Wednesday, July 31, 2019

Control The Speed Of The DC Motor Engineering Essay

Direct current ( DC ) motor is applied in a broad scope of applications peculiarly in mechanization engineering due to minimum electromotive force ingestion. In the proposal DC motor plays an effectual function in Hardware execution. The chief rule behind the undertaking is to utilize the cascade control to run the DC motor ; it ‘s one of best feedback accountants. For gauging the speed and the armature current of the DC motor with 24 Vs and a dsPIC Microcontroller is programmed.The above all operation is done in a closed control cringle map. Table of Contentss 1.2 Objective 2. Specific Aims of the undertaking Chapter 1 1. Introduction 1.1 Background Brushed DC Motor DC motor theoretical account Digital control of District of Columbia motor Advantages of District of Columbia with regard to rush control Analogue control of District of Columbia motor 2.1 Dss PIC dsPIC30f 3010 2.2 MPLAB IDE 3. Design and Research Cascade control Currentloop kineticss Speed cringle kineticss 3.1 Components for commanding 24v brushed Dc motor 3.1. Flexible upside-down board 3.2.1 Generating PWM moving ridge signifiers 3.1.2 H-Bridge convertor 3.2 Software techniques used in DC motor Programing microcontroller in Flexible inverted board 4. Consequences and Discussion 5. Decision 6. Appendix List of Figures FIGURE 1: Operation of BRUSHED DC Motor FIGURE2: General block diagram of velocity cringle and current cringle of DC Motor FIGURE3: H-bridge convertor with different electromotive force VI ± & A ; VI?Chapter 11. Introduction1.1 ObjectiveThe chief map of the undertaking is to command the velocity of the DC Motor utilizing a dsPIC30f3010 microcontroller. For that implement a separate hardware to fulfill the chief map of the undertaking.1.2 Specific Aim of the undertakingIn order to accomplish the chief nucleus of the undertaking, concept Hardware for commanding the velocity control of DC motor. The chief hardware demands are Ds PIC microcontroller ICD interface & A ; connection for system interface DC power supply MOSFET Current detectors The above constituents are required to build a hardware called Flexible Inverted Board [ 4 ] .1.3 OUTLINE OF PROJECTStep1 In this paper a flexible upside-down board is constructed with the series of hardware constituents Step2 Then pass on the Flexible inverted board with system utilizing MPLAB IDE package with ICD-3 interface [ 4 ] .the linguistic communication used in the MPLAB package is C-language. Step3 The velocity cringle and the current cringle are the two of import maps for commanding the velocity of the Dc motor. In our undertaking the cardinal point is to command both the cringles by C-programming linguistic communication utilizing MPLAB ICD-3. The velocity cringle of the microcontroller is called velocity accountant and the current cringle of the microcontroller is called current accountant.Chapter 2THEORITICAL TECHNIQUES AND THEIR REVIEWS2 Background2.1 Brushed DC MotorIn automotive industries DC motor is used widely in â€Å" fuel pump control, electronic maneuvering control, engine control and electric vehicle control † [ 6 ] for its cost effectual and it is used in many applications like â€Å" mush and paper industries, fan pumps, imperativeness, winder motors † [ 2 ] , † place contraptions, washers, driers and compressors † [ 6 ] are some of the best illustrations. DC motor is one of the of import hardware employed in this paper, it consists of a rotor and stator, and the parts are placed in a lasting magnetic field. Commutator and coppice are placed in between the rotor and stator. Positioning the coppice at a peculiar way in the rotor is classified into some classs and they are â€Å" rad ial, trailling or taking † [ 3 ] places. When the rotor rotates the commutator and C coppice interface at a point, which produces an tremendous sum of magnetic field from the coppice of the motor and it produces current to the armature twist of the Dc motor. FIGURE 1: Operation of BRUSHED DC Motor [ a ]2.2 DC Motor theoretical account [ 8 ]Each motor will hold different specification and demands. Harmonizing to motor demands and inside informations the theoretical account can be designed. The purpose of motor theoretical account, trades with commanding the applied electromotive force of both velocity and current. The basic theoretical account for a Dc Motor is shown below FIGURE2: DC Motor theoretical account The above diagram is a simple RL circuit. RL circuit is called opposition induction circuit and a 24v DC Motor. All these constituents combine to organize RL circuit. Now the derivation portion of the RL circuit is explained below T ( T ) = J tungsten is the Angular speed J is the minute of inactiveness B is the clash T is the armature Torque T ( T ) = ( T ) is the Torque invariable is Armature current Harmonizing to Kirchhoff ‘s jurisprudence ( T ) – ( T ) = ( T ) + and are the induction and opposition for the armature current ( Iowa ) The electromotive of the motor can be determined by multiplying the back voltage with velocity The relationship for the electromotive force is shown below ( T ) = The province theoretical account for any DC motor utilizing Iowa and tungsten ( velocity ) is mentioned below.= +2.3 ds PIC -microchip Ds PIC stands for Programmable Interface Controller or programmable intelligent computing machine, which act as an of import controlling unit for full system. The chief aim of this undertaking is to do the Ds PIC to bring forth 6PWM wave form. In an ideal status the wave form from the pulsation width transition can command the H-bridge convertor. It non merely serves as an interface accountants but besides plays a function of a programmable logic accountant ( PLC ) . [ 16,20 ] Ds movie has a memory of 16bit microcontroller that has two major maps. Firstly it can move as a package portion functioning package maps and the other is a hardware portion functioning hardware maps. The input signals that are attain from the feedback service system are received by the package portion which in bend utilizes the codifications that are written on the bit on C – linguistic communication to analyse the input and run the hardware. Finally the package makes certainly the hardware runs based on the package maps to derive the needed end product. [ 18, 20 ] Our undertaking concentrated on working experiments that were run at lab conditions. Since a twosome of systems have certain differences from the stimulation that have been run in existent conditions compared to ideal conditions. This in bend is the working of the microcontroller. dsPIC30F 3010, 2010 4011 and 3012 are the series of french friess that have been available in the Lab. The missive ‘F ‘ in ds PIC30F and such bit provinces that the bit contains brassy memory. The ground for sing this brassy memory merchandise is because 30F has an ex-ordinary public presentation when compared to EPROM ( Effaceable Programmable Read-Only Memory ) and one clip programmable french friess ( OTP ) . This has been a major demand for the running of this undertaking to acquire the needed end product. 16-bit modified Harvard architecture has been added to the CPU incorporating Ds PIC30F for using the information and upgrading the set of usher lines for running digital signal processing ( DSP ) [ 14 ] . There is a drawn-out flexible opcode field which has been installed in the CPU that has a 24 spot broad user coder memory country and the entire turn toing velocity can travel up to 4MA-24 spot. This programming theoretical account has sixteen 16bit working registries in Ds PIC30F bit. There are two categories of debut commanding unit that have been integrated and used for executing they are integrated and used for executing [ 2 ] .2.3.1 dsPIC30F 3010This subdivision is about the pin constellation and the constituents available in dsPIC30F3010 microcontroller. Normally the memory allotment in dsPIC30F 3010 can classified in to three classs they are SRAM in Bytes EEPROM in Bytes Programmable memory in Bytes/instruction2.3.1.1 SRAMSRAM stands for inactive RAM ( Random Access Memory ) . Harmonizing to the tabular matter shown below the informations bound for inactive RAM should non transcend 1024 bytes. The memory in the map can sort in two types they are X – Datas RAM Y – Datas RAM The inactive RAM uses X -RAM and Y_RAM for hive awaying informations.2.3.1.2EEPROMThe memory allotment for EEPROM is same as inactive RAM. In read merely memory one of the of import types of ROM used to hive away memory is EEPROM. The chief map of this ROM is based on two parametric quantities they are endurance and keeping [ 2 ] . Endurance is to retain the informations even after the ROM fails. Therefore the informations ca n't be deleted at any instant. Time period is required to hive away informations that is taken attention by keeping [ 2 ] .2.3.1.3Program memoryIn a peculiar plan Ds PIC30f microcontroller has a separate memory allotment for hive awaying both the reference and information. The memory bound for the plan memory is 24K. plan reference infinite anda informations reference infinite Table 1: Tabulation for memory allotment in Ds PIC30f3010 The pin constellation of dsPIC30f3010 is described below FIGURE 3: Pin constellation of dsPIC30F 3010 [ 2 ] Pin descriptions ( PWM1L and PWM1H ) , ( PWM2L and PWM2H ) & A ; ( PWM3L and PWM3H ) [ 2 ] these are six different types PWM channels used in the pin constellation. In which each PWM brace generates three responsibility rhythms with one high end product ( H ) and one low end product ( L ) . INT0, INT1 & A ; INT2 are the interrupt buffers used in the PIC. VSS and VDD [ 2 ] are the supply electromotive force and land in the PIC accountant. U1RX & A ; U1TX, U1ARX & A ; U1ATX [ 2 ] are the series of pins used for pass oning PIC microcontroller with Personal computer, in other system interface operation can be done by UART map. In that RX stands for receiving system and TX stands for sender. The above pin map plays an of import in our undertaking.Chapter 3Methodology3.1 Components for commanding 24v brushed Dc motorSince the undertaking is to the full based on difficult ware so many constituents are available and how they work in that operation.3.1.1Cascade control operation in Dc Motor:The below operation is done by utilizing Double cascaded layout, it consists of two cringles they are current accountant with current mention and velocity accountant with velocity mention [ 5 ] as shown in. FIGURE4: General block diagram of velocity cringle and current cringle of DC Motor [ B ] The current cringle is covered by the velocity cringle, in the block diagram it has the two circles interior circle is called interior cringle and the outer circle is called outer cringle since the interior circle operation is ever quicker than the outer circle. In other words interior circle public presentation is multiple of 10 times faster than the staying 1. The cascade control rule is chiefly used in our undertaking to keep the velocity of the motor at a changeless degree and the current cringle in the cascade control is the armature current and it is otherwise called as torsion. Sometimes armature current may transcend the bound to avoid this state of affairs in cascade control, it has limiter, and the chief map of the clipper is to restrict the values of the armature current. For illustration To restrict the armature current to 64volt i.e. 1 ampere. So that the armature wo n't transcend those bounds since the clipper is available in cascade control. The velocity accountant in the cascade control used to bring forth demand current ia* . The motor runs to get the better of the demand current values. The demand current value will ever higher than the normal current values. So that the velocity motor bit by bit increases. PI accountant ( relative Integral accountant ) Current accountant Speed accountant The above all constituents construct a cascade accountant and the map each constituent is described below 3.1.1.1PI accountant ( relative and built-in accountant ) In cascade accountant map assorted accountants are used for observing the velocity and control of the motor, but PI accountant is recommended as high efficient accountant because it consist to constant addition Kip and Kid. By manually tuning the addition of both Kii and Kpi will cut down the steady province mistake and the stableness of the system will be increased. In recent study more than 70 % cascade accountant used PI accountant for commanding the velocity control DC Motor. In order to cut down the steady province mistake in the closed cringle system, bit by bit increase the relative addition changeless Kp. As the addition of the Kp increases the steady province mistake in the system decreases. But the stableness of the system will non be stable. To do the system stable, built-in term Ki is introduced in the system. When both the proportional and built-in term amount each other to cut