Wednesday, April 15, 2020

The Effects of Autotune on the Music Industry Essay Example

The Effects of Autotune on the Music Industry Essay Throughout the years, musicians and artists have used many different techniques in order to make themselves sound different and to sell records. Quite recently, many musicians and artists have been using a pitch correcting program called Autotune. One rapper/hip-hop artist, T-Pain, is mainly responsible for transforming the use of Autotune. Autotune was first invented in 1997 by Dr. Harold â€Å"Andy† Hildebrand. Dr. Hildebrand founded Antares Audio Technologies in 1990 after working as a research scientist for Exxon from 1976 until 1989, when he realized that the same technology he used to detect oil reserves in the sea floor could also be used to correct a singer’s unruly notes. After leaving Exxon, Hildebrand created a program called Infinity, which allowed musicians and producers to created endless loops of multiple instruments in samples. Due to the success Infinity had attained, the Dr. had decided to move on to his next task at hand. In 1997, Auto-Tune was released. Auto-Tune was a program designed to fix and correct pitch problems in not only singers, but other musicians who played instruments as well. The release of the program gained instant notoriety, as Auto-Tune became an instant phenomenon and grew to become the largest-selling plug-in of all time (www. antarestech. com). Auto-Tune is based on â€Å"phase vocoding technology†, which is an analysis-synthesis algorithm. The software detects the pitch of the voice of the singer or the instrument of the artist, analyzes the pitch along with the overtones and content, and then autocorrects the notes to the desired/correct pitch (www. ow-to-guide. net). In the years following the development and release of Auto-Tune, there wasn’t much commercial use of the product. The first big hit to feature the use of Auto-Tune was Cher’s â€Å"Believe† in 1998 (Blame Cher). Since then, many prominent artists have featured the use of Auto-Tune, such as Kanye West, Lady GaGa, Ke$ha , and of course, T-Pain. About ten years before the release of Auto-Tune, a young boy by the name of Faheem Rasheed Najm was born in Tallahassee, Florida. This young boy would later grow up to become better known as his stage name, T-Pain. We will write a custom essay sample on The Effects of Autotune on the Music Industry specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Effects of Autotune on the Music Industry specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Effects of Autotune on the Music Industry specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In the winter of 2005, T-Pain released his debut album â€Å"Rappa Ternt Sanga† and it debuted at #40 on the Billboard 200, dropping some, and then eventually climbing up to #33 over the next few weeks. Since then, T-Pain has released a total of 3 full length albums and has produced many hits for himself, as well as producing many hits for other rappers and artists. He has been nominated for many awards, and has won 13 (www. t-pain. net). In September of 2009, Smule introduced and released the â€Å"I am T-Pain† application in the app store for download on all iPhones. The application allows its user to simply talk into the microphone and record messages, notes, or even record songs over pre-recorded beats and then Auto-Tune your voice and send your messages to friends (www. iamtpain. smule. com). After Cher’s â€Å"Believe† in 1998, Auto-Tune went out of fashion and no artists were using it. In 2003, back when T-Pain was a little-known artist, he was recording a song in the studio when he put Auto-Tune on his voice. In an article from Time. com, T-Pain said that â€Å"It just worked for my voice†¦ And there wasn’t anyone else doing it. Years have passed since T-Pain’s first experiments with Auto-Tune, and much has changed since then. Since T-Pain’s â€Å"Rappa Ternt Sanga† debuted in 2005, he has had 12 singles in the top 10, dozens on award nominations, and serves as the inspiration behind much of the music of many artists we listen to and love today. While Kanye West was recording his hit album â⠂¬Ëœ808s and Heartbreak’ Kanye flew T-Pain to Hawaii to find out ways that Auto-Tune could be tweaked and manipulated to find new ways of singing. P Diddy offered T-Pain a percentage of the profits off of his next album if T-Pain would give him lessons on how to use Auto-Tune. T-Pain also says of Auto-Tune that â€Å"†¦You can use it to change the mood of a record†. This is most prominent in Kanye West’s â€Å"808s and Heartbreak†, in which he uses the same Auto-Tune effect that T-Pain uses on his hit single â€Å"Chopped N Skrewed† to produce a ghost-like and cold aura that branded the album as one of the year’s best (www. time. com). Although T-Pain started Auto-Tuning his voice because nobody else was doing it and he wanted to sound different, nowadays it seems that just about everybody sounds the same. â€Å"It used to make me sound different†¦ Now I sound like everybody else again† said T-Pain (The New Tune). In response to the sudden explosion of artists that are using Auto-Tune, T-Pain said that people need to start paying him respect – and paying him literally – for their use of Auto-Tune. T-Pain said that other artists are ruining the use of Auto-Tune and that it’s basically over for them unless they start to pay up (www. mtv. com). While many people may criticize and ridicule the use of Auto-Tune and talk about how it is â€Å"ruining† the music industry by leading people to believe that recording artists are pitch-perfect, there is one thing that nobody can deny; it sells records. And there is nothing that musicians and artists want to do more than sell records. Auto-Tune was originally intended to help oil companies find out where oil reserves are save companies lots of money by not having to dig up the group looking for oil when they could find out just where the oil was. Over the course of time, that program evolved into one of the most prominent and recurring effects in the music industry. Although Auto-Tune has its benefits in the music industry, it also has its drawbacks as well. The British television show The X factor had a very controversial week in August when the producers of the show decided to Auto-Tune the voice of one of their contestants. Many people found this outrageous due to the fact that it was a singing competition and the voices of the people they would be paying to vote for were being altered (Blame Cher). This example directly relates to T-Pain because without T-Pain’s use of Auto-Tune, the effect would never have been so popular and would never have been featured on a hit television show. The use of Auto-Tune represents many phonographic effects. The development of Auto-Tune is a direct result of recordability. Without the ability to record music, Auto-Tune would have never been developed and music today would not be what it is. Also, Auto-Tune is a clearly a result of the phonographic effect of manipulability due to its ability to obviously manipulate the way that music sounds T-Pain drastically changed the use of Auto-Tune in pop-culture by paving the way for other artists and taking a pitch-correcting program and turning it into a trademark for himself to be remember by for years to come. Works Cited Antares History.   Antares Audio Technologies. Web. 26 Oct. 2010. . Gleeson, Sinead. LexisNexis ® Academic Library Solutions.   Business Solutions Software for Legal, Education and Government | LexisNexis. 25 Aug. 2010. Web. 26 Oct. 2010. . How Does Autotune Work.   How Does Autotune Work. Web. 26 Oct. 2010. . I Am T-Pain. Web. 26 Oct. 2010. . Reid, Shaheem. T-Pain Says Its Time For Everybody Else To Stop Using Auto-Tune Music, Celebrity, Artist News | MTV.   New Music Videos, Reality TV Shows, Celebrity News, Top Stories | MTV. 9 Nov. 2008. Web. 26 Oct. 2010. . Reid, Shaheem. T-Pain Says Its Time.   New Music Videos, Reality TV Shows, Celebrity News, Top Stories | MTV. 19 Nov. 2008. Web. 26 Oct. 2010. . Soeder, John. LexisNexis ® Academic Library Solutions.   Business Solutions Software for Legal, Education and Government | LexisNexis. 30 Dec. 2008. Web. 26 Oct. 2010. . T-Pain Biography.   T-Pain Home | The Official T-Pain Site. Web. 26 Oct. 2010. . Tyrangiel, Josh. Auto-Tune: Why Pop Music Sounds Perfect TIME.   TIME. com. 5 Feb. 2009. Web. 26 Oct. 2010. .

