroutine CALL Delay C on the whole grip subroutine ADI 99H See Addition beneath DAA Adjust for decimal CPI 99H Compare with stopping point count JNZ BACK If no, repeat HLT 19Program ( ii ) LXI SP, 27FFH I nitialize stack pointer MVI C, OOH Initialize counter BACK CALL Display C any display subroutine CALL Delay Call bar subroutine INR C Increment counter MOV A, C CPI OOH Check counter is FFH JNZ BACK If not, repeat HLT Stop Delay Routine Delay LXI B, count Initialize count BACK DCX D Decrement count MOV A, E ORA D Logically OR D and E JNZ BACK If result is not 0 repeat douse Return to main program 4. Cautions a. Before enter the program press RST key on 8085 kit. b.Proper care must be taken while handling the microprocessor kit. 5. Learning outcomes mathematical operations using 8085. 20 Experiment 7 1. Aim Interfacing of Seven segment display with 8085 microprocessor. Requirements 8085 Microprocessor kit, Seven Segment LED & wires. 2. Learning Objective Seven segment interfacing using 8085 kit. 3. Circuit diagram 4. Program MVI A, 80H come forth CR K LXI H, 2000H MVI B, 10H KK MOV A, M OUT PA CALL crack INX H JNZ KK 21 JMP K HLT Delay LXI D, Count Back DCX D MOV A, D ORA E JNZ Back ret 5.Inputs 2000 40H, 79H, 24H, 30H, 19H, 12H, 02H, 78H, 00H, 18H, 08H, 03H, 46H, 21H, 06H, 0EH 6. Result On the Seven segment LED we can see all the Hexadecimal nos displayed with some delay as mentioned. 7. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 8. Learning outcomes Students will be able to learn how to interface seven segment with 8085. 22 Experiment 8 1. Aim Interfacing of D/A converter with 8085 microprocessor to generate RAMP wave.Requirements 8085 Microprocessor Kit, DAC0808, 100nF(2), 1k, Op-Amp 741. 2. Learning Objective Digital to line of latitude converter interfacing. 3. Circuit Diagram 4. Program MOV A, 80H OUT CW MVI A, 00H KK OUT PA CALL foil INC A JMP KK RST 5 Delay LXI D, Count Back DCX D MOV A, D ORA E JNZ Back RET 23 5. Result On the CRO we can see a RAMP wave generated. 6. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 7. Learning outcomes Students will be able to learn how to interface digital to linear converter with 8085. 4 Experiment 9 1. Aim Interfacing and control of stepper motor using 8085 microprocessor. Requirements 8085 Microprocessor kit, stepper Motor, Motor driver circuit (ULN2003) & wires. 2. Learning Objective Stepper motor interfacing with 8085. 3. Program i) To rotate in Clock Wise direction MVI A, 80H OUT CR MVI A, 44H KK OUT PA CALL withstand RRC JMP KK RST 5 ii) To rotate in Anti-Clock Wise direction MVI A, 80H OUT CR MVI A, 44H KK OUT PA CALL DELAY RLC JMP KK RST 5 Delay LXI D, Count Back DCX D MOV A, D ORA E JNZ Back RET 4.Result Stepper motor rotates in Clock wise & Anti-clock wise direction. 5. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 6. Learning outcomes Students will be able to learn how to interface and control stepper motor with 8085. 25 Experiment 10 1. Aim Design a 8085 Microprocessor based Traffic light control for figure shown below with the following conditions Allow traffic to flow from N to S & S to N for 1sec flare all Yellow lights for 0. sec Allow traffic to flow from W to E & E to W for 1sec Glow all Yellow lights for 0. 2sec Make this process continues. Requirements 8085 Microprocessor Kit, 9 LEDs, 5K resistors (9) 2. Learning Objective Traffic light control dodging using 8085. 3. Circuit Diagram 4. Program MVI A, 80H Initialize 8255, bearing A and port B OUT CR (CR) in output mode START MVI A, 09H OUT PA (PA) air out data on PA to glow R1 and R2 MVI A, 24H OUT PB (PB) Send data on PB to glow G3 and G4 MVI C, 28H alloy multiplier count (40 ) for delay 26CALL DELAY Call delay subroutine MVI A, 12H OUT PA PA Send data on Port A to glow Y1 and Y2 OUT 81H PB Send data on port B to glow Y3 and Y4 MVI C, 0AH Load multiplier count (10 ) for delay CALL DELAY Call delay subroutine MVI A, 24H OUT 80H PA Send data on port A to glow G1 and G2 MVI A, 09H OUT 81H PB Send data on port B to glow R3 and R4 MVI C, 28H Load multiplier count (40 ) for delay CALL DELAY Call delay subroutine MVI A, 12H OUT 80H Send data on port A to glow Y1 and Y2 OUT 81H Send data on port B to glow Y3 and Y4 MVI C, 0AH Load multiplier count (10 for delay CALL DELAY Call delay subroutine JMP START Delay Subroutine DELAY LXI D, Count Load count to give 0. 5 sec delay BACK DCX D Decrement counter MOV A, D ORA E Check whether count is 0 JNZ BACK If not zero, repeat DCR C Check if multiplier zero, otherwise repeat JNZ DELAY RET Return to main program 5. Cautions a. Before enter the program press RST key on 8085 kit. b. Proper care must be taken while handling the microprocessor kit. 6. Learning outcomes Students will be able to learn how to design microprocessor based traffic light system using 8085. 27

Saturday, May 18, 2019

Drawbacks of the Common Law System

Explain the drawbacks of the third estate law schema in England and Wales. communal law originated in England in the 11th century. Today in the United States of America, some common law principles from the original English Law atomic number 18 being applied.Alongside it is the branching body of Common Law which is in the process of being set as a part of stare decisis which itself is an abbreviation of the Latin phrase stare decisis et non quieta movere which translates as to stand by decisions and non to disturb settled matters, whereby the statutory systems decisions and interpretation of statutory law provisions by judges, are becoming a part of the common law. Judges to a fault do look to these decisions as a guideline, reference or as a necessary precedent to follow, whilst making their own decisions.Although advantages of the system have been significant in England and Wales, drawbacks of the system little by little came on par. As these decisions are based on past ca ses, predictability of the outcome increased and people are more exposed to what should be expected, however so, with the element of predictability, absurdity on deciding cases may occur. In referring to a decided case, if there appears to be no change and the decision is followed again by a judge, a bad decision will eventually be perpetuated.And considering common law systems have been by-line precedents as a base, changes takes a long time to happen. In the meantime, a bad decision from a past case continues to be upheld. It became a major criticism of common law systems that it can be hard to locate the relevant principles due to the available volume of material. Common law which was based on the principle of binding precedent meant that judges must follow precedent even if they disagree with it.Judges too were not able to distinguish essentially similar cases although they were on grounds decision made would be inappropriate. Lord Denning too criticised the doctrine to stand b y what has been decided by saying, if attorneys hold to their precedents too closely, curt of the fundamental principles of truth and justice which they should serve, they may find the whole edifice comes tumbling down most them. Just as the scientist seeks for truth, so the lawyer should seek for justice.Just as the scientist takes his instances and from them builds up his general propositions, so the lawyer should take his precedents and from them build up his general principles. Just as the propositions of the scientist fail to be modified when shown not to fit all instances, or even discarded when shown in error, so the principles of the lawyer should be modified when found to be unsuited to the times or discarded when found to work injustice. , which in different words meant accepting the decisions of old law racetracks to unfairness and injustice. Furthermore, when precedent appears absent the common law legal system will be bound to face difficulties in making judgement s. Difficulties will arise and pig out various parties which include judges and those with intention to claim justice will be at deep in thought(p) with the unavailability of a decided precedent to refer to. This has been said on certain occasion to lead to a high degree of unpredictability based on illogical distinctions.