down the steady province mistake and do the system stable.the above two maps can be done at th e same time in the PI accountant. The mathematical look for PI accountant is explained below. FIGURE 5: PI accountant of a closed cringle map [ 1 ] Kp-proportional addition Ki-Intergral addition Y- Output of the PI accountant Err-Error in the PI accountant At the get downing mistake ( Err ) will go through through both Kp and Ki. For relative addition the end product is Kp Err y1= Kp Err eqn1 [ 1 ] y2 = eqn 2 [ 1 ] Y = y1 + y2 eqn 3 [ 1 ] eqn 4 [ 1 ] The cardinal point in this PI accountant is the mistake Err in intergral addition Ki will be integrated. so that the steady mistake will be reduced and the system will be stable.3.1.1.2Current accountantThe current accountant in the closed cringle maps of the cascade control. The current cringle is besides called as current accountant. It is used to protect cascade circuit from harm. The chief map of the cascade map is to command the velocity. Before commanding the velocity the current of the accountant should be controlled. The current obtained from the closed cringle map is from armature circuit of the DC Motor [ 7 ] .the input in the current accountant is the back voltage ( ia* ) . Power convertor is chiefly used to better the control in the system. It has high exchanging frequence, since the power convertor in the current cringle is really speedy. The end product of the convertor is armature electromotive force ( Va ) . ( -E ) is the perturbation occurred in the current cringle, in order avoid the perturbation -E Iowa ia* RL CIRCUITT Power Converter Pi FIGURE 6: Functional block diagram of Current accountant The perturbation is added along with RL circuit, and the equation is shown below Va = ( S La + Ra ) ia + Tocopherol The map of the RL circuit is cut down complexness Va is Armature electromotive force. Iowa is armature current ( seeking to command ) Ra is Armature opposition Tocopherol is Disturbance RL = 1/ ( S La + Ra ) Current cringle is carried out by conveying the from Iowa ( armature current ) to ia* ( demand armature current ) . As speedy as possible without doing the over shoot acquiring so high. If the over shoot is high it creates job to the convertor. Similarly when the addition values ( Kp and Ki ) increases in PI controller the over shoot value reduces, but the same clip there is more sum of oscillation which may impact the system. Care should be taken in taking both Kp and Ki values. T Iowa ia** FIGURE 7: graph for armature current V subsiding clip ia – Armature current ia* – Demand armature current ts – Settling clip3.1.2 Flexible inverted boardThe major hardware has been designed and implemented as Flexible inverted board. It consists of many constituents they are dsPIC30F3010 microcontroller, H-bridge convertor and District of Columbia motor. The maps of these hardware constituents are explained earlier. The above all operation is implemented in a individual hard ware called flexible inverted board. FIGURE 8: Functional block diagram of Flexible inverted board3.1.2.1 IR2130 gate thrust circuit:There are three input signal generator blocks which are capable of supplying two end products each gives the inputs to the six end product drivers. L1, L2 and L3 are signal generators which drive exactly the three low-side end product drivers although H1, H2 and H3 signal generators must be flat shifted before it is fed to the high-side end product drivers. The drifting points of the driver, gate charge demands of the power switch and the maximal power switch â€Å" ON † times receives power from three bootstrap capacitances C1, C2 and C3. Bootstrap capacitances besides feed supply to the internal natation driver current. Once these energy demands are met there must be considerable sum of charge still on the 8.3V nominal to forestall halting. D7, D8 and D9 should be super-fast. VCC degree seen by an under-voltage sensor circuit gives an input to criminalize six end products of the signal generator circuits. Current detector R1 derives the ITRIP signal in the chief power circuit of the motor when it is segregated with a 0.5 V mention to criminalize the six signal generator end products. ITRIP inputs sets up a mistake logic circuit which in bend gives unfastened drain TTL end product for system gesture. FIGURE 9: Circuit diagram for IR2130 gate thrust circuit3.1.2.2Trim port map with PWMTrim port are little in size and they are really little in size.it is chiefly used in many PCB building board since it ‘s occupies less infinite. The spare port act like a potentiometer and it is otherwise called as pruner [ ] . By tuning the spare port, opposition value can be minimized or maximized. For illustration if a 50ohm opposition can be tuned by spare port from 0 – 50. The two leg of H-bridge convertor produce two pulse wave form one with low end product ( 1L ) and another 1 with high end product ( 1H ) . The responsibility ratio of the PWM wave signifier can set utilizing spare port.3.1.2.3DC MOTOR ENCLOSED WITH A ENCODERThe best methods of ciphering the velocity of the DC motor is utilizing optical encoder method. It consists of a disc, Light Emitting Diode ( LED ) and optical detector [ 6 ] . The disc is fitted with the rotor, as the rotor rotates the disc starts whirling along with the rotor and it is placed in between the LED beginning and the light detector. Once the rotary motion starts the disc passes through the LED beginning and the optical detector gets started, from which the velocity of the motor can be calculated because the optical detector Acts of the Apostless like a tachometer. In other words the encoder in the DC motor is otherwise called as velocity observing detectors. [ 6 ]3.1.2.4 H-Bridge convertorDC motor runs differential v elocity, but the applied electromotive force of the motor varies at every interval of clip. Since the electromotive force is straight relative velocity, as the electromotive force increases the velocity of the motor besides increases. Speed can be calculated by tachometer which is in physique in the DC motors, the applied electromotive force can be supplied and controlled by a convertor called h-bridge convertor. Soman GD – Gate Drive Circuit FIGURE 10: H-bridge convertor with different electromotive force VI ± & A ; VI? [ c ] In this H-bridge circuit it produces two unipolar pulsation breadth transitions because it has two leg inverter. Effective transition takes topographic point merely in the first half of the inverter. As a consequence two variable electromotive forces are generated on either side of the armature twist. In H-bridge, transition index is represented as ( +mi ) and the reciprocal of transition index is represent as ( -mi ) .the motor in our undertaking really sing two pulse breadth. Both the pulsations are reciprocally relative to each other bring forthing a unipolar PWM. The two legs in the convertor are called the shift signals or exchanging frequence. Bigger convertor comparatively has lower frequence and smaller convertor has higher frequence. If the frequence in the leg1 is high in contrast the frequence in the leg2 will be low. In our undertaking see VI ± and VI? are the exchanging channels of the H- span convertor. they are reciprocally relative to each other. The bearer signal is called the input frequence. the bearer frequence used in our undertaking is 10khz. Harmonizing to the bearer frequence the clip period of VI ± and VI? differs. In C coding VI ± and VI? is mentioned as PDC1and PDC2 from the below graph FIGURE 11 graphical representation of PWM signals in H- Bridge convertor. The end product electromotive force of the h-bridge convertor can be obtained both negative and positive electromotive force distribution [ 1 ] . Pulse width transition in the h-bridge convertor helps to command the armature circuit of the DC motor [ 1 ] . Maximal armature current ( torsion ) can be obtained by comparing clip invariable of both field twist and the armature weaving [ 1 ] . Since the motor is connected straight to the field twists supply electromotive force in the field twist is more when compared with the armature weaving. To keep equal clip invariable in both field and armature weaving [ 1 ] , the applied electromotive force in the armature twist should be increased, as the armature current increases the torsion end product is maximized [ 1 ] .3.1.3 Generating PWM moving ridge signifiersAs the torsion end product gets maximized, pulse breadth transition is introduced in the H-bridge system to avoid the perturbation in the armature current.it can be done by increasing the frequence degree of the H-bridge convertor at a higher scope. As the torsion end product gets maximized, pulse breadth transition is introduced in the H-bridge system to avoid the perturbation in the armature current.it can be done by increasing the frequence degree of the H-bridge convertor at a higher scope. FIGURE 12: Diagrammatic representation of the pulsation breadth transition is shown below [ 6 ] The below specification is referred from [ 6 ] Ton – Time is ON ( applied electromotive force ) Toff – Time OFF ( applied electromotive force ) T – Time period. Duty rhythm = . The mean electromotive force of the DC motor can be shown in an equation below Average = Duty rhythm A- Vin [ 6 ] When the motor is running at a changeless velocity the back voltage of the motor is besides remain changeless. As the back voltage remain the same the motor running at changeless velocity and the armature current ( Ia ) is zero. PWM is one chief portion that is required for the operation of cascade control.4. Software used to drive the Motors4.1 Programing microcontroller in Flexible inverted board utilizing C-languageIn the flexible inverter board PIC microcontroller plays a major place in directing the pulsation breadth transition. The Ton clip in the pulsation breadth transition ( PWM ) signal can be modulated or controlled by the microcontroller, as the microcontroller varies the clip, the speed of the motor alterations with regard to clip. The Programing linguistic communication used in microcontroller is embedded C. The scheduling codifications are downloaded in the microcontroller bit, the downloading attack can be done by a package development tool called MPLAB, this package exists in supervising the systems, this package should be foremost installed in the Personal computer, the code rs will compose the codifications to modulate the PI accountant to get Applicable beginning from the current cringle of the cascade control map. Once the codifications are accepted harmonizing to the current cringle [ 1 ] , the plans can be downloaded in the microcontroller through cosmopolitan consecutive coach or in circuit Debugger ( ICD ) ; ICD is a coach which interfaces Personal computer system and the flexible inverter Board. [ 6 ] In order to plan the microcontroller examine whether the hardware constituents are interfaced with the accountant. The scheduling linguistic communication used for programming the accountant is C linguistic communication. In c-language the information ‘s are classified in to input informations and end product informations. The microcontroller direct the information in linear signal, where the C-language wo n't accept linear signals.To avoid the state of affairs ADC convertor and encoder interface are introduced in the system. ADC stands for parallel to digital convertor ; it converts the linear signal in to digital signals. Then the digital signals get received by the C-program as input informations. In turns c-program will direct the end product informations to the PWM unit. UART communicating system is a bidirectional so that microcontroller and Personal computer can pass on at the same time. UART stands for cosmopolitan asynchronous receiving system sender. The basic diagram matic representation for system communicating with C-language is shown below FIGURE 13: System communicating in C – Programing Language. In C-language foremost initialise all the maps required for the velocity control of motor.4.1.1Current detector input:The current in the motor spiral is one of import parametric quantity in the effectual running of the motor. So it is indispensable to mensurate the value of this current. The measuring of the current is performed by utilizing particular detectors call Hall Effect Sensors. The scope of the current is determined by the evaluation of the motor. Any over current in the motor can severely damage the motor. The Hall Effect detectors produce a electromotive force matching to the stage current. This is fed to the ADC inputs of the micro accountant where it is converted into the digital signals. This is so fed into the microcontroller plan. Hence the current demands to be limited within specific limits.CL1, CL2 and CL3 are the three current detectors variables used in this cryptography. The spot ratio of the ADC input is 10 so the input informations scopes from 0 to 1023. The maximal informations