Thursday, March 12, 2020

The impacts of glass cockpits on pilot performance The WritePass Journal

The impacts of glass cockpits on pilot performance 1 Introduction The impacts of glass cockpits on pilot performance 1 Introduction3.Semi-structured Interviews4   Research Sample4.1 Rationale for selection criteria4.2 Administration of the Research4.3    Research Setting  5. Research Analysis6. Concluding PointsRelated 1 Introduction This study aims to assess the impacts of glass cockpits on pilot performance as perceived by respondents drawn from pilots currently flying these aircraft. The objective of this study include the identification of: i) pilots perceptions regarding the effect of glass cockpits on their performance; ii) the safety aspects derived from these perceptions; iii) the effect of pilot performance on aircraft safety; iv) the human factors affected by glass cockpits; v) the migration by airlines and manufacturers to glass cockpits; and vi) the human performance perspective of the advantages and disadvantages of the use of glass cockpits. Chapters one and two introduced existing literature and previous research undertaken in relation to the impact of glass cockpits on pilot performance with a particular focus on the aforementioned objectives. This methodology chapter explains each stage of the research, data collection and analysis undertaken in conducting the research. 2   Qualitative Research When undertaking research, there are two main research possibilities – quantitative and qualitative. Louis (1981) describes them as both excellent ways of tackling research effectively. He distinguishes between the two by naming quantitative as â€Å"inquiry from the outside† and qualitative as â€Å"inquiry from the inside†. By this, Louis is referring to the researchers involvement and immersion within the data collection – the â€Å"inside† approach involves the researcher more, often leaving a potential hazard of bias. Whereas the â€Å"outside† approach enables the researcher to isolate the phenomenon of bias because of the lack of feedback associated with quantitative research. Qualitative research is often used as â€Å"a form of systematic empirical inquiry into meaning† (Shank, 2002, p. 5) – it is useful for those wishing to complete research in a methodical, ordered and planned way. Authors (Bryman et al 1988; Punch, 1998; Maykut and Morehouse, 1994) all describe qualitative research as a valued method of collecting a bettered, in-depth range of data. However, with the advantage of enriched data comes the disadvantage of researcher bias. As qualitative research was chosen, the researcher had to identify and accept that certain areas of the data collection would be open to bias, either value or objective (Hussey and Hussey, 1997). Referring to Johnson (1994), â€Å"the selection of the research method is a crucial element in the planning of an investigation† (p.174). Johnson also suggests that using a variety of research methods is beneficial to gaining an adequate understanding of the objective results – as suggested in my research proposal. However, it became evident that my access to the great number of â€Å"glass-cockpit-flying pilots† needed to complete questionnaires successfully was limited. It was therefore decided that the best course of action was to select a qualitative approach, and to interview the pilots that met the selection criteria highlighted in the â€Å"Research Approach† section of this methodology. 3.Semi-structured Interviews Kumar (2011) defines an interview as â€Å"any person-to-person interaction, either face to face or otherwise, between two or more individuals with a specific purpose in mind†.   Reasons for employing an interview to collect data a numerous. Depending on the topic discussed, it is possible to obtain in-depth information by probing; an interviewer can often add to data collected not only by verbal means, but also by non-verbal reactions displayed by the interviewee; and, because the interviewer can alter the order / wordings of the questions, it is less likely that the interviewee can misunderstand the question. The author chose to utilise a semi-structured type interview as a hybrid of the two extremes – unstructured and structured – as this would give the best of both worlds. Although a structured interview would i) establish a good base for the interviewee to explain exactly what the author felt was needed,   ii) provide uniform information, in the form of the comparability of the data collected and iii) enable the interviewer to collect the data without having the necessary interview skills for an unstructured interview, this method was discarded as it was nearly impossible for the interviewer to probe new ideas formulated by the answers of the interviewee. For many of these reasons, also, the unstructured interview was, too, rejected. Referring to point iii), this existed as the main reason to not chose the unstructured type interview as this was the authors first attempt at an academic interview.   Thus a semi-structured, or hybrid data collection model was developed: an element of flexibility was permitted to enable interviewees to include relevant information pertinent to the topic in discussion (Patton, 1990; Bernard, 1988). In this respect, the researcher would include an interview guide – as found in a structured interview. However, this was, as said, a guide: the interviewer and the interviewee were able to establish and discuss any points that came up in conversation, some of which were new to the interviewer or perhaps the interviewee. A predominately qualitative research approach was used throughout this study. In this respect, interviews were used as the data collection tool through which the current pilot perceptions of glass cockpits were identified. This method was selected because: It allowed flexibility to follow unexpected ideas during research and explore processes effectively;   It gave sensitivity to contextual factors; Also, the ability to study symbolic dimensions and social meaning;   increased opportunities: o to develop empirically supported new ideas and theories; o for in-depth and longitudinal explorations of leadership phenomena; and o for more relevance and interest for practitioners. -Bryman et al, 1988 Although it is arguable that a questionnaire would have suited this type of study, there were certain concerns with finding the multiple pilots needed to complete the surveys – particularly given the   high   security status post September 11th. 4   Research Sample Consideration into finding the most applicable people for inclusion in this study was needed to ensure that the author chooses the candidates with the required information to achieve the objectives set for the study (Kumar, 2011). This strategy is useful to assess the pilot perceptions of glass-cockpits as, although much researcher has been conducted into glass cockpits, very little has been done into the perceptions of pilots regarding them. The population of this study consisted of 5 interviewees. Purposive sampling was used to identify the particular pilots needed for interview, the selection criteria included: Have flown a glass cockpit within the previous 6 months Have flown an analogue cockpits previously Willing to participate in the interview 4.1 Rationale for selection criteria Firstly, by defining â€Å"previous 6 months† as recent, then we are able to understand that the interviewee must have recent experience in order to acknowledge the disadvantages and advantages of glass cockpits as experienced by them – the longer it has been since the stimuli, the less effects the subject will retain in memory. The rationale for selecting the second criterion was simple: although this study is an exploritive study into glass cockpits, the interviewees must have experience with the older fashioned analogue type cockpits in order to have a valuable opinion regarding their own perceptions. The final criteria suggests that every pilots participation is critical to this study – since the research involved potentially lengthy interviews, every interviewee would need to be willing to take the time to discuss the topic at hand (Chaffee, 1995). Advantages of performing interviews with an acquaintance are well documented by authors. Roger (1988) implies that social norms constrain strangers from interacting in a natural way and Coates (1996) adds that   the presence of recording equipment, and peoples perceptions to it, is less obvious when dealing with a friend or group of friends – ultimately, by interviewing pilots whom   were personally known the the researcher, it is possible to allow the interviewee to become more relaxed and less inclined to shy away from sensitive questions. After designing an interview, but before putting it into practice, there was a chance to try out my interview on a potential subject. This pilot study was a opportunity to develop the interview so that, in future interviews, any problems would be ironed out and questions could be arranged in an order that would suit a naturally flowing conversation. Hundley (2001) suggests that performing multiple pilot studies is advantageous to the researcher, however, due to time constraints only one pilot interview could be undertaken before it was necessary to move onto the actual interviews. That pilot study changed the order of questions within the interview, as well as a few question wordings to make it more logical and easier for the interviewees to understand. 4.2 Administration of the Research When beginning the interview stage of the project, a way of recording the conversations was necessary    this came in the form of a Dictaphone. This made the process of analysing results much simpler than having to take notes and understand them later. Of course, the participants were given full authority on whether or not they wanted the interview recorded – obviously it was competently   explained to them that the interview was completely confidential via an interview confidentiality letter (appendix B). Where possible, the interviewees were given the questions via email (appendix C). The author decided to do this in the hopes that the interviewees would provide more concise and clearer answers. Arranging meetings with pilots was, at first thought, something of a given. However, the pilots whom the author thought were once suitable for interview declared that they had no prior, or very limited, experience with glass cockpits. It was up to me to find suitable alternatives. Luckily, the pilots who had no experience were able to refer me to their friends and colleagues who did have experience with glass cockpits –   the author was able to arrange contact with them via email and telephone. Bennett (1994) discusses the options to improve the chances of the potential interviewees responding to my emails and calls. He states that, by explaining the following points, the interviewee will be more inclined to respond accordingly: Imparting the conviction that the investigation is a worthwhile piece of work and the investigator a competent person to carry it out; Explaining why the investigation seeks the co-operation of the persons or institutions being approached; Indicating the use to be made of the eventual research material.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Bennett (1994, p.174) 4.3    Research Setting Interviews were planned to take place face to face, at a place convenient to both the interviewer and the interviewee. A suitable quiet environment was to be used, in most cases this was arranged in advance – but some were very short notice so the choice of location was somewhat improvised. This is for the interviews that had taken place in person, but as discussed earlier email interviews had been arranged. Due to the nature of   email, there was no way of enforcing the setting – so it was left up to the interviewee to chose a suitable place to respond. I was the interviewer in all bar the two email interviews, it was therefore my duty to maintain the correct track throughout as well as to ensure the interviewees were giving suitable responses to questions. Two of my potential interviewees had requested, due to time-zone differences, that they complete the interview via email – I was more than obliged to do so, so the interviews were sent to them along with appendix B (interview confidentiality letter). Unfortunately, there was no possible way of administrating the email respondents – other than reading through their answers and responding to them with any queries. Each face to face interview lasted between 10 and 20 minutes and were conducted between February and March 2011. The email interviews were between 1000 and 1500 word long and were sent out during the beginning days of March for a expectant reply by the end of March. Other than the emails, no names were used during the interviews – this left the researcher an option to code the names for the data analysis: Email interview 1, Interview 1 etc It was essential for the researcher to transcribe the interviews as soon as practicably possible as too not forget any non-verbal communications made, as discussed earlier. It is also for this reason that the researcher did not complete any more than one interview per day, or per transcribe. i.e. the researcher would only move onto another interview when the previous one was transcribed completely.  Ã‚   To avoid recall error as defined by Kumar (2011): â€Å"error that can be introduced in a response because of a respondents inability to recall correctly its various aspects when replying† when possible, and if time permitted, interviewees were given the opportunity to examine the interview transcripts for conformation and approval.   5. Research Analysis Kumars(2011) four step research analysis was adopted to efficiently summarise and analyse the data collected. The steps were identification of the main themes; assignment of codes for the main themes; responses to the main themes and; integration of themes and responses into the text. The first step involved carefully reading through the interviews collected by each interviewee, understanding the meaning that they communicate (the use of language to express themselves) and categorising the discovered broad themes. The second step uses coding to identify the amount of times, or how frequently, a certain phrase or wording has occurred and pursuing the more specific themes from these. Step 3 analyses the interview scripts collected and assigns certain responses and phrases under the themes chosen in step 2. Finally, the fourth step uses the responses that fall within different themes collected in step 3 and integrates them into the text of the dissertation. Blaxter et al (2006) suggested that most research could be affected by opinions, beliefs   and motivations of those involved – it was essential for the undergoing researcher to remember this throughout this study because it had the possibility to bias results by means of altering the questions asked to accommodate preconceptions known by the researcher. 6. Concluding Points To summarise, this chapter has covered the beneficial aspects and disadvantages of qualitative research, semi-structured interviews and data analysis; how purposive sampling was engaged as a way of implementing assurance that interviewees could offer their perceptions of glass cockpits; and   the various limitations imposed onto the researcher, interviewees and ultimately, the study itself.