Friday, May 17, 2019

Baby Boomers: Effect on Health Care Essay

A muff boomer is a person who was born during the demographic World War II baby boom and who grew up during the period of 1946-1964. This population of Ameri bottomlands lead soon be over the age of 65. When the last of the baby boomers dispatch retirement age, almost 20% of the U.S. population go forth be 65 and older compared to less than 13% today. By 2030, there bequeath be more than 70 million Americans over age 65 (Taylor, 2005). There is a major concern of how this increased population will affect the health care system. health check care for retiring and aging citizens whitethorn strain resources and future generations maybe faced with higher pretension and higher taxes to cover the cost of social security, Medicare, and other retirement benefits (Taylor, 2005). Many people are already feeling the effects with increased cost of premiums, deductibles, and prescription medication.At some point this population is termination to require healthcare. According to, Giganle (2010), over 60% of adults between the ages of 50 to 64 who are working or has a spouse that is working have been diagnosed with at least one degenerative health hold back such as arthritis, cancer, heart disease, high blood pressure, or diabetes. By 2020, Boomers will account for 4 in 10 office visits to physicians. Over the next 20 years, Boomers will make up a greater proportion of hospitalizations as they continue longer but with multiple complex conditions (Giganle, 2010). Prescription drugs will become a major part of medical treatment and is expected to be a major expense. According to the Congressional Budget Office, spending for programs such as Medicare and Medicaid accounted for 3% each of gross internal budget in 2009. By 2035, spending for Medicare alone will have more than doubled to 8% and by 2080 it would have grown to approximately 15% (Peterson, 1999). These generations have different needs and expectations than past generations.In the past many of the older g enerations were not as concerned active their health and many illnesses and diseases much went undetected. They did not visit the set up as much. On the other hand, this generation is more concerned about maintaining their health and living longer therefore they visit the doctor frequently. They are making more doctor visits and using more prescription medications. Many of these prescribed medications are new and very expensive. There is as well cost associated with the number of lab test that are required in order to monitor these medications. citizenry are also living way longer than before, however many of them are living with chronic conditions. The growing number of people with these conditions will also put an increase demand on the healthcare system. Medicare cost for those 65 and older may cause the national debt to dramatically increase. This financial increase may eventually cause a reduction of healthcare for all.Many healthcare practices are now preparing for the ba by boomer generation. Baby boomers will have new technologies and medical services available to help them to live longer. Chronic conditions will create a demand for continuous medical management in twain inpatient and outpatient settings (Peterson, 1999). Some health care providers are preparing themselves as well by looking at the amount of space they have available for increased amount of patients, training their staff for diversity, and having new applied science available for patients to enhance their care. Procedures like minimally invasive surgery, new imaging techniques and remote care technologies will improve the quality of life for many (Taylor, 2005). These new and advanced technologies would allow them new opportunities. All we can do now is brace ourselves as we prepare for the Gray Tsunami the age wave that will by all odds change America.ReferencesGiganle, S. (2010, February 22). How baby boomers will impact healthcare industry. Retrieved from www.cnbc.comPeterson , P. (1999, April 16). Gray tsunami how the coming age wave will transform america. Retrieved fromwww.infoworld.com/../aging-baby-boomers-will-drive-health-care-Taylor, R. (2005). Baby boomers put hurt on healthcare system. Senior Journal, Retrieved from SeniorJournal.com

Critical Path

Graduate Institute of reflexion engineer and charge, National Central University, No. 300, Jhongda Rd. , Jhongli City, Taoyuan County 32001, Taiwan b R&D Center for social organisation excogitate commission, Chung Hua University, No. 707, Sec. 2, WuFu Rd. , Hsinchu, 300 Taiwan Received 7 February 2010 received in rewrite form 12 June 2011 accepted 16 June 2011 Abstract Assessing schedule appreciations jolt on entire hold eon to distri plainlye hold up obligation remains a controversy.N sensation of existent deferral epitome figures is unadulterated because including an element of assumptions, subjective assessment and theoretical disgorgeion. Windows- found block epitome regularitys argon excellent in identifying and metre social organisation schedule sustains. establish on a preliminary report identifying potential problems in available windows- base persist abbreviation manner actings, this piece of work proposes an innovative windows-based live synopsis regularity, called the effect-based handgrip outline regularity acting (the EDAM mode).The EDAM order completes checker summary using extracted windows and memorizes clutches have-to doe withs by considering the effects of sticks on the captious style(s). According to its implementation to vatic cases and comparisons with new(prenominal) method acting actings, the EDAM method is in effect(p) in see digest and effective in puzzle out coinciding cargo decks and determining schedule gelded. The proposed EDAM method is a good alternative for schedule wait psycho epitome for construction projects. 2011 Elsevier Ltd. and IPMA. All rights reserved. Keywords hinder outline Claim Schedule outline wind project 1.Introduction reflection projects generally sport highly complicated situations during execution, involve umteen project stakeholders and interfaces, and ar influenced by many external factors. Therefore, schedule time lags in constructi on projects argon common and affect full(a) project period in unpredictable ways. Delay t distributivelying and evidence are usually recorded and agreeed in different records, documents and schedules during the construction phase. Selecting a suitable check off analysis method and analyzing last information rightly are inseparable tasks in any delayed construction project.Current delay analysis methods analyze delay liabilities based on delay information and evidence. Various analysis methods have been create, such as spheric impact, as- be after, impacted as-planned, net ? Corresponding author. Tel. +886 3 422715134040 fax +886 3 4257092. E-mail address emailprotected edu. tw (J. -B. Yang). impact, time impact, collapsing, unaffectionate delay type, snapshot, window analysis and isolated collapsed but-for (Bordoli and Baldwin, 1998 Gothand, 2003 Hegazy and Zhang, 2005 Kim et al. 2005 Mbabazi et al. , 2005 Ng et al. , 2004 Yang and Yin, 2009 Zack, 2001). Farrow (2007) h ad invitely claimed that none of the delay analysis methodologies is perfect tense because they all include an element of assumptions, subjective assessment, and theoretical projection. Generally, a delay analysis method attempts to discover delay information derived from as-planned and as-built schedules, those are the bases for re closure delay contentions and claims.However, real delay analysis methods politic have the hobby shortcomings (1) coincidental delays butt non be recognized or computed by any(prenominal) of breathing methods (2) the circumstantial style method stop non be executed in analysis and exact path permutes pottynot be considered (3) the relative monetary value of float intake is not considered (4) analysis is not contemporaneous with delay measure and (5) intimately methods focus solo on the delayed activities, and ignoring the effects of time- trimmed activities on resume project period (Arditi and Pattanakitchamroon, 263-7863/$ see fr ont matter 2011 Elsevier Ltd. and IPMA. All rights reserved. doi10. 