bound for the current detector is 1023.so the current detector value in the C- codification is initiated as CL1 = 511 ; CL2 = 511 ; CL3 = 0 ;4.1.2 Encoder input:For any velocity accountant, the existent velocity of the rotor forms the footing for the control signals. The velocity control signal can be changed merely if there is an mistake between the existent velocity of the rotor and the coveted velocity of the rotor. If the measured velocity is less than the coveted velocity so the PWM pulsations are changing consequently to increase the velocity. To execute this action a shaft encoder is used. The shaft encoder uses an opto-mechanical system to bring forth pulsations. These pulsations so are used to deduce the velocity of the rotor. A mention pulsation is used as an index to number the pulsation. This information is fed to the microcontroller, which so uses a particular timing circuit that processes these encoder pulsations. The motor velocity to be accessed by the microcontroller needs to be stored in a variable within the micro accountant codification. The variable used in this plan is a variable called revolutions per minute. This variable is accessed to cipher all maps related to the motor velocity.4.1.3 Pulse Width Modulation:The MOSFET ‘s in the circuit is used as switches. These MOSFET ‘s are switched harmonizing to a PWM. To drive these MOSFETs ‘ a gate driver circuit is required. The gate thrust signal generates the electromotive force required for the operation of these MOSFET ‘s. The PWM is generated by the microcontroller harmonizing to the plan and is supplied to the gate thrust circuit. The PWM signals are sep arate for each if the 3 legs of the MOSFET inverter. Each of the PWM requires a transition index to bring forth the signal. These transition indexes are stored in a registry. The registries are named as PDC1, PDC2, and PDC3. These variables are really important in bring forthing the PWM signals for the MOSFET drivers. Since informations bound is 1023.4.1.4 Initializing the codification in C – linguistic communicationBefore executing any map in C-language, it requires an low-level formatting. It is of import to initialising the variable of a map. Some the maps are initialized below.Init PORT ( )This map initialise the digital input and end product port or parallel input and parallel end product of the microcontroller.Init UART ( )It is one of pin in the microcontroller.The chief map of the UART is used for bidirectional communicating with Personal computer. Since UART can able to observe the transmittal velocity in informations transportation between the microcontroller and Pe rsonal computer. The maximal transmittal velocity is around 19200.the informations transportation wo n't transcend the bound.Init PWM ( )The input frequence of our PWM signal is 10kHz.the clip bound for the transition index is around 0-1474.in the h-bridge convertor has two legs so each leg produces a PWM signal with a maximal clip bound of 0-737. Hence the Ton clip of PWM signal will be in 1:1 responsibility ratio.Init ADC ( )It is used to change over the parallel signals in to digital signals. In the microcontroller there are five pins reserved for the ADC inputs. During the informations transmittal ADC maps plays a of import function in disrupting the signal. An low-level formatting is required for the interrupt to execute any map in C- linguistic communication.Init CAPTURE ( )The gaining control map is chiefly used to mensurate the frequence and clip period of the PWM wave signifier generated from the two legs J30 and J31 pins of the H-bridge convertorInitTimer3 ( ) and InitTime r1 ( )To put initial clip in the microcontroller for the gaining control map and timer 1 set the starting clip for the interrupt map happened in the UART communicating system.Interrupts:Interrupts are occurred merely during the informations transportation, when the transmittal velocity that is the baud rate is known means the interrupts can be added to the system easily.in our undertaking the baud rate is 19200.the chief map of the interrupt is used synchronize clip period of PWM with the velocity cringle and the current cringle of the motor. In our undertaking four different type of interrupt service modus operandi are used. They are ISR_ADCInterput ( ) This interrupt is triggered when the ADC finishes its transition and hence its get synchronized to the microcontroller PWM clip base. From this all the application control codification to be implemented in this interrupts service modus operandi.ISR_T1Interput ( )The assorted information to the Personal computer is transferred by utilizing the UART communicating nexus in this interrupts service modus operandi. All the variables that are needed to be mentioned in this everyday utilizing standard C map dash ( ) .ISR_U1RXInterput ( )Assorted information is transferred from the Personal computer in to the C plan. This everyday concedes us to modulate the facets of the plan when it is running.ISR_IC1Interput ( )It measures the velocity value from clocking informations that are attained in the input gaining control faculty. FIGURE 14 The connexion diagram for the velocity control of Dc motor is shown above Chapter 55 Consequences and treatmentAs discussed earlier the assorted maps of hardware constituents in this undertaking, this subdivision discusses the inside informations sing how the undertaking deals with comparing and measuring the consequences. Undertaking has a series of stairss ; each measure is assigned with different operation techniques to put to death the concluding consequences. 5.1 Initial connexion trial between MPLAB IDE and Flexible inverted Board Initially the system needs to be interfaced utilizing the flexible inverter board. This operation is performed by linking the Personal computer to the flexible upside-down board. To link the Personal computer to the flexible upside-down board, ICD 3 interface port is used to finish the connexion. Since the informations transmittal velocity in ICD 3 is high when compared with ICD 2, the power supply to the inverted board is supplied through the Dc power supply generator. The Initial conditions were set to the power supply generator where the electromotive force bound and current bound is zero. For the Dc motor maximal electromotive force supply is 24voltage in VDC and a current of 0.5 ampere is set in the power supply generator which is so connected to the inverter board. Once the initial conditions are set, the power generator is fitted with a path button which needs to be held and at the same time the end product button needs to be pressed. Once the end product button is turned ON, the power is applied to the inverted board. On the other manus MPLAB IDE package is opened in the system, where a new file demands to be created so the needed compiler for this undertaking needs to be selected. Once these scenes are done the debugger option in the MPLAB ICD 3 is chosen, the package will initialise the tool and a verification message was displayed on the screen which says â€Å" ICD 3 is connected † . The codifications for this were designed in the MPLAB package and burnt in the Ds PIC microcontroller by ICD 3 interface. 5.2 Measure 3, 4 & A ; 5 One of the ADC input pin in the PIC microcontroller demands to be initialize as ADCBUF0. The maximal input scope of ADC interrupt is 1023 since ADC input is initialized as IN1. When IN1 is initialized as ADCBUF0 in C-language it can be written as{IN1 = ADCBUF0 ; PDC1 = IN1 ; IFS0bits.ADIF = 0 ;}Here IN1 is the informations value for the spare port in the flexible upside-down board. The maximal IN1 value is 1023. As mentioned earlier PDC1 is initialized as one leg portion H-bridge convertor, where PDC1 is 1474 and a unipolar pulsation breadth transition was generated. If IFS0bits.ADIF is zero, it means that the chief used to initialise ADIF value is 0 in other words it is the default value. PDC1 = 2*IN1 ; Similarly in measure 4 multiply the spare port input value with 2. Then the PDC1 input scope will transcend so ‘if ‘ statements are used to restrict the value of PDC1 from 0 to 1474. To restrict the values of PDC1 the codification in C-language can be implemented as ; PDC1 = 2*IN1 ; If ( PDC1 & gt ; 1474 ) PDC1= 1474 ; 5.3 Step6 & A ; 7 The flexible upside-down board consists of a gate triggered circuit in other words they are known as MOSFETS. Wholly 6 MOSFETS are available in the flexible upside-down board. In our undertaking two MOSFET are used and both of them are connected to the legs of the H-bridge convertor. The MOSFETS that are connected to H-bridge convertor are ‘U10 and U13 ‘ & As ; ‘U11 and U14 ‘ . To supervise and look into if the MOSFETS are triping the pulsation or non it can be done by analyzing the trial points available in the flexible upside-down board. This is done utilizing the CRO where the trial points are connected via investigations as a consequence triping pulsation is produced. The diagrammatic representation of Square wave signifier is shown below. FIGURE 15The above diagram represents the general pulsation wave form Depending on the transition index value produced by the ADC input the responsibility ratio of the pulse fit transition varies consequently. In other words the transition index is straight relative to the responsibility ratio. Using appropriate C plan the ensuing wave form from the three different responsibility ratios was observed to be in the square form. When the CRO is connected to the trial point J30, three different per centums were obtained due to the different responsibility rhythms. The C codifications that were used to obtain the wave forms are mentioned below: C codification for 50 % responsibility rhythm: PDC1 = MI + 737 ; PDC2 = MI – 737 ; Manual computation for 50 % responsibility rhythm Since PDC1 = 1474 If PDC1/2 = 1474/2 = 737. Resulting wave form for 50 % responsibility rhythm is shown below FIGURE 16 moving ridge from for 50 % responsibility rhythm C codification for 25 % dutycycle: PDC1 = MI + 1105.5 ; PDC2 = MI – 1105.5 ; Manual computation for 25 % dutycycle: ( PDC1 and PDC2 ) value for 50 % responsibility rhythm is 737 ( PDC1 and PDC2 ) value for 75 % responsibility rhythm is 368.5 For 25 % responsibility rhythm add both 737 + 368.5 = 1105.5 Resulting wave form for 25 % dutycycle: FIGURE 17 moving ridge signifier for 25 % responsibility rhythm Code for 75 % dutycycle: PDC1 = MI + 368.5 ; PDC2 = MI – 368.5 ; Manual computation for 75 % responsibility rhythm For PDC1 and PDC2 is 737 Divide PDC1 and PDC2 by 2 The solution for for PDC1 and PDC2 is 368.5. Resulting wave signifier for 75 % dutycycle FIGURE 18 moving ridge signifier for 75 % responsibility rhythm 5.4 Measure 7 The last operation is based on linking the CRO with the trial point J30 in the flexible upside-down board, likewise the same operation is performed in another trial point J31. The triggered pulsation obtained from the MOSFETS is shown below for the different responsibility rhythm ratio as already mentioned in measure 6. Resulting wave form for 25 % responsibility rhythm: FIGURE 19 Resulting wave signifier for 25 % responsibility rhythm in trial point J31 Resulting wave signifier for 50 % responsibility rhythm is shown below FIGURE 19 Resulting wave signifier for 50 % responsibility rhythm in trial point J31 FIGURE 20 Resulting wave signifier for 75 % responsibility rhythm: From above three wave signifiers each differs in their responsibility ratio. Then compare the wave form of J30 & A ; J31. The different is happened because of hold or mistake occurred during the informations transmittal. 5.5 Measure 10 In the initial status of the spare port is set as nothing. Then the responsibility rhythm of the PWM 1 is high and PWM 2 will be low.In other words PWM1 is reciprocally relative to PWM2. Similarly in the ulterior status when the spare port is turning toward the higher terminal. Now the responsibility rhythm of PWM 2 is found to be more than 95 % . The end product of the PWM is determined from the CRO. Since the value of PDC1 and PDC2 will be 1474.due to 1:1 responsibility ratio. The input informations values are every bit shared by both PDC1 and PDC2. In some conditions when the PDC1 = 2*IN1.the value of IN1 is 1023, and so value of PDC1 is 2046. As per the conditions mentioned earlier the value should non transcend the input informations bound 1474. Such state of affairs are handled with aid of if statements. Using if statement how the status is satisfied in C cryptography PDC1 = 737+MI ; PDC2=737-MI ; If ( PDC1 & gt ; 1474 ) PDC1 = 1474 ; If ( PDC2 & gt ; 1474 ) PDC2=1474 ; This codification C2=1474-PDC1 makes the motor to revolve at rearward way. When the above codification is compiled and executed the electric resistance value increased or decreased by manually tuning the spare port in the flexible upside-down board. Harmonizing to the opposition value in the microcontroller the amplitude and the current flow can be controlled. 