Tuesday, February 25, 2020

Trends In HR Technology Essay Example | Topics and Well Written Essays - 2500 words

Trends In HR Technology - Essay Example The benefits to the organization from efficiencies realized when employees change their own HRIS data and â€Å"serve themselves,† to more informed, effective decision making by managers support a transformation of HR’s role within the organization. The role will change from an essentially administrative function to a strategic business partnering function where HR personnel contribute to bottom-line results. HR self-service eliminates the non value- adding administrative tasks that can be handled automatically by the system. HR self-service are somewhat different for employees than for their managers. In all cases, however, the time, cost, and quality improvements enabled by a self-service HR adds value to the organization. Not only are HR department and HRIS administrative expenses sharply reduced, but employees and managers using a well designed self-service system spend â€Å"less time doing more† for themselves, their colleagues and the business.

Saturday, February 8, 2020

City Sustainability Essay Example | Topics and Well Written Essays - 2250 words

City Sustainability - Essay Example This research will begin with the statement that environmental conservation is the key to a successful life. Effective environmental management leads to a sustainable future. The biophysical environment experiences degradation due to population pressure and change in technology. Conserving the environment is the responsibility of every individual in the society. Environmental conservation encompasses education, legislation, and ethics. In most cases, these factors play an important role in influencing personal-level environment, national-level environmental decisions, and behaviors. Environmental conservation emphasizes on waste management strategies, recycling of used materials, and avoiding pollution. Sustainability has been a controversial and challenging issue to the government and the society. Despite the measures taken to conserve the environment, cases of environmental pollution and degradation still exist in the society. Rapid population growth has posed a major challenge in the conservation of the environment. Urban centers have been the main sites of rapid population growth thus facing problems in conserving the places. Cities as industrial areas depict most cases of pollution whether air pollution, water pollution, or even land pollution. Strategies have been each passing day innovated and invented to reduce cases of environmental pollution. The city authorities have been given a hard task of managing the ever-growing city areas.... Overcrowding in cities leads to water shortages, air pollution, land pollution, and mismanagement of the available natural resources. This leads to epidemic diseases that turn out to be the government’s responsibility. As the major places for income sources, it becomes hard for the government to control immigration of people to the city centers. Different people have different perceptions of life and thus different views on environmental conservation. Some people view environmental conservation as burden given unto them rather than an added advantage on their health and safety (Hyyppa, 2010:139). Environmental conservation has led to a decline in the country’s economy as the government tries to reduces cases of environmental pollution and enhance sustainability. FACTORS THAT DETERMINE THE METHODS USED BY CITIES TO ADOPT SUSTAINABILITY Invention and innovation Through innovation and invention, the city council is able to improvise new machines that used in sustaining the city. Moreover, the technology used in a particular city determines the level of sustainability of the city. For efficient sustainability, the city ought to invent high technological machines that are environmental friendly rather than those that cause hazardous effects to the city. Responsibility Responsibility is a main factor of consideration when planning for environmental sustainability. In order to enhance a city’s sustainability, the residents should take it as responsibility. The sustainability of any city requires devotion and concern. Lack of consciousness in maintaining the city’s sustainability both for the present and future generation, it becomes hard and impossible to implement the measures required to make the city sustainable. Sustainability of

