Wednesday, December 25, 2019

Facilitating Developmental Attachment And A Treatment For...

Facilitating Developmental Attachment – The road to emotional recovery and behavioural change in foster and adopted children Daniel A. Hughes, A Jason Aronson Book copyright 1997, Rowman Littlefield Publishers, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www.rowmanlittlefield.com, 2004 ISBN 0-7657-0270-0 Facilitating Developmental Attachment is a book about the theory behind and a treatment for attachment disorder, focusing on children who have been fostered or adopted due to abuse or neglect. Daniel Hughes gives a detailed therapy plan of how to help these particular children begin to form the secure attachment that is crucial to living a fulfilling life. â€Å"All children, at the core of their beings, need to be attached to someone who considers them to be very special and who is committed to providing for their ongoing care.† In this very first sentence Daniel Hughes expresses the importance of attachment in children in order for them to live rich and fulfilling lives. He outlines the issues surrounding the poorly attached child (particularly foster and adopted children) and shows how it is possible, using specific therapeutic interventions, to help them to â€Å"heal and grow†. He begins by giving a detailed explanation of how foster and adopted children’s unique problems make it difficult for them to create new significant relationships. As a consequence of abuse or neglect they have not been given the opportunity to form a meaningful and secure attachmentShow MoreRelatedThe Attachment Of Children And Their Influence On Children1686 Words   |  7 PagesAvoidant Attachment in Children Parents are a vital factor in the development of their children. Many parents fill various roles as teachers, playmates, caregivers, and disciplinary figures; but one of the most important roles that a parent can hold is that of an attachment figure. The attachment between a child and their attachment figure is a strong predictor of the child’s later social and emotional wellbeing (Benoit, 2004). John Bowlby and Mary Ainsworth worked together to come to the principleRead MorePeriodontal Disease And Its Effects On The Body1511 Words   |  7 PagesPeriodontitis affects the entire periodontium and is marked by clinical attachment loss. Autoimmune disorders are caused by a faulty immune system that targets the body’s own cells and attacks the host’s organs causing tissue destruction. In both periodontal disease and autoimmune disorders the tissue destruction observed is caused by an exaggerated inflammatory response from the immune system. Rheumatoid arthritis is an autoimmune disorder and periodontitis is a form of periodontal disease, both affectRead MorePost Traumatic Stress Disorder ( Ptsd )1602 Words   |  7 Pages Sarah Richards Post Traumatic Stress Disorder March 9, 2015 SW 612 Post-traumatic stress disorder (PTSD) is an anxiety disorder that may develop after an exposure to a terrifying event in which physical harm occurred or was threatened. Usually, the anxiety may be brought on by an â€Å"exposure to an actual or threatened death, serious injury or sexual violence â€Å"(American Psychiatric Association, 2013, pg. 271). Only recently have children and youth been deemed to have experiencedRead MoreRelationship Of Themes Of Developmental Theories Essay1955 Words   |  8 PagesRelationship of Themes to Developmental Theories First of all, loneliness, a first developmental theme addressed above can be related to John Bowlby and Mary Ainsworth’s Attachment theory, where Amy is living with her estranged father after the death of her mother. Initially she spends most of her time living alone as she does not have any friends and her father is busy in his work. It’s seems that both are not attached emotionally with each other which results in the manifestation of her affectionlessRead MoreSocial Interaction For Children With Autism3206 Words   |  13 PagesAutism Spectrum Disorder According to the Diagnostic and Statistical Manual of Mental Disorders (DSM) Autism Spectrum Disorders (ASD) is a developmental disability characterised by impaired social functioning and communication skills (Burrows, 2008). Attention and research relating to the study of ASD is of much interest to professionals at this time, largely due to its prevalence, increased need for provision of services and resources, and the degree of limitation this disorder places on both theRead MoreAttachment Theory and the Kibbutz Society5271 Words   |  21 Pagesï » ¿Table of Contents PART 1 2 1- Introduction 2 1.1- Thesis statement 3 1.2- Definition of terms 4 PART 2 5 2- Research description 5 Literature review 5 2.1- Attachment Theory 5 2.2- Growing in Kibbutz 8 2.3- Intervention programs 9 2.4- Physical issues 9 2.5- Mothers sensitivity to infant cues 10 2.6- Externalizing and its impact on children 10 Research design 11 Method 11 Findings 11 Emotional unavailability 11 Complication in mother-infant relationship 12 Limitations 12 PARTRead More Eating Disorders and Pregnancy Essay2138 Words   |  9 PagesEating Disorders and Pregnancy Pregnancy has often been viewed as a period of great developmental change for women. This is also a period in which previously dormant psychological issues rise to the surface and when current issues have the potential to worsen. Because anorexia nervosa and bulimia nervosa occur primarily in young women, many of whom are of childbearing age, it is important to evaluate the potential medical and psychological consequences when an eating disorderedRead MoreSocial Implications Of Psychoanalytic Theory Essay1219 Words   |  5 Pagesnumerous avenues of the psychodynamic theory. They maintained constant themes throughout this process, such as, understanding the importance of human subjectivity, identity and selfhood; and the basic nature and the relationship between intimate attachments and the quality of social relationships; as well as the dynamics of oppression. The authors explored a range of psychoanalytic ideas, comprising of Early Drive Theory, Ego Psychology, Objec t Relations, Self-Psychology, and Relational and FeministRead MoreWhat Causes Adhd And How That Might Be Compatible With A Medication Intervention?3573 Words   |  15 Pagesand how that might be compatible with a medication intervention? Among the many theoretical frameworks proposed to explain ADHD symptoms and causes, psychological and neurobiological perspectives are the most commonly evoked to conceptualize the disorder. Proponents of the psychological perspective are divided into two major groups of theories: top-down theories and bottom-up theories. Top down process emphasize some form of cognitive control, while bottom-up process emphasize motivational or energeticRead MoreThe Treatment Of Children And Adolescents With Complex Trauma2384 Words   |  10 Pages The treatment of children and adolescents with Complex Trauma Jeffery D. Thomas PSY 679 Psychology of Trauma National University, Fresno, CA Kathy Hayden, LMFT In this paper I will discuss complex trauma (CT) in children and adolescents. I will distinguish the difference between CT and Post Traumatic Stress Disorder (PTSD). I will also discuss assessment some of the current treatment models for CT for children and adolescents. First I will define PTSD. PTSD is a psychiatric

Tuesday, December 17, 2019

Mental Health And Health Services - 1167 Words

First, trauma has become nationally recognized and appreciated in the last two decades. The nation’s perspective has changed for the better due to 9/11, Hurricane Katrina, and the influx of veterans returning from Iraq and Afghanistan with Post Traumatic Stress Disorder. Citizens are now recognizing how trauma impacts individuals, families, and communities (Reardon, 2011). A second trend in social services include the Mental Health Parity and Addiction Equity Act of 2008. The Act provides that large companies provide equal insurance coverage for mental health services when compared to medical services. In other words, insurance companies are to provide the same medical treatment standards to insurers and their families for mental health services. Insurance companies are no longer able to discriminate against people with mental health issues and are required to close the disparity gaps between people with mental health concerns and people with only medical concerns. Hence, families will be able to receive mental health services at an affordable price. Social workers need to be aware of the â€Å"carve† out benefits. â€Å"Carve-out arrangements with managed behavioral health organizations are still allowed, as long as mental health and substance use disorder benefits are being covered and managed in a manner that is no more stringent than medica l/surgical benefits† (920 Mental Health Parity, 2005; Reardon, 2011). The third trend in the social work field, policy-making, and politics isShow MoreRelatedIncreasing Utilization Of Mental Health And Health Services777 Words   |  4 PagesUtilization of Mental Health and Health Services The availability of professional services to accommodate all aspects of a healthy child is important to establish in a Community School environment participating Community Schools is partnering with CBO’s partners and their health service team provide the necessary services for the school. Increase Mental Health/Health Services: In year 1: 60% of students and/or families will demonstrate an increase in utilization of mental health and health services. InRead MoreMental Health And Addiction Services Essay930 Words   |  4 PagesIntroduction Mental health is one of significant issues in New Zealand. The government has been making greater efforts to improve the quality and outcomes of mental health and addiction services for clients, families, whÄ nau, and communities for a number of years (Ministry of Health, 2012). According to Ministry of Health (2014a), approximately 148,000 people accessed mental health and addiction services in 2011/12. Of these, 54% were male while 46% were female. Furthermore, approximately 126,000Read MoreAccess To Mental Health Services1086 Words   |  5 PagesIt is a necessity for our veterans who have honorably served our country to have increased access to mental health services. Closely monitoring the availability of future appointment slots is essential to be able to respond to increased demands for service. An integrated portal across VA and Non-VA facilities should be available for providers that would expedite immediate access to care, and receive quality treatment. The portal must i nclude the number of available new appointments per week, andRead MoreThe Shortage Of Mental Health Services1027 Words   |  5 PagesOregon has a shortage of mental health clinicians and prescribers resulting in inadequate access to mental health services. Oregon has 90 designated Mental Health Care Health Professional Shortage Areas (HPSA) (Kaiser Family Foundation [KFF], 2016). However, this data does not include Psychiatric Nurse Practitioners. The Portland Metropolitan Area, comprised of Multnomah, Washington and Clackamas counties is not designated as a Mental Health Care HPSA (Oregon Health Authority [OHA], 2013). InRead MoreAccess Of Mental Health Services1497 Words   |  6 PagesAccess to mental health services is distributed unevenly across countries, with low and middle-income countries (LMICs) lacking proportionate access to human resources and treatments. Developed countries only carry a small portion of the global mental health burden, and yet they are most equi pped to treat patients. In need of a more sustainable method of providing mental health services within the confines of cost and time, LMICs have begun to explore the option of task-sharing, in which mental healthRead MoreMental Health And Human Service2109 Words   |  9 PagesIntroduction Social work practice is a profession which requires many knowledge-bases which overlap in different contexts. Mental health is a knowledge-base that social workers must acquire in vast quantity and quality, as it can appear in any health and human service in which they work in. The ability to work with those with mental illness within health and human service is paramount. This requires the capacity to work with and within the individual’s environment, recognise, comprehend and respondRead MoreThe Mental Health Service Act1949 Words   |  8 PagesMental health illnesses have been around since interrelated relationships have been present in society. The treatment of this illness has evolved immensely throughout history. Early on, those who were mentally ill were demonized and thought to be an all mighty evil, which had the ability to be passed on to others. Due to this ideology, many people shunned, and banished those who were thought to be mentally handicapped. In order to protect society from these â€Å"beasts† many people imprisoned mentallyRead MoreMental Health Services On Campus2453 Words   |  10 PagesImagine living with a mental illness that affects everyday life but has no physical aspects to it. Waging a war within ones own head and not being able to control ones own thoughts or feelings. Millions of adolescence throughout the United States are currently sick, living with a mental illness with no idea how to treat it, or even the idea they are sick. Mental Health services on campus may be the answer to treating the diseases many children are suffering from. Mental health is defined as our emotionalRead MoreMental And Behavioral Health Services1216 Words   |  5 Pageswill discuss in depth how this situation affects the elderly mentally and emotionally, leading them to depression. As one ages, the need for mental and behavioral health services continues to increase. Psychologists are playing a critical role in addressing these needs. Some of the most critical concerns facing older people today are highlighted below. Mental Illness in the Elderly, unique problems elderly face and causes and economic problems presented by the elderly. Depression is one of the mainRead MoreMental Health Services On Campus2673 Words   |  11 PagesImagine living with a mental illness that affects your everyday life but has no physical aspects to it. Waging a war within your own head and not being able to control your own thoughts or feelings. Millions of adolescence throughout the United States are currently sick, living with a mental illness with no idea how to treat it, or even the idea they are sick. Mental Health services on campus may be the answer to treating the diseases many children are suffering from. Mental health is defined as our

Sunday, December 8, 2019

Report E-Catalog Database

Question: Describe about the eCatlog database? Answer: Introduction This is a report for the eCatalog database. In this report different phases of building the database will be discussed. For this database, Microsoft Visio, Excel, Access has been used. Requirement Analysis To understand the entities, relationships and attributes of the database are needed to be understood before designing or developing the database itself. For that purpose, some eCatalogs available online, have been studies thoroughly. After understanding how data is stored, what attributes are there, what real world entities are present etc. It then moves to the next phase of designing the logical data model for the eCatalog database. Data Modeling Data modeling is the first stage of database design and development. The business rules identified from the requirement analysis are, There may be two types of documents Books and Journal articles. Each should be uniquely identifiable. A book may have more than one edition from same or different publishers. However, this is not true for journal articles. A journal article will be published on a specific journal by a journal publisher once. There are authors who can write journal article or book. Each book will have one or more chapters. A chapter will belong to one book only. There are two types of publishers, journal publishers and book publishers. A book or journal article may be written by one or more authors. ER diagram for the eCatalog database having entities like Author, Book, Journal, Journal Publisher, Book Publisher, Chapter etc. , relationships among the entities and attributes of the same, is, There are one to one relationship between Chapter and Book, Journal Publisher and Journal etc. These are represented using foreign keys from one side to many side. There are many to many relationships, both binary and ternary. For example, binary many to many relationship Journal Publication, ternary many to many relationship Book Publication. These information about entities, relationships etc. will be transformed into implementation of the database in Microsoft Access. Relational Database Design in Microsoft Access In this phase there will be a table for each many to many relationship and entities from the ER diagram. The attributes of each will be also there. Using Create table option these tables will be created. Then the attributes and data types will be set. The primary key and foreign keys will also be set. After building the database in Access and saving it, each table will be exported into HTML web pages. The Structures of the tables will be shown in HTML web pages. The Access Database contains different tables, like Author It describes the details of each author. Including their unique ID, name, and contact details. Book It describes the details of each book, like unique ID, title, publication details, number of pages, edition etc. the composite primary key is BookID and Edition. BookPublication It describes the publication of an edition of a book by a publisher. BookPublisher It describes the details of book publisher. There are fields like unique identification for each book publisher, name, contact address etc. Chapter Each book will have one or more chapters. So there is a composite key including BookId and chapter no. Chapter no will uniquely identify each chapter in a book. There are other fields like name of the chapter, additional details etc. Journal A journal will be identified by journal ID. There are other fields like name, year of publication etc. JournalPublication There will be publication details of each journal in this table. There will be detailed date of publication, city etc. along with the unique ID. JournalPublisher There will be details about each journal publisher. Each publisher will have their name, website, email, contact details etc. The Access database is, Data Dictionary A data dictionary provides information about the data in the database. That is, it will provide information about the tables, attributes, primary keys, foreign keys etc. For that purpose an Excel based data dictionary has been developed. Where description from each attribute of each table has been described. The data dictionary descriptions are, Author Attribute Name Description Comment AuthorID This is the primary key field and uniquely identifies each record in the Author table. Name Author It represents the name of the author. Email ID It represents the email id of the author. Contact Number It represents the contact number of the author. Book Attribute Name Description Comment Book ID This is one of the key field and unique for each book. The composite primary key BookID and Edition uniquely identifies a Book Edition This is one of the key field. Book Name This is the name of a book. Date Publication This is the date of publication of an edition of a book. Number Pages This is the number of pages in an edition of a book Book Publication Attribute Name Description Comment Book ID This is a key field and a foreign key to the Book Table. The composite primary key contains all these four attributes. It uniquely identifies each record in Book Publication Table Author ID This is a key field and a foreign key to the Author Table. Edition This is a key field and a foreign key to the Book Table. Book Publisher ID This is a key field and a foreign key to the BookPublisher Table. BookPublisher Attribute Name Description Comment Book Publisher ID This is the primary key and uniquely identifies each record in the BookPublisher table. Name This is the name of a book publication company. Address This is the contact address of a book publishing company. Chapter Attribute Name Description Comment Chapter No This is a key field. It represents the chapter in some Book These three fields constitute the primary key of the table Chapter Book ID This is a key field. It represents the book to which the chapter belongs to. This is also a foreign key to Book table. Edition This is a key field and foreign key to Book table. Name This is the title of a chapter. Details This is an optional field for describing some details associated with a chapter. Journal Attribute Name Description Comment Journal ID This is the primary key field for Journal table. Journal Name This is the name of a journal. Volume This is the volume of a journal. Issue This is the issue number of a journal. Year Of Publication This is the year of publication of a journal. Journal Publisher This is a foreign key to the table Journal Publisher. It represents the reference to the publisher of a journal. Journal Publisher Attribute Name Description Comment Journal Publisher ID This is a key field. It is also a foreign key referencing to the Journal Publisher table. Name This is the name of the Journal Publishing organisation. Email This is the email of the Journal Publishing organisation. Website This is the website (URL) of the Journal Publishing organisation. Address This is the address of the Journal Publishing organisation. Journal Publication Attribute Name Description Comment Author ID This is a key field in the Journal Publication table. This is also a foreign key referencing to the Author table. These two fields constitute the primary key of the table. Journal ID This is a key field in the Journal Publication table. This is also a foreign key referencing to the Journal table. Date Publication This field gives the Date of the publication of some journal. City This is the publication city of a journal. Conclusion In this report, the phases of designing and developing the eCatalog database have been described. There are discussions on designing the logical schema, building the database and creating the data dictionary. References Garcia-Molina, H., Ullman, J. D., Widom, J. (2011). Database Systems: The Complete Book. Pearson. Lambert, J., Cox, J. (2013). Microsoft Access 2013 Step by Step. Pearson Education. Silberschatz, A., Korth, H., Sudarshan, S. (2010). Database System Concepts (6th ed.). McGraw-Hill Education.