1016/j. ijproman. 2011. 06. 003 386 J. -B. Yang, C. -K. Kao / worldwide journal of sound projection attention 30 (2012) 385397 2006 Bordoli and Baldwin, 1998 Gothand, 2003 Mbabazi et al. , 2005 Ng et al. , 2004 Yang and Yin, 2009). Further much, Arditi and Pattanakitchamroon (2006), in discussing how to select a delay analysis method, concluded that selecting a feasible analysis method depends on a variety of factors, including information availability, time of analysis, methodology apabilities, time, funds and effort portiond for analysis. Based on a empirical nurture in UK, six group factors (project characteristics, contr authentic requirements, characteristics of baseline program, cost proportionality, quantify of the analysis and record availability) influencing the selection of delay analysis methodologies were identified (Braimah and Ndekugri, 2008). In summary, although some ripe delay analysis metho ds have been beated, including a few commercial systems, existing delay analysis methods gagenot accomplish the practical requirements of delay analysis.That is, practitioners still require an alternative method for tortuous cases. Windows-based delay analysis methods perform delay analysis according to some extracted time frames, called windows. Traditional windows-based method, the windows analysis method, has been recognized as the most creditable delay analysis method (Gothand, 2003 Kim et al. , 2005). US courts have generally accepted some types of windows-based method, as they can calculate the impact of various delays, namely, the non-excusable delays (NE delays) and excusable delays (ED delays).Based on the viewpoint of a adjureor, excusable delays are further divided into excusable compensable delays (EC delays) and excusable non-compensable delays (EN delays) (Zack, 2000 Mohan and Al-Gahtani, 2006). For above delay types, analysis results generated by windows-based m ethods issue a clear obligation assignation to contract parties. This information is valuable for dispute resolution. For a colonial construction project, tercet types of delays (NE, EC and EN delays), world power exist simultaneously.While the information for identifying all types of delays is available, the allocation of come up project delay to above delay types provides more clear delay liability identification. Furthermore, for a contractor, to allocate all delays into these delay types improves its ability to get possible delayed-related expenditure back although the situations for compensable/non-compensable depend in the main on the terms of the contract (Trauner et al. , 2009). It is beneficial to a contractor to distinguish compensable and non-compensable delays. Namely, a perfect delay analysis method is targeted to identify these delay types accurately.To provide an alternative delay analysis method for resolving synchronal delays and liability distribution prob lems and for overcoming the time-consuming drawback of analyzing delays in a twenty-four hourstime-by- solar day manner, this sketch proposes a sweet windows-based delay analysis method, called the effect-based delay analysis method (EDAM), which is a systematic analysis method that considers the impact of delays on the particular path(s) of a project. 2. Available windows-based delay analysis methods Several windows-based delay analysis methods have been developed in the past devil decades.All windows-based delay analysis methods can be divided into two categories (1) performing delay analysis starting signal backward from an as-built schedule and (2) performing delay analysis starting forward from an as-planned schedule. The popular methods in the fellowship of starting forward from an as-planned schedule include the windows analysis method (called traditional windows analysis (TWA) hereinafter), the modified windows analysis (MWA) method, the delay analysis method using d elay class (DAMUDS) method and the daily windows delay analysis (DWDA) method.The TWA method performs delay analysis using extracted schedule windows, sooner than by analyzing delay events in a one-by-one manner forward from the as-planned schedule or backward from the as-built schedule. The MWA method improves analytic processes by the TWA method and uses algorithms to calculate delay liability. The DAMUDS method tries to overcome two limitations in existing methods, namely inadequate accounting of concurrent delays and inadequate accounting of time- truncated activities.The DWDA method calculates clear delay liabilities to the contractor and owner based on day-by-day delay analysis of sarcastic path(s) along the project term. Kao and Yang (2009) compared the above iv windowsbased delay analysis methods using an illustrative case. They controld that the quaternity methods are dynamic delay analysis methods that perform real-time critical path analysis. The TWA and MWA method s are less reliable than the DAMUDS and DWDA methods, since they may lose essential information when the analysis period is long and may be unable to detect critical path changes.The DWDA method analyzes delay information in a day-by-day manner that is the equal as as-built situations, but requires goodish effort during analysis. The DAMUDS method is more efficient than the DWDA method even though both yield the same analysis results. Detailed compared information can be found elsewhere (Kao and Yang, 2009). Other windows-based methods belonging to the form of starting backward from an as-built schedule, such as the isolated collapsed but-for delay analysis method (Yang and Yin, 2009), have been developed for facilitating delay analysis problems by similar border ones.However, these methods perform delay analysis moving backward from an as-built schedule, not forward from an as-planned schedule. The border ones of using as-planned schedule or as-built schedule may derive differ ent final analytic results. This study does not compare the results by the methods belonging to the category of starting backward from an as-built schedule to those by the developed EDAM method. 3. Problems in windows-based delay analysis methods 3. 1. Unable to identify critical path changes In general, whether an legal action is on a critical path is an important signal when identifying its delay impact on total project duration.During the construction phase of a construction project, many situations e. g. , change order, occupation appending or deleting by different site conditions, and critical path changes, affect the outcome of delay analysis. In J. -B. Yang, C. -K. Kao / planetary diary of confinement Management 30 (2012) 385397 387 considering delay information unless for those activities on the critical path(s) in the as-planned schedule, existing windowsbased delay analysis methods may ignore essential delay information from activities during critical path changes. 