5.6 Measure 11 Ripple current and RL Load Now connect the RL burden with the connection of the flexible upside-down board to cipher the ripple current. In the connection of the flexible inverted board has two points. They are sing as point A and point B. Ripple current can be calculated by a device called current investigation. First connect the current investigation to the point A of the connection and view the mean value of the ripple current in the CRO. The wave form for the mean ripple current value for point A is shown below. FIGURE 21 moving ridge signifier for responsibility cycle1 with 1H and duty rhythm 2 1L ( indicate A ) 1H – High End product 1L – Low End product In this wave form the conditions are wholly reversed when compared with the above wave form. The responsibility rhythm 1 with 1L and duty rhythm 2 with 1H ( indicate A ) FIGURE 22 moving ridge signifier for responsibility cycle1 with 2L and duty rhythm 2 1H ( indicate A ) Once the rippling currents are calculated in point A. the similar operation is performed by the current investigation in point B. the wave forms are shown below FIGURE 23 wave form for responsibility cycle1 with 1H and responsibility cycle2 with 1L ( point B ) FIGURE 24 wave form for responsibility cycle1 with 2L and responsibility cycle2 with 2H ( point B ) 5.7 Measure 12 This measure deals with ciphering the beginning and derive value of ripple current through current investigation as discussed earlier. These values are chiefly used for trying the input informations ‘s from the microcontroller. In order to cipher the beginning and addition value the values need to be identified as shown in the tabular matter below they are ; ADC electromotive force, current detector, PDC1 and PDC2. Initially the interface needs to be reloaded with the flexible upside-down board. The PDC1 and PDC2 value can be determined by the ticker option in MPLAB IDE package. The current detector in the flexible inverted board has a trial point J43. Then the current detector value was measured by multi metre through the trial point. For this a 24 electromotive force Dc motor the maximal current detector value gettable will be 2.57voltage. Initially set the spare port value to zero, so look into the current detector value by a multi metre where it showed 2.57. By increasing the electric resistance of the spare port the current detector and ADC electromotive force will be bit by bit decreased nevertheless at one phase the ADC electromotive force bit by bit decreases to zero. Later the ADC electromotive for ce value increased easy but the current detector invariably decreased as shown in the tabular matter. These values were recorded in the tabular matter. Subtracted ADC electromotive force value from PDC1 value and the mean value consequence was recorded in the new column. Then the mean value for the new column is calculated. Table 2 Tabular column for ciphering beginning and addition values ADC electromotive force Current detector PDC1 PDC2 PDC2 – ADC electromotive force Spot 27.51 2.569 41 1433 13.49 4.46039 25.43 2.559 143 1331 117.57 21.79 2.544 283 1191 261.21 20.51 2.527 444 1030 423.49 17.79 2.517 546 928 528.21 0.0007 2.497 757 717 756.9993 3.72 2.478 960 514 956.28 4.07 2.462 1123 351 1118.93 18.4 2.43 1431 43 1412.6 5588.7793 620.9754778 Manual computation for the above tabular matter is shown below Offset spot = ( PDC1 – ADC electromotive force ) / entire figure values ( PDC1- ADC electromotive force ) = 13.49 + 117.57 + 261.21 + 528.21 + 756.9993 + 956.28 + 1118.93 + 1412.6 = 5588.7793 PDC1-ADC electromotive force = 5588.7793 Entire figure of values = 9 Average ( PDC1 – ADC electromotive force ) = 5588.7793/9 = + 620.9754778. Calculate the entire ADC electromotive force Entire ADC electromotive force =27.51 + 25.43 + 21.79 + 20.51 + 17.79 + 0.0007 + 3.72 + 4.07 + 18.4 = 132.5 Offset spot = + 620.9754778./ 132.5 = 4.4602 spot 5.8 Measure 13 In this subdivision connect 24 volt Dc motor to the flexible upside-down board. When the power supply is turned ON the motor rotates at a peculiar velocity and this velocity of the motor rotates harmonizing to the responsibility ratio produced by the H-bridge convertor. Initially test all the conditions to verify the on the job status of the motor. The motor used here is fitted with an encoder that is attached together. Since the flexible inverted board has an encoder sensor the encoder portion of the motor was connected to the encoder sensor, therefore the motor satisfies the conditions mentioned above.5.9 Measure 14In this measure, J14 pin of the flexible upside-down board is interfaced together with the system through a overseas telegram. Using Lab position package ‘s the Tacho scope, RPM can be determined. PDC1, PDC2 and their corresponding responsibility rhythm per centum are viewed. Like this similar operation Table 3 Tabular column for ciphering electromotive force Vs velocity Tacho Vdc Revolutions per minute PDC1 PDC2 Duty 1 % Duty 2 % 1 -18.1 1776 150 1324 89.2 11.2 2 -14.5 1416 270 1204 81.1 19.9 3 -10.71 1047 388 1087 73.3 27.1 4 -7.46 727 482 992 66.5 35.5 5 -3.42 334 596 878 58 42 6 0 95 714 760 50 49.6 7 1.69 165 826 648 45.6 54.4 8 5.5 538 941 532 38.2 62.2 9 9.33 919 1049 423 29.8 70.1 10 12.9 1265 1155 320 22.3 72.9 11 16.1 1578 1256 219 15.5 85.5 12 19.6 1919 1374 97 9 92 RPM = K To cipher the value of the K K = Vdc12 – Vdc1/RPM12 – RPM1 K = 19.6-18.1/1919 – 1776 K = 0.0104 As per the demands from the tabular matter secret plan the graph for Vdc ( electromotive force ) V RPM The graph representation is shown below FIGURE 25 Voltage Vs Speed5.10 Measure 155.10.1Current cringleOnce the mean value of the ripple current and the beginning values are calculated, to command the velocity of the motor, foremost the applied electromotive force of the motor should be controlled. Interestingly the applied electromotive force can be determined from the current cringle of the relative and Built-in accountant in other words as PI accountant. Since the operation of PI accountant is explained before itself. In the PI accountant current plays the interior cringle, and it is 10 times faster than the outer cringle. So the interior cringle is executed foremost. A measure input given to the PI accountant. The consequence expected from the end product of the PI accountant as a measure end product with extremum over shoot. This extremum over shoot increases the steady province mistake besides increases. In bends steady province mistake produces a electromotive force bead in the motor. So the velocity of the motor bit by bit decreases. This state of affairs can be overcome by seting the addition of both relative and built-in. The maximal extremum over shoot degree is 7.5 % . If the degree exceeds, the end product of the current cringle is non in a stable status. If the system is non stable, it is hard to command the velocity of the motor. the graphical representation of the expected current cringle is shown below. FIGURE 26 measure response end product for current cringle In the above measure response the ia* and Iowa are the demand current and the armature current. Since the current detector value 1023. Two current detectors are used. They CL1 and CL2 The armature current Iowa = 511 Demand current ia* = 511 Tocopherol is the mistake E = demand current – armature current E = ia* – Iowa E = 511 – 511 = 0 ; Harmonizing to the computation shown above.The codification is compiled in C-language for the current cringle. In the cryptography First originate the addition values of the PI accountant as kpi and kii. int kpi, kii ; kpi=10 ; kii=0 ; Then initialise the mistake, armature current and demand current as i_error, Iowa and ia_demand int Iowa, ia_demand, i_error ; Iowa = CL1 ; ( initialise current detector 1 as armature current of the motor ) CL1 = 511 ; ( initialise the value of current detector 1 as 511 ) ia_demand = 511 ; ( demand armature current ) i_error = ia_demand – CL1 ; ( Error in the armature current can be determined by deducting the armature currenr ( Iowa ) from the demand armature current ( ia* ) . The expected mistake should be zero. when the above codification is executed in MPLAB package. In the get downing the mistake is non zero. Some clip the current detector value differs. As per the codification the expected CL1 value should 511. In this status, a new set of codification is implemented. In this codification, if statements are used for the CL1 value. Then the current detector value will be within the scope. if ( 510 & lt ; CL1 & A ; & A ; CL1 & lt ; 517 ) the value CL1 ranges from ( 511 to 517 ) The manual tuning of kpi and kii alterations CL1 from 511 to some other value. As a consequence mistake occurs in the extremum over shoot. For illustration if CL1 is 514, which is displayed on the ticker of MPLAB Since the expected CL1 is 511 but CL1 is 514 The mistake difference between the expected and the present value is 3. The avoid the mistake difference in CL1 a simple codification is designed below CL1 = CL1 -3 ; ( if CL1 is 514, 514 – 3 is 511 ) . The mistake is zero but the extremum over shoot is still high. This is due built-in air current up map because the built-in added with kii in PI accountant. To avoid this mistake separate codification is executed in C cryptography. The variable zi is initialized as built-in collector and its value is 737. if ( zi & gt ; 737 ) zi=737 ; if ( zi & lt ; -737 ) zi=-737 ; the above codification keeps the zi value within the scope. Since i_error = 511 zi = 737 + 511 zi = zi+i_error ; ( anti air current up codification added with an mistake ) In order to avoid the built-in mistake multiply built-in collector with built-in addition ( kii ) . kii * zi ( eqn 1 ) Multiply the mistake with the addition of proportional. kpi * i_error ( eqn 2 ) add both the eqn to acquire the concentrated transition index. This map will cut down the steady province mistake and extremum over shoot. myocardial infarction = ( kpi*i_error ) + ( kii*zi ) ; From this codification the expected extremum over shoot is obtained with zero steady province mistake. The expected current cringle moving ridge signifier implemented from the codification is shown below In this moving ridge signifier over shoot is high. To cut down the over shoot and stead province mistake manually tune the kpi and kii value. Manual tuning is like a loop method to acquire a peculiar solution after many comparings take topographic point between kpi and kii values. The expected end product is non yet determined. So the expected end product is still under procedure.Mention[ 1 ] D.J.Atkinson, â€Å" Control of Electric thrusts, † EEE 8014 talk notes, School of electrical, electronic and Computer technology, Newcastle University,2011. [ c ] [ 2 ] R.Roberge, â€Å" Carbon coppice public presentation and application in the mush and paper environment † , National Electrical Carbon Products, 2001. [ 6 ] E.A.CHOON, â€Å" DCmotor velocity control utilizing microcontroller pic16f877a † , 2005, pp. 1-64. [ 3 ] K.Hameyer, R.J.M.Belmans, â€Å" Permanent magnet excited brushed DC motors † Dept. of Electrical. Engineering. Katholieke University, Vol. 43, 1996, pp. 247-255 [ a ] CONDIT, R. ( 2004 ) Brushed DC Motor Fundamentals Microchip Technology Inc. [ 5b ] P.Chevrel, L.Sicot, S.Siala, â€Å" Switched LQ accountant for DC Motor Speed and Current Control: a comparing with cascade control † , 1996. [ 4 ] G.J.Atkinson, â€Å" Electrical Power and Control Project, † EEE8075 ( Semester 1 ) talk notes, School of electrical, electronic and Computer technology, Newcastle University, 2011. [ 7 ] M.V.Ramesh, J.Amarnath, S.Kamakshaiah, G.S.Rao, â€Å" SPEED CONTROL OF BRUSHLESS DC MOTOR BY USING FUZZY LOGIC PI CONTROLLER † ARPN Journal of Engineering and Applied Sciences.Vol.6, NO. 9, 2011. [ 8 ] R. K. Munje, M. R. Roda, B. E. Kushare, â€Å" Speed Control of DC Motor Using PI and SMC † IPEC, 2010 Conference Proceedings, 2010, pp.945- 950. DS movie mention [ 2 ] . ( 2010 ) dsPIC30f3010 Data Sheet. Microchip Technology Inc. [ 16 ] .D'SOUZA, S. ( 2004 ) detector less BLDC Motor Control Using dsPIC30f2010. Microchip Technology Inc. [ 18 ] . ELLIOTT, C. & A ; BOWLING, S. ( 2004 ) Using the dsPIC30F for mindless BLDC control. IEEE Inc. [ 20 ] . HUDDLESTON, C. ( 2007 ) Intelligent detector design utilizing the micro chip Ds PIC [ electronic resource ] / by Creed Huddleston. , Elsevier/News. Tabulation J. Plantier, H. Aziza, J.M. Portal, C. Reliaud, A. Regnier, J.L. Ogier, â€Å" EEPROM tunnel oxide life-time dependability anticipation based on fast electrical emphasis trials † ELECTRONICS LETTERS Vol. 46 No. 23, 2010. Tang Yiliang, Cui Wenjin, Xie Xiaorong, Han Yingduo, Man-Chung Wong â€Å" 80Cl96MC Microcontroller-based Inverter Motor Control and IR2130 Six-output IGBT Driver † Department of Electrical Engineering and Faculty of Science and Technology, 1999, pp.665-667. [ FIGURE9 and 3.1.2.1 ] David Cook â€Å" CHAPTER 14 Variable Resistors ROBOT Building FOR BEGINNERS † , 2010, pp 173-191. [ trimport ]