Thursday, January 30, 2020

Ecommerce in Bangladesh Essay Example for Free

Ecommerce in Bangladesh Essay 1. Introduction When Electronic commerce, commonly known as ecommerce, is the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Electronic commerce draws on such technologies as electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the at least at one point in the transactions life-cycle, although it may encompass a wider range of technologies such as email, mobile devices and telephones as well. Electronic commerce is generally considered to be the sales aspect of ebusiness [1]. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. E-commerce can be divided into: i. E-tailing or virtual storefronts on Web sites with online catalogs, sometimes gathered into a virtual mall ii. The gathering and use of demographic data through Web contacts iii. Electronic Data Interchange (EDI), the business-tobusiness exchange of data iv. E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters) v. Business-to-business buying and selling vi. The security of business transactions The main areas of e-commerce are following: i. Business to Business (B2B) ii. Business to Consumer (B2C) iii. Business to Government (B2G) iv. Government to Business (G2B) 2. Objectives Our objectives are following: i. To define e-commerce and describe how it differs from ebusiness. ii. To identify and describe the unique features of ecommerce technology and discuss their business significance. iii. To describe the major types of e-commerce. iv. To discuss the origins and growth of e-commerce. v. To explain the evolution of e-commerce from its early years to today. vi. To identify the factors that will define the future of ecommerce. vii. To describe the major themes underlying the study of ecommerce. viii. To identify the major academic disciplines contributing to e-commerce and understand design of an e-commerce engine ix. To identify the opportunity and problem of e-commerce implementation in Bangladesh. x. To identify the future of e-commerce. Volume 2 Issue 2, February 2013 www.ijsr.net 150 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 3. E-Commerce in Bangladesh In Bangladesh there is a limited application and use of B2C e-commerce .This field is not yet much developed in Bangladesh. There are many reasons behind it one simple reason this country is not so developed and most of its citizens are poor and uneducated. It is quit natural that there are few customers who is willing and can shop in internet. It will take years to be developed this sector in bd. The telecommunication infrastructure any country affect the Internet services directly, cause it is largely depended on it. In this chapter Define Need for e-commerce in Bangladesh, different sector in Bangladesh, overview of implementation stage of e-commerce in Bangladesh. And there is some problem such as: low internet speed, no payment gateway and internet range, and recommendation. 3.1 Need for E-commerce in Bangladesh With the increasing diffusion of ICTs, more specifically t he Internet, the global business community is rapidly moving towards Business-to-Business (B2B) e-commerce. The buyers/ importers gain a clear advantage when the Internet gives them access to the global market, by which they can compare prices across regions, find out whether prices vary by order fragmentation, get awareness about substitute/ alternative products. Consequently, the sellers/ exporters make sure that they are well portrayed in the cyber world through websites and portals. Like buyers, sellers also benefit from increased and more efficient access to the global market through the Internet. Bangladesh is pursuing an economic policy of export-led growth. With the rising forces of globalization, it is becoming increasingly important that the private sector, particularly the export sectors are well prepared to meet the requirements and expectations of the importers and also stand out in the competition against exporters in other countries. In such a scenario, two issues are becoming particularly important for Bangladeshi export sectors –one, whether businesses are automating their internal processes with these of ICTs to become increasingly efficient and competitive in a global context, and two, whether businesses have effective presence and participation in the cyber world. International organizations such as UNCTAD (United Nations Center for Trade and Development) and WTO (World Trade Organization) [2] have, over the last several years, put much emphasis on the importance of e-commerce for developing countries. UNCTAD has special programs to facilitate developing countries to transition into e-commerce. The WTO has also develo ped rules and guidelines for global e-commerce transactions. 3.2 E-commerce in Different Sector in Bangladesh Despite being a under developed country, selected segments of the Bangladeshi business community has embraced technology with reasonable success. Personal computers and the Internet are also emerging as day-to-day business tools. These positive indicators are favoring the prospects of e-commerce in Bangladesh. i. RMG Sector ii. Banking on the Web (Online Banking) iii. Online Shopping iv. Web Hosting, Domain v. Online cards, gifts vi. Pay Bill 3.3 The Existing Situation and Potential of E-commerce in Bangladesh Internet services are presently available in Bangladesh. Its usage for e-commerce by the Bangladeshi producers to export as well as to access inputs will be dependent on their willingness and ability to use this medium as well as that of the buyers of final products and the sellers of intermediate goods and services. Figure 1 depicts the three dimensions of e-commerce. Business to-Consumers (B2C) e-commerce is practically non-existent within Bangladesh, while a very limited level of Business-to-Business (B2B) and Businessto-Government (B2G) transactions exists [3]. The potential for use of e-commerce by Bangladeshi consumers and businesses with foreign firms is much brighter, and can play an important role in boosting the country’s exports. A significant volume of B2G is also possible, as the government remains the biggest spender. Figure 1. The Three Dimensions of E-commerce 3.4 E-commerce growth in Bangladesh E-commerce growth in Bangladesh shown in figure 3.2 in the year of 2000 e-commerce business is 11440 million taka. In the years of 2001 business of e-commerce is 15840 million taka and increase year by year 2002 business is 18980 million taka 2002 to 2004 businesses is not very fast but in the year of 2005 business of e-commerce is 22480 and end the year of 2006 business of e-commerce growth is 252000 million taka. Figure 2. E-commerce growth in Bangladesh 4. Methodologies The methodologies of our survey are given below: 4.1 Identification of scope of study 151 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 To accomplish the project objectives, a systematic process is followed. The project process begins with the identification of the project topic where studies was carried out to obtain enough information on the topic. 4.2 Group discussions to collect suggestions on the survey of e-commerce system Discuss with group member about the topic and collect their suggestions on this topic. Also discuss impacts of ecommerce in our society and business and barriers ecommerce in different sectors in Bangladesh and the future of e-commerce system. 4.3 E-commerce site visits as clients Some e-commerce websites visits were made as clients. We visited websites like www.ebay.com, browsed many products, added product to shopping cart, created user account and observed the check out process. We also examined their user interface, front end design and various category of product. We searched products by different types, t he product names and the company name. 4.4 Internet search to collect data on e-commerce growth world wide We searched the internet to collect data on e-commerce business growth based on time, data on e-commerce revenue based on geographic locations. We also collected data about e-commerce business growth and present situation of ecommerce in Bangladesh. 4.5 Architecture and code review of e-commerce site We reviewed the main technologies involved in ecommerce site, which include php sessions, catalog technology, server technology (hardware and software). We also reviewed credit card transaction and shopping cart checkout process. 4.6 Interviews to find what people think about ecommerce We interviewed people from various sections of the society to find out what they think about e-commerce and what changes they needed. We also discussed with them what the advantages and disadvantages of e-commerce systems are. 4.7 Introducing intentional change to understand ecommerce engine We downloaded e-commerce site code and changed the catalog of product, banner, product detail, product image, and increase and decrease number of product show in the main page also changed the theme of e-commerce site. We entered new products and removed selling product and updated the products. 