3. 2.Incapable of dealing with complicated delay situations An ideal delay analysis method should calculate delay information quickly, accurately and stably. Some windowsbased delay analysis methods perform delay analysis based on arbitrarily extracted windows, eyepatch others deal with limited delay situations. As construction projects become increasingly complex, proper delay analysis methods should deal with complicated delay situations (i. e. , concurrent delays, project speedup and compression). Approaches for window stock by the some mentioned windows-based delay analysis methods cannot effectively deal with complex delay situations. . 3. Inefficient delay analysis Windows-based delay analysis methods perform analysis using extracted windows. The time of delay analysis for different methods vary. The rule by the TWA and MWA methods is to select timing subjectively. Conversely, the DAMUDS and DWDA methods select analysis windows objectively. For a complicated delay case, th e TWA and MWA methods might obtain faulty results when using inadequate windows thus the DAMUDS and DWDA methods may waste ample unhurriedness effort due to many windows in a complex project with long duration.How to intelligently select analysis windows for available windowsbased delay analysis methods puzzles a delay analyst. 3. 4. Unclear liability allocation Available windows-based delay analysis methods can identify concurrent delays, but cannot clearly allocate delay liability. For example, the DAMUDS method uses the concept of contractors float to represent the effects of a contractor on schedule management. Although the DAMUDS method can identify concurrent delays based on a contractors perspective, it does not provide a clear liability allocation approach. 4.Methodology development 4. 1. modern concept To provide an alternative method for dealing with problems in existing windows-based delay analysis methods, this study proposes a tonic windows-based delay analysis met hod, the EDAM method, which is a systematic analysis method based on existing windows-based delay analysis methods. The EDAM method performs delay analysis using extracted windows and moderates delay impacts by considering the effects of delays on the critical path. Although the analytical processes of the EDAM method are similar to those in other method, the EDAM ethod solves the problems mentioned previously. The EDAM method consists of analytical procedures with baseline schedule development and algorithms for liability identification and calculation. 4. 2. Analytical procedures Fig. 1 shows the analytical processes in the EDAM method. The EDAM method uses an as-planned schedule as a basis for delay analysis, and requires clearly identified delay attributes (delay start, earth up and liability) for delay liability calculation. Before delay impact calculation, the EDAM method applies the critical path method to determine a comparison baseline.Based on this comparison baseline, t he EDAM method performs schedule analysis by considering two situations with and without a delay in an analyze period. If no delay occurred in an analyzed period, the EDAM method considers whether the cognitive operation of project acceleration exists. If a delay is identified in an analyzed period, a day-by-day delay analysis is executed to calculate the impact of a delay when the delay is on a critical path. In delay impact calculation, the concurrent delay is detected and its liability is then assigned to contract parties.Similar to the other windows-based methods, the EDAM method performs delay analysis using two viewpoints, namely, those of owner and contractor. Therefore, the EDAM method allocates delay liability for each contract fellowship and collects the performance of project acceleration by the contractor for each analyzed period. The EDAM method performs schedule analysis until all analysis periods are complete. 4. 3. Baseline schedule development approach A baseline for delay impact calculation is determined using the following four approaches which determine the duration, start find out, and finish visit for each legal action. Completed activeness. The start and finish dates for completed activities are assigned based on echt start and finish dates in which delay information is embedded. Started-without-delay activity. For un-delayed started activities, start dates are assigned based on genuine start dates finish dates are determined based on actual start dates rundown consumed activity duration with remaining duration (asplanned duration minus consumed duration). Started-with-delay activity.For those delayed but started activities, start dates are assigned based on actual start dates finish dates are determined using actual start dates plus the consumed activity duration, delayed duration and remaining duration. Un-started activity. For activities not yet started, their start and finish dates are determined by their predecessors by considering predetermined logic relationships with the asplanned duration. 4. 4. Approach for determining analysis timing For solving the limitations of existing windows-based delay analysis methods in window determination depicted in 388 J. -B. Yang, C. -K.Kao / International journal of Project Management 30 (2012) 385397 Preparing the as-planned schedule Identifying delay attributes and determining analysis periods Updating schedule-related information Performing CPM calculation Analyzing the difference between updated and baseline schedules A period with out delay A period with delay Analyzing delay impact day-by-day Identifying the number of critical activity No shortening performance NO Project schedule shortening? YES Calculating the performance of schedule shortening NO synchronous delay? YES Allocating liability of concurrent delay NO NO Delay on CP?YES Two or more delays? YES Cumulating schedule variance Identified delay impact Identified schedule shortening performance C alculating delay liability Final period? YES Summarizing analysis results NO Fig. 1. Delay analysis processes for EDAM. parting 3. 3, the proposed method has an approach to determine the timing for delay analysis. This approach considers the following two situations when determining analysis timing. No delay occurred. In this situation, the time frame without a delay event is designated as a single analysis period. Therefore, all activities have actual durations that are the ame as planned durations. Moreover, if an activitys duration is shorter than the planned duration, the performance of project acceleration is considered. Delay occurred. To accurately calculate delay effects on a construction project, the minimum time frame, i. e. , a day or a week depending on the contract, should be considered. J. -B. Yang, C. -K. Kao / International daybook of Project Management 30 (2012) 385397 389 4. 