Sunday, December 1, 2019

Why Are Books Considered “Mass” Media Essay Example

Why Are Books Considered â€Å"Mass† Media Essay Define human rights. In your opinion, what are the rights that all should have? How has contemporary feminism altered the debate on human rights? How active should the United States be ensuring that all nations respect the human rights of their citizens? ANS: Human rights are rights that all human beings are entitled to without regard to race, gender, nationality, ethnic origin, religion, language or any other status. We are all entitled to these right without discrimination. These rights may be interrelated, interdependent and indivisible. The United Nation’s Universal Declaration of Human Rights identifies the rights that all people are entitled to without discrimination. These rights are life, liberty and security of person; freedom from slavery and servitude; freedom from torture, or cruel, inhumane or degrading treatment or punishment; equality before the law; not being subjected to arbitrary arrest, detention or exile; freedom of movement and residence; nationality; the right to marriage and to found a family; freedom of thought, conscience and religion; peaceful assembly and association; work, health and education. In my opinion, everyone is entitled to basic human rights. Regardless of what status an individual occupies, all people should have right to life, liberty and pursuit of happiness. The right to life should entitle us to live a life free from cruelty, injustice and equality. In order to enjoy life, people should have income and food security. The right to life should entitle us to freedom of speech, assembly and religion. Also people should be allowed to live a lifestyle they chose to and marry who they want. Human rights are inalienable. We will write a custom essay sample on Why Are Books Considered â€Å"Mass† Media specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Why Are Books Considered â€Å"Mass† Media specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Why Are Books Considered â€Å"Mass† Media specifically for you FOR ONLY $16.38 $13.9/page Hire Writer They should not be taken away, except in specific situations and according to the due process. The right to liberty may be restricted if a person is found guilty of a crime by a competent court of law. Justice should not only be served but should be seen to be served. All people should have access to the courts and be treated equally before the court of law. Contemporary feminists have a great impact on human rights. Feminist’s theory is woman centered and interdisciplinary, and it actively promotes ways to achieve social justice. The three core questions feminist theory explore are: (1) what about the women? (2) Why is the social world as it is? (3) How can we change and improve the social world as to make it a more just place for women and for all people? Feminist contemporary question the differences between women, including how race, class, ethnicity and age intersect with gender. They are most concerned with giving a voice to women and highlighting the various ways widen have contributed to society. Feminist work hard to make sure universal human right are applied to women and women have a role in implementation of those rights. Because women and children are the venerable members of society, they make sure that women are not only respected but also protected. They make sure women are given voices and they are heard. United States being a super power have a major role in making sure basic human rights are respected throughout the world. For United States to be able to enforce and expect other countries to respect human rights, it should be seen that United States itself respect those very rights it expects other countries to respect. In this regard all countries should be held to the same standard. When it falters in this role, its clout diminishes. All human rights are indivisible, whether they are civil and political rights, such as right to life, equality before the law and freedom of expression; economic, social and cultural rights, such as the right to work, social security and education. The improvement of one right facilitates advancement of the others. Likewise, the deprivation of one right adversely affects the others.

Tuesday, November 26, 2019

Organizing an Exploratory Essay on Earthquake Prediction

Organizing an Exploratory Essay on Earthquake Prediction This is the last part of the guide which will assist you in writing an exploratory essay on Earthquake Predictions. Just to recap, the first part of this guide was 10 facts on earthquake prediction for an exploratory essay, the second part was 20 topics on earthquake prediction for an exploratory essay, in which we also discussed a sample essay, and in this final part, we’re going to tackle the art of organizing an exploratory essay on earthquake prediction. Writing an exploratory essay about earthquakes is going to be a little different than the essays you’re used to writing. In this essay you won’t just be writing about the topic itself but rather establish arguments on popular beliefs. You aren’t just supposed to fill up the word count on validating a thesis, but also critique an existing study or research, and present your take on the matter. There is another thing that you need to know which is essential to the essay: your exploratory essay on earthquakes should be a retrospect of your thinking process, while you’re working your way through a problem. The essay should complement your research, explaining how you did it and where you got the information from. That’s what differentiates an exploratory essay from a normal one; you need to tell the reader how you worked through that problem. How to Start It Off The introduction to your essay should have a clear outline of what the problem is and why it caught your attention. You have to tell your reader what the cause of the problem is, who  bears the responsibility and what the possible solutions are. It should also have a brief overview of your research sources. Body The body should have the inquiry process that you used to learn about the problem and solve it. This section will contain most of the information and should be able to sell your idea to the reader. You should include where you got the information from. The section should be detailed with proper references. End At the end of the essay, the conclusion should connect everything together. It all needs to fit in harmoniously; i.e. recalling the problem you found in the subject, the main causes to that problem and finally, wrap it up with the solutions you proposed. This is just a single essay, not a research paper. So naturally you would have to cut it short, but you should mention this in the conclusion that there are still a few concerns you have with the subject in question. Express that you’ll pursue this in your further education and write a proper paper about it.

Friday, November 22, 2019

5 Factors for Effective Business Writing Training

5 Factors for Effective Business Writing Training When it comes to business writing, which encompasses everything from email and report writing to marketing messages, even the Fortune 500 companies face crisis. All around theglobe, organizations spend millions onstaff training for leadership, motivation, team†building and whatnot, but invest far less in business writing training. This is a costly mistake.In mostcompanies, employees spend fully 40% of their time †Ã¢â‚¬  or more †Ã¢â‚¬  writing each day. Enhancingthis skill will greatly reduce time writing each document and yield better business writing. Traditionally, business writing typically referred to reports, proposals and memos. Thatnarrow definition is long gone. Every aspect of every business function is carried in some formof writing. New documents have emerged †Ã¢â‚¬  and some of them must be written and maintainedfor compliance with corporate or federal governance and other regulations. In such cases, the last thing your business needs is employees with poor writing skills. This iswhy your business’s primary objective, at the time of hiring, should be to assess the writing skills of your potential employees. After assessing your employees' writing skills, you will have a clear idea (ideally you will have a clear measurement) of current business writing skills and how to improve business writing skills overall. If you feel that your company lacks the necessary business writing skills to write relevant and structured content that clearly elicits the right business response, you can improve employee business writing abilities either by conducting an internal tutorial program or hiring outside expert training. In either case, here are the five most important factors that make up an effective business writing training session: 1) Qualification(s) The first step is to evaluate and verify the credentials of the writing expert and trainer who will conduct the business writing training. The instructor should be well†trained and experienced specifically in business writing, not writing in general. Look for a background in rhetoric, which indicates the trainer understands all aspects of business writing, including thinking, organization, creativity, relevance to audience purpose. Without an understanding of rhetoric, your business writing training could devolve to simplegrammar training. Good business writing training is much more than that. 2) Program Structure An effective business writing training class addresses both the substance and the syntax of documents. While syntax is easier to teach and to find an instructor for, substance requires a thorough understanding of your business, writing requirements, and relevant information involved. It is necessary to appoint an instructor who has both a mastery of English languageand who has taught writing and rhetoric as a subject previously.3) Customization There are several off†the†shelf business writing training programs and software available in the market. They offer a cost†effective way to improve business writing skills for your employees, but they may or may not be the right match for your particular company documents and employee skill gaps. One-size-fits-all doesn’t work with business writing, given its wide application. Search for a company that specializes in offering customized business writing training in addition to off†the†shelf options. This will ensure you’re dealing with a company that truly understands business writing. You will also save costs by gaining a customized business writing training program that does not have to built from scratch. 4) Continual Support Effective business writing training is not just a single event. Transforming your employees’ business writing skills involves continual training. After any business writing training program, make sure there is opportunity to ask ongoing questions and receive ongoing resources. Business writing standards evolve quickly. Make certain your employees have access to new information. 5) Flexibility Lastly, the business writing training should be flexible in two ways. First, it should achievethe desired results †Ã¢â‚¬  improve your employees’ business writing skills. Secondly, the training logistics should be flexible to match your requirements. Can the training support a large, onsite delivery? Can the training support a large, online delivery? Are online and onsite and general and customized options available to best match your needs? Will the company work with you to ensure logistics match what you want? Demand this. Download my eBook, â€Å"Four Steps to Improve Your Team’s Business Writing Skills"to learn more on what makes up a good business writing training session.Read and discover the secret art to effective business writing and maintaining your company’s image and efficiency through proper communication. Or, schedule a complimentary consultationwith a business writing expert to help your team write better at work.

Thursday, November 21, 2019

Asda and Tesco - Restructuring to reflect multichannel markets Assignment

Asda and Tesco - Restructuring to reflect multichannel markets - Assignment Example Therefore, the study has utilized different leadership theories to explain the required traits and skills for the new managerial positions. The report is based on the study of the current restructuring plans of Asda and Tesco, the two retail giants of the UK. This report has also emphasised on different theories of leadership practices in any business environment, to understand the relevance of these theories in the restructuring plans of Asda and Tesco. Tesco Plc. is one of the leading supermarket chains in the UK. Tesco has its stores in 12 countries worldwide and it generally deals with food, books, clothes, electronic gadgets and furniture. The company is successfully restructuring its multichannel market operations over a period of time. In this process, they are redeploying near about 100 staffs to new job roles. They are also creating several vacancies across the organisation. Their initiative called â€Å"Building tomorrow’s Tesco† is focused on achieving the global multichannel leadership (Channel management, 2014). Asda stores Ltd. is a renowned name in the retail industry of the UK. The organisa tion deals in grocery items, general merchandise, clothes and toys. Following the trend of Tesco, Asda is also focusing on a massive restructuring of its multichannel business operations. They are creating near about 5670 new roles for various departments of its multichannel operations (Harrison, 2014). These restructuring plans are massively changing leadership roles and responsibilities of several employees in these organisations. The importance of different leadership theories on the success of the restructuring plans of these organisations have been described in this report. Leadership in an organisation describes the role where leaders utilize the available resource and capabilities of a team to attain a common goal. The

Tuesday, November 19, 2019

Continue American Airlines Essay Example | Topics and Well Written Essays - 2000 words

Continue American Airlines - Essay Example 352). The airline industry is gravely affected by the rising fuel costs in the global market, rapid evolution of the internet, and other technological factors. 2. Competitive Forces of the Airline Industry Competition in the airline industry is becoming more aggressive since the â€Å"world is experiencing massive expansion of both domestic and international air travel† (Williams, 2009, p. 80). However, the industry has been shakedown by highly dynamic environment that influenced the industry’s competitive forces which include entry of competitors; threat of substitutes; bargaining power of suppliers; bargaining power of buyers; and rivalry among the existing players (Hubbard, 2004). The entry of competitors is determined by the existing barriers that include intense competition, differentiation and the high capital costs of entry. However, when the market is deregulated the liberalized the industry is becoming saturated with new entrants like the LCCs. In terms of thre at of substitutes, customers can also use other carriers such as train, bus or cruise lines in order to reach the desired destination. Furthermore, the bargaining power of buyers and suppliers is among the critical competitive forces of the airline industry because of its direct impact on prices, volume, and profit (Porter, 1998, p. 45). Air travel carriers particularly those that are sharing the same routes need to have their own effective strategies in order to attract travelers, considering that the industry is centered on Boeing and Airbus suppliers. Lastly, competitive rivalry in the airline industry is high because of its low-cost nature; high fixed costs and competitive pricing make the industry grow at a very slow rate. 3. Airlines Firm Competes Today In the history, the airline industry is heavily regulated wherein almost all of the firm’s activities are highly supervised. This isolated manner of competition had initiated in the U.S.; however, it has been remodeled a nd â€Å"for the first time of history of commercial aviation, an open market situation in which competitive market pricing was to be the norm, and market entry was to become legally open to new airlines† (Williams, 2009, p. 78). The fact that U.S. is one of the highest performing countries in the world, and the reform strategy has been effective in the country, then the other countries are encouraged to adopt the diverse market deregulation. Today, airline firms are competing based on their sizes, assets count, competitive pricing and technological advancement. 1. Firm Competitiveness: Their Key Strengths and Weaknesses AA is one of the world’s largest air freight carriers, and they remain to be competitive despite of the existence of LCCs because they believe on their strengths from the principles of low costs, valued customers, cooperation, and strong financial condition (Subbarao & Murthy, 2005, p. 75). AA’s key strengths include 621 passenger fleet in more than 251 destinations in 41 countries, its alliances and partnerships with American Eagle and AmericanConnection (regional affiliates), Oneworld Airline Alliance, and trans-Atlantic and trans-Pacific joint business agreement. All these activities are realized by AA because of their strong relations with the government. Their key weaknesses include unstable financial position because of on-going economic crisis, high operating expenses and