5.1 Architecture This is the design of front-end design shown in Figure 3. There is a one home page, wish list, acco unt, shopping cart, and product list and checkout option. Figure 3. E-commerce site front end design 5.2 Database Structure 5.2.1 E-R Diagram A sample entity–relationship diagram using Chens notation is shown in Figure 4. 5. Technical Design of E-Commerce Site The technical design of e-commerce site include database structure, database schema, table structure, php session, shopping cart, e-r diagram, and credit card transaction. Figure 4. A sample entity–relationship diagram using Chens notation In software engineering, an entity–relationship model (ER model for short) is an abstract [4] and conceptual representation of data. Entity–relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often 152 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 a relational database, and its requirements in a top-down fashion. Diagrams created by this process are called entity– relationship diagrams or ER diagrams. Using the three schema approach to software engineering, there are three levels of ER models that may be developed. The conceptual data model is the highest level ER model in that it contains the least granular detail but establishes the overall scope of what is to be included within the model set. The conceptual ER model normally defines master reference data entities that are commonly used by the organization. Developing an enterprise-wide conceptual ER model is useful to support documenting the data architecture for an organization. A conceptual ER model may be used as the foundation for one or more logical data models. The purpose of the conceptual ER model is then to establish structural metadata commonality for the master data entities between the set of logical ER models. The conceptual data model may be used to form commonality relationships between ER models as a basis for data m odel integration. A logical ER model does not require a conceptual ER model especially if the scope of the logical ER model is to develop a single disparate information system. The logical ER model contains more detail than the conceptual ER model. In addition to master data entities, operational and transactional data entities are now defined [5]. The details of each data entity are developed and the entity relationships between these data entities are established. The logical ER model is however developed independent of technology into which it will be implemented. One or more physical ER models may be developed from each logical ER model. The physical ER model is normally developed be instantiated as a database. Therefore, each physical ER model must contain enough detail to produce a database and each physical ER model is technology dependent since each database management system is somewhat different. The physical model is normally forward engineered to instantiate the structur al metadata into a database management system as relational database objects such as database tables, database indexes such as unique key indexes, and database constraints such as a foreign key constraint or a commonality constraint. The ER model is also normally used to design modifications to the relational database objects and to maintain the structural metadata of the database. The first stage of information system design uses these models during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data modeling technique can be used to describe any ontology (i.e. an overview and classifications of used terms and their relationships) for a certain area of interest. In the case of the design of an information system that is based on a database, the conceptual data model is, at a later stage (usually called logical design), mapped to a logical data model, such as the relational model; this in turn is mapped to a physical model during physical design. 5.2.2 The Building Blocks: Entities, Relationships, and Attributes The building blocks: entities, relationships, and attributes as shown in Figure 5, first here two related entities then an entity with an attribute next in this figure a relationship with and attribute and finally see primary key. Figure 5. The building blocks: entities, relationships, and attributes An entity may be defined as a thing which is recognized as being capable of an independent existence and which can be uniquely identified. An entity is an abstraction from the complexities of some domain. When we speak of an entity we normally speak of some aspect of the real world which can be distinguished from other aspects of the real world. An entity may be a physical object such as a house or a car, an event such as a house sale or a car service, or a concept such as a customer transaction or order. Although the term entity is the one most commonly used, following Chen we should really distinguish between an entity and an entity-type. An entity-type is a category. An entity, strictly speaking, is an instance of a given entity-type. There are usually many instances of an entity-type. Because the term entity-type is somewhat cumbersome, most people tend to use the term entity as a synonym for this term. Entiti es can be thought of as nouns. Examples: a computer, an employee, a song, a mathematical theorem. A relationship captures how entities are related to one another. Relationships can be thought of as verbs, linking two or more nouns. Examples: owns relationship between a company and a computer, supervises relationship between an employee and a department [6], performs relationship between an artist and a song, a proved relationship between a mathematician and a theorem. The models linguistic aspect described above is utilized in Volume 2 Issue 2, February 2013 www.ijsr.net 153 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 the declarative database query language ERROL, which mimics natural language, constructs. ERROLs semantics and implementation are based on Reshaped relational algebra (RRA), a relational algebra which is adapted to the entity–relationship model and captures its linguistic aspect. Entities and relationships can both have attributes. Examples: an employee entity might have a Social Security Number (SSN) attribute; the proved relationship may have a date attribute. Every entity (unless it is a weak entity) must have a minimal set of uniquely identifying attributes, which is called the entitys primary key. Entity–relationship diagrams dont show single entities or single instances of relations. Rather, they show entity sets and relationship sets. Example: a particular song is an entity. The collection of all songs in a database is an entity set. The eaten relationship between a child and her l unch is a single relationship. The set of all such child-lunch relationships in a database is a relationship set. In other words, a relationship set corresponds to a relation in mathematics, while a relationship corresponds to a member of the relation. 5.2.3Relationships, Roles and Cardinalities In Chens original paper he gives an example of a relationship and its roles. He describes a relationship marriage and its two roles husband and wife. A person plays the role of husband in a marriage (relationship) and another person plays the role of wife in the (same) marriage. These words are nouns. That is no surprise; naming things requires a noun. However as is quite usual with new ideas, many eagerly appropriated the new terminology but then applied it to their own old ideas. Thus the lines, arrows and crows-feet of their diagrams owed more to the earlier Bachman diagrams than to Chens relationship diamonds. And they similarly misunderstood other important concepts. In particular, it b ecame fashionable (now almost to the point of exclusivity) to name relationships and roles as verbs or phrases. 