5. Algorithms for liability identification and calculation The EDAM method calculates project project total duration (Duribase) using Eq. 1) among each analysis period, in which Duriact1 is the actual consumed duration of the previous ? analysis period Duriremained is the remaining duration for all unfinished activities considering logic relationships in the asplanned schedule. Moreover, the EDAM method uses Eqs. (2) and (3) to determine the impacted project duration term considering the liabilities for the owner (Duriown ) and contractor (Duricon). In those two equations, anticipated total project duration (Duribase) is compute by Eq. (1) DuriNE, DuriENand DuriEC represent the impact from an NE delay, an EN delay and an EC delay, respectively.Based on calculation results by Eqs. (2) and (3), the extended duration considering the liabilities of the owner and contractor are determined. Therefore, in each delay analysis period, delay liability for the owner (Dutyiown ) and contractor (Dutyicon) is calculated using an apportioned duration minus the original anticipate d project completion duration, as in Eqs. (4) and (5). After determining the delay liability in each analysis period, the EDAM method summarizes project delay liability for each contract party (Duty ownfor the owner and Duty con for the contractor) from all analyzed periods using Eqs. 6) and (7). act Duribase = Duri? 1 + Duriremained premiere condition is that and one delay event occurred in a time frame the reciprocal ohm condition is two or more delay events occurred concurrently. In the first condition, an activity with zero or negative remaining total float is responsible for the project delay otherwise, the analyzed activity only(prenominal) consumes its usable float. In the second condition, if multiple delays occurred in an analyzed time frame, a further retainer for allocating delay liability is required. Thus, the EDAM method uses Eqs. 9) and (10) to allocate liability for a concurrent delay. The approach of allocating delay liability uses the ratio of a concurrent dela ys delay value to the total delay value on the critical path. Although the calculation results may be some whole days with a decimal, considering the right ratio of delay liability on the critical path, the proposed method does not round up the analytical results. PSTjcon = Durjplanned ? Durjact ? TFjremained 0 CDown = ? i=1 n ?8? 1 DuriCP ? j=1 m A n B A CDEN + CDEC = ? BDuriEN ? i i i=1 DurjCP C C A ?9? ?1? ?2? ?3? ?4? ?5? 0 n B + ? BDuriEC ? i=1 1 DuriCP C C m A ? DurjCP j=1 A A Duriown = Duribase + DuriEN + DuriEC Duricon = Duribase + DuriNE Dutyown i Duriown ? Duribase 0 n n B CDcon = ? CDNE = ? BDuriNE ? i i=1 i=1 m 1 DuriCP C C A ? DurjCP ? 10? = j=1 Dutycon = Duricon ? Duribase i n Dutyown = ? Dutyown i i=1 ?6? Dutycon = ? Dutycon i i=1 n ?7? For the apportionment of concurrent delay liability, several studies (Kraiem and Diekmann, 1987 Arditi and Robinson, 1995) have proposed varied rules. Ibbs et al. (2010) proposed that a recent trend in concurrent delays is to advocate an evenhanded apportionment (i. e. eaning apportionment of days and/or dollars). This fair apportionment has been described as fail rule or comparative negligence (Ibbs et al. , 2010). The proposed method for apportionment of concurrent delays supports the fail apportionment. 5. Hypothetical Case mull over Hypothetical case studies have been widely employ for similar studies in literature (i. e. , Hegazy and Zhang, 2005 de la Garza et al. , 2007 Sakka and El-Sayegh, 2007 Nguyen and Ibbs, 2008 Ibbs et al. , 2010), therefore, this study uses hypothetical projects to demonstrate the capabilities of proposed EDAM method.Furthermore, for comparing the results by other windows-based methods and the proposed method, a hypothetical case used in literature is examined in this study. In addition to considering the impacts of delay events, the EDAM method uses Eq. (8) to determine the performance of project acceleration by a contractor in an analyzed period when no delay exists and the val ue calculated by Eq. (5) is negative. In Eq. (8), TFjremained is the remaining total float for the analyzed activity. As projects are typically managed by a contractor not an owner, the EDAM method does not calculate the project acceleration performance from an owner.To determine the effect of delay event(s) on total project duration, two conditions mustiness be considered independently. The 390 J. -B. Yang, C. -K. Kao / International Journal of Project Management 30 (2012) 385397 Table 1 Information of as-planned and as-built schedules for examine case. Act. As-planned information continuation (day) 1 2 3 4 5 6 7 8 9 10 7 5 7 9 6 4 3 9 5 3 trumpeter Start day 1 1 8 6 6 15 15 12 19 21 Finish day 7 5 14 14 11 18 17 20 23 23 As-built information Duration (day) 11 10 12 9 15 6 5 11 12 5 positive start day 1 1 12 11 11 24 20 26 30 37 Actual finish day 11 10 23 19 25 29 24 36 41 41 5. 1.Case description This study applies the EDAM method and four other windows-based methods to a modi fied test case (Fig. 2), originally developed by Kraiem and Diekmann (1987) and examined by Alkass et al. (1996) and Kao and Yang (2009). This test case has ten activities and an original total duration of 23 days. Based on critical path calculation, the test case has two critical paths, namely the paths of activities 1 3 6 9 and 2 5 8 10. The project was in conclusion completed in 41 days, with 18 days of delays. Table 1 shows the planned and actual activity information for duration, start date, finish date and logical relationships.Table 2 shows delay events, classified as NE, EN and EC delays affecting all activities. To explain the effects of all delay events on each activity, the as-planned and as-built schedules are organized as Fig. 3 and adopted for delay analysis. 5. 2. Summary analytical procedures According to the processes shown in Fig. 1, this study performed delay analysis for the test case. For each delay analysis scenario in Fig. 4, Eqs. (1) to (3) are used t o determine anticipated project duration, the impacted duration considering one delay caused by the owner or contractor, respectively.Consequently, the EDAM method employs Eqs. (4) and (5) to calculate the delay liability allocated to the owner or contractor, respectively. While all 34 delay periods were complete, Eqs. (6) and (7) are used to summarize all delay liability allocated to the owner or contractor, respectively. 5. 3. Final results Based on the test case consisting of original as-planned and as-built schedules, delay events and related responsibilities, delay analysis was performed using the EDAM method and four other windows-based methods, i. e. the TWA/MWA, DAMDUS and DWDA methods.Table 3 lists identification results for different delays, and the timings of the critical path changes. Table 4 summarizes analysis results. Compared to actual delay information (Tables 3 and 4), the DAMUDS, DWDA and EDAM methods accurately calculated the values for the NE, EN, EC and concurr ent delays. The TWA and MWA methods do not calculate the concurrent delay, and calculate the NE delay incorrectly. The information for NE, EN and EC shown in 0 0 0 0 0 Start 0 0 0 0 0 7 1 0 5 2 0 7 7 5 5 7 7 5 11 5 5 7 3 0 9 4 6 6 5 0 14 14 14 20 11 11 1 2 2 3 4 5 6 8Tables 2, 3 and 4 confirms that the proposed method can accurately identify those delay information that DAMUDS, DWDA and EDAM methods do. In addition to its calculation accuracy, the EDAM method identifies right critical path changes and has adequate analysis scenarios to perform delay analysis efficiently. That is, the EDAM method yields an accurate calculation result with economic analysis times. 