Sunday, November 17, 2019

Electrotherapy and Osteoarthritis Essay Example for Free

Electrotherapy and Osteoarthritis Essay Osteoarthritis has been described and defined as a condition involving the human bones that is caused by the breakdown of the joints, leading to the loss of cartilage, or what is known as the ‘cushion’ between the bone and the joint, in the affected joint or joints. Osteoarthritis is known to affect more than twenty million people every year in the United States of America alone. This degenerative disease affects persons aged above forty five, and it is found in both sexes, and it does not distinguish between races and colors and ethnicities. The hands, the feet, the spine and the large joints of the body fall prey to this debilitating disease, and until today, research has not been able to reveal the specific cause of osteoarthritis, although it is true that it can be directly attributed to the impact of ageing. Injuries in a joint, ageing and being overweight can also lead to the onset of osteoarthritis. The pain in osteoarthritis is caused due to the rubbing of the bones together after the cartilage that cushions them has been worn out. Some of the prescribed therapies to deal with the disease are exercise, stringent weight control, resting of the painful joints, pain relief medication, electrotherapy, and alternative therapies, and if the pain is excruciating, surgery. Electrotherapy is today one of the most accepted and used skills of physiotherapists, although it is by no means new. The use of heat, cold and electrical stimulation have been in use for a long time now, but the inherent problem is that the benefits and the advantages or disadvantages if any have not been analyzed or accounted for, and this means that the method is not as widely used as it can be. However, it remains a fact that electricity has been used by medical practitioners for hundreds of years now, and it is now one of the most common treatment approaches, giving new hope to millions of sufferers across the globe. (Kitchen, Sheila 2002) Take for example this table demonstrating the improvement in the management of pain in osteoarthritis using electrotherapy. Recent research has been able to prove that electricity would be able to bring immediate relief for both acute as well as chronic pain, and it must be remembered that in the case of osteoarthritis, the pain can be both acute and chronic. Nevertheless, the exact mechanism of electrotherapy is not known yet, although it is true that the method can block the transmission of pain signals across the nerves, and can also cause the release of endorphins, or the natural painkillers that are created by the body to combat pain. There can be several different types of electrotherapy methods, and some of them are: TENS, or ‘transcutaneous electrical nerve stimulation’, inferential current, and galvanic stimulation. One must note that all the three methods use electrotherapy to stimulate nerves and muscles, through the adhesive pads that are applied on the skin. Electrotherapy must never be used over malignancies, open infections, over pacemaker leads, and over the throat, because it may cause lowered blood pressure, and over a pregnant uterus, as it may affect the fetus. In the year 2004, a randomized double blind pilot study on the impact of electrotherapy on about sixty four osteoarthritis patients suffering from moderate to severe pain in their various joints was conducted. The aim was to study whether the therapy would be useful in alleviating the pain for these patients, and it was found that it would definitely be able to provide temporary relief from severe and intolerable pain. At the present time, stated the researchers who were involved in the experiment, pain relief for osteoarthritis is predominantly medication, and this approach could bring better relief. In the study, the approach was to apply micro to milliamp current to certain specific areas of the patient’s head. This would result in the release of endogenous opioids from the various pain management areas located within the human brain. For a period of two weeks prior to and tow weeks after the study, the subject pain was self assessed using the ‘value scale’, and none of the physicians, patients and the device operators were let in on which device was real and which, false, and the data thus collected revealed the interesting fact that electrotherapy was indeed beneficial in bringing down the pain of the patients of osteoarthritis. According to the Australian Physiotherapy Association, there is sufficient evidence available to prove that physiotherapy management of the knee joints is a very good idea, and that there is a lack of evidence to prove that electrotherapy, specifically shortwave diathermy, including ultrasound, microwave and shortwave may be useful in managing the pain. It may however be true that a recent Cochrane review was able to prove conclusively that TENS or transcutaneous electrical nerve stimulation may be quite effective in controlling pain in these patients. However, better designed studies have to be made before it can be stated that TENS can be used to treat pain for osteoarthritis sufferers. (Bennell K, Hinman R, Crossley K 2001) It is important that the treatment plan must be made with the complete cooperation and consultation with the patient. The treatment goals would depend on the timescale of the treatment that he or she is undergoing for his osteoarthritis, the patient profile, and the affected joints. This would ensure that the patient achieves the maximum benefits of the treatment, so that he may be able to continue living a healthy and active life. Although research has shown that electrotherapy methods like laser therapy and ultrasound do not bring in any significant levels of improvement in the long term for the pain, they do bring in immediate relief from the pain. (EMHM Vogels, HJM Hendrick et al 2003) This cannot be taken to mean that electrotherapy does not bring relief for patients of osteoarthritis; it has been found that low power laser therapy has brought great relief for the pain of sufferers of osteoarthritis in Russia and in Eastern Europe. A study showed that electrotherapy brought relief for pain, mobility, tenderness and functioning in these patients, with relatively little adverse effects. In all probability, the mechanisms treated successfully using laser electrotherapy included peripheral nerve stimulation, resolution of inflammation, enhanced chondrocyte proliferation and increased matrix synthesis. (Ghassemi, M, Marks R 1999) There can be no doubt that the studies conducted so far are by no means conclusive, and the issue of handling the joint pains of those suffering from osteoarthritis with electrotherapy must be analyzed and studies further to bring in real statistics and real results. Perhaps, very soon, there may be available some sort of revolutionary treatment for the management of pain, which these patients would be able to use without fear of side effects or other complications, so that they may be able to continue to live an active and healthy lifestyle.

Thursday, November 14, 2019

SHOULD WE FAVOR DRUG LEGALIZATION Essay examples -- essays research pa

SHOULD WE FAVOR DRUG LEGALIZATION? In the article â€Å"Drug Policy and the Intellectuals,† William J. Bennentt, chides intellectuals who believe drugs should be legalize. Bennett challenges his audience , by attacking intellectuals. However Bennett tries to win over his audience of intellectuals in two ways: by calling upon their talents and by attacking on the arguments of intellectuals who favor legalizing drugs. .He shows an understanding of others’ viewpoints by addressing points of opposition several times during the article. Bennett demonstrates knowledge of the subject by supporting his points with examples and facts. In his opening remarks, Bennett comes close to insulting his audience of intellectuals by referring to those he is attacking as "they" (617 ). Early in the speech, he diplomatically praises some intellectuals, especially in medicine and science, who are using their talents to combat the drug problem. Bennett makes clear that his speech will not be politically partisan. Bennett will be criticizing intellectuals, whether on the left or the right, who hold either or both of these views: that the drug problem can be solved by legalization and that the problem is so hopeless we should give up trying to fix it. Although some of Bennett's coun...

Tuesday, November 12, 2019

Maruti 800 Car

There are many cars on the market that are exciting with respect to power(Accord), interior design(Octavia, Benz), overall execution(again Accord) & the vitality in the segment they play in (New City) [pic][pic][pic][pic] but no other car is as close to what ALTO is in the entry level segment. Santro & Indica do have a strong hold on the upper level where Alto plays (Alto 1. 1) but with respect to the range that Alto has from mid 2 to low 4 lac it is the only choice. August 05 Alto is being launched with better styling (clear head-tail lamps), changed nose and a few more vibrant colors to make matters interesting. The seat fabric have received an upgrade. Although Swift continues to take limelight, guess Alto is serving Maruti and entry level buyers just fine. I wish they again launch it with the 1. 1 liter engine. Given that Alto has longer wheelbase and (more) modern chassis than Zen it would kill Zen’s sales if launched with 1. 1 liter engine. June 04: For the first time ever a model (Alto) outscored 800 on the sales chart. This is due to Maruti positioning Alto as entry level car & in order to phase out 800 & also they slashed entry level price by 25,000 (without AC) at 2,34,000. Recently I had a test ride of a used Alto 1. without power steering. The car was in a good condition. I really liked the power of 1. 1 engine. With 4 passengers it was pulling very well. The transmission was typical Maruti/Suzuki, a little rough but spot-on. As I am used to Palio’s butter smooth gears I found the gears in Alto a little crude but accurate & easy to locate specially from 2nd to 3rd, it is easy to find it. Although I have heard a few complaints from some owners about Grinding noises from transmission. So better watch-out for that. The AC was good enough but left me for wanting as it was VERY hot. Also with AC on the acceleration suffered a bit. Can’t blame as I had 4 full grown adults with me! 🙂 Overall I was very satisfied but when finally we sat for negotiations the Doctor was asking a little too much than I thought a used Alto should cost. This led to me test drive of the new Alto (800), at 2,60 it was very close to the used 1. 1! The test drive without AC was very good but with AC full blown the acceleration did suffer significantly. So I tried shutting off AC when I was speeding & then started it when cruising, it worked just fine. I thought I can manage with this power by effectively shutting off AC when I needed to Pass & on inclines (valleys etc). The interior was a bit lacking compared to Palio & also Santro but at this price point it did meet my expectations. It is only a matter of getting used to. I didn’t like the shifter coming out of teh floor as opposed to much better treatment in Palio/Santro. Here in Alto it seem to come out of the floor! 🙂 But not a point that would affect my decision. The interior room is satisfactory if not significant. 4 Adults can fit in for trips of say 3/4 hrs with some halts. The seats themselves are good & I found a very comfortable seating position except some room for my legs as I am 6’ 1’ with the legs of same length as of my 6’ 3’ friend! ) The fuel economy I was told as phenomenal with at least 14 in city & 17-18 on the highways! That was MUCh better than 10/14 of my Palio. As this car is for my father I thought he would get a little better than what I can extract! Driving style you know! 🙂 I was a bit concerned about the tire size & t hought for a longer trips bigger tires would be preferable but it would affect the fuel economy I guess. You can’t have all!! The styling is conservative but tasteful for the common man who thinks that car is an extension of their personality. The fashion seekers should shop elsewhere. Both front & rear styling is interesting enough but at the same time toned down to take out the last drop of boldness.. The car looks much better with body colored bumpers than the ugly black ones! They look like an accessory externally attached than the integral part of the car! Only black car looks ok with those bumpers. Anyways, who buys a black color car in a counry of hot summer! 🙂 (There are quite a few mind you! ) I am almost set on Alto 800. I compared it with all the competition & it bits the competition when you factor in the price & daily running costs (fuel/maintenance) & have decided to go for Alto 800 Lxi. I think it is worth to pay for the extra features for some price. At the same time I didn’t think it was a good idea to spend more than 4 lac for 1. 1 as I thought the level of interior materials & overall comfort would be more justified in Santro/Indica/Palio for a little more cash. Fuel economy is again where Alto 1. 1 would do better than most though. The color availability is again ok for this price range. I would love to see more colors coming out soon to keep interest in the product. I would recommend Alto to anyone planning to buy a entry level car. It is a must to have a loot at this car before buying any other car you like. This is the perfect as far as the segment it plays in goes. MARUTI UDYOG LIMITED – Managing competition successfully Maruti Udyog Limited (MUL) was established in Feb 1981 through an Act of Parliament, to meet the growing demand of a personal mode of transport caused by the lack of an efficient public transport system. It was established with the objectives of – modernizing the Indian automobile industry, producing fuel efficient vehicles to conserve scarce resources and producing indigenous utility cars for the growing needs of the Indian population. A license and a Joint Venture agreement were signed with the Suzuki Motor Company of Japan in Oct 1983, by which Suzuki acquired 26% of the equity and agreed to provide the latest technology as well as Japanese management practices. Suzuki was preferred for the joint venture because of its track record in manufacturing and selling small cars all over the world. There was an option in the agreement to raise Suzuki’s equity to 40%, which it exercised in 1987. Five years later, in 1992, Suzuki further increased its equity to 50% turning Maruti into a non-government ganization managed on the lines of Japanese management practices. Maruti created history by going into production in a record 13 months. Maruti is the highest volume car manufacturer in Asia, outside Japan and Korea, having produced over 5 million vehicles by May 2005. Maruti is one of the most successful automobile joint ventures, and has made profits every year since inception till 2000-01. In 2000-01, although Maruti generated operating profits on an income of Rs 92. 5 billion, high depreciation on new model launches resulted in a book loss. COMPANY HISTORY AND BACKGROUND The Evolution Maruti’s history of evolution can be examined in four phases: two phases during pre-liberalization period (1983-86, 1986-1992) and two phases during post-liberalization period (1992-97, 1997-2002), followed by the full privatization of Maruti in June 2003 with the launch of an initial public offering (IPO). The first phase†¦ Hindustan Construction Co. Ltd. Hincon House, LBS Marg, Vikhroli (W) Mumbai – 400083 email: [email  protected] com Tel: +91 22 25775959 Fax: +91 22 25775732 Hindustan Construction Co. Ltd. 706-707, 7th Floor Surya Kiran, 19, KG Marg New Delhi – 110001 Tel: +91 11 23358717, 23358727 Fax: +91 11 23358837