Tuesday, July 30, 2019

Pigrimage Should money be given to the poor or should it be used for maintaining the places of pilgrimage? Essay

Should money be given to the poor or should it be used for maintaining the places of pilgrimage? I think that money should be given to the poor people this is because Jesus helped the people in need. This is stated in the parable of the sheep and the goats and the rich young man. Another reference to back this up is â€Å"Love your neighbour† this means that you should help anyone in their time of need like in the good Samaritan when a Samaritan was beaten up and was in need of desperate help two people walked past him took a look at him and walked on then a Jew came past and helped him even though Jews and Samaritans absolutely hated each other he helped him in his time of need. So we should give money to the poor because at this time in their life they need our help and it is our duty to help them. This is why money should be given to the poor rather than places of pilgrimage because life is more important than buildings life is unique and special life is a gift from god. But also give money to the churches to maintain buildings of pilgrimage and churches but most of the money should go to the poor. On the other hand some Christians believe that it is right to maintain our places of pilgrimage because God deserves that kind of respect we should build his house in gold. The churches are the core of all communities. The church also helps those in need for example Soup kitchens. If the churches are not maintained then the churches history that it has got over hundreds of years. We also need to preserve places of pilgrimage because it is a way to get closer to God and pray for family. Another reason is that God is worthy of the admiration and beauty of the places of pilgrimage. Organisations like CAFOD help the poor by giving them long term aid like education and tool to get food. They also give short term aid where they give them food clean bottles of water health checks and vaccinations. We are unique and have feelings and our life is more important than buildings. The early Christians did not have places of worship and they managed to cope so why cant we do the same. Churches spread Christianity so if they start to deteriorate people will not want to go to church because it is so run down a lifeless it don’t seem worthy to be Gods house. In conclusion I think that more money should be spent on the poor because life is unique, precious, made in god’s image and likeness and life is a gift from god buildings are a luxury to have. If we spent more money on places of pilgrimage then lives would be wasted where no money was spent on them which means nobody cares about poor people any more.