6. Discussion 6. 1. Efficiency for delay analysis To compare the might of the EDAM method to that of the other four windows-based methods, all studied methods use the same test case. Fig. shows the analysis periods used by all methods. The TWA and MWA methods employed the start and finish dates of key delay events as the timing for extracting analysis periods the DAMUDS method determined the timings of delay sections from the start, change and finish dates of any delay event, while the DWDA method analyzed delays on a day-by-day basis. Detailed parameters for the four methods can be found elsewhere (Kao and Yang, 2009). Notably, the current country of the art in delay analysis through discussed methods is performing delay analyses by the schedule analysts manually, because only a few of methods are computerized.Therefore, this study concerns the efficiency of studied methods by the number of analysis times (analysis runs), rather than the computing times (total duration). 14 14 14 20 11 11 4 6 0 3 7 6 9 8 0 18 18 17 23 20 20 20 20 3 10 0 23 23 18 18 5 9 0 23 23 23 23 ES LS 0 End 0 Duration military action TF 23 23 EF LF Legend Fig. 2. antecedence diagram for test case. J. -B. Yang, C. -K. Kao / International Journal of Project Management 30 (2012) 385397 Table 2 Delay information for test case. A ct.NE delay Duration (day) 1 2 3 4 5 6 7 8 9 10 Sum 3 1 3 1 1 3 12 Start day 1 3 12 13 22 32 Finish day 3 3 14 13 22 34 EN delay Duration (day) 1 3 5 1 2 2 14 Start day 7 4 19 30 35 37 Finish day 7 6 23 30 36 38 EC delay Duration (day) 1 2 3 2 1 1 2 12 Start day 7 15 14 24 23 33 39 Finish day 7 16 16 25 23 33 40 391 Total delay 4 5 5 9 2 2 2 7 2 38 Based on the analysis periods shown in Fig. 4 and Table 4, the number of analysis times for the TWA/MWA, DAMUDS, DWDA and EDAM methods are 17, 20, 41 and 34, respectively.Notably, one analysis time operator to perform one analysis scenario. The DWDA and EDAM methods have the same accuracy level however, the EDAM method is more efficient than the DWDA method. In the test case, the EDAM method saves 17% in the number of analysis times than the DWDA method. For complicated construction projects the number of activity and the complexity of delay events are increased, the numbers of analysis times by th ose methods are increased consequently therefore, the EDAM method is a more efficient calculation approach than four other windows-based methods. 6. 2.Ability to identify critical path changes Delay claim in the construction industry usually considers delays on the critical path(s) therefore, identifying critical path changes is essential for allocating delay liability. The as-built schedule in Fig. 3 shows real situations of critical path changes while delays appear on the critical paths. Table 3 shows the real timing of critical path changes and the analysis results from different delay analysis methods. In summary, eight critical path changes occurred in the test case. The DWDA and EDAM methods correctly reflected the real situations.Furthermore, the EDAM method calculated the delay impacts on total project duration by only considering the delay on the critical path correctly. Detailed information concerning liability allocation is discussed in Section 6. 4. 6. 3. Ability to deal with concurrent delays and project acceleration To identify the appearances of a concurrent delay and project acceleration, the EDAM method uses a minimum cycle time, one day, as its analysis period. For example, one concurrent delay (one day) appears on day 14 in the test case. The EDAM method accurately identifies this concurrent delay shown in Table 3.If the analysis period exceeds the duration of the concurrent delay, the concurrent delay would not be detected. Notably, in an as-built schedule, the situations of project delay and project acceleration do not occur concurrently. Project acceleration means shortening the duration of activity on original critical path(s), by which a project is completed earlier than planned completion date. While the duration of critical-path activities is trim down, two situations occur. iodine is the shortened activity is still on critical path the other is the activity is changed from a critical activity into a no-critical activity.The former one does not cause different analysis result. The latter one might result in different results and is discussed in this study. In Fig. 5, the test case with quintuplet activities has one critical path, namely the path of activities 2 4 5. Finally, this case was completed in 14 days with three days acceleration. In the as-built schedule (the bottom part in Fig. 5), it is clear that, activity 2 shortened one day and activity 4 shortened three days. Fig. 5 shows the complete analyses, in which five analytical scenarios were performed. Notably, according to the algorithm shown in Eq. 8), the performance of project acceleration is caused by activity 2 with 1 day (5-4-0) and activity 4 with 2 days (9-6-1), which are calculated during analytical scenario 1 (day 14) and 3 (day 810), respectively. 6. 4. Liability allocation approach The EDAM method has an approach that allocates delay liability based on the ratio of an analyzed concurrent delay event to the total delay values on the criti cal path. As the information shown in Table 4, the DAMUDS and DWDA methods can identify concurrent delays, but cannot clearly allocate delay liability.Those two methods provide the same concurrent delay value of 1 day, that is, the analysis period. In the test case, one concurrent delay appears on day 14, in which activity 3 encounters an NE delay while activity 5 has an EC delay. According the allocation approach (described by Eqs. (9) and (10)), the duration of activities 3 and 5 should be calculated. Notably, the duration of an activity on the critical path just considers the conditions up to the analysis period. Therefore, 392 NO. Duration 1 7 3 7 6 4 9 5 2 5 4 9 5 6 7 3 8 9 10 3 thoroughfare 1( 1 3 6 9) road 2( 2 4 7) mode 3( 2 5 8 10) vituperative itinerary NO. 1 3 6 9 2 4 5 7 8 10 2 3 4 5 6 7 8 9 As-planned shedule 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 J. -B. Yang, C. -K. Kao / International Journal of Project M anagement 30 (2012) 385397 CP 1 CP 2 Act. Dur. 1 2 3 4 5 6 7 8 11 NE NE NE EN 12 6 12 10 NE EN EN EN EC 9 15 5 11 5 Note delay project completion Path 1( 1 3 6 9) Path 2( 2 4 7) Path 3( 2 5 8 10) 9 As-built schedule 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 concurrent delay NE NE NE EC EC EC EC NE NE NE EN EN EC EC NE EC EC EC EN EN EN EN EN NE EC EN EC EN ENFig. 3. As-planned and as-built schedule with delay liability. J. -B. Yang, C. -K. Kao / International Journal of Project Management 30 (2012) 385397 EDAM summary TWA/MWA Period DAMUDS DWDA NO. Duration 1 11 3 12 6 6 9 12 2 10 4 9 5 15 7 5 8 11 10 5 Path 1( 1 3 6 9) Path 2( 2 4 7) Path 3( 2 5 8 10) 1 2 1 3 4 1 2 1 2 3 4 1 2 3 4 NE NE NE 5 2 3 5 5 6 7 3 4 6 7 8 6 7 8 EN 22 9 10 11 12 13 14 15 16 17 18 19 20 21 23 5 6 7 8 9 10 11 7 8 9 10 11 12 6 13 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 NE NE NE EC EC EC EC 4 5 24 12 14 31 31 25 26 27 28 29 30 31 32 33 34 13 14 15 16 17 17 18 19 20 15 16 32 33 34 35 36 37 38 39 40 41 32 33 34 35 36 37 38 39 40 41 42 NE NE NE EN EN NE EN EN EN EC NE EC EC EC EN EN EN EN EN NE EC EN EC EN EN EC EC Fig. 4. psychoanalysis period partition by EDAM and other methods. 