Saturday, November 9, 2019

Life and Work of John Bowlby

Bowlby was born in London to an upper-middle-class family. He was the fourth of six children and was brought up by a nanny in the British fashion of his class at that time. His father, Sir Anthony Bowlby, first Baronet, was surgeon to the King's Household, with a tragic history: at age five, Sir Anthony's own father (John's grandfather) was killed while serving as a war correspondent in the Opium Wars. Normally, Bowlby saw his mother only one hour a day after teatime, though during the summer she was more available. Like many other mothers of her social class, she considered that parental attention and affection would lead to dangerous spoiling of the children. Bowlby was lucky in that the nanny in his family was present throughout his childhood. [1] When Bowlby was almost four years old, his beloved nanny, who was actually his primary caretaker in his early years, left the family. Later, he was to describe this as tragic as the loss of a mother. At the age of seven, he was sent off to boarding school, as was common for boys of his social status. In his work Separation: Anxiety and Anger, he revealed that he regarded it as a terrible time for him. He later said, â€Å"I wouldn't send a dog away to boarding school at age seven†. [2] Because of such experiences as a child, he displayed a sensitivity to children’s suffering throughout his life. However, with his characteristic attentiveness to the effects of age differences, Bowlby did consider boarding schools appropriate for children aged eight and older, and wrote, â€Å"If the child is maladjusted, it may be useful for him to be away for part of the year from the tensions which produced his difficulties, and if the home is bad in other ways the same is true. The boarding school has the advantage of preserving the child's all-important home ties, even if in slightly attenuated form, and, since it forms part of the ordinary social pattern of most Western communities today [1951], the child who goes to boarding-school will not feel different from other children. Moreover, by relieving the parents of the children for part of the year, it will be possible for some of them to develop more favorable attitudes toward their children during the remainder. [3] He married Ursula Longstaff, herself the daughter of a surgeon, on April 16, 1938, and they had four children, including (Sir) Richard Bowlby, who succeeded his uncle as third Baronet. Bowlby died at his summer home on the Isle of Skye, Scotland. Career Bowlby studied psychology and pre-clinical sciences at Trinity College, Cambridge, winning prizes for outstanding intellectual performance. After Cambridge, he worked with maladjusted and delinquent children, then at the age of twenty-two enrolled at University College Hospital in London. At the age of twenty-six, he qualified in medicine. While still in medical school he enrolled himself in the Institute for Psychoanalysis. Following medical school, he trained in adult psychiatry at the Maudsley Hospital. In 1937, aged 30, he qualified as a psychoanalyst. During World War II, he was a Lieutenant Colonel in the Royal Army Medical Corps. After the war, he was Deputy Director of the Tavistock Clinic, and from 1950, Mental Health Consultant to the World Health Organization. Because of his previous work with maladapted and delinquent children, he became interested in the development of children and began work at the Child Guidance Clinic in London. This interest was probably increased by a variety of wartime events involving separation of young children from familiar people; these included the rescue of Jewish children by the Kindertransport arrangements, the evacuation of children from London to keep them safe from air raids, and the use of group nurseries to allow mothers of young children to contribute to the war effort. [4] Bowlby was interested from the beginning of his career in the problem of separation and the wartime work of Anna Freud and Dorothy Burlingham on evacuees and Rene Spitz on orphans. By the late 1950s he had accumulated a body of observational and theoretical work to indicate the fundamental importance for human development of attachment from birth. [2] Bowlby was interested in finding out the actual patterns of family interaction involved in both healthy and pathological development. He focused on how attachment difficulties were transmitted from one generation to the next. In his development of attachment theory he propounded the idea that attachment behaviour was essentially an evolutionary survival strategy for protecting the infant from predators. Mary Ainsworth, a student of Bowlby’s, further extended and tested his ideas, and in fact played the primary role in suggesting that several attachment styles existed. The three most important experiences for Bowlby’s future work and the development of attachment theory were his work with: Maladapted and delinquent children. James Robertson (in 1952) in making the documentary film A Two-Year Old Goes to the Hospital, which was one of the films about †young children in brief separationâ€Å". The documentary illustrated the impact of loss and suffering experienced by young children separated from their primary caretakers. This film was instrumental in a campaign to alter hospital restrictions on visiting by parents. In 1952 when he and Robertson presented their film A Two Year Old Goes to Hospital to the British Psychoanalytical Society, psychoanalysts did not accept that a child would mourn or experience grief on separation but instead saw the child's distress as caused by elements of unconscious fantasies (in the film because the mother was pregnant). Melanie Klein during his psychoanalytic training. She was his supervisor; however they had different views about the role of the mother in the treatment of a three-year-old boy. Specifically and importantly, Klein stressed the role of the child's fantasies about his mother, but Bowlby emphasized the actual history of the relationship. Bowlby's views—that children were responding to real life events and not unconscious fantasies—were rejected by psychoanalysts, and Bowlby was effectively ostracized by the psychoanalytic community. He later expressed the view that his interest in real-life experiences and situations was â€Å"alien to the Kleinian outlook†. [2] Maternal deprivation Main article: Maternal deprivation In 1949, Bowlby's earlier work on delinquent and affectionless children and the effects of hospitalised and institutionalised care lead to his being commissioned to write the World Health Organization's report on the mental health of homeless children in post-war Europe. [5] The result was Maternal Care and Mental Health published in 1951. [6] Bowlby drew together such limited empirical evidence as existed at the time from across Europe and the USA. His main conclusions, that â€Å"the infant and young child should experience a warm, intimate, and continuous relationship with his mother (or permanent mother substitute) in which both find satisfaction and enjoyment† and that not to do so may have significant and irreversible mental health consequences, were both controversial and influential. The 1951 WHO publication was highly influential in causing widespread changes in the practices and prevalence of institutional care for infants and children, and in changing practices relating to the visiting of infants and small children n hospitals by parents. The theoretical basis was controversial in many ways. He broke with psychoanalytic theories which saw infants' internal life as being determined by fantasy rather than real life events. Some critics profoundly disagreed with the necessity for maternal (or equivalent) love in order to function normally,[7] or that the formation of an ongoing relationship with a child was an important part of parenting. [8] Others questioned the extent to which his hypothesis was supported by the evidence. There was criticism of the confusion of the effects of privation (no primary attachment figure) and deprivation (loss of the primary attachment figure) and in particular, a failure to distinguish between the effects of the lack of a primary attachment figure and the other forms of deprivation and understimulation that may affect children in institutions. [9] The monograph was also used for political purposes to claim any separation from the mother was deleterious in order to discourage women from working and leaving their children in daycare by governments concerned about maximising employment for returned and returning servicemen. 9] In 1962 WHO published Deprivation of maternal care: A Reassessment of its Effects to which Mary Ainsworth, Bowlby's close colleague, contributed with his approval, to present the recent research and developments and to address misapprehensions. [10] This publication also attempted to address the previous lack of evidence on the effects of paternal deprivation. According to Rutter the importance of Bowlby's initial writings on ‘maternal deprivation' lay in his emphasis that children's experiences of interpersonal relationships were crucial to their psychological development. 8] Development of attachment theory Bowlby himself explained in his 1988 work â€Å"A Secure Base† that the data were not, at the time of the publication of Maternal Care and Mental Health, â€Å"accommodated by any theory then current and in the brief time of my employment by the World Health Organization there was no possibility of developing a new one†. He then went on to describe the subsequent development of attachment theory. 11] Because he was dissatisfied with traditional theories, Bowlby sought new understanding from such fields as evolutionary biology, ethology, developmental psychology, cognitive science and control systems theory and drew upon them to formulate the innovative proposition that the mechanisms underlying an infants tie emerged as a result of evolutionary pressure. [12] â€Å"Bowlby realised that he had to develop a new theory of motivation and behaviour control, built on up-to-date science rather than the outdated psychic energy model espoused by Freud. [5] Bowlby expressed himself as having made good the â€Å"deficiencies of the data and the lack of theory to link alleged cause and effect† in Maternal Care and Mental Health in his later work Attachment and Loss published in 1969. [13] Ethology and evolutionary concepts â€Å"From the 1950s Bowlby was in personal and scientific contact with leading European scientists in the field of ethology, namely Niko Tinbergen, Konrad Lorenz, and especially the rising star of ethology Robert Hinde. Using the viewpoints of this emerging science and reading extensively in the ethology literature, Bowlby developed new explanatory hypotheses for what is now known as human attachment behaviour. In particular, on the basis of ethological evidence he was able to reject the dominant Cupboard Love theory of attachment prevailing in psychoanalysis and learning theory of the 1940s and 1950s. He also introduced the concepts of environmentally stable or labile human behaviour allowing for the revolutionary combination of the idea of a species-specific genetic bias to become attached and the concept of individual differences in attachment security as environmentally labile strategies for adaptation to a specific childrearing niche. Alternately, Bowlby’s thinking about the nature and function of the caregiver-child relationship influenced ethological research, and inspired students of animal behaviour such as Tinbergen, Hinde, and Harry Harlow. Bowlby spurred Hinde to start his ground breaking work on attachment and separation in primates (monkeys and humans), and in general emphasized the importance of evolutionary thinking about human development that foreshadowed the new interdisciplinary approach of evolutionary psychology. Obviously, the encounter of ethology and attachment theory led to a genuine cross-fertilization† (Van der Horst, Van der Veer & Van IJzendoorn, 2007, p. 321). [14][15] The â€Å"Attachment and Loss† trilogy Main articles: Attachment theory and Attachment in children Before the publication of the trilogy in 1969, 1972 and 1980, the main tenets of attachment theory, building on concepts from ethology and developmental psychology, were presented to the British Psychoanalytical Society in London in three now classic papers: The Nature of the Child’s Tie to His Mother (1958), Separation Anxiety (1959), and Grief and Mourning in Infancy and Early Childhood (1960). Bowlby rejected psychoanalyst explanations for attachment, and in return, psychoanalysts rejected his theory. At about the same time, Bowlby's former colleague, Mary Ainsworth was completing extensive observational studies on the nature of infant attachments in Uganda with Bowlby's ethological theories in mind. Her results in this and other studies contributed greatly to the subsequent evidence base of attachment theory as presented in 1969 in Attachment the first volume of the Attachment and Loss trilogy. [16] The second and third volumes, Separation: Anxiety and Anger and Loss: Sadness and Depression followed in 1972 and 1980 respectively. Attachment was revised in 1982 to incorporate recent research. According to attachment theory, attachment in infants is primarily a process of proximity seeking to an identified attachment figure in situations of perceived distress or alarm for the purpose of survival. Infants become attached to adults who are sensitive and responsive in social interactions with the infant, and who remain as consistent caregivers for some months during the period from about 6 months to two years of age. Parental responses lead to the development of patterns of attachment which in turn lead to ‘internal working models' which will guide the individual's feelings, thoughts, and expectations in later relationships. [5] In Bowlby's approach, the human infant is considered to have a need for a secure relationship with adult caregivers, without which normal social and emotional development will not occur. As the toddler grows, it uses its attachment figure or figures as a â€Å"secure base† from which to explore. Mary Ainsworth used this feature plus â€Å"stranger wariness† and reunion behaviours, other features of attachment behaviour, to develop a research tool called the â€Å"Strange Situation Procedure† for developing and classifying different attachment styles. The attachment process is not gender specific as infants will form attachments to any consistent caregiver who is sensitive and responsive in social interactions with the infant. The quality of the social engagement appears to be more influential than amount of time spent. 16] Darwin biography Bowlby's last work, published posthumously, is a biography of Charles Darwin, which discusses Darwin's â€Å"mysterious illness† and whether it was psychosomatic. [17] Bowlby's legacy Main article: Attachment theory Although not without its critics, attachment theory has been described as the dominant approach to understanding early social development and to have given rise to a great surge of empirical research into the formation of children's close relationships. 18] As it is presently formulated and used for research purposes, Bowlby's attachment theory stresses the following important tenets:[19] 1) Children between 6 and about 30 months are very likely to form emotional attachments to familiar caregivers, especially if the adults are sensitive and responsive to child communications. 2) The emotional attachments of young children are shown behaviourally in their preferences for particular familiar people, their tendency to seek proximity to those people, especially in times of distress, and their ability to use the familiar adults as a secure base from which to explore the environment. ) The formation of emotional attachments contributes to the foundation of later emotional and personality development, and the type of behaviour toward familiar adults shown by toddlers has some continuity with the social behaviours they will show later in life. 4) Events that interfere with attachment, such as abrupt separation of the toddler from familiar people or the significant inability of carers to be sensitive, responsive or consistent in their interactions, have short-term and possible long-term negative impacts on the child's emotional and cognitive life.

Thursday, November 7, 2019

The eNotes Blog Goodbye to a Modern Pioneer Michael S. Hart, ProjectGutenberg

Goodbye to a Modern Pioneer Michael S. Hart, ProjectGutenberg Reasonable people adapt themselves to the world. Unreasonable people attempt to adapt the world to themselves. All progress, therefore, depends on unreasonable people. ~ George Bernard Shaw. On September 6, the literary world lost a true pioneer. Michael S. Hart, founder of Project Gutenberg, died of a heart attack in his home in Urbana, Illinois. He was 64. Hart was the inventor of the now nearly-ubiquitous electronic books, or eReaders, which he conceived in 1971. The idea for eReaders came to him after he received a free copy of the Declaration of Independence.   At the time, Hart was a student at the University of Illinois at Urbana-Champaign and had access to their (then powerful) computers. He typed up the Declaration and sent it through the computer network to other users. This free transmittal of literature became Harts lifes work for the next forty years via his Project Gutenberg. As of today, there are 100,000 works available to anyone who cares to download them, all free of charge. Dr. Gregory Newby penned the obituary for his friend and colleague.   It reads, in part: Michael prided himself on being unreasonable, and only in the later years of life did he mellow sufficiently to occasionally refrain from debate. Yet, his passion for life, and all the things in it, never abated. Frugal to a fault, Michael glided through life with many possessions and friends, but very few expenses. He used home remedies rather than seeing doctors. He fixed his own house and car. He built many computers, stereos, and other gear, often from discarded components. Michael S. Hart left a major mark on the world. The invention of eBooks was not simply a technological innovation or precursor to the modern information environment. A more correct understanding is that eBooks are an efficient and effective way of unlimited free distribution of literature. Access to eBooks can thus provide opportunity for increased literacy. Literacy, and the ideas contained in literature, creates opportunity. In July 2011, Michael wrote these words, which summarize his goals and his lasting legacy: â€Å"One thing about eBooks that most people havent thought much is that eBooks are the very first thing that were all able to have as much as we want other than air. Think about that for a moment and you realize we are in the right job. He had this advice for those seeking to make literature available to all people, especially children: Learning is its own reward. Nothing I can say is better than that.

Tuesday, November 5, 2019

Biography of Robert Hanssen, Spy Who Betrayed the FBI

Biography of Robert Hanssen, Spy Who Betrayed the FBI Robert Hanssen is a former FBI agent who sold highly classified material to Russian intelligence agents for decades before he was finally arrested in 2001. His case is considered one of Americas greatest intelligence failures, as Hanssen operated as a mole within the bureaus counterintelligence division, the highly sensitive part of the FBI tasked with tracking foreign spies. Unlike Cold War spies of an earlier era, Hanssen claimed to have no political motivation for selling out his country. At work, he often spoke of his religious faith and conservative values, traits which helped him avoid any suspicion during the years that he was in secret communication with Russian spies. Fast Facts: Robert Hanssen Full Name: Robert Phillip HanssenKnown For: Worked as a mole for Russian spy agencies while serving as an FBI counterintelligence agent. He was arrested in 2001 and sentenced to life without parole in federal prison in 2002Born: April 14, 1944 in Chicago, IllinoisEducation: Knox College and Northwestern University, where he received an MBASpouse: Bernadette Wauck Early Life and Career Robert Phillip Hanssen was born in Chicago, Illinois, on April 18, 1944. His father served on the police force in Chicago and was serving in the U.S. Navy during World War II when Hanssen was born. As Hanssen grew up, his father was reportedly verbally abusive to him, often ranting that he would never succeed in life. After graduating from a public high school, Hanssen attended Knox College in Illinois, studying chemistry and Russian. For a time he planned to become a dentist, but eventually wound up obtaining an MBA and becoming an accountant. He married Bernadette Wauck in 1968 and, influenced by his devout Catholic wife, he converted to Catholicism. After a few years working as an accountant, he decided to enter law enforcement. He worked as a policeman in Chicago for three years and was placed on an elite unit that investigated corruption. He then applied and was accepted into the FBI. He became an agent in 1976, and spent two years working in the Indianapolis, Indiana, field office. Initial Betrayal In 1978, Hanssen was transferred to the FBI office in New York City and was assigned to a counterintelligence post. His job was to help assemble a database of foreign officials posted in New York who, while posing as diplomats, were actually intelligence officers spying on the United States. Many of them were agents of the Soviet intelligence agency, the KGB, or its military counterpart, the GRU. At some point in 1979, Hanssen made a decision to sell American secrets to the Soviets. He visited an office of the Russian governments trading company and offered to spy. Hanssen would later claim that his goal was simply to make some extra money, as living in New York City was putting a financial squeeze on his growing family. He began providing the Soviets with highly valuable material. Hanssen gave them the name of a Russian general, Dimitri Polyakov, who had been providing information to the Americans. Polyakov was carefully watched by the Russians from that point on, and was eventually arrested as a spy and executed in 1988. Robert Hanssens business cards, chalk and thumb tacks, which he used to communicate with his Russian contacts, according to the FBI. FBI.gov In 1980, after his first interactions with the Soviets, Hanssen told his wife what he had done, and she suggested they meet with a Catholic priest. The priest told Hanssen to stop his illegal activities and donate the money he had gotten from the Russians to charity. Hanssen made the donation to a charity affiliated with Mother Teresa, and cut off contact with the Soviets for the next few years. Return to Spying In the early 1980s, Hanssen was transferred to FBI headquarters in Washington, D.C. To his colleagues in the bureau he seemed to be a model agent. He often steered conversations to talk of religion and his very conservative values, which were aligned with the very conservative Catholic organization Opus Dei. Hanssen appeared to be a devoted anti-communist. After working in the FBI division that developed secret listening devices, Hanssen was again placed in a position to track Russian agents operating in the United States. In 1985 he approached the Soviets again and offered valuable secrets. During his second round of dealing with Russian agents, Hanssen was much more cautious. He wrote to them anonymously. While not identifying himself, he was able to gain their trust by initially providing information which the Soviets found both credible and valuable. The Soviets, suspicious of being lured into a trap, demanded to meet him. Hanssen refused. In his communications with the Russians (some of which were eventually made public after his arrest) he insisted on setting the terms of how he would communicate, pass information, and pick up money. His Russian contacts and Hanssen were highly trained in espionage techniques and were able to work together without ever meeting. At one point Hanssen spoke to a Russian agent over a pay phone, but they generally relied on placing signals in public places. For instance, a piece of adhesive tape placed on a sign in a park in Virginia would indicate that a package had been placed in a dead drop location, which was usually under a small footbridge in the park. Undated file photo released by the FBI February 20, 2001 shows a package recovered at the Lewis drop site containing $50,000 cash allegedly left by Russians for FBI Agent Robert Philip Hanssen. FBI / Getty Images A Third Stint of Betrayal When the Soviet Union collapsed in 1991 Hanssen became much more wary. During the early 1990s, KGB veterans began to approach western intelligence agencies and provide information. Hanssen became alarmed that a Russian with knowledge of his activities would tip off the Americans that a highly placed mole was operating within the FBI and the resultant investigation would lead to him. For years, Hanssen stopped contacting the Russians. But in 1999, while assigned as an FBI liaison with the State Department, he once again began selling American secrets. Hanssen was finally discovered when a former KGB agent contacted American intelligence agents. The Russian had obtained Hanssens KGB file. Realizing the importance of the material, the United States paid $7 million for it. Although his name was not specifically mentioned, evidence in the file pointed to Hanssen, who was put under close surveillance. On February 18, 2001, Hanssen was arrested at a park in northern Virginia after he had placed a package at a dead drop location. The evidence against him was overwhelming, and to avoid the death penalty, Hanssen confessed and agreed to be debriefed by American intelligence officials. During his sessions with investigators, Hanssen claimed his motivation had always been financial. Yet some investigators believed anger about how his father treated him as a child triggered a need to rebel against authority. Friends of Hanssen later came forward and told journalists that Hanssen had exhibited eccentric behavior, which included an obsession with pornography. In May 2002, Hanssen was sentenced to life in prison. News reports at the time of his sentencing said American intelligence agencies were not entirely satisfied with the extent of his cooperation and believed he was holding back information. But the government could not prove he had lied, and wishing to avoid a public trial, the government chose not to void his plea agreement. He was sentenced to life in prison. Robert Hanssen moments after being arrested. Getty Images   Impact of Hanssen Case The Hanssen case was regarded as a low point for the FBI, especially as Hanssen had been so trusted and had committed such betrayals for so many years. In court proceedings the government stated that Hanssen had been paid more than $1.4 million during his spying career, most of which he never actually received, as it was held for him in a Russian bank. The damage Hanssen did was considerable. At least three Russian agents he identified had been executed, and it was suspected that he compromised dozens of intelligence operations. One notable example was the information that the Americans had dug a tunnel under the Russian embassy in Washington to install sophisticated listening devices. Hanssen was incarcerated in a supermax federal prison in Colorado which also houses other notorious inmates, including the Unabomber, one of the Boston Marathon bombers, and a number of organized crime figures. Sources: Hanssen, Robert. Encyclopedia of World Biography, edited by James Craddock, 2nd ed., vol. 36, Gale, 2016, pp. 204-206. Gale Virtual Reference Library,A Search for Answers: Excerpts From the FBI Affidavit in the Case Against Robert Hanssen. New York Times, 22 February 2001, p. A14.Risen, James. Former FBI Agent Gets Life in Prison For Years as a Spy. New York Times, 11 May 2002, p. A1.