Adapting Communicative Language Teaching Approach to China’s Context Essay

1. Introduction With the development of market economy, China is accelerating its steps to join the world family in commerce and cultural partnership. With the recent accession to the WTO, the long-awaited Olympic Games in Beijing, China has made learning English a national priority. English, with its unique status, has been taught in China for more than 100 years. Today, English is becoming more and more popular. It is a compulsory course for all Chinese students from primary school to university. Clearly it is relatively easy to demonstrate the importance of English in current China. This essay intends to argue that to achieve success in English learning for Chinese students the methods of teaching must be reconsidered. Therefore this article is structured as follows: First, analyzing different types of English teaching methods in China and then focusing on the CLT Method. By analyzing and contrasting these English teaching methods, the need to change current English teaching methods in China will be discovered. Finally, explaining the problems of adopting the more modern CLT Approach and giving suggestions on how it may best be adapted to the Chinese context. See more:  Social Satire in The Adventures of Huckleberry Finn Essay 2. A Brief Introduction to English Teaching Methods in China 2.1 Grammar-Translation Method  English has been taught in China for more than 100 years. In the beginning stage, people did not have any experience on modern language teaching and learning, so they followed a European language teaching method YE Jin (1978- ), Master of education, lecturer of School of Foreign Language, Shenzhen University; research fields: English language teaching methods, cross-cultural communication, educational assessment,which is used in teaching Greek and Latin in Middle Ages in Europe—Grammar-Translation Method. Some Chinese students become accustomed to this method in learning English and generally showed great interest in language structures and linguistic details. Most of them believe â€Å"we would like to know what happens, because if we understand the system, we can use English more effectively† (Harvey, 1985). Therefore, most Chinese English teachers always stick to this method, and think it is essential to analyze grammar to learners, without considering the age of the students or their English proficiency. This method is effective and suitable for some Chinese students, but not all of them. The outcome of this method is that students develop poor oral English ability with pronunciation and intonation not standard. Although they have learned lots of grammar rules, when using English to communicate, they will make grammatical mistakes frequently. Especially when they are in foreign countries, they cannot ask the way; they cannot order taxi. They are â€Å"observers† rather than active participants in classes. Students became almost â€Å"structurally competent but communicatively incompetent† (Johnson & Morrow, 1981). It has been pointed out that this grammar-oriented approach reflects an artificial and formalistic view of language skills and learning. It doesn’t allow the learners to use a language in a natural way (Widdowson, 1990). This is the most serious problem in Grammar-Translation Method and also in current China’s English teaching. 2.2 Direct Method  This English teaching method is totally different from Grammar-Translation Method. It uses English directly in teaching, such as using English to make conversations or have discussions. Students’ English competence is developed in this way instead of using mother tongue to translate. The basic principle of this method is that the foreign language learning process should be like the natural process of a child learning his or her mother tongue. It believes that language is a skill or habit, and this habit can be achieved by repetition and imitation. Although this method can inspire students’ interests in learning English and is in favour of their English pronunciation and intonation, it has certain limitations: (1) It only focuses on experiences and perceptual knowledge in English and it has little estimate on students’ level of consciousness. (2) This method rejects mother tongue in English teaching. It only sees the disadvantages of mother tongue, but never makes use of mother tongue to facilitate students’ comprehension. (3) After learning English for a long time, some students may understand simple oral English but not complicated sentences and have poor grammar skills. (4) The class size should be small in using this method. So this method is just suitable to teach English beginners, and cannot be fully applied in the large country—China. 2.3 Audio-Lingual Approach  This English teaching method puts listening and speaking in the first place. It uses sentence pattern as the base of teaching and tries to avoid mother tongue in class. When using this method in learning English, students should first listen and then speak. After a long time practice, students can automatically express what they had heard. Because this method relies on repetition and drills, the main limitations are: (1) It over emphasizes the mechanical practice and ignores students’ English skills training and learning flexibility. (2) This method focuses too much on the language structure and ignores the meaning of the language, so students’ reading and writing abilities are poor. 2.4 Communicative Language Teaching Approach (CLT)  In the early 1990s, a new English teaching method was introduced to China—Communicative Language Teaching Approach. This method emphasizes how to use language as a media to communicate. Teachers should not only train students’ listening, speaking, reading and writing skills, but also train them how to use all of these language skills into the real life communication. The teacher sets up a situation that students are likely toï ¿ ¼encounter in real life. The CLT can leave students in suspense as to the outcome of a class exercise, which will vary according to their reactions and responses (Galloway, 1993). The basic features of CLT are: (1) It focuses on students’ active participation, the whole classroom is not the teacher-centered, but students-centered one. The teacher should give students enough time to practise during class. (2) The English teacher should help students to be more independent, active and fluent in using English. In real life situation, students will use the language without teacher’s help. (3) When using the CLT, the teacher often organizes pair and group work, the whole classroom setting should be arranged in favour of these activities. Although this method is quite useful and can inspire students’ interest, it still has some limitations: (1) The textbook using in CLT breaks up the English grammatical system, which increases students’ difficulty in learning grammar. (2) This method is hard to assess. The above four English teaching methods are all used in China in different time and to a certain extent; they have their own features and focuses on improving different language skills. So the limitations are unavoidable when we use them separately in English teaching. Among them, the oldest language teaching method—Grammar-Translation Method is still popular in some places in current China. Meanwhile, for various reasons, using the CLT in China met considerable difficulties. How to use the CLT in China’s English teaching context properly still has a long way to go. 3. Adapting Communicative Language Teaching Approach in China To solve this problem, we need to use the CLT flexibly, that is to say, we need to adapt CLT to China’s English teaching context. But just as Johnson and Morrow (1981, p. 1) state â€Å"new movements often begin as reactions to old ones. Their origins lie in a discontent with an existing state of affairs†. In fact, in 1992 the State Education Development Commission (SEDC) introduced a functional syllabus, in which the communicative teaching aim was set and the communicative functions to be taught were listed. In the same year, in cooperation with the British Longman, the SEDC published a new textbook series. The syllabus and the textbooks required teachers to teach communicatively in classrooms. This action met considerable resistance at that time. 3.1 Problems  The main problems of adopting CLT in China are: First, class size. In China, each class has at least 50 students, and there are only 45 minutes in one English class. Each student could potentially speak in each class less than 1 minute. So it is impossible for English teachers to conduct CLT well in this kind of class. Second, English teachers especially some primary and secondary school English teachers lack sufficient English knowledge and teaching skills to adopt CLT without further guidance and training. â€Å"Many teachers have tried to change the dominant teaching procedures but quickly get frustrated, lose their initial enthusiasm, and acquiesce to tradition†. (Campbell & ZHAO, 1993) Third, in China the whole process of English teaching and learning is heavily influenced by examinations, and the matriculation English test focuses on students’ linguistic competence. The English teaching pattern in China is textbook-based, teacher-dominated and test-oriented, which prevents students from improving their communicative competence (ZUO, 1993). Finally, lack of teaching materials is another obstacle to adopt CLT in China. Right now, some universities in China stick to their own textbooks—College English, which was published in 1989 by Shanghai Foreign Language Education Press, and has remained unchanged for more than 10 years. College English does include some authentic materials from English novels and magazines, but it lacks practical applications and is hard to organize communicative classroom activities to go with it. Because of the above reasons, English teachers cannot adopt CLT directly in China’s context, and the history 31 Adapting communicative language teaching approach to China’s context ï ¿ ¼has already proved that direct adoption would fail at last. They must adapt CLT and use an eclectic method according to Chinaà ¢â‚¬â„¢s current situation. 3.2 Factors to be considered of adapting CLT to China’s context The above four English teaching methods are all used in China’s English teaching. They have their own advantages and disadvantages. Previous research and analysis show that the most scientific way to teach English in China’s context is to combine those different English teaching methods together, using an eclectic method. An eclectic method is a method that accepts the best teaching techniques from other methods according to the actual situation. To reconcile communicative approaches to the teaching of English with traditional Chinese methods helped English teachers in their teaching, but to be eclectic, teachers were required to use CLT as a method while accepting elements of the traditional methods, especially the Grammar-Translation Method. 3.2.1 Combining accuracy and fluency in China’s English teaching In English learning, accuracy and fluency are two equally important factors, but in China, accuracy is emphasized more than fluency. Chinese students are keenly interested in the exact words, have a low tolerance of ambiguity, and tend to focus on discrete grammar points and specific syntactic constructions (Barnhouse, 1981). Modern society needs students use English not only accurately but also fluently, so more attention should be paid to fluency in the future’s English teaching. As for teaching beginners, a solid foundation of English must be emphasized, which is primarily built on accuracy, so English teachers should use Grammar-Translation Method more in this stage . Then teachers should encourage students to use English orally with as few errors as possible, and to manipulate the language system as spontaneously and flexibly as possible. CLT is largely involved in this process. After students have mastered the language forms, they ought to be given intensive fluency practice, because although linguistic competence is the basis of communicative competence, communicative competence does not automatically result from linguistic competence (DUAN, 1992). At this stage, English teachers should not interrupt students’ practice to correct their mistakes frequently, but at the end of each fluency practice, the teacher should let students aware their mistakes, so they can avoid next time. During the whole practice, the teacher should let students use English extensively and limit the use of Chinese. Through this way, accuracy and fluency can be achieved and students’ English linguistic competence and communicative competence can both be developed. 3.2.2 Student-centered orientation  For a long time, China’s English classroom is dominated by teachers. They always stand in front of the blackboard, and talk all the time; students sitting in lines separately to listen. This kind of classroom setting is in favour of using Grammar-Translation Method in teaching, but it is not convenient to carry out students’ practice. In order to facilitate English acquisition, students need oral practice in English classroom. Teachers must ensure that classroom interactions are managed, not just by the teacher, but by all participants. To achieve this, teachers should arrange the desks in such a way that the students can look directly at one another to help create interactions among students. 3.2.3 Teacher’s role  Instead of being the master of the class, the English teacher could act as an independent participant and facilitator in English classroom. He or she facilitates the communicative process among all learners and between students and various tasks. He or she can give guidance and advice when necessary. But this does not mean in the teaching process, the teacher should only be a passive observer. Although the teacher may be nondirective in general, it is still the teacher’s responsibility to recognize the distinctive qualities in the students (HAN, 1979) and to help students develop those qualities. Of course, to perform these roles well, English teachers in China need further guidance and training to let 32 Adapting communicative language teaching approach to China’s context ï ¿ ¼them fully understand that teaching English does not consist only of teaching grammar but that the true mastery of a language involves communicative competence, and to let them know how to use CLT in their daily teaching process successfully. 3.2.4 Classroom activities  Classroom activities such as role-play, pair work and group discussion should be largely involved in English teaching. At the same time, teachers can also use any unexpected occurrence that happens during class. I still remember when I was in secondary school, I was always attracted easily by outside sights and noises. Once in an English class, I saw a very beautiful butterfly flying outside the window. It was so beautiful that I signaled my best friend to look at it. Just at this moment, my English teacher also noticed my signal. Instead of being angry, she asked the whole class to enjoy the beautiful butterfly, and me to describe it in English. Although in China, classroom activities are usually based on textbooks; English teachers can try to create activities to provide students with speaking opportunities and motivate them. 3.2.5 Changes in English test  For a long time, English examinations in China did not have oral test and the language use section. Recently, some important English tests in China developed by the State Education Development Commission began to include the language use section. English teachers can teach to the test from now on. The section was added to measure the four English language skills used for communication and it included such elements like: role-play, reading comprehension and communicative writing. Most of my students in China told me that the English examination is more interesting than ever before and they like these changes. 4. Conclusion  English teaching in China, with its traditional setting and current situation, differs from many English speaking countries. But this does not mean that the CLT approach is not applicable in China’s context. On the other hand, English teachers can use an eclectic method according to their actual situations. Adapting the CLT approach, making full use of its advantages and reconciling it with the traditional Grammar-Teaching Method, this approach can work the most effectively in China. But adapting CLT to China’s context is a very complicated process, under the guidance of the SEDC, the representatives of the central government, it should be done step by step. Right now what English teachers in China need to do is to modernize, not westernize, English teaching.

Monday, July 29, 2019

W4 D566 Sentiment & Social Analytics using Text & Web Based Mining Essay

W4 D566 Sentiment & Social Analytics using Text & Web Based Mining - Essay Example They are useful for examining the social structure and interdependencies (or work patterns) of individuals or organizations. SNA involves collecting data from multiple sources (such as surveys, emails, blogs and other electronic artifacts), analyzing the data to identify relationships, and mining it for new information† (Social Networking Analysis, 2013, p. 1). The relationships among these terminologies include the collection of information about people’s sharing of information through posts, ideas, and other communication medium and identification of some evident pattern or trend. The disparities among these terms include the use or medium to disseminate crucial information solicited through social analysis: social analytics, per se, is broader in range; while SNA specifically identified social networks as the predominant medium of information

Sunday, July 28, 2019

Locate a news article about POVERTY in order to conduct a Term Paper

Locate a news article about POVERTY in order to conduct a meta-analysis of the author's economic perspective of the issue - Term Paper Example The New York Times Article Food Stamps Helped Reduce Poverty Rate, Study Shows† is a good economic issue (ref: http://www.nytimes.com/2012/04/10/us/food-stamp-program-helping-reduce-poverty.html?_r=1) 1. In terms of providing a brief overview / synopsis of the economic issue, the article shows that the Agriculture Department mentioned food stamps continue to reduce the poverty level of the United States. The food stamps are also known as Supplemental Nutrition Assistance Program or SNAP. The food stamps project benefitted more than 45,000,000 individuals in the nation. Specifically, the food stamps program raised the average below poverty line individual’s income six percent nearer to the poverty line. 2. In terms of discussing the model or economic theory that relates to the issue presented in the news article, the economic theory that relates to the issue in the news article is demand principle. The economic theory dictates that â€Å"as the prices of goods and services increase, the demand for products and services decrease.† The theory also states that the demand for the products and services increases as the price of goods and services decline. The people who have enough money to pay for the goods and services will be the ones willing to buy the goods and services. As the prices of the goods or services increase, some of the people can no longer afford to buy the previously lower priced goods or services. Thus, the people who can no longer afford to buy the higher priced goods and services are forced to shift to the competitors’ lower priced goods and services.... Ronald King (King, 2000) theorizes â€Å"The Food Stamp Act of 1964 authorized the secretary of agriculture â€Å"to formulate and administer ‘a program under which â€Å"eligible households within the State shall be provided with an opportunity more nearly to obtain a nutritionally adequate diet through the issuance to them of a coupon allotment which shall have a greater monetary value than their normal expenditures for food.’1 The food stamp program is intended to increase the food purchasing power of low-income households to the point where they can afford the â€Å"Thrifty Food Plan, † the least expensive of the food purchasing plans developed by the U.S. Department of Agriculture.† The above quote states that the basic unit for the United States food stamps benefit program is the household. The family is described as the group of persons living under one roof who regularly buy food and prepare food in together. The food stamps program presumes that average household spends 30 percent of their entire purchasing power (computed in terms of cash on hand) on their unavoidable food needs. The food stamps program lightens the food need predicament of the family qualifying as belonging to the poverty line population of the United States. The United States government steps into the poverty level family home by giving them subsidy that is enough to close the gap between the household’s expected contribution to food purchases and the cost of the Thrifty Food Plan. The food stamps are given to the qualified families through booklets of coupons denominated in United States dollar amounts or by an Electronic Benefit Transfer card technology program. Some of the United States groceries are authorized to accept the food stamps as payment for the food bought from their

Saturday, July 27, 2019

Early Modern Architecture Essay Example | Topics and Well Written Essays - 2000 words

Early Modern Architecture - Essay Example While he was working under Behren, Mies developed a design approach that was basically based on advanced structural techniques and Prussian classicism. While still conducting his discovery on architecture he developed sympathy for the aesthetic credos of both Dutch De Stijl group and Russian Constructivism. He also borrowed from the post and lintel construction of Karl Friedrich Schinkel for his designs in steel and glass. In 1923 Mies worked with a new magazine called G which started that every year in the month of July. His architectural philosophies are greatly recognized and were a major contribution in the late 1920s and 1930s as artistic director of the Werkbund-sponsored Weissenhof project and as a director of the Bauhaus (Cohen, 2006). Mies is famously known for his dictum ‘Less is More’ and he attempted to create neutral, contemplative spaces through an architecture that was based on structural integrity and material honesty. After ages spanning twenty years of his life, Mies was able to eventually achieve his vision of a monumental ‘skin and bone’ architecture. Through his dedication, commitment, passion and hard work his later works provide a fitting denouement to a life dedicated to the idea of a universal, simplified architecture. After World War 1, he developed the interest in the skyscraper which eventually led to him studying it and he designed two innovative and ingenious steel framed towers encased in glass. One of the critically acclaimed skyscrapers was the Friedrichstrasse which was designed in 1921 for a competition albeit it was never built but it drew a lot of critical praise and it even foreshadowed his skyscraper designs of the late 40s and 50s. The very same year he desi gned the Friedrichstrasse so did his marriage end and he changed his name.