393 394 J. -B. Yang, C. -K. Kao / International Journal of Project Management 30 (2012) 385397 Table 3 Analysis results by EDAM and other windows-based methods.Type NE delay S/N 1 2 3 4 5 1 2 3 4 5 6 7 8 9 10 1 2 3 4 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Timing in day 1 2 3 12 13 4 6 19 20 21 22 23 30 37 38 7 15 16 33 14 1 2 3 5 6 12 14 19 21 23 36 37 38 40 Actually occurred Y Y Y N Y N Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y N N Y Y Y N Y N N Y Y N Y Total 4 EDAM Y Y Y N Y N Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y N N Y Y Y N Y N N Y Y N Y TWA/MWA Y Y Y Y Y Y N Y Y Y Y Y Y Y Y Y Y Y Y N N N Y N Y N Y N N Y Y N Y Y DAMUDS Y Y Y N Y N Y Y Y Y Y Y Y Y Y Y Y Y Y Y N Y N N Y Y N N Y N Y N Y Y DWD A Y Y Y N Y N Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y N N Y Y Y N Y N N Y Y N suffer delay 9 EC delay 4 Concurrent delay Critical path change 1 8 activity 3 takes 3 days on the critical path while activity 5 takes 4 days on the critical path. The values of delay liabilities for activity 3 (NE delay, attributed to the contractor) and activity 5 3 (EC delay, attributed to the owner) are 0. 43 (1 ? 3 + 4 = 043) 4 and 0. 57 (1 ? 3 + 4 = 043), respectively. Notably, the analytical result is a decimal fraction day because only one-day concurrent delay exists in the test case.In the situation where the NE delay to activity 3 and the EC delay to activity 5 on day 14 were extended to ten days, respectively. Namely, the duration for the concurrent delay is from 1 day changed to 10 days due to the NE delay to activity 3 and the EC delay to activity 5 has been extended to 12 days, respectively. Based on the proposed approach, the values of delay liabilities for activity 3 (NE delay) and activity 5 (EC d elay) are 4. 8 (10 ? 2 12 13 = 48) and 5. 2 (10 ? 12 13 13 = 52), respectively. + + In practice, schedule delays or time computer address claims usually result in cost reimbursement or liquidated damage calculations, the analytical results can service as an accurate tool in such calculations. The analytical results based on the proposed transparent calculation approach will provide a better alternative than conventional method that usually employs a half-and-half approach. 6. 5.Comparison to other windows-based delay analysis methods Based on above discussions and the information shown in Table 4, this study summarizes the differences between the proposed method and the discussed windows-based delay analysis methods, organized as follows. Table 4 Analysis results by EDAM and other windows-based methods. Attributes NE delay (in day) EN delay (in day) EC delay (in day) Concurrent delay (in day) Critical path change (in times) Analysis period (in times) Actual EDAM 4 9 4 1 8 TWA/ DAMU DS DWDA MWA 4 9 4 1 7 20 4 9 4 1 8 41 4 5 9 9 4 4 1 (0. 3 for NE 0 0. 57 for EC) 8 7 34 17 J. -B. Yang, C. -K. Kao / International Journal of Project Management 30 (2012) 385397 As-Planned schedule Act. No. Duration TF 1 7 3 7 1 2 5 0 4 7 0 5 3 0 Path 1( 1 3) Path 2( 2 4 5) Analysis Period day 1- 4 Act. No. Duration TF 1 7 2 3 7 2 2 4 0 4 9 0 5 3 0 Path 1( 1 3) Path 2( 2 4 5) Analysis Period day 5-7 Act. No. Duration TF 1 7 2 3 7 2 2 4 4 9 0 5 3 0 Path 1( 1 3) Path 2( 2 4 5) Analysis Period day 8-10 Act. No. Duration TF 1 7 3 7 0 2 4 4 6 1 5 3 1 Path 1( 1 3) Path 2( 2 4 5) Analysis Period day 1-13 Act. No. Duration TF 1 7 3 7 0 2 4 4 6 5 3 1 Path 1( 1 3) Path 2( 2 4 5) Analysis Period day 14 Act. No. Duration TF 1 7 3 7 0 2 4 4 6 5 3 Path 1( 1 3) Path 2( 2 4 5) 395 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Critical path NW1 1 2 3 4 5 6 10 11 12 13 14 15 16 17 18 19 20 21 22 One day is shortened for project duration One day is shortened for Activity 2 7 8 9 Critical pa th 1 2 3 4 5 NW2 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 One day is shortened for project duration One day is shortened for Activity 2Critical path 1 2 3 4 5 6 NW3 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Three days are shortened for project duration One day is shortened for Activity 2 7 8 Three days are shortened for Activity 4 Critical path NW4 10 11 12 13 14 15 16 17 18 19 20 21 22 Three days are shortened for project duration Three days are shortened for Activity 4 Critical path NW5 10 11 12 13 14 15 16 17 18 19 20 21 22 Three days are shortened for project duration One day is shortened for Activity 2 7 8 9 Three days are shortened for Activity 4 Critical path 1 2 3 4 5 6 7 8 9 One day is shortened for Activity 2 2 3 4 5 6 Fig. 5. Project acceleration detected by EDAM. Comparing to the TWA/MWA method, the EDAM method can deal with the EC, EN, NE and concurrent delays more accurate. Comparing to the TWA/MWA and DAMUSD methods, the EDAM method can perform delay analysis c onsidering critical path changes more correct. Comparing to the DWDA method, the EDAM method can perform delay analysis more efficient. Comparing to the TWA/MWA, DAMUSD and DWDA methods, the EDAM method can allocate delay liability more accurate, and provide a bit of detecting project acceleration. 396 J. -B.Yang, C. -K. Kao / International Journal of Project Management 30 (2012) 385397 6. 6. Advantages and limitations This study proposes a novel delay analysis method for resolving the problems associated with existing windows-based delay analysis methods. The EDAM method has the following advantages compared to existing windows-based delay analysis methods. It has a systematic window extraction method for performing delay analysis stably and efficiently. It adopts a process-based analysis approach to identify critical path changes, concurrent delays and project acceleration. It develops a clear liability distribution approach for apportioning concurrent delays. Although the ED AM method has been tested using hypothetical cases, some limitations exist in applying to solve schedule delay problems in construction projects. The limitations are organized as follows. The classification of EC, EN, NE and concurrent delays must be identified before employing the developed EDAM method. The EDAM method does not discuss float ownership. That is, the one uses the float first who owns the ownership. Construction projects usually encounter complex delay situations.This study just examines the capabilities of the EDAM method using two hypothetical cases that simulate the identified problems. Therefore, the EDAM method might be unable to resolve the complex delay situations that are not identified in this study. 