Sunday, November 3, 2019

Strategic Audit of Twitter Company Essay Example | Topics and Well Written Essays - 6250 words

Strategic Audit of Twitter Company - Essay Example Additionally, the alternative strategy relating to advertising services will be an effective measure for improving profit margin. Current Performance. In the present contemporary era, social media technologies are identified to play an effective role in the field of communication. Presently, there are several social networking service providers and Twitter is one of them. Online users with the use of Twitter are able to convey as well as read short messages with 140 characters. The social networking service provider has offered the global people with a platform for expressing as well as performing conversation relatively at cheaper rate. The service provider has been performing operations with better effectiveness over the years. In this respect, during the year 2013, the company has been conducting operations with revenue of around US$ 176.2 million. However, the company incurred loss of around US$ 645.3 in the same year. The revenue growth rate of the company has been slow due to lessening user base (Twitter, Inc., â€Å"Annual Report 2013†). The company has made investment in different spheres that include technology infrastructure, sales and marketing, research and development (R&D), expansion operations, retaining employees and strategic opportunities among others. In this regard, the company is identified to witness fluctuation in return on investment (ROI) for investors and shareholders. ROI of the company has been positive for the advertisers, as they are able to generate better returns on their investments (Twitter, Inc., â€Å"Annual Report 2013†). Twitter is a US based company. The company has expanded business operation on a global context in different countries that include Brazil, the UK, Australia, Canada and Japan. In this regard, the number of users of the company has increased to a substantial level. Based on the

Thursday, October 31, 2019

First amendment Essay Example | Topics and Well Written Essays - 3250 words

First amendment - Essay Example There have been a number of issues posing questions as to the effectiveness and extent of the provisions in the First Amendment. One of such is the Citizens United case popularly referred to as the ‘Citizens United v. Federal Election Commission’, in which the US Supreme Court, following a 5-4 decision, ruled that corporations and unions have similar political speech rights as individuals under the First Amendment. Being a conservative non-profit organization, Citizens United claims its commitment to restoring the control of the United States government to the citizens, as well as to emphasize American principles of limited government, autonomy of enterprise, strong families, and state sovereignty and security. Citizens United produced a documentary named Hillary-with respect to the then Senator Hillary Clinton, which was the main issue of the court case. The Federal Election Campaign Act of 1971, which controls the financing of political campaigns, was amended by the Bi partisan Campaign Reform Act of 2002 (BCRA). Following the amendment, this federal law prevents corporations and unions from spending their general treasury funds towards independent expenditures for a speech referred to as an ‘electioneering communication’, in other words a speech that concerns elections or one that portrays endorsement or disapproval of a candidate in the elections. As defined in the constitution, an electioneering communication ideally refers to any broadcast, cable, or satellite communication that refers to an openly identified candidate for Federal office and is created in 30 days of a major election or 60 days of a common election, (2 U.S.C.  § 441b), and that is publicly distributed (11 CFR  § 100.29(a)(2)). The documentary-Hillary was released at a time when Hillary Clinton was running for the Democratic presidential nomination, and as such, it conveyed opinions on Hillary’s suitability for the presidency. Not only did Citizens United avail the documentary in theatres and on DVDs, but also planned to make it accessible through video-on-demand. Further, Citizens United went ahead to produce television advertisements to endorse the movie and planned to run them on broadcast and cable television. However, the advertisements and the video-on-demand distribution had to be paid for, and as such, Citizens United opted to spend its general treasury funds. Consequently, Citizens United’s production and initiative was reflective of a violation of  § 441b of the constitution. Realizing the looming threat of facing possible civil and criminal charges, Citizens United rushed in to seek an injunction in federal district court, against the Federal Elections Commission (FEC), posing various arguments. First, Citizens United presented an argument claiming that  § 441b is unconstitutional with regard to the movie Hillary; a motion that the District Court denied and instead granted summary judgment to the FEC. In additi on, it argued that, as applied to the movie Hillary and the ads endorsing it, BCRA's disclaimer and disclosure requirements (BCRA  §Ã‚ §201 and 311) are also unconstitutional. According to BCRA

Tuesday, October 29, 2019

International Political Economy &Islamic Factor of Central Asia Essay

International Political Economy &Islamic Factor of Central Asia - Essay Example For example, Belarus has been able to advance the trade with Central Asia especially larly Kazakhstan. This was made possible by the high integration level within the economy of Russia. On the other hand, Ukraine has been promoted by the Turkmen and Uzbek governments as a way of escaping from the dominance of Russian and as a Europe opening. The Guam (anti-Russssian institution designed for fostering of the strategic) and the economical alliances between Ukraine Georgia Moldova, Azerbaijan, and Uzbekistan is not efficient to alter the regional balance. Besides, the chapter demonstrates a failing in the Caspian unity which included the south Caucasus and Central Asia. The growth in the connectivity and the cooperation of the Central Asia is discussed at length in the chapter. Aspects like the regional leadership Uzbek-Kazakh Competition are also highlighted. In this chapter, the author discussed the structural Agricultural sector trends. In central Asia Kazakhstan is one special case in terms of the level of agriculture. The whole republic was displayed as a key driver of the Soviet development of Agriculture, especially as a result of the Virgin campaign lands that were launched in the year 1954 by the Khrushchev. The campaign of the virgin lands facilitated the Kazakhstan Agriculture to an extent where it made over 20 percent of the whole land. The Kazakh republic made exports worth ten million tons of wheat in 1980. They also made over 300,000 tons of meat whose revenues were made up of a third of the GDP. The other produce were not of great relevance to the Soviet scale despite being relevant on the local level. The southern section of the republic cultivated cotton and rice. To date, the country is in possession of two hundred and twenty two million hectares farmland, most of which is used for pasture. This is about 85 percent of t he