Friday, July 26, 2019

Digital tools and architectural visualization Term Paper

Digital tools and architectural visualization - Term Paper Example The report has found out that technology has changed the way designing used to be done. There is a whole lot of digital tools and computer software’s in use currently that have eased the work of an architect. Architects are using animation technologies and software’s that are projecting building in an almost real manner. The report analyses in detail the use of technology in the profession and its significance in future world of architecture. Table of Contents 1.0 INTRODUCTION 4 2.0 LITERATURE REVIEW 5 3.0 ANALYSIS OF DIGITAL TECHNOLOGY IN ARCHITECTURE 10 4.0 Digital Visualization Technical Overview 13 Benefits of the transition to digital Architectural Visualization 15 5.0 CONCLUSION 16 Revit 16 ArchiCAD 16 SketchUp 17 Rhinoceros 3D 17 AutoCAD 17 Works cited 19 1.0 INTRODUCTION Architecture is probably ranked among the world’s oldest professions of all time, it is an art in itself and only people with unrivalled creative genius were associated with the professio n. Many buildings and monuments have been built through this science right from the medieval times. Architectural design is among the professions in the world that have direct effect on us, we probably would not be seeing the kind of buildings that pride our skylines today were not for this profession. A while back architects performed their trade through sheer creativity and drawing. It called for individuals who are highly creative, good in drawing and men who were good in mathematics. We can say, it called for artists who are above the basic level, to come up with sketches and designs, it required for calculation and good drawing capability since architects did not have the advantage of technology assisted designs during their time. This is a profession that requires at most care in order not to make mistakes that will be threatening to the whole process of construction. Technology has come up with tools to help in the development of architectural designs which are more accurate and deliberate on quality to cut down on costly mistakes. All said and talked about, architecture has not gained the necessary audience and not many people care to understand the ropes. Therefore despite the improvement in technology some segments of architects have refused to move with technological tide deciding instead to maintain the traditional way of doing things. The researcher hence found it necessary to bring to light all the gains made in the architectural world primarily focusing on technology and tools available to architects to make their work stand out while improving on quality. It should be understood that the current complex designs seen in the first world countries would not have happened without complex digital technology to birth a design. Currently it is possible to build structures that seem to defy gravity and structures which respond positively to environment thanks to improved technology on architecture. Without architects great structures cannot be created, hence the researcher found motivation with the kind of progress that has taken place and needs to be known. In this report the researcher meant for it to address the following points while making them the main objectives points-: Types Digital tools used in architecture focusing also on available software’s What is visualization and how it has helped in designing The impact of technology on arc

Thursday, July 25, 2019

Policy paper Essay Example | Topics and Well Written Essays - 3250 words

Policy paper - Essay Example This is why policies undertaken by the government, nowadays, are highly valuable for economies. This report will throw light on Dodd Frank Wall Street Reform and Consumers Protection Act or the Dodd Frank Act. The Federal government primarily passed it in order to sustain atrocities of the financial crisis (2007 onwards). The context of the paper will encompass the rationale, efficiency, implementation, evaluation and recommendations regarding the law. The information and analysis of the paper will help to understand the nature of public-private dealings, taking place in the current era and its implicit value to the economy (BIS, 2005, p. 1-391). The Dodd Frank Wall Street Reform and Consumers Protection Act introduced by the Federal government was claimed to bring about a remarkable change in the history of financial services legislation in U.S. The Federal government had decided to introduce this law or policy, just after occurrence of the financial crisis in U.S. in 2007. The Act was passed for reforming traumatic monetary market conditions in U.S., since the incidence of financial crisis. Nonetheless, after its implementation, it could be said that the law was less beneficial to the U.S. economy than that expected during implementation (Stinson Leonard Street, 2013). Along with numerous sets of provisions, several implementation timeline was settled, under the regime of this law. The context of the paper tends to state that after implementation, the Dodd Frank Act still comprised certain deficiencies. At present, in 2013, President Obama has declared to conduct a special meeting with the regulators regarding this very Act. The President claimed that the Dodd Frank Act, which aimed to bring about ambitious financial reforms in U.S., was not effective in several ways. Obama stated that progress of the Act must be accelerated with renewed efforts made for bringing about productive housing and general financial reforms. The

Wednesday, July 24, 2019

Summary about the Rwanda Genocide Essay Example | Topics and Well Written Essays - 500 words

Summary about the Rwanda Genocide - Essay Example The majority called Hutu and the minority the Tutsi. Tutsi held the majority of the political power despite their small population as compared to the Hutu. In 1984, the Germans became the first colonial power in Rwanda. They realized that the Tutsi had light skins, and they were tall. To the Germans, the characteristics resembled Europeans hence they favoured them in issuing responsibilities. The First World War made the Germans lose their colonies including Rwanda (Mamdani, 2001). Belgium took over Rwanda and introduced the identity cards. The Tutsi continued to receive favour from the Belgians, leaving the Hutu behind. the Belgians gave the Tutsi leadership positions which made the majority of the population, the Hutu terribly angry. However, during Rwanda’s’ struggle for independence, the Belgians made the new self-dependent government in the hands of the Hutu. This further increased the tension between the two ethnic communities. In 1994, the year which the genocide took place, President Habyarimana while coming back from Tanzania, was assassinated. A surface-to-air missile shot the presidents plane killing everyone on board. This made the Hutu extremely angry, and within 24 hours of the assassination the slaughter had started. In Kigali, the Hutu blocked the roads and interrogated the road users. They were supposed to produce their identity cards to prove that they were Hutus. The Tutsi were killed instantly. The killings were done by the use of clubs, machete and knives. The Hutu youths who doing the killings called themselves interahamwe, this means those who strike as one. They also went after the government officials who were Tutsi and the Hutu officials who supported the Tutsi (Mamdani, 2001). This included the prime minister. Ten Belgians UN peacekeepers tried to protect the prime minister and were killed in the process. The Tutsi started running towards the hills

Genetic, Biological and Environmental Influences on School-Age Crack Research Paper

Genetic, Biological and Environmental Influences on School-Age Crack Babies in Dealing with Multiple Stimuli and Forming Close - Research Paper Example Research has shown that almost one million infants born in the USA have been at one time exposed to one of the many illicit drugs while in utero. The social effects associated with these infants or crack babies when normally present themselves clearly when these children reach age of going to school. In most cases, the stimulation process becomes very erratic and such children are faced with difficulties of dealing with these multiple stimuli and have issues when it comes to having close attachments with people around them such a teachers and other pupils (McNichol & Tash, 2001). Dealing with multiple stimuli and forming close attachments Research has shown that we have a permanent developmental, neurological and behavior consequences which could be directly attributed to the exposure on drug use by parents. One notable thing has been that parents and even academic institutions are still quite unprepared in dealing with this problem effectively (McNichol & Tash, 2001). Given the envi ronment in which such children are exposed to at an early age, it becomes difficult for them to integrate fully with the society around them. It is a known fact that children do inherit certain genetic components from their parents. The drug use interferes with a child’s development. ... Close observations made on these children have shown that they are normally persistently withdrawn from their environment and enjoy personal space more than keeping company of others. It has also been noted that these crack babies are normally prone to some sudden snaps and episodes of violent behavior as compared to other children. These have been attributed to the fact that their parents exposed them to drugs in their prenatal stage. Research has shown that infants exposed to cocaine during the prenatal stage exhibit increased risk of having motor dysfunction (Schneider & Chasnoff, 1992). Also, the risk of having intra-venicular hemorrhages is increased. Questions still abound as to the exact effect of hemorrhages when it comes to the development process. The exposure has been noted to majorly affect the central nervous system causing abnormalities to these children (Doberczak, 1988). Fulroth, Phillips and Durand (1989) noted that a number of babies who have been exposed to cocaine in their prenatal stages show signs of withdrawal from the society or the environment around them. However, some researchers did dispute this basing their argument to the fact that the duration after birth matters and that the children normally normalize after the ages of 1 to 2 years. However, 30 to 40% of those children studied showed that they experienced language development problems which were compounded by attention problems that went through their fourth year of growth (Schneider & Chasnoff, 1992). Other studies have also shown that many of the children who have been borne out of drug abuse related mothers have numerous cognitive and behavioral difficulties. This has been attributed to the environmental influences. Other studies such

Tuesday, July 23, 2019

Politics Comment 1 Essay Example | Topics and Well Written Essays - 750 words

Politics Comment 1 - Essay Example â€Å"Even after visiting the likely hiding places around Baghdad, the coalition found no convincing proof that Iraq retained stocks of chemical and biological weapons, or that Saddam had been trying to build a nuclear bomb† (Richie, p. 91). And still American troops remain in Iraq and as a result terror is being felt by the people, not from a dictatorial regime, but from being unnecessarily caught up in the crossfire between insurgents and American troops. U.S. invasion of Iraq has been an instrument of manipulation with underlying reasons not related to discovering and disarming weapons of mass destruction. â€Å"U.S. soldiers has no right to occupy a sovereign nation, outside of international law, and doubly so because it was done under false pretenses† (Tremblay, p. 203). Such false pretenses, experts claim, mask the ulterior motive of the U.S. of wanting to maintain control over Iraqi oil fields and to placate political conservatives who want to make the Middle Eas t safe for Israel (Mueller, p. 137). When the U.S Congress authorized the sending of troops to Iraq, it agreed to do so in order to â€Å"defend the national security of the US from the threat posed by Iraq† (Congressional Resolution 296-133 in the House; 77-23 in the Senate, as quoted by Levin, Editorials). With the fall of Saddam Hussein, Iraq no longer poses a threat to US security. Many experts argue that when illegal troops occupy a country, any violent means adapted by the country’s citizens to depose illegal occupants can be classified as guerrilla warfare. Guerrilla warfare is a war waged by the people to express their protest and outrage against forces that threaten their independence and sovereignty. â€Å"It is a defensive type of war against a foreign invader† (Eland, as quoted by Knickerbocker â€Å"Specials†). And interest groups emphasize that this type of warfare usually does not stop until the