5.2.4 Limitations ER models assume information content that can readily be represented in a relational database. They describe only a relational structure for this information. Hence, they are inadequate for systems in which the information cannot readily be represented in relational form, such as with semistructured data. Furthermore, for many systems, the possible changes to the information contained are nontrivial and important enough to warrant explicit specification. Some authors have extended ER modeling with constructs to represent change, an approach supported by the original author; an example is Anchor Modeling. An alternative is to model change separately, using a process modeling technique. Additional techniques can be used for other aspects of systems. For instance, ER models roughly Figure 6. E-R modeling 5.3 Table Structure In relational databases and flat file databases, a table is a set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows each row is identified by the values appearing in a particular column subset which has been identified as a unique key index. Table is another term for relations; although there is the difference in that a table is usually a multi-set (bag) of rows whereas a relation is a set and does not allow duplicates. Besides the actual data rows, tables generally have associated with them some meta-information, such as constraints on the table or on the values within particular columns. The data in a table does not have to be physically stored in the database. Views are also relational tables, but 154 correspond to just 1 of the 14 different modeling techniques offered by UML. Another limitation: ER modeling is aimed at specifying information from scratch. This suits the design of new, standalone information systems, but is of less help in integrating pre-existing information sources that already define their own data representations in detail. Even where it is suitable in principle, ER modeling is rarely used as a separate activity. One reason for this is todays abundance of tools to support diagramming and other design support directly on relational database management systems. These tools can readily extract database diagrams that are very close to ER diagrams from existing databases, and they provide alternative views on the information contained in such diagrams. In a survey, Brodie [7] and Liu could not find a single instance of entity–relationship modeling inside a sample of ten Fortune 100 companies. Badia and Lemire blame this lack of use on the lack of guidance but also on the lack of benefits, such as lack of support for data integration. Also, the enhanced entity–relationship model (EER modeling) introduces several concepts which are not present in ER modeling. ER modeling as shown in Figure 6. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 their data are calculated at query time. Another example is nicknames, which represent a pointer to a table in another database. 5.4 Database Schema A database schema of a database system is its structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data to create a blueprint of how a database will be constructed (divided into database tables). The formal definition of database schema is a set of formulas (sentences) called integrity constraints imposed on a database. These integrity constraints ensure compatibility between parts of the schema. All constraints are expressible in the same language. A database can be considered a structure in realization of the database language. The states of a created conceptual schema are transformed into an explicit mapping, the database schema. This describes how real world entities are modeled i n the database. A database schema specifies, based on the database administrators knowledge of possible applications, the facts that can enter the database, or those of interest to the possible end-users. The notion of a database schema plays the same role as the notion of theory in predicate calculus. A model of this â€Å"theory† closely corresponds to a database, which can be seen at any instant of time as a mathematical object. Thus a schema can contain formulas representing integrity constraints specifically for an application and the constraints specifically for a type of database, all expressed in the same database language. In a relational database [8], the schema defines the tables, fields, relationships, views, indexes, packages, procedures, functions, queues, triggers, types, sequences, materialized views, synonyms, database links, directories, Java, XML schemas, and other elements. Schemas are generally stored in a data dictionary. Although a schema is defined in text database language, the term is often used to refer to a graphical depiction of the database structure. In other words, schema is the structure of the database that defines the objects in the database. In an Oracle Database system, the term schema has a slightly different connotation. For the interpretation used in an Oracle Database, see schema object. 5.5 Levels of Database Schema A conceptual schema or conceptual data model is a map of concepts and their relationships. This describes the semantics of an organization and represents a series of assertions about its nature. Specifically, it describes the things of significance to an organization (entity classes), about which it is inclined to collect information, and characteristics of (attributes) and associations between pairs of those things of significance (relationships). Figure 7. Conceptual schema or conceptual data model A logical schema is an alias that allows a unique name to be given to all the physical schemas containing the same data store structures. The aim of the logical schema is to ensure the portability of the procedures and models on the different physical schemas. In this way, all developments in Designer are carried out exclusively on logical schemas. A logical schema can have one or more physical implementations on separate physical schemas, but they must be based on data servers of the same technology. A logical schema is always directly linked to a technology. To be usable, a logical schema must be declared in a context. Declaring a logical schema in a context consists of indicating which physical schema corresponds to the alias logical schema for this context. For example: The logical schema LEDGER is the set of Sybase tables required for the functioning of the accounting application. These tables are stored in a physical schema for each installation of the accounting application. Work in Designer or Operator is always done on the logical schema LEDGER. Only the context allows the physical schema on which the operations are actually done to be determined. Thus, the user can switch from one physical environment to another in a single action. A logical schema’s example is shown in figure 8. Table 1: Name of the logical schema Name of the logical schema LEDGER LEDGER LEDGER Context Boston Seattle Production Seattle Test Physical Schema Sybase Boston LDG Sybase SEATTLE PROD LDG Sybase SEATTLE TEST LDG Volume 2 Issue 2, February 2013 www.ijsr.net 155 International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 This article discusses the Oracle use of the term. For other uses of schema in a database context, such as a graphical representation of tables and other objects in a database, see database schema. In an Oracle database, associated with each database user is a schema. A schema comprises a collection of schema objects. Examples of schema objects include: tables, views, sequences, synonyms, indexes, clusters, database links, snapshots, procedures, functions and packages. Figure 8. Logical schemas Physical schema is a term used in data management to describe how data is to be represented and stored (files, indices, et al.) in secondary storage using a particular database management system (DBMS) (e.g., Oracle RDBMS, Sybase SQL Server, etc.). The logical schema was the way data were represented to conform to the constraints of a particular approach to database management. At that time the choices were hierarchical and network. Describing the logical schema, however, still did not describe how physically data would be stored on disk drives. That is the domain of the physical schema. Now logical schemas describe data in terms of relational tables and columns, object-oriented classes, and XML tags. A single set of tables, for example, can be implemented in numerous ways, up to and including an architecture where table rows are maintained on computers in different countries. Figure 10. Schema objects 5.6 Php Sessions A PHP session variable is used to store information about, or change settings for a user session. Session variables hold information about one single user, and are available to all pages in one application [9]. When you are working with an application, you open it, do some changes and then you close it. This is much like a Session. The computer knows who you are. It knows when you start the application and when you end. But on the internet there is one problem: the web server does not know who you are and what you do because the HTTP address doesnt maintain state. A PHP session solves this problem by allowing you to store user information on the server for later use (i.e. username, shopping items, etc). However, session information is temporary and will be deleted after the user has left the website. If you need a permanent storage you may want to store the data in a database. Sessions work by creating a unique id (UID) for each visitor and store variables based on this UID. The UID is either stored in a cookie or is propagated in the URL. In PHP, sessions can keep track of authenticated in users. They are an essential building block in todays websites with big communities and a lot of user activity. Without sessions, everyone would be an anonymous visitor. In system terms, PHP sessions are little files, stored on the servers disk. But on high traffic sites, the disk I/O involved, and not being able to share sessions between multiple web servers make this default system far from ideal. This is how to enhance PHP session managem ent in terms of performance and share ability. If you have multiple web servers all serving the same site, sessions should be shared among those servers, and not 156 Figure 9. Physical schema In Database lore, a schema object is a logical data storage structure. This possibly originates from the use of the term in the context of Oracle databases. The term schema can have other meanings when talking about non-Oracle databases. Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 reside on each servers individual disk. Because once a user gets load-balanced to a different server, the session cannot be found, effectively logging the user out. A common way around this is to use custom session handlers. 5.7 Shopping Card A shopping cart is a software application that typically runs on the computer where your Web site is located (the Web server), and allows your customers to do things such as searching for a product in your store catalog, adding a selected product to a basket, and placing an order for it. The shopping cart integrates with the rest of your Web site. In other words, there are typically links on your Web pages that customers can click on, and which allow them to perform some of the functions described above. For example, many e-commerce Web sites have a search link appearing on every Web page, as part of the navigation area Shopping carts are written in a variety of different programming languages. Some of them provide full access to the source code, thus allowing experienced programmers to make modifications to the system features, some others dont. Some shopping carts run on Windows Web servers, some on Unix, others on both. In most cases, you can place the shopping cart on your Web server simply by transferring its files there using any FTP [10] software, where FTP stands for File Transfer Protocol. For example, our shopping cart software called Product Card is a collection of files written in a programming language called Classic ASP, and that you host on a Windows server. Experienced programmers can customize the system as they wish as the source code is included. iii. Merchant runs credit card through the point of sale unit. The amount of the sale is either hand-entered or transmitted by the cash register. iv. Merchant transmits the credit card data and sales amount with a request for authorization of the sale to their acquiring bank. . v. The acquiring bank that processes the transaction, routes the authorization request to the card-issuing bank. The credit card number identifies type of card, issuing bank, and the cardholders account. vi. If the cardholder has enough credit in their account to cover the sale, the issuing bank authorizes the transaction and generates an authorization code. This code is sent back to the acquiring bank. vii. The acquiring bank processing the transaction, and then sends the approval or denial code to the merchants point of sale unit. Each point of sale device has a separate terminal ID for credit card processors to be able to route data back to that particular unit. viii. A sale draft, or slip, is printed out by the point of sale unit or cash register. The merchant asks the buyer to sign the sale draft, which obligates them to reimburse the cardissuing bank for the amount of the sale. ix. At a later time, probably that night when the store is closing up, the merchant reviews all the auth orizations stored in the point of sale unit against the signed sales drafts. When all the credit card authorizations have been verified to match the actual sales drafts, the merchant will capture, or transmit, the data on each authorized credit card transaction to the acquiring bank for deposit. This is in lieu of depositing the actual signed paper drafts with the bank. x. The acquiring bank performs what is called an interchange for each sales draft, with the appropriate card-issuing bank. The card-issuing bank transfers the amount of the sales draft, minus an interchange fee to the acquiring bank. xi. The acquiring bank then deposits the amount of the all the sales drafts submitted by the merchant, less a discount fee, into the merchants bank account. Credit card transaction is shown in Figure 12. Figure 11. Google Checkout shopping cart 5.8 Credit Card Transaction From the information presented in the preceding sections, we can start to piece together what is occurring during a credit card transaction. We know that merchants have a relationship with either an acquiring bank or independent sales organization, through which they have their credit card transactions processed. The section on industry terminology shows us some of the fees involved in this process. Merchants must pay the acquiring bank or ISO a discount fee based on the total amount of the sale. Likewise, the acquiring bank or ISO must pay the card issuer an interchange fee when they process the sales draft from the merchant. Steps involved in a normal credit card transaction: i. Merchant calculates the amount of purchase and asks buyer for payment ii. Buyer presents merchant with a credit card. Figure 12. Credit card transaction 6. Conclusion Electronic commerce or e-commerce is a term for any type of business, or commercial transaction that involves the transfer of information across the Internet. It is currently one of the most important aspects of the Internet to emerge. E157 Volume 2 Issue 2, February 2013 www.ijsr.net International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 commerce has grown tremendously worldwide. In the future e-commerce may become totally mobile based. In Bangladesh E-commerce also become a very powerful business mechanism but Bangladesh will have to overcome the problems with poor network connectivity and electronic payment issues. The problems identified in this Project are: Security problem, Confusing checkout process, Customers can’t find products, Customers can’t touch and fell a product, No sales staff means any chance of up-selling, Language barrier. Regarding the identified problems the following solutions have been proposed: Merchant needs to ensure the platform employs strong encryption for payment processing and customer data retention. E-commerce platform should always have a visible running total of purchases prominently displayed during the customer experience. E-commerce platform must support the ability to present the customer with nested categories as well as a search box. An e-commerce platform should also support the ability to attach multiple pictures to a product catalog page, allowing the consumer to view the product from multiple angles. E-commerce platform needs to be able to associate products with related and complimentary products. The system should allow all tran slation to be done centrally. My M.Sc Engg. in CSE is running at Bangladesh University of Engineering and Technology (BUET), Dhaka-1000, Bangladesh. My research interest areas are the image processing, Computer Networks, Computer Networks and Data Security, Compiler, Theory of Computations, etc. My several papers Published in International Journals. Muhammad Golam Kibria, Assistant Professor and Head, Department of CSE, University of Information Technology Sciences, Dhaka, Bangladesh. I completed Masters in Mobile Computing and Communication from the University of Greenwich, London, UK. My research interests are Computer Network Security and image processing, Sensor, Robotics and Wireless Sensor Network. Mohammad Nuruzzaman Bhuiyan is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212.Bangladesh. I have completed my B.Sc Engg. and M.Sc Engg. in CS from The University of Sheffield, Western Bank, Sheffield S10 2TN, UK. My research interest areas are Fundamental of Computer, Web technology, Computer Networks, Computer Networks and Data Security, Theory of Computations, etc. My several papers accepted in International Journals. References [1] http://en.wikipedia.org/wiki/Electronic_commerce [2] Tkacz, Ewaryst; Kapczynski, Adrian (2009), Springer, P. 255 [3] Online Today, The Electronic Mall. CIS/compuserve nostalgia. Http://www.gsbrown.org/compuserve/electronic-mall1984-04/. [4] http://www.marketwatch.com/story/amazon-buysdiaperscom-parent-in-545-mln-deal-2010-11-08/. [5] http://techcrunch.com/2011/03/28/ebay-to-acquire-gsicommerce-for-2-4-billion [6] Miller, Holmes E. And Engemann, Kurt J. (1996); A methodology for managing information-based risk; Information Resources Management Journal; 9:2; 17-24 [7] http://www.e-consultancy.com/news blog/363726/whydo-customers-abandon-the-Checkoutprocess.htmlcopyright 2008 Voloper Creations Inc. 7 [8] http://www.articlesbase.com/e-commercearticles/impacts-of-e-commerce-on-business1882952.html [9] http://www.startupsmart.com.au/mentor/michaelfox/2011-02-03 Authors Profile Md. Akbor Hossain received the B.Sc degrees in CSE University of Information Technology and Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. I am working as a Lab Demonstrator at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka-1212, Bangladesh. *Md. Akkas Ali is working as a Lecturer at the Department of CSE IT, University of Information Technology Sciences (UITS), Baridhara, Dhaka1212, Bangladesh. I completed my B.Sc Engg. in CSE from Chittagong University of Engineering and Technology (CUET), Chittagong-4349, Bangladesh. Volume 2 Issue 2, February 2013 www.ijsr.net