Sunday, October 27, 2019

Unmanned Aerial Vehicles (UAVs) in Subconventional War

Unmanned Aerial Vehicles (UAVs) in Subconventional War CHAPTER- I INTRODUCTION 1. Many military strategists and theorists have concluded, based on recent history, the nature of future wars will be limited to regional and intrastate conflicts. Large interstate wars such as World Wars One and Two and the Persian Gulf War are not likely to be the wars of the future. UAVs are increasingly standard features of the modern combat theaters and Low Intensity Conflict zones where ISR missions may need to be carried out. Todays ISR missions are sophisticated operations. Covert or overt, they are executed using traditional techniques and modern technology – with expensive equipment and infrastructures often requiring highly skilled operators. Remotely Piloted Vehicles (RPVs)/Unmanned Aerial Vehicles (UAVs) are small unmanned aircraft which came into being as mans quest for newer and better tools of warfare. 2. Unmanned aerial vehicles (UAVs) will play a key role in dealing with low intensity conflicts abetted by both internal elements and unfriendly neighbours. Indias great neighbours not being really friendly be it Pakistan or China. Avoiding all risk to human life or manned search aircraft operating in hostile territory, poor weather or hazardous environments, UAVs fitted with sensors can be used to safely perform the Search-Locate-Identify elements of importance in a missions. Unmanned (or uninhabited) aerial vehicles (UAVs) are methodically becoming a central theme in the mosaic of Air Force systems and capability. The questions regarding employment of UAVs are not so much about if they should be developed but how to integrate them into Air Force doctrine and organizations. The Study identified reconnaissance UAVs as one of the high leverage systems of the future. Accordingly, the Air Force has made a concerted effort to develop UAVs and sensor technologies with a particular emphasi s on intelligence, surveillance, and reconnaissance (ISR) applications. This paper addresses considerations for improving the future application of UAVs for the ISR mission and their employment in LICO across our vast borders. Specifically, this research illustrates that UAVs in concert with manned and space assets addresses several Air Force ISR needs. Furthermore, the Air Force should seize the opportunity to leverage the rapid advances in sensor and information technology to increase the capability of UAVs to perform ISR while also performing other vital air power missions. 3. Used as drones in the First World War, RPVs since then have been used as targets for artillery guns, missiles and piloted aircraft or to bring exposed film of hostile territory. With advanced technology, RPVs are now being so designed so as to carry payloads for varied purposes and missions, such as for surveillance (TV cameras, Infra Red (IR) Imagers, sensors) or equipment for electronic counter measures (radar jammers, flares or chaff) or strictly for employment as weapon platforms. 4. A number of countries are today engaged in RPV development projects, prominent amongst these being UK, USA, France and Israel. It has been stated that the RPVs will be able to take on a number of missions and assignments, which are currently being performed by manned aircraft. As tactical aircraft are too few and too expensive to launch for random searches for targets in a battle area, manned reconnaissance (recce) in particular is being reduced in emphasis in favour of RPVs, which are cheaper. The comparative cost of a lost RPV vis-Ã  -vis a manned aircraft with a trained pilot is in itself a sufficient and good enough reason for undertaking such a research and development. 5. RPV can provide close recce of troops deployed in depth which would otherwise have to be undertaken by fighter aircraft, perform spotting functions for incoming munitions and designate as well as destroy targets, Jam enemys electronic equipment, act as radio relay stations and provide real-time intelligence. Further, by penetrating an enemys territory they alert electronic systems and this leads to their early detection. RPVs are therefore about to become an invaluable accretion for providing real-time, over the battlefield surveillance capability. But for all its virtues it is still being debated as to whether an RPV will be able to stand and fight alone or would it only compliment an air force. 6. Of the principles of war defined by Clausewitz the element of surprise has probably made the greatest contribution to success. In the military context therefore the denial of surprise to a potential aggressor is paramount. Equally the acquisition of intelligence is a vital factor in any operational venture. From the very earliest days of aviation the foresighted became aware of the use of aerial platforms for reconnaissance tasks. This has been true throughout the history of warfare. The Second World War saw a quantum leap in reconnaissance from the third dimension. In the Arab Israel wars of 1967 and 1973 the use of aerial reconnaissance enabled Israel dramatically to demonstrate the use of force multiplication through intelligence gained. Air reconnaissance has always been important to the success in war. It is the UAV whose time has come in ensuring that aerial reconnaissance continues to give intelligence in a high intensity air defence scenario. They have proved their worth i n reconnaissance and surveillance. 7. In an age of shrinking defence budgets, expensive manned aircraft and high cost of aircrew training most of the modern armed forces around the world are realising the need to employ RPVs for missions in the dense hostile Air Defence (AD) environment. Missions which were considered extremely dangerous and yet important can now be undertaken by RPVs with relative impunity. Owing to their small radar, IR signature and the ability to spoof the enemy, RPVs can give vital real time data about the enemy to commanders on the ground. RPVs if employed intelligently can make a significant contribution by keeping manned aircraft out of the hostile AD threats while providing real time information and at the same time denying the same by effective electronic warfare to the decision makers in a conflict between adversaries. Statement of the Problem 8. To study and evaluate the efficacy of employing UAVs in ISR role in sub-conventional warfare in the Indian context with special reference to counter terrorist operation across our vast borders. Justification of the Study 9. The UAV has shown, in counter-insurgency and in anti-terrorist operations as much as in war, the critical importance of an eye in the sky. UAV can be effectively employed in gathering the intelligence in terrorist training camps, their infiltration routes etc, to build an effective databank for use in the future. The Israel Army has deployed a new miniature unmanned aerial vehicle in counter-insurgency operations over the West Bank. The Israeli army has launched operations of the Skylark tactical UAV for counter-insurgency missions in the northern West Bank. Skylark began flying missions in late 2005 in what marked the first operational deployment of the new UAV. The MQ-1 Predator, armed with the AGM-114 Hellfire missile continues to be one of the US militarys most requested systems, assisting in the execution of the global war on terror by finding, fixing, tracking, targeting, engaging, and assessing suspected terrorist locations. 10. Historically unmanned aircrafts have been employed successfully in number of conventional operations. Their relatively low cost and the modest political embarrassment likely to be caused by their loss, seems to make them irreplaceable especially in a LICO environment where the enemy is difficult to identify and the political compulsions are high. UAVs can facilitate employment of aircraft, long-range guns and missiles by accurate target acquisition.. UAVs hold out a promise of providing a range of ISR and other support missions. Some of these are battlefield reconnaissance and surveillance, fire control and direction, communication and radar suppression. This study has been prompted in being able to identify and analyse the technical and tactical requirements of a UAV for aerial reconnaissance and to suggest the principle of employment for the task in sub conventional war.. 11. The day of the UAV as a natural ingredient of military thinking is much nearer than it was a decade ago, but there is still a need for clearer and more widespread understanding of what the UAV can be used to do as a tool for reconnaissance in a sub-conventional warfare which is more likely to be faced by our country in the future. Hypothesis 12. UAVs have been proposed for several mission areas including ISR, communications, and weapons delivery. The UAVs were used extensively in recent war. Direction is needed to ensure these maturing UAVs are used in the most effective way. The on-going revolution in sensor technology that will improve the UAVs ability to perform ISR missions now conducted by high-value, manned assets. 13. Todays ISR missions are sophisticated operations. Covert or overt, they are executed using traditional techniques and modern technology – with expensive equipment and infrastructures often requiring highly skilled operators. The requirement for information is likely to keep increasing as warfare becomes more oriented towards reconnaissance-strike. In future scenarios, no one system is going to be able t o meet all data collection requirements. Manned aircraft will not be available for all the intelligence needs of the warfighter. Satellite systems also have limitations that will prevent them from being the sole suppliers of information. The capabilities of UAVs make them ideally suited to fill the increasing void between intelligence requirements and existing data collection capability. Scope 14. The scope of this dissertation is to go into the evolution of UAVs, development and employment of UAV in recent wars. It will concentrate on the ISR aspects while identifying the characteristics/requirements of a UAV in a sub-conventional war. As UAVs being one of the high leverage systems of the future, the Air Force has to make a concerted effort to procure UAVs and sensor technologies with a particular emphasis on intelligence, surveillance, and reconnaissance (ISR) applications. This paper addresses considerations for improving the future application of UAVs for the ISR mission. Furthermore, the Air Force should seize the opportunity to leverage the rapid advances in sensor and information technology to increase the capability of UAVs to perform ISR while also performing other vital air power missions. 15. The scope of this dissertation is to critically analyse the efficacy of employment of UAVs in Armed role in sub-conventional environment which is more likely to be faced by India in future. It aims to study the application of UAV in LICO, study the advantages of employing UAVs in LICO in ISR role and suggest the philosophy for employment of UAVs in LICO in the ISR role. Methods of Data Collection 16. The information in this dissertation has been collected from the reference material available in the DSSC Library and from the Internet. The bibliography of the sources is appended at the end of the text. Organisation of the Dissertation 17. It is proposed to study the subject in the following manner:- (a) Chapter I. Introduction. (b) Chapter II . Evolution of UAVs. (c) Chapter III . Classification of UAVs. (d) Chapter IV . Characteristics of UAVs. (e) Chapter V . Importance of UAVs and ISR Sensors. (f) Chapter VI . Principles of employment of the UAV for aerial reconnaissance. (g) Chapter VII . Low intensity conflict operations. (h) Chapter VIII. Employment philosophy for UAVs in sub conventional warfare. (j) Chapter IX . Conclusion CHAPTER II EVOLUTION OF UAVs UAV technology is a vast field with wide and enough scope for exploration to produce a new and challenging tool of warfare VK Madhok Battlefields of The Early 21st Century. History of Evolution of UAVs/RPVs 1. Unmanned aircraft have a history as long as that of aviation itself. Even before the First World War a French artillery officer, Rene Lorin had proposed the use of flying bombs to attack distant targets. This aircraft he suggested could be stabilized in flight by a combination of gyroscopes and barometer, guided along the track by radio signal from an accompanying piloted aircraft propelled by a pulse jet or ram jet engine to hit the target. 2. The drones/RPV idea actually goes back to the technology of the First World War. The grandparents of todays unmanned vehicles were the Kettering bug and Sperry Aerial Torpedo used in 1917 and 1918. They were winged carts on wheels with engines that somehow managed to lift them into the air after a fast start on a pair of rails. Though they flew, they left much to be desired in terms of sophistication and were not useful as an accurate, winged bomb. More successful, however was the effort that lasted from 1928 to 1932 in which the Curtis Robin aircraft was turned into a working drone. Then, in the late 1930s there was a rush of military interest in remotely controlled vehicles, which led to a raft of special weapons including a second Bug, essentially a surface to surface buzz bomb, and the Bat, a radio controlled glide Bomb. Out of this pack came the first truly usable weapon: the crude but legal GB 1, which was a 2000 bomb with plywood wings and rudders and a radio control packag e. These were dropped from B-17s and visually guided by bombardiers to their target. In 1943, 108 GB-1s were dropped on cologne causing heavy damage. Later in the war came the GB-4 Robin, the first television guided weapon and Q-2 developed by Ryan Aeronautical Company (now Teledyne–Ryan) in 1946 from which have developed most of todays modern RPVs/UAVs. 3. In the United States, the UAV has normally been associated with the reconnaissance mission and designed to be a recoverable asset for multiple flight operations. The remotely piloted vehicles (RPV) of the early 1960s were developed in response to the perceived vulnerability of the U-2 reconnaissance aircraft, which had been downed over the Soviet Union in 1960 and again over Cuba in 1962.Red Wagon was the code name for a 1960 project by Ryan Aeronautical Company to demonstrate how its drones could be used for unmanned, remotely guided photographic reconnaissance missions. As early as 1965, modified Ryan Firebee drones were used to overfly China with some losses experienced. Vietnam War 4. The best known UAV operations were those conducted by the United States Air Force during the Vietnam War. Ryan BQM-34 (Ryan designation: Type 147) Lightning Bug drones were deployed to the theater in 1964.[iii] . In addition to the reconnaissance role, Teledyne Ryan also experimented with lethal versions of the BQM-34 drone. In 1971 and 1972, drones were armed with Maverick missiles or electro-optically guided bombs (Stubby Hobo) in an attempt to develop an unmanned defense suppression aircraft to be flown in conjunction with manned strike aircraft. 5. The Vietnam War was notable in two regards with respect to unmanned aircraft. It was the first war in which reconnaissance UAV were employed and it was notable for the ubiquity of the drones which was use throughout the war. An average of one mission was flown each day during this lengthy war. Employment in Recent Conflicts 6. Yom Kippur – 73 . It was in 1973, that the Israelis effectively used the RPV for reconnaissance and surveillance. The main unmanned aircraft were Mastiff, Scout and the Pioneer. These could also be used for Electronic Warfare. The valuable information gained from these sorties, besides the fire drawn from Arab SAMs which increased the vulnerability of the Air Defence systems found the Unmanned Aerial Vehicle enjoying a pivotal role in the Israeli success. 7. Bekka Valley – 1982. The Israelis once again explored the use of unmanned aircraft during air operations. Besides surveillance and intelligence gathering drones over the Syrian air space were able to gauge reactions of the air defence systems and cater for suitable counter measure. During the Israeli attack, it is reported that RPVs were used to monitor runway activity, activate Syrian fire control radars so that behind the first wave of decoy aircraft, Israeli aircraft could launch their anti, radiation missiles for neutralization of the radars. A large degree of success can be attributed to the employment of this platform wherein the Syrian had losses of 19 SAM batteries and 86 combat aircraft for the corresponding loss of only a solitary Israeli aircraft. The UAVs used were Teledyne, Scout, Mastiff, Samson and Delilah. It was therefore seen that in a dense AD environment, the use of unmanned aircraft would provide rich dividends. 8. The types of RPVs used were the Teledyne BQM-34, Scout, Mastiff, Samson and Delilah. During the operation certain important lessons were learnt, namely:- (a) Training under operational condition is essential for success of operations. (b) Instead of an all-purpose RPV, a family of RPVs with specific task related capability would be more suitable. (c) Simulation of fighter aircraft with use of corner reflector on RPV could lend an element of surprise. (d) The RPVs proved to be a major force multiplier. (e) The low radar, IR, acoustic and optical signature reduced its vulnerability to ground fire and electronic counter measures. (f) The Bekaa Valley operation proved that RPVs are a cost effective means of conducting reconnaissance, electronic warfare and intelligence gathering. (g) It is an ideal platform for employment in a dense AD environment of a modern TBA. (h) The operations re-emphasized the worlds faith in the utility of RPVs in a modern battle. Gulf War 1991 9. UAVs were used extensively by the US in the Gulf War. The Israeli built Pioneer UAV flew 530 missions into Iraqi territory. The other types of UAVs which were used by the US were the BAI-Exdrone and the French Alpilles-MART. Besides the conventional uses of reconnaissance, surveillance, target acquisition and Arty fire control, UAVs were used innovatively for pre-ingress route reconnaissance of Apache AH-64 helicopters, individual chemical agent detection (ICAD) and command, control, communication and intelligence functions The US Navy used UAVs for detection of enemy vessels, detection of Silkworm anti-shipping missile sites, mine detection and naval gunfire direction. The Multi National Forces employed UAVs like the Pioneer, Pointer, Midge, Mart and the Exdrone for reconnaissance, surveillance and battle damage assessment. The US Marine Corps extensive use of UAVs offset the Armys shortfall in aircraft-based reconnaissance. (a) Pioneer . Six Pioneer units each equipped with five UAVs were deployed in the theatre, three with the US Marines, one with US army and one each on USS Missouri and USS Wisconsin. It was used round-the- clock, using TV or (forward looking infra-red) FLIR sensors, for (reconnaissance, intelligence, surveillance and target acquisition (RISTA). The US Navy used it to search for Silkworm sites, air defence arty guns; and command and control bunkers. The US Marines used them for real-time targeting with attack aircraft. Pioneers flew 307 sorties in the campaign logging 1011 hours. Of these, seven were lost two to AD arty and five to non-combat reasons, and 26 were damaged of which 13 were repaired in theater and re-used. Pioneer, already a veteran of activity in the Gulf, reiterated its value, both from the decks of the battleships of USS Missouri and Wisconsin and with the ground forces. One Pioneer achieved a bizarre first for UAVs when a group of Iraqi soldiers, seeing their bunker under observat ion from the circling craft, emerged waving white flags. (b) Pointer . Pointer is a low cost, hand launched and battery operated RPV that is equipped with a TV camera. Weighing only 8 pounds, its use was limited due to strong winds. Nonetheless, pointer was used during the early morning and late afternoons when winds were light. It was often used for rear area security, checking for foot prints in the sand that had not been there the night before. It was also sometimes used to scout roads before vehicles moved down them. (c) F-47A Exdrones . These were deployed during the Gulf War in the surveillance role, carrying miniature colour TV cameras and microwave video transmitters. Amongst other achievements, it detected that Iraqi forces had abandoned their defences in Kuwait, allowing the US Marines to advance more than a day earlier than what had been planned. This was also used in electronic warfare roles such as jamming and communication interception. 