Monday, July 22, 2019

Time and Truth Essay Example for Free

Time and Truth Essay The unreal in English is used to talk about things in your imagination, but which are not true. The unreal is often used with if and wish. Present Unreal Conditional The present unreal talks about the present time, life today, right now, but imagining (or wishing) something that is untrue. In a wish sentence, or in an if-clause, you use the past tense to show that the verb is unreal about the present. The main clause (often called the â€Å"result† clause) uses would: If I had a lot of money, I would buy a house. (The truth is that you don’t have a lot of money. ) If I knew Japanese, I would work in Tokyo. (The truth is that you don’t know Japanese. ) I wish I had a better job. If I had a good job, I would be much happier. (The truth is that you don’t have a good job. ) I wish I knew how to type. If I knew how to type, I would be able to get a better job. (The truth is that you don’t know how to type. ) The verb to be is always were in the unreal, no matter who the subject is: He wishes he were the mayor. If he were mayor, he would solve the homeless problem. (The truth is that he is not the mayor. ) If I were taller, I would play basketball. I wish I were six feet tall. (The truth is that you are not tall. ) Exercise 1. She doesn’t speak English, so she doesn’t understand you. If she ____________ English, she ______________________ you. 2. He can’t drive, so he won’t buy a car. If he _________________________, he _____________________ a car. 3. He isn’t rich, so he won’t buy a beach house. If he _____________________ rich, he ___________________ a beach house. 4. He eats too much, so he’s fat. If he ________________________ too much, he ___________________ fat. [Note: You need to use didn’t in this sentence. ] Past Unreal Conditional (Rick Shur, page 2 of 2) A wished or imagined idea about a past event is called the past unreal. The verb in the wish clause or if-clause is put in the past perfect (had + past participle) to show the past unreal. The main clause (the â€Å"result† clause) will use would have + past participle. When I was a child, I hated school. (This is the truth, what really happened. You hated school.) If I had liked school better, I would have studied and [I would have] learned more. I wish I had been a better student as a boy. I wish I had had better teachers, too. I wish my parents had forced me to do my homework. (The truth is that you didn’t like school, you didn’t study, you didn’t learn, you were not a good student, you didn’t have good teachers, and your parents didn’t force you to do your homework. ) If she had reminded me that yesterday was her birthday, I would have bought her a present. At least, I would have sent her a card. (The truth is that she didn’t remind you, so you didn’t buy her a present. ) I wish the Mets had won the game last night! If they had won, I would have made a lot of money. If the Mets had beaten the Yankees, I would have won $200. (The truth is that the Mets didn’t win, and you didn’t win any money. You lost! ) Exercise 1. She didn’t give me her phone number, so I wasn’t able to call her. If she ___________________________ her phone number, I ________________________________able to call her. 2. He didn’t have his wallet with him last night, so he didn’t buy the book. If he ____________________________ his wallet with him, he ________________________________ the book. 3. They didn’t get to the airport in time, so they missed their flight. If they __________________________ to the airport in time, they ________________________________ their flight. [Note: You need to use wouldn’t in this sentence! ] 4. He wasn’t able to open the wine bottle, so they didn’t drink wine. If he ___________________________ able to open the wine bottle, they _______________________________ wine.

Sunday, July 21, 2019

Attachment Styles And Romantic Relationship Outcomes Psychology Essay

Attachment Styles And Romantic Relationship Outcomes Psychology Essay Many researchers have shown a link between attachment styles and romantic relationship outcomes. Attachment styles deals with early infant parent caring and environment, internal working models of themselves, their early relationships with peer or friends and attachment security. These major attachment styles leads to the different timing of the first sexual intercourse which later shows links to relationship satisfaction, quality of romantic relationships, union formation and the number of romantic partners. The timing of first sexual activity is classified at either early age (14 or earlier), on time (15-19) or late age (19 or older) (Harden 2012). Many studies have shown that individuals prefer partners with similar attachment style, a complementary attachment style or either the attachment style most likely to form attachment security, is all dealt with the age of an individual. This theory of attachment increases the understanding of Hardens (2012) findings and explains these fi ndings by him. The characteristics and stability of teenagers romantic relationship in young adulthood is concerned with the timing of teenager ¿Ã‚ ½s first sexual intercourse. One theory that suggests reasons for the quality of this romantic relationship is the attachment theory. John Bowlby was the first Psychologist to introduce the attachment theory, describing attachment as a lasting psychological connectedness between human beings (Bowlby, 1969). The attachment theory states that people  ¿Ã‚ ½construct internal, working models of themselves and their early relationships, which function to guide social behaviour throughout their life span ¿Ã‚ ½ (Bowlby, 1973). Hazen and shaver (1987) also concluded that attachment styles may influence the quality of their romantic experiences and their beliefs on relationships. This attachment theory and peer relationships are able to explain Hardens (2012) findings that concluded that  ¿Ã‚ ½timing of first sexual intercourse in adolescence predicts ro mantic outcomes in adulthood, including union formation, number of romantic partners, and relationship dissatisfaction ¿Ã‚ ½. The essential argument of the attachment theory is if parents are not available and responsive to their children ¿Ã‚ ½s needs are likely to face difficulties in their lives. Belsky et al. (1991); ¿Ã‚ ½Belsky, 1997) ¿Ã‚ ½claimed that an individual ¿Ã‚ ½s early family environment, including the childhood-parent attachment relationship, conveys to children the risks and uncertainties they are likely to face in their lifetimes (Belsky, J. et al. 2010). It has been stated that  ¿Ã‚ ½Such information adaptively regulates psychological, behavioural, and reproductive development, either toward a mutually beneficial orientation to interpersonal relations or toward an opportunistic, advantage-taking point of view ¿Ã‚ ½ (Belsky, J. et al. 2010). This may result and affect mating behaviour, pair bonding, and parental investment, and also has been said to result earlier or later sexual intercourse, number of romantic partner, unstable or stable relationships and union formation(Belsky , J. et al. 2010). From this evidence attachment of individuals with their parents explains the results in which romantic relationships are created and built and timing of first sexual intercourse. Friendships are extremely significant during adolescence, so an individual might experience internal working models (attachment theory) of close friendships to become particularly influential during this time (Trinke and Bartholomew, 1997; Weiss, 1991).Researchers have proposed that friendship during adolescence is provided as a supplement rather than a replacement for relationships between parents and should be considered as a unique factor on adolescent functioning (Furman Simon 1998; Paterson et al. 1994). Peer relationship or friendship is known to contribute to later romantic relationship outcomes, and best known by the scholar Sullivan(1953). He viewed  ¿Ã‚ ½chumpships established in middle childhood as foundational for later romantic relationships ¿Ã‚ ½ (Madsen, S., Collins, W. 2011). A research by Neemann et al. (1995), documented that peer relationships or friendships during the age of middle adolcence influences factors such as romantic relationship involvement, numbe r of romantic partners, and relationship satisfaction and the quality of relationship in young adulthood. Furthermore, rejections experienced by friends in middle adolescence are significant issues in the development of rejection sensitivity, and the results of these experiences of rejection have been strongly correlated with dissatisfaction in romantic relationships (Downey, Bonica, Rinc ¿Ã‚ ½n, 1999). Many studies have focused on that relationship satisfaction and behavioural patterns is associated with attachment styles. Collins and Read (1990) stated that attachment characteristics were connected to the partner ¿Ã‚ ½s evaluation of the relationship, although differently for both genders. A study by Pistole (1989) investigated attachment styles and conflict resolution recorded by college students concerning their most important romance. The results indicated  ¿Ã‚ ½secure subjects reported more adaptive strategies, than insecure subjects, and adaptive strategies were associated with satisfaction relationships ¿Ã‚ ½ (Pistole 1989). In a previous study by Kobak and Hazan (1991), examined married couples and asked them to complete attachment styles and martial satisfaction measures and to contribute in behavioural and martial interaction tasks. The results concluded that there is major relationship between security of attachment and both partners martial satisfaction (Senchak, M. and Lenonard, K. 1992). Both of these studies suggest a connection between attachment styles and evaluation of relationships, and behavioural conflict which leads to relationship dissatisfaction and union formation (Senchak, M. and Lenonard, K. 1992). Adult attachment style may determine an individual ¿Ã‚ ½s, sense of security, and how felt security is sought, in order to be successful in achieving this goal is most likely dependent about their partner ¿Ã‚ ½s attachment styles and behaviour (Holmes, B. and Johnson, K. 2009). Individuals that will show preference towards partners with similar attachment characteristics to their own is called the similarity hypothesis (Holmes, B. and Johnson, K. 2009). Gaining insight of the similarity hypothesis, the application of self-enhancement theory, which proposes individuals will to enhance their self-image, will have a strong desire for positive feedback from others (Baumeister, 1982; Greenwald, 1980; Jones, 1973; Kaplan, 1975). From this theory, it represents that individuals might prefer partners on the basis of their attachment style. The results of this theory indicated secure individuals would prefer securely attached partners and would allow for the experience of confidence and i ndependence (Holmes, B. Johnson, K. 2009). However, insecure individuals, it is predicted that the preference of partners becomes more problematic (Holmes, B. Johnson, K. 2009). Both of these theories predict secure individuals demonstrate preference to one another while variations exit in the preferences of insecure individuals (Holmes, B. Johnson, K. 2009). Overall it can be seen from the above evidence, that the attachment theory can be an explanation for Hardens (2012) findings. From the attachment theory it is predicted that early parent-child relationships are influences of later love relationships. A major function of attachment relationships is to provide feelings of security (Sroufe Waters, 1977). The internal working models of an individual and attachment styles determines and individual ¿Ã‚ ½s quality of romantic outcomes, stability and number of romantic partners. The studies mentioned above supports this, and strongly suggest an explanation for Hardens (2012) findings. Peer relationships or friendships, a part of attachment styles is also known to influence individuals during middle adolescence and known to contribute to romantic relationship outcomes, number of romantic partners, union formation. These finding give a greater insight into the human psyche.