Tuesday, January 21, 2020

Third Meditation:The Existence of God Essay -- Meditations on First Ph

In the Third Meditation, entitled â€Å"Of God: That He Exists†, Rene Descartes presents an argument for the existence of God. Meditation III talks about what is real and how to justify it. Descartes acknowledges of being doubtful of bodily things but is absolutely assured that he exists and he clearly and distinctly perceives this fact. As he confirms: I am a thinking (conscious) thing, that is, a being who doubts, affirms, denies, knows a few objects, and is ignorant of many, - [who loves, hates], wills, refuses, who imagines likewise, and perceives. . . (Descartes p 66) However, he could not be certain unless all clear and distinct perception can be true. From this he concludes, whatever is clearly and distinctly perceived must be true. Therefore, he is not only proving that God exists but to prove his existence as well. During his youth, Descartes thought he was confident that all things he believes were true but he doubts it now. For example, â€Å"two and three added together make five† (Descartes 67), which he finds clear and distinct. However, he is unsure about it because he thinks that God might be deceiving him. He says: Indeed, if I afterward judged that we ought to doubt of these things, it was for no other reason than because it occurred to me that a God might perhaps have given me such a nature as that I should be deceived, even respecting the matters that appeared to me the most evidently true. (Descartes 67) Since he assumes there is a malevolent God who he thinks is deceiving him, Descartes then needs to assure himself and look for evidence that he is not completely deceived. Hence, this causes him in proving that God exists and is not a deceiver. Rene Descartes begins by classifying his ideas into different k... ...ims we do because sometimes we go with our senses and some in our reasons and experiences. However, it is God, on whom Descartes relies on for his existence, and who the source of his idea of perfection is. Works Cited Rene Descartes, â€Å"Meditations on First Philosophy (1641)†, in Cutler (2013) Belief, Truth and Justification in Epistemology. Douglas College, NW, BC. 25 Oct. 2015. SparkNotes Editors. â€Å"SparkNote on Meditations on First Philosophy.† SparkNotes.com. SparkNotes LLC. n.d.. Web. 26 Oct. 2015. SparkNotes Editors. â€Å"SparkNote on Meditations on First Philosophy.† SparkNotes.com. SparkNotes LLC. n.d.. Web. 26 Oct. 2015. Uzgalis, Bill. â€Å"Descartes' Proof for the Existence of God. â€Å". Oregon State University. Department of Philosophy , Oregon State University, 2003. Web .26 Oct. 2015.

Monday, January 13, 2020

Japanese American Concentration Camps

World War 2 was not officially initiated until German Nazi's invaded Poland on September 1, 1939. America did not get Involved in the war until December 7, 1941, Japan bombed Pearl Harbor, war was not declared on Japan until the following day. December 11, 1941 Germany declared war on the united States. The war was now In full force, with America raging war against the Japanese and the German Nazi's.Back home In America, they to were taking action to protect their homeland. In February of 1942, President Roosevelt signed an executive order to relocate all Japanese Americans. This occurred because of the bombing of Pearl Harbor, Many feared that the Japanese were attempting to â€Å"Remain loyal to their homeland† and were acting as spies. Even without concrete evidence, President Roosevelt signed for them to be relocated. These camps were still located on American soil and were not death camps.The camps were concentration camps, a place where they go to basically do hard labor all day. Many Japanese American families sold their homes and assets, here was no guarantee that their lives would continue as normal upon their return. Their homes sold for fractions of the price they were actually worth, even Japanese vets of WWW were forced to leave their homes and assets behind. It did not matter If the families were born and raised In America and had never been to Japan, the fear of an invasion was to great to allow a possible security issue be lose. Until the camps were finished the Japanese Americans were held in stables at local racing tracks. Ten camps were completed and the camps were built in remote areas of seven western tastes : Arkansas, California, Wyoming, Colorado, Idaho, and Utah. The housing was poor, Tarpaper Barracks were the housing for the Japanese. There were communal mess halls for family to dine with one another, the children had to attend school and the adults had the option to work for 5$ a day.The Japanese definitely were not living hig h class, but the camps they were located to where heaven to the Jewish In Germany. The plan for the camps was for them to be self sufficient, by farming for food. The solo was not Ideal for this plan however. The homes were not heated or lolled during seasonal changes and the food was made army grub style. The Japanese Americans were not allowed to leave because security would not hesitate to shoot one who tried to escape. There was armed security that stood round clock watch over the Japanese Americans. 27,000 Japanese Americans were wrongfully relocated into concentration camps, when challenged by Fred Sauerkraut, the Supreme Court showed little to no sympathy and said it was war time necessary for the camps. The government and the people without a Japanese bloodline agreed that it was simply for the time of war. The camps never got to be the point of the horrific f the Nazi's camps and that was greatly appreciated, but the act in itself was considered wrong and In history is labe led as a bad move In American history.January 8 1945, the first families were released from the camps. Most families had nowhere to go and nowhere to work. A lot of Americans would not hire Japanese Americans due to their own racism that grew because of the war. In 1988 the court tried to apologize for the wrong act of putting the Japanese Americans into compared to what the families had to go through during and after the camps. In hope America will stoop low enough to concentration camps again.