7. Conclusions While schedule delays occur frequently during construction projects, identifying the liability of contract parties accurately has received considerable attention. Although many methods have been developed for analyzing and measuring construction schedule delays, no one method is unexceptionable for all project participants and suitable for all delay situations.An ideal delay analysis method must calculate delay information stably, accurately and efficiently. Some existing windows-based delay analysis methods perform delay analysis based on an arbitrary window extraction some deal with limited delay situations. This study presents the EDAM method, a novel delay analysis method that has a systematic window extraction method for performing delay analysis stably, and adopts a process-based analysis approach to resolve concurrent delays and liability distribution problems accurately. Additionally, the EDAM method performs delay analysis efficiently in a test case.The EDAM method is a good alternative for resolving analysis problems associated with schedule delays in construction projects. The construction industry requires persistent improvements to delay analysis methodology due to industry complexity. Based on research resu lts, this study provides following suggestions for further study. Evaluating the performance of the existing windows-based methods (including the EDAM method) for diverse and real cases can improve the acceptance of all windows-based methods in the construction industry.However, illustrative cases, covering all delay situations or real delay cases are ponderous to retrieve because the cases in the court have limited and simplified information, and information from the arbitration cases is not disclosed. How to develop a protocol for collecting such cases is essential for further development and evaluation. Most available delay analysis methods are not implemented in popular project management systems (such as Microsoft Project and Oracle Primavera P6) or supported by those systems, thus posing a barrier to apply these methods for solving real delay problems.Although capable of providing a basic function for delay analysis, a few systems only perform simple schedule comparisons. F or example, the Claim Digger function embedded in Oracle Primavera P6 can be used monthly to compare different schedule variances in start date, finish date and activity duration. According to the systematic approach provided by this research, developing easy-to-use systems embedded in, based on or supported by available commercial project management systems will enhance the performance of delay analysis methods. The methods for delay analysis can be divided into four categories forecasting, real-time, after-delay-occurred and after-project-completion (Arditi and Pattanakitchamroon, 2006). Most of methods belong to the after-projectcompletion category by those methods some essential documents and evidences may be lost. Developing a method that belongs to forecasting or real-time category can resolve this problem. Furthermore, systems kinetics approach has been recognized and proven to be accommodative for dispute resolution (Weil and Rayford, 1990 Cooper and Lee, 2009).It would b e another good alternative method for schedule delay analysis for construction projects. The proposed method for allocating delay liability provides a better alternative with transparent calculation approach than conventional method that usually employs a half-and-half approach. However, if construction contracts have a clear delay liability allocation clause that employ the proposed method or conventional half-and-half approach, the dispute for delay liability allocation will be diminished.How to draft a suitable clause that provides a clear delay liability allocation approach and fair rights and obligations in a contract can be studied carefully. Acknowledgements The authors would like to thank the National Science Council, Taiwan, ROC, for financially supporting this research to a lower place Contract No. NSC96-2221-E-216-027-MY2. The authors are also thankful to the reviewers for their valuable suggestions and comments. J. -B. Yang, C. -K. Kao / International Journal of Projec t Management 30 (2012) 385397 397 References Alkass, S. , Mazerolle, M. , Harris, F. , 1996. Construction delay analysis techniques.Construction Management and Economics. 14 (5), 375394. Arditi, D. , Pattanakitchamroon, T. , 2006. Selecting a delay analysis method in resolving construction claims. International Journal of Project Management. 24 (2), 145155. Arditi, D. , Robinson, M. A. , 1995. Concurrent delays in construction litigation. Cost engineering science 37 (7), 2031. Bordoli, D. W. , Baldwin, A. N. , 1998. A methodology for assessing construction project delays. Construction Management and Economics. 16 (3), 327337. Braimah, N. , Ndekugri, I. , 2008. Factors influencing the selection of delay analysis methodologies. International Journal of Project Management. 6 (8), 789799. Cooper, K. , Lee, G. , 2009. Managing the dynamics of projects and changes at Fluor. Proceedings of the 27th International Conference of the System Dynamics Society, Albuquerque, New Mexico. Access ht tp//www. systemdynamics. org/ newsletters/2009-10oct/application%20award%20paper. pd. de la Garza, J. M. , Prateapusanond, A. , Ambani, N. , 2007. Preallocation of total float in the application of a critical path method based construction contract. Journal of Construction Engineering and Management. 133 (11), 836845. Farrow, T. , 2007. Developments in the analysis of extensions of time.Journal of Professional Issues in Engineering procreation and Practice. 133 (3), 218228. Gothand, K. D. , 2003. Schedule delay analysis modified windows approach. Cost Engineering. 45 (9), 1822. Hegazy, T. M. , Zhang, K. , 2005. Daily windows delay analysis. Journal of Construction Engineering and Management. 131 (5), 505512. Ibbs, W. , Nguyen, L. D. , Simonian, L. , 2010. Concurrent Delays and Apportionment of Damages. Journal of Construction Engineering and Management. 137 (2), 119126. Kao, C. K. , Yang, J. B. , 2009. Comparison of windows-based delay analysis methods. International Journal of Pro ject Management. 27 (4), 408418. Kim, Y. Kim, K. , Shin, D. , 2005. Delay analysis method using delay section. Journal of Construction Engineering and Management. 131 (11), 11551164. Kraiem, Z. , Diekmann, J. , 1987. Concurrent delays in construction projects. Journal of Construction Engineering and Management. 113 (4), 591602. Mbabazi, A. , Hegazy, T. , Saccomanno, F. , 2005. Modified but-for method for delay analysis. Journal of Construction Engineering and Management. 131 (10), 11421144. Mohan, S. B. , Al-Gahtani, K. S. , 2006. Current delay analysis techniques and improvements. Cost Engineering 48 (9), 1221. Ng, S. T. , Skitmore, M. , Deng, M. Z. M. , Nadeem, A. , 2004.Improving existing delay analysis techniques for the establishment of delay liabilities. Construction Innovation 4 (1), 317. Nguyen, L. D. , Ibbs, W. , 2008. FLORA New forensic schedule analysis technique. Journal of Construction Engineering and Management. 134 (7), 483491. Sakka, Z. I. , El-Sayegh, S. M. , 2007. Float consumption impact on cost and schedule in the construction industry. Journal of Construction Engineering and Management 133 (2), 124130. Trauner Jr. , T. J. , Manginelli, W. A. , Lowe, J. S. , Nagata, M. F. , Furniss, B. J. , 2009. Construction delays understanding them clearly, analyzing them correctly, Second edition.Elsevier Inc.. ISBN 978-1-85617-677-4. Weil, H. B. , Rayford, L. E. , 1990. System dynamics in dispute resolution. Proceedings of the 1990 International System Dynamics Conference, Utrecht, The Netherlands, pp. 13111324. Access http//www. systemdynamics. org/ conferences/1990/proceed/pdfs/weil1311. pdf. Yang, J. B. , Yin, P. C. , 2009. Isolated collapsed but-for delay analysis methodology. Journal of Construction Engineering and Management. 135 (7), 570578. Zack, J. G. , 2000. Pacing delaysthe practical effect. Cost Engineering 42 (7), 2328. Zack, J. G. , 2001. But-for schedulesanalysis and defense. Cost Engineering 43 (8), 1317.