10. Some of the important lessons learnt from Gulf War are:- (a) Diverse family of RPVs are required rather than one all-purpose model like Pioneer with US. (b) Smaller, target-spotting tactical RPVs would be easier to operate near the front lines. (c) Larger, long-endurance unmanned vehicles could take off from behind the battle field and yet patrol large strategic areas. (d) Small numbers of low observable RPVs could carry out recce missions with high chance of survival. 11. Bosnian Conflict . The NATO forces in Bosnia used the Tier-2 Predator to monitor the enforcement of cease-fire. Specific tasks included detection of movement of ammunition at night and detection of tampering of mass graves by Bosnian Serbs at night. CHAPTER II I CLASSIFICTION OF UAV Knowledge of an enemys dispositions and movements has always been a key to success in war John WR Taylor, David Mondey Spies in the Sky. 1. Classification of UAVs may be based on important attributes such as range, endurance, flight altitude and launch or recovery methods. Broadly UAVs can be classified into tactical and strategic categories. A further sub division may also include offensive UAVs and Decoys. 2. Relevance. It is important that we understand the broad classification of the UAV tree as it would thereafter be easy to associate roles that can be assigned to the UAV in context of tasks which manned aircraft are required to perform. For any comparison with the manned aircraft, a generic understanding enables us to be able to oversee the debate between manned aircraft vis a vis manned aircraft from an overall objective and broader perspective. 3. Tactical UAV: (a) Micro UAV . Mainly useful for reconnaissance, surveillance and target acquisition (RSTA), sampling NBC and Electronic Warfare (EW), the range is limited to 10 kms with endurance of less than an hour and max altitude of 250 metres. (b) Mini UAV . Mostly for civil use and similar to micro UAV except that the endurance is greater upto two hours. (c) Close Range UAV . With a range of 10 to 30 Kms, and endurance of 2-4 hrs, ceiling of 3000 meters, this group is used for RSTA, arty correction and mine detection. (d) Short Range UAV . Range of 30-70 Km and an endurance of 3 to 6 hrs, This could also be employed for NBC sampling and post strike damage assessment. (e) Medium Range UAV . The range is enhanced up to 70-200 kms with endurance of 6-10 hr and the altitude band from 3000-5000 metres. This is used for communication relays also. (f) Low Altitude Deep Penetration UAV . The main feature is its ability to escape enemy radar cover. It has an endurance of up to an hour with a range of beyond 250 Km and ceiling limits of 9000 m. This is mainly armed to provide commanders the capability to look deep into enemy territory. (g) Long Range UAV. With a range of up to 1000 kms and endurance of 6-13 hrs, the UAV is mainly employed on RSTA, Post strike damage assessment and communications relays. (h) Endurance UAVs. As the name suggests, it has the ability to operate upto 24 hrs and ranges greater than 500 kms. Utilized for RSTA, post strike damage assessment, relay, Electronic Warfare and NBC sampling. 4. Strategic UAV (a) Medium Altitude Long Endurance (MALE). The striking feature is that it can be used for weapons delivery. Operating in a range of 500-700 Kms from 234-48 hrs, it can also be used in tactical roles upto a ceiling from 5000 to 8000 metres. (b) High Altitude Long Endurance . Operating in the 15000 – 20000 metres band, it can be utilized as a missile launch vehicle. It operates for ranges upto 6000 kms. 5. Offensive UAV. This category caters for weapons which are anti-tank/vehicle, anti-radar or antiship. 6. Decoys . Certain aerial and naval decoys with endurance ranging from a few minutes to several hours, these may be launched via canisters, rockets or air launched. 22. Sensor Systems . The sensor systems are required for the various modes of reconnaissance which can be carried out by the UAV. These will be discussed in detail further in this paper. The various modes of reconnaissance are:- (a) Photographic Reconnaissance . The main sensor for photographic reconnaissance is the camera. The various types of camera systems for photographic reconnaissance are:- (i) Vertical Photograph Cameras. (ii) Oblique Photograph Cameras. (iii) Pin point Photograph Cameras. (iv) Split Vertical Photograph Cameras. (v) Trimetrogon. (vi) Multi-Camera Fan. (vii) Panoramic. (viii) Long Range Oblique Photography and Long Range Aerial Photography. (ix) Sonne Strip Photography. (x) IR Camera. (b) Infra- red Reconnaissance . The infra-red spectrum is used in reconnaissance in two distinct forms. The reflective portion of the infra-red is made use of in infra-red photography. The emissive portion of the infra-red is used in reconnaissance with the aid of appropriate sensors by a process called thermal imaging. This mode of reconnaissance uses emissive infra-red radiations and employs thermal detectors that transform infra-red radiation into detectable electrical signals. The output electrical voltage is recorded either on a magnetic tape for digital analysis by computer or on a film. The main types of infra-red reconnaissance systems which can be used by the UAV are:- (i) Infra-red Line Scan. (ii) Forward Looking Infra-Red (FLIR). (c ) Reconnaissance by Electronic Means . Reconnaissance by electronic means involves the use of radar and TV i.e. they need microwave sensors and light sensors. The two main types of reconnaissance by electronic means are thus radar reconnaissance and TV reconnaissance. 7. There is today a very clear direction of evolving UAV for specific purposes. Much like manned aircraft which have specified roles such as Air Defence, Air Interdiction and so on. Specialization is the buzz word in the UAV family wherein by changing payloads different functions can be performed. The broad classification above is likely to undergo changes in the future where specific functional UAVs would be listed. CHAPTER I V CHARACTERISTICS OF UAV Knowledge of an enemys dispositions and movements has always been a key to success in war John WR Taylor, David Mondey Spies in the Sky. UAV And Manned Aircraft A Comparison 1. Cost (a) Cost of Aircraft . The high cost of current generation fighter aircraft is a cause for concern to air force planners the world over. What is worse is their unit cost is continuing to escalate inexorably. A few examples will corroborate the fact. At 1985 prices, USAF aircraft like the P-51 Mustang of 1944 would have cost $ 0.5 million; the F- 100 Super Sabre of 1954 would be a little over $ 2 million; the F-4 Phantom of 1962 would be $ 6 million; while the F-15 Eagle of 1974 would cost $ 25 million. Similarly in the UK, the Harrier GR. 1 of 1970 costs four times as much as the Hunter fighter of the fifties and the Hawk training aircraft costs one and a half times as much as its predecessor the Gnat. In our own air force, the Mirage 2000 cost Rs 24 crores a piece when it was inducted in the Indian Airforce in 1985, while today it is in excess of 120 crores. (b) Cost of In-service Support . It is not just the unit capital cost of aircraft that is rising this way, so is the cost of in-service support. As a rough rule of thumb, the cost of in-service support for an aircraft is about twice the production cost. Statistics from Tactical Air Command of the USAF show that the cost of replenishment spare parts during the in-service life an F-4G aircraft is $ 3.5 million and for an F-15A, it is $ 10.7 million, while the depot maintenance costs for the same aircraft are $ 7.7 million and $ 5.8 million respectively. The total in-service operational and support costs for one aircraft including all items such as fuel, pay for unit personnel, pay for indirect support personnel, support equipment and so on, work out to $ 66.4 million and $ 64.2 million respectively for the two types. (c ) Personnel Costs . The cost of personnel to operate, service and support the aircraft are also high. Combat fighters in the USAF inventory need an average of 17 maintenance specialists for each machine, and a detachment of 24 F-15s for a 30 day period calls for 621 maintenance specialist in 22 different trades, together with 370 tons of equipment. The aircrew are also an expensive asset and their training costs are rising sharply. For example, it costs the RAF a little over $ 5 million at 1987 prices to train a pilot of a fast jet aircraft like the Harrier or a Tornado. (d) Cost of the Training Organization . The ratio of training aircraft to combat aircraft has always been high in any modern air force. For example in the RAF in 1987, there were 758 combat aircraft as compared to 833 in training units (including operational conversion units). It implies that higher the number of combat aircraft in any air force, the number of training aircraft would increase in a higher if not similar proportion. (e) Cost of UAVs versus Aircraft . (i) Mini UAVs . UAVs require neither crew nor crew supporting systems. Therefore, they are bound to be simple, smaller and thus a great deal cheaper than their manned counterparts. For example the unit cost of a Pointer RPV is $10,000. On the other hand the cost of Mig 21, which is used for TAC-R in the Indian Air Force, is $ 1 million. Now if we include the costs of in-service support, personnel costs and the cost of training Organization, the cost balance tips heavily in favor of UAVs. This also means that for same investment, we can have more UAVs and the sheer weight of numbers should be able to make up for whatever deficiencies which result from the absence of a crew. (ii) HALE . Though there are UAVs like the Condor HALE whose unit cost is $ 20 million (at 1993 prices), it would be more appropriate to compare them with satellites; and aircraft like the SR-71, U-2 and Mig 25, due to their role and capability. Then their cost-effectiveness can scarcely be in doubt. (iii) Mission C osts . A comparison of the mission costs of a UAV and an equivalent aircraft for the same role will further corroborate the economy of UAVs. 2. Mobility . (a) Tactical . High mobility and reach are two characteristics of air power which can be exploited in a variety of ways, such as to concentrate for effect or to disperse for survival. It is in these fields that UAVs have a major disadvantage vis-Ã  -vis manned aircraft, since they cannot easily transfer their effort between bases. They need to be transported from one operating site to another whereas a Unmanned Aerial Vehicles (UAVs) in Subconventional War Unmanned Aerial Vehicles (UAVs) in Subconventional War CHAPTER- I INTRODUCTION 1. Many military strategists and theorists have concluded, based on recent history, the nature of future wars will be limited to regional and intrastate conflicts. Large interstate wars such as World Wars One and Two and the Persian Gulf War are not likely to be the wars of the future. UAVs are increasingly standard features of the modern combat theaters and Low Intensity Conflict zones where ISR missions may need to be carried out. Todays ISR missions are sophisticated operations. Covert or overt, they are executed using traditional techniques and modern technology – with expensive equipment and infrastructures often requiring highly skilled operators. Remotely Piloted Vehicles (RPVs)/Unmanned Aerial Vehicles (UAVs) are small unmanned aircraft which came into being as mans quest for newer and better tools of warfare. 2. Unmanned aerial vehicles (UAVs) will play a key role in dealing with low intensity conflicts abetted by both internal elements and unfriendly neighbours. Indias great neighbours not being really friendly be it Pakistan or China. Avoiding all risk to human life or manned search aircraft operating in hostile territory, poor weather or hazardous environments, UAVs fitted with sensors can be used to safely perform the Search-Locate-Identify elements of importance in a missions. Unmanned (or uninhabited) aerial vehicles (UAVs) are methodically becoming a central theme in the mosaic of Air Force systems and capability. The questions regarding employment of UAVs are not so much about if they should be developed but how to integrate them into Air Force doctrine and organizations. The Study identified reconnaissance UAVs as one of the high leverage systems of the future. Accordingly, the Air Force has made a concerted effort to develop UAVs and sensor technologies with a particular emphasi s on intelligence, surveillance, and reconnaissance (ISR) applications. This paper addresses considerations for improving the future application of UAVs for the ISR mission and their employment in LICO across our vast borders. Specifically, this research illustrates that UAVs in concert with manned and space assets addresses several Air Force ISR needs. Furthermore, the Air Force should seize the opportunity to leverage the rapid advances in sensor and information technology to increase the capability of UAVs to perform ISR while also performing other vital air power missions. 3. Used as drones in the First World War, RPVs since then have been used as targets for artillery guns, missiles and piloted aircraft or to bring exposed film of hostile territory. With advanced technology, RPVs are now being so designed so as to carry payloads for varied purposes and missions, such as for surveillance (TV cameras, Infra Red (IR) Imagers, sensors) or equipment for electronic counter measures (radar jammers, flares or chaff) or strictly for employment as weapon platforms. 4. A number of countries are today engaged in RPV development projects, prominent amongst these being UK, USA, France and Israel. It has been stated that the RPVs will be able to take on a number of missions and assignments, which are currently being performed by manned aircraft. As tactical aircraft are too few and too expensive to launch for random searches for targets in a battle area, manned reconnaissance (recce) in particular is being reduced in emphasis in favour of RPVs, which are cheaper. The comparative cost of a lost RPV vis-Ã  -vis a manned aircraft with a trained pilot is in itself a sufficient and good enough reason for undertaking such a research and development. 5. RPV can provide close recce of troops deployed in depth which would otherwise have to be undertaken by fighter aircraft, perform spotting functions for incoming munitions and designate as well as destroy targets, Jam enemys electronic equipment, act as radio relay stations and provide real-time intelligence. Further, by penetrating an enemys territory they alert electronic systems and this leads to their early detection. RPVs are therefore about to become an invaluable accretion for providing real-time, over the battlefield surveillance capability. But for all its virtues it is still being debated as to whether an RPV will be able to stand and fight alone or would it only compliment an air force. 6. Of the principles of war defined by Clausewitz the element of surprise has probably made the greatest contribution to success. In the military context therefore the denial of surprise to a potential aggressor is paramount. Equally the acquisition of intelligence is a vital factor in any operational venture. From the very earliest days of aviation the foresighted became aware of the use of aerial platforms for reconnaissance tasks. This has been true throughout the history of warfare. The Second World War saw a quantum leap in reconnaissance from the third dimension. In the Arab Israel wars of 1967 and 1973 the use of aerial reconnaissance enabled Israel dramatically to demonstrate the use of force multiplication through intelligence gained. Air reconnaissance has always been important to the success in war. It is the UAV whose time has come in ensuring that aerial reconnaissance continues to give intelligence in a high intensity air defence scenario. They have proved their worth i n reconnaissance and surveillance. 7. In an age of shrinking defence budgets, expensive manned aircraft and high cost of aircrew training most of the modern armed forces around the world are realising the need to employ RPVs for missions in the dense hostile Air Defence (AD) environment. Missions which were considered extremely dangerous and yet important can now be undertaken by RPVs with relative impunity. Owing to their small radar, IR signature and the ability to spoof the enemy, RPVs can give vital real time data about the enemy to commanders on the ground. RPVs if employed intelligently can make a significant contribution by keeping manned aircraft out of the hostile AD threats while providing real time information and at the same time denying the same by effective electronic warfare to the decision makers in a conflict between adversaries. Statement of the Problem 8. To study and evaluate the efficacy of employing UAVs in ISR role in sub-conventional warfare in the Indian context with special reference to counter terrorist operation across our vast borders. Justification of the Study 9. The UAV has shown, in counter-insurgency and in anti-terrorist operations as much as in war, the critical importance of an eye in the sky. UAV can be effectively employed in gathering the intelligence in terrorist training camps, their infiltration routes etc, to build an effective databank for use in the future. The Israel Army has deployed a new miniature unmanned aerial vehicle in counter-insurgency operations over the West Bank. The Israeli army has launched operations of the Skylark tactical UAV for counter-insurgency missions in the northern West Bank. Skylark began flying missions in late 2005 in what marked the first operational deployment of the new UAV. The MQ-1 Predator, armed with the AGM-114 Hellfire missile continues to be one of the US militarys most requested systems, assisting in the execution of the global war on terror by finding, fixing, tracking, targeting, engaging, and assessing suspected terrorist locations. 10. Historically unmanned aircrafts have been employed successfully in number of conventional operations. Their relatively low cost and the modest political embarrassment likely to be caused by their loss, seems to make them irreplaceable especially in a LICO environment where the enemy is difficult to identify and the political compulsions are high. UAVs can facilitate employment of aircraft, long-range guns and missiles by accurate target acquisition.. UAVs hold out a promise of providing a range of ISR and other support missions. Some of these are battlefield reconnaissance and surveillance, fire control and direction, communication and radar suppression. This study has been prompted in being able to identify and analyse the technical and tactical requirements of a UAV for aerial reconnaissance and to suggest the principle of employment for the task in sub conventional war.. 11. The day of the UAV as a natural ingredient of military thinking is much nearer than it was a decade ago, but there is still a need for clearer and more widespread understanding of what the UAV can be used to do as a tool for reconnaissance in a sub-conventional warfare which is more likely to be faced by our country in the future. Hypothesis 12. UAVs have been proposed for several mission areas including ISR, communications, and weapons delivery. The UAVs were used extensively in recent war. Direction is needed to ensure these maturing UAVs are used in the most effective way. The on-going revolution in sensor technology that will improve the UAVs ability to perform ISR missions now conducted by high-value, manned assets. 13. Todays ISR missions are sophisticated operations. Covert or overt, they are executed using traditional techniques and modern technology – with expensive equipment and infrastructures often requiring highly skilled operators. The requirement for information is likely to keep increasing as warfare becomes more oriented towards reconnaissance-strike. In future scenarios, no one system is going to be able t o meet all data collection requirements. Manned aircraft will not be available for all the intelligence needs of the warfighter. Satellite systems also have limitations that will prevent them from being the sole suppliers of information. The capabilities of UAVs make them ideally suited to fill the increasing void between intelligence requirements and existing data collection capability. Scope 14. The scope of this dissertation is to go into the evolution of UAVs, development and employment of UAV in recent wars. It will concentrate on the ISR aspects while identifying the characteristics/requirements of a UAV in a sub-conventional war. As UAVs being one of the high leverage systems of the future, the Air Force has to make a concerted effort to procure UAVs and sensor technologies with a particular emphasis on intelligence, surveillance, and reconnaissance (ISR) applications. This paper addresses considerations for improving the future application of UAVs for the ISR mission. Furthermore, the Air Force should seize the opportunity to leverage the rapid advances in sensor and information technology to increase the capability of UAVs to perform ISR while also performing other vital air power missions. 15. The scope of this dissertation is to critically analyse the efficacy of employment of UAVs in Armed role in sub-conventional environment which is more likely to be faced by India in future. It aims to study the application of UAV in LICO, study the advantages of employing UAVs in LICO in ISR role and suggest the philosophy for employment of UAVs in LICO in the ISR role. Methods of Data Collection 16. The information in this dissertation has been collected from the reference material available in the DSSC Library and from the Internet. The bibliography of the sources is appended at the end of the text. Organisation of the Dissertation 17. It is proposed to study the subject in the following manner:- (a) Chapter I. Introduction. (b) Chapter II . Evolution of UAVs. (c) Chapter III . Classification of UAVs. (d) Chapter IV . Characteristics of UAVs. (e) Chapter V . Importance of UAVs and ISR Sensors. (f) Chapter VI . Principles of employment of the UAV for aerial reconnaissance. (g) Chapter VII . Low intensity conflict operations. (h) Chapter VIII. Employment philosophy for UAVs in sub conventional warfare. (j) Chapter IX . Conclusion CHAPTER II EVOLUTION OF UAVs UAV technology is a vast field with wide and enough scope for exploration to produce a new and challenging tool of warfare VK Madhok Battlefields of The Early 21st Century. History of Evolution of UAVs/RPVs 1. Unmanned aircraft have a history as long as that of aviation itself. Even before the First World War a French artillery officer, Rene Lorin had proposed the use of flying bombs to attack distant targets. This aircraft he suggested could be stabilized in flight by a combination of gyroscopes and barometer, guided along the track by radio signal from an accompanying piloted aircraft propelled by a pulse jet or ram jet engine to hit the target. 2. The drones/RPV idea actually goes back to the technology of the First World War. The grandparents of todays unmanned vehicles were the Kettering bug and Sperry Aerial Torpedo used in 1917 and 1918. They were winged carts on wheels with engines that somehow managed to lift them into the air after a fast start on a pair of rails. Though they flew, they left much to be desired in terms of sophistication and were not useful as an accurate, winged bomb. More successful, however was the effort that lasted from 1928 to 1932 in which the Curtis Robin aircraft was turned into a working drone. Then, in the late 1930s there was a rush of military interest in remotely controlled vehicles, which led to a raft of special weapons including a second Bug, essentially a surface to surface buzz bomb, and the Bat, a radio controlled glide Bomb. Out of this pack came the first truly usable weapon: the crude but legal GB 1, which was a 2000 bomb with plywood wings and rudders and a radio control packag e. These were dropped from B-17s and visually guided by bombardiers to their target. In 1943, 108 GB-1s were dropped on cologne causing heavy damage. Later in the war came the GB-4 Robin, the first television guided weapon and Q-2 developed by Ryan Aeronautical Company (now Teledyne–Ryan) in 1946 from which have developed most of todays modern RPVs/UAVs. 3. In the United States, the UAV has normally been associated with the reconnaissance mission and designed to be a recoverable asset for multiple flight operations. The remotely piloted vehicles (RPV) of the early 1960s were developed in response to the perceived vulnerability of the U-2 reconnaissance aircraft, which had been downed over the Soviet Union in 1960 and again over Cuba in 1962.Red Wagon was the code name for a 1960 project by Ryan Aeronautical Company to demonstrate how its drones could be used for unmanned, remotely guided photographic reconnaissance missions. As early as 1965, modified Ryan Firebee drones were used to overfly China with some losses experienced. Vietnam War 4. The best known UAV operations were those conducted by the United States Air Force during the Vietnam War. Ryan BQM-34 (Ryan designation: Type 147) Lightning Bug drones were deployed to the theater in 1964.[iii] . In addition to the reconnaissance role, Teledyne Ryan also experimented with lethal versions of the BQM-34 drone. In 1971 and 1972, drones were armed with Maverick missiles or electro-optically guided bombs (Stubby Hobo) in an attempt to develop an unmanned defense suppression aircraft to be flown in conjunction with manned strike aircraft. 5. The Vietnam War was notable in two regards with respect to unmanned aircraft. It was the first war in which reconnaissance UAV were employed and it was notable for the ubiquity of the drones which was use throughout the war. An average of one mission was flown each day during this lengthy war. Employment in Recent Conflicts 6. Yom Kippur – 73 . It was in 1973, that the Israelis effectively used the RPV for reconnaissance and surveillance. The main unmanned aircraft were Mastiff, Scout and the Pioneer. These could also be used for Electronic Warfare. The valuable information gained from these sorties, besides the fire drawn from Arab SAMs which increased the vulnerability of the Air Defence systems found the Unmanned Aerial Vehicle enjoying a pivotal role in the Israeli success. 7. Bekka Valley – 1982. The Israelis once again explored the use of unmanned aircraft during air operations. Besides surveillance and intelligence gathering drones over the Syrian air space were able to gauge reactions of the air defence systems and cater for suitable counter measure. During the Israeli attack, it is reported that RPVs were used to monitor runway activity, activate Syrian fire control radars so that behind the first wave of decoy aircraft, Israeli aircraft could launch their anti, radiation missiles for neutralization of the radars. A large degree of success can be attributed to the employment of this platform wherein the Syrian had losses of 19 SAM batteries and 86 combat aircraft for the corresponding loss of only a solitary Israeli aircraft. The UAVs used were Teledyne, Scout, Mastiff, Samson and Delilah. It was therefore seen that in a dense AD environment, the use of unmanned aircraft would provide rich dividends. 8. The types of RPVs used were the Teledyne BQM-34, Scout, Mastiff, Samson and Delilah. During the operation certain important lessons were learnt, namely:- (a) Training under operational condition is essential for success of operations. (b) Instead of an all-purpose RPV, a family of RPVs with specific task related capability would be more suitable. (c) Simulation of fighter aircraft with use of corner reflector on RPV could lend an element of surprise. (d) The RPVs proved to be a major force multiplier. (e) The low radar, IR, acoustic and optical signature reduced its vulnerability to ground fire and electronic counter measures. (f) The Bekaa Valley operation proved that RPVs are a cost effective means of conducting reconnaissance, electronic warfare and intelligence gathering. (g) It is an ideal platform for employment in a dense AD environment of a modern TBA. (h) The operations re-emphasized the worlds faith in the utility of RPVs in a modern battle. Gulf War 1991 9. UAVs were used extensively by the US in the Gulf War. The Israeli built Pioneer UAV flew 530 missions into Iraqi territory. The other types of UAVs which were used by the US were the BAI-Exdrone and the French Alpilles-MART. Besides the conventional uses of reconnaissance, surveillance, target acquisition and Arty fire control, UAVs were used innovatively for pre-ingress route reconnaissance of Apache AH-64 helicopters, individual chemical agent detection (ICAD) and command, control, communication and intelligence functions The US Navy used UAVs for detection of enemy vessels, detection of Silkworm anti-shipping missile sites, mine detection and naval gunfire direction. The Multi National Forces employed UAVs like the Pioneer, Pointer, Midge, Mart and the Exdrone for reconnaissance, surveillance and battle damage assessment. The US Marine Corps extensive use of UAVs offset the Armys shortfall in aircraft-based reconnaissance. (a) Pioneer . Six Pioneer units each equipped with five UAVs were deployed in the theatre, three with the US Marines, one with US army and one each on USS Missouri and USS Wisconsin. It was used round-the- clock, using TV or (forward looking infra-red) FLIR sensors, for (reconnaissance, intelligence, surveillance and target acquisition (RISTA). The US Navy used it to search for Silkworm sites, air defence arty guns; and command and control bunkers. The US Marines used them for real-time targeting with attack aircraft. Pioneers flew 307 sorties in the campaign logging 1011 hours. Of these, seven were lost two to AD arty and five to non-combat reasons, and 26 were damaged of which 13 were repaired in theater and re-used. Pioneer, already a veteran of activity in the Gulf, reiterated its value, both from the decks of the battleships of USS Missouri and Wisconsin and with the ground forces. One Pioneer achieved a bizarre first for UAVs when a group of Iraqi soldiers, seeing their bunker under observat ion from the circling craft, emerged waving white flags. (b) Pointer . Pointer is a low cost, hand launched and battery operated RPV that is equipped with a TV camera. Weighing only 8 pounds, its use was limited due to strong winds. Nonetheless, pointer was used during the early morning and late afternoons when winds were light. It was often used for rear area security, checking for foot prints in the sand that had not been there the night before. It was also sometimes used to scout roads before vehicles moved down them. (c) F-47A Exdrones . These were deployed during the Gulf War in the surveillance role, carrying miniature colour TV cameras and microwave video transmitters. Amongst other achievements, it detected that Iraqi forces had abandoned their defences in Kuwait, allowing the US Marines to advance more than a day earlier than what had been planned. This was also used in electronic warfare roles such as jamming and communication interception. 10. Some of the important lessons learnt from Gulf War are:- (a) Diverse family of RPVs are required rather than one all-purpose model like Pioneer with US. (b) Smaller, target-spotting tactical RPVs would be easier to operate near the front lines. (c) Larger, long-endurance unmanned vehicles could take off from behind the battle field and yet patrol large strategic areas. (d) Small numbers of low observable RPVs could carry out recce missions with high chance of survival. 11. Bosnian Conflict . The NATO forces in Bosnia used the Tier-2 Predator to monitor the enforcement of cease-fire. Specific tasks included detection of movement of ammunition at night and detection of tampering of mass graves by Bosnian Serbs at night. CHAPTER II I CLASSIFICTION OF UAV Knowledge of an enemys dispositions and movements has always been a key to success in war John WR Taylor, David Mondey Spies in the Sky. 1. Classification of UAVs may be based on important attributes such as range, endurance, flight altitude and launch or recovery methods. Broadly UAVs can be classified into tactical and strategic categories. A further sub division may also include offensive UAVs and Decoys. 2. Relevance. It is important that we understand the broad classification of the UAV tree as it would thereafter be easy to associate roles that can be assigned to the UAV in context of tasks which manned aircraft are required to perform. For any comparison with the manned aircraft, a generic understanding enables us to be able to oversee the debate between manned aircraft vis a vis manned aircraft from an overall objective and broader perspective. 3. Tactical UAV: (a) Micro UAV . Mainly useful for reconnaissance, surveillance and target acquisition (RSTA), sampling NBC and Electronic Warfare (EW), the range is limited to 10 kms with endurance of less than an hour and max altitude of 250 metres. (b) Mini UAV . Mostly for civil use and similar to micro UAV except that the endurance is greater upto two hours. (c) Close Range UAV . With a range of 10 to 30 Kms, and endurance of 2-4 hrs, ceiling of 3000 meters, this group is used for RSTA, arty correction and mine detection. (d) Short Range UAV . Range of 30-70 Km and an endurance of 3 to 6 hrs, This could also be employed for NBC sampling and post strike damage assessment. (e) Medium Range UAV . The range is enhanced up to 70-200 kms with endurance of 6-10 hr and the altitude band from 3000-5000 metres. This is used for communication relays also. (f) Low Altitude Deep Penetration UAV . The main feature is its ability to escape enemy radar cover. It has an endurance of up to an hour with a range of beyond 250 Km and ceiling limits of 9000 m. This is mainly armed to provide commanders the capability to look deep into enemy territory. (g) Long Range UAV. With a range of up to 1000 kms and endurance of 6-13 hrs, the UAV is mainly employed on RSTA, Post strike damage assessment and communications relays. (h) Endurance UAVs. As the name suggests, it has the ability to operate upto 24 hrs and ranges greater than 500 kms. Utilized for RSTA, post strike damage assessment, relay, Electronic Warfare and NBC sampling. 4. Strategic UAV (a) Medium Altitude Long Endurance (MALE). The striking feature is that it can be used for weapons delivery. Operating in a range of 500-700 Kms from 234-48 hrs, it can also be used in tactical roles upto a ceiling from 5000 to 8000 metres. (b) High Altitude Long Endurance . Operating in the 15000 – 20000 metres band, it can be utilized as a missile launch vehicle. It operates for ranges upto 6000 kms. 5. Offensive UAV. This category caters for weapons which are anti-tank/vehicle, anti-radar or antiship. 6. Decoys . Certain aerial and naval decoys with endurance ranging from a few minutes to several hours, these may be launched via canisters, rockets or air launched. 22. Sensor Systems . The sensor systems are required for the various modes of reconnaissance which can be carried out by the UAV. These will be discussed in detail further in this paper. The various modes of reconnaissance are:- (a) Photographic Reconnaissance . The main sensor for photographic reconnaissance is the camera. The various types of camera systems for photographic reconnaissance are:- (i) Vertical Photograph Cameras. (ii) Oblique Photograph Cameras. (iii) Pin point Photograph Cameras. (iv) Split Vertical Photograph Cameras. (v) Trimetrogon. (vi) Multi-Camera Fan. (vii) Panoramic. (viii) Long Range Oblique Photography and Long Range Aerial Photography. (ix) Sonne Strip Photography. (x) IR Camera. (b) Infra- red Reconnaissance . The infra-red spectrum is used in reconnaissance in two distinct forms. The reflective portion of the infra-red is made use of in infra-red photography. The emissive portion of the infra-red is used in reconnaissance with the aid of appropriate sensors by a process called thermal imaging. This mode of reconnaissance uses emissive infra-red radiations and employs thermal detectors that transform infra-red radiation into detectable electrical signals. The output electrical voltage is recorded either on a magnetic tape for digital analysis by computer or on a film. The main types of infra-red reconnaissance systems which can be used by the UAV are:- (i) Infra-red Line Scan. (ii) Forward Looking Infra-Red (FLIR). (c ) Reconnaissance by Electronic Means . Reconnaissance by electronic means involves the use of radar and TV i.e. they need microwave sensors and light sensors. The two main types of reconnaissance by electronic means are thus radar reconnaissance and TV reconnaissance. 7. There is today a very clear direction of evolving UAV for specific purposes. Much like manned aircraft which have specified roles such as Air Defence, Air Interdiction and so on. Specialization is the buzz word in the UAV family wherein by changing payloads different functions can be performed. The broad classification above is likely to undergo changes in the future where specific functional UAVs would be listed. CHAPTER I V CHARACTERISTICS OF UAV Knowledge of an enemys dispositions and movements has always been a key to success in war John WR Taylor, David Mondey Spies in the Sky. UAV And Manned Aircraft A Comparison 1. Cost (a) Cost of Aircraft . The high cost of current generation fighter aircraft is a cause for concern to air force planners the world over. What is worse is their unit cost is continuing to escalate inexorably. A few examples will corroborate the fact. At 1985 prices, USAF aircraft like the P-51 Mustang of 1944 would have cost $ 0.5 million; the F- 100 Super Sabre of 1954 would be a little over $ 2 million; the F-4 Phantom of 1962 would be $ 6 million; while the F-15 Eagle of 1974 would cost $ 25 million. Similarly in the UK, the Harrier GR. 1 of 1970 costs four times as much as the Hunter fighter of the fifties and the Hawk training aircraft costs one and a half times as much as its predecessor the Gnat. In our own air force, the Mirage 2000 cost Rs 24 crores a piece when it was inducted in the Indian Airforce in 1985, while today it is in excess of 120 crores. (b) Cost of In-service Support . It is not just the unit capital cost of aircraft that is rising this way, so is the cost of in-service support. As a rough rule of thumb, the cost of in-service support for an aircraft is about twice the production cost. Statistics from Tactical Air Command of the USAF show that the cost of replenishment spare parts during the in-service life an F-4G aircraft is $ 3.5 million and for an F-15A, it is $ 10.7 million, while the depot maintenance costs for the same aircraft are $ 7.7 million and $ 5.8 million respectively. The total in-service operational and support costs for one aircraft including all items such as fuel, pay for unit personnel, pay for indirect support personnel, support equipment and so on, work out to $ 66.4 million and $ 64.2 million respectively for the two types. (c ) Personnel Costs . The cost of personnel to operate, service and support the aircraft are also high. Combat fighters in the USAF inventory need an average of 17 maintenance specialists for each machine, and a detachment of 24 F-15s for a 30 day period calls for 621 maintenance specialist in 22 different trades, together with 370 tons of equipment. The aircrew are also an expensive asset and their training costs are rising sharply. For example, it costs the RAF a little over $ 5 million at 1987 prices to train a pilot of a fast jet aircraft like the Harrier or a Tornado. (d) Cost of the Training Organization . The ratio of training aircraft to combat aircraft has always been high in any modern air force. For example in the RAF in 1987, there were 758 combat aircraft as compared to 833 in training units (including operational conversion units). It implies that higher the number of combat aircraft in any air force, the number of training aircraft would increase in a higher if not similar proportion. (e) Cost of UAVs versus Aircraft . (i) Mini UAVs . UAVs require neither crew nor crew supporting systems. Therefore, they are bound to be simple, smaller and thus a great deal cheaper than their manned counterparts. For example the unit cost of a Pointer RPV is $10,000. On the other hand the cost of Mig 21, which is used for TAC-R in the Indian Air Force, is $ 1 million. Now if we include the costs of in-service support, personnel costs and the cost of training Organization, the cost balance tips heavily in favor of UAVs. This also means that for same investment, we can have more UAVs and the sheer weight of numbers should be able to make up for whatever deficiencies which result from the absence of a crew. (ii) HALE . Though there are UAVs like the Condor HALE whose unit cost is $ 20 million (at 1993 prices), it would be more appropriate to compare them with satellites; and aircraft like the SR-71, U-2 and Mig 25, due to their role and capability. Then their cost-effectiveness can scarcely be in doubt. (iii) Mission C osts . A comparison of the mission costs of a UAV and an equivalent aircraft for the same role will further corroborate the economy of UAVs. 2. Mobility . (a) Tactical . High mobility and reach are two characteristics of air power which can be exploited in a variety of ways, such as to concentrate for effect or to disperse for survival. It is in these fields that UAVs have a major disadvantage vis-Ã  -vis manned aircraft, since they cannot easily transfer their effort between bases. They need to be transported from one operating site to another whereas a