Friday, April 3, 2020

Yukon Jack Essays - Klondike Gold Rush, Jack London, White Fang

Yukon Jack The short lived life of Jack London is a direct reflection of his literary works major theme, the struggle for survival of strong men driven by primitive emotions. ?To Build A Fire? and White Fang are two of his works that coincide his life experiences and illustrate his literary theme. London was born the illegitimate son of W.H. Chaney and Flora Wellmen in 1876. He never saw his biological father and his mother had little to do with him. Eight months after his birth, his mother married a man named John London. This is where Jack received his name. Even with his new family, that included two step-sisters, Jack still received little time or love from them. ?He claimed to have felt that he was a boy without a boyhood? (Marshall 749). In ?To Build A Fire,? a man is on a journey through the Yukon. He takes this journey alone, and therefore must face all challenges alone. This is much like the childhood of Jack London. London had to accept all challenges and obstacles in his childhood alone, because his family was not there to support him. Both Jack London and the man in ?To Build A Fire? are in control of their own destiny. As it turns out for the man in ?To Build A Fire,? he faces his death because of his solitude. ! London may be implying that if he had someone to guide him through the early stages of life, he might have turned out to be a more fulfilled and successful person. 2 By the age of twenty-three, London had held a numerous variety of jobs. He had been everything from a newsboy to an oyster bed pirate. He even bummed his way through the United States. In 1897, he traveled to Canada to try his luck in the Yukon Territory gold rush. This is the motivation behind his 1906 novel, White Fang. White Fang Centers around the ability of a man, through love and kindness, to tame a savage wolf, and turn it into a loyal domestic animal. This may not be relevant when talking about the relationship between London's life and the novels theme. What is relevant though, is that the story did take place in the Yukon, a place where London had been during his life. The story contains struggles of man's survival against nature, maybe London's own survival against nature. London could also be portraying his survival against life in general. During the same time period, London had evolved a working philosophy from Karl Marx, Herbert Spencer, and Friedrich Nietzsche which explained the world of his experiences to his own satisfaction. ?These experiences persuaded him to join the Socialist Labor Party and crusade for worker's rights? (Kennedy 118). Even though London claimed to be a socialist, he contradicted his belief in socialism with his individualistic notion of the survival of the fittest. In the short story ?To Build A Fire,? London shows us what happens to the weak. The man freezes to death and the dog survives. London maybe using this story to expand on his survival of the fittest belief. In order for a man to survive the potentially blizzard cold temperatures of the Yukon, he must not only be in top physical 3 condition, he must also be equally fit psychologically. The dog in ?To Build A Fire? had both, a physical conditioning and a mental instinct, something London saw in himself. The man in the story experiences regret for not following the advice given to him earlier, but the dog presses on without regret or pity for the man, the same way London treats life. London began writing in early adulthood. He found it was the easiest way for him to make money. His literary apprenticeship was comparatively short. He started by writing for a local newspaper in San Francisco, and before long the entire country took a liking to his work. London had published his first book, The Son of the Wolf, in 1900. Also in 1900, London married his first wife, Bessie Madden. In 1903 he had left her and his daughters to marry Charmian Kittredge. Shortly after their marriage, London had left his second wife. London had always longed for a

Sunday, March 8, 2020

Research Paper on DNA

Research Paper on DNA Deoxyribonucleic acid is present in all organisms. Whether it is mammal, bird or bacteria DNA is responsible for a functioning organism. Looking at the two tables provided, there are some noticeable trends that could be identified, as well as conclusions that can be derived. The idea that more complex organism have more DNA mass per cell, that the mass of DNA in somatic cells is constant (there is a range but it is very slight) for any particular organism, that sperm cells are haploid cells and that all organisms have DNA present in their cells are ideas present from the tables provided. The fact that all of the organisms, whether it is mammal, bird or fungi have a mass of DNA present in their cells shows that DNA is present for a reason. If a mammal has an approximate DNA mass in each cell of 6pg and birds have an average DNA mass of 2pg per cell then this DNA has to have a specific function in the body, which explains its initial appearance in each cell. Also, because the organism has a DNA mass in each cell then DNA would have to be passed from the parents onto their offspring. The masses of DNA in the somatic cells of the chicken are all approximately the same. The DNA mass found in a heart cell of the chicken measured at 2.45 pg while the mass of the DNA in each kidney cell weighed at 2.50pg. This can be explained by the fact that when an egg is fertilized by a sperm cell, the fertilized egg eventually becomes the starting point for all the different cells. During the process of mitosis, the fertilized egg is duplicating to form a cluster of cells, while doing so the DNA is also being duplicated and eventually these cluster of cells will become specialized for different functions in different areas of the body. The small but notable variance in the value of masses of the somatic cells can be attributed to experimental error. More complex organisms have a higher DNA mass content per cell. Per cell a mammal has a DNA mass content per cell of 6 pg while a bird has an average DNA mass content of 2pg. The mass of DNA present in each of the cells is dependant on how complex the organism is, the higher the complexity the more DNA that is needed for the organism to function with its internal functions. Since there is more information for the organism itself, then the DNA mass will increase. From the tables provided the mass of the DNA found in sperm cells can be noted. While the mass of DNA seems to fall in the same range for all the different cells in the chicken’s body, the sperm cell is an odd case. With a mass of DNA of 1.26 pg the sperm cell holds the smallest number, as well as the number that does not fit in with the rest of the other values assigned as values for DNA in the different parts of the cells in the chicken’s body. This can be explained by the fact that the sperm cell is a haploid cell, and that it carries half the DNA that an organism will eventually obtain, the other half coming from the egg. If the sperm cell, with a DNA mass of 1.26 pg were to fertilize the egg (which has a DNA mass of 1.26 pg), the resulting organism will have a DNA mass of 2.52 pg. This value fits in with the rest of the values observed in the second chart. It can be noted that DNA is passed on from both the sperm and egg cell. The initial presence of the DNA in each of the organism’s cells, the fact that the mass of DNA in each of the somatic cells of the chicken is approximately the same, that sperm cells carry half of the mass of DNA of an ordinary somatic cell, and that more complex organisms have a higher DNA mass content per cell than lower organism are ideas present in the tables. From these four points extracted from the tables DNA seems to be an important component for each organism responsible for carrying information.

Thursday, February 20, 2020

STRATEGIC MANAGEMENT Essay Example | Topics and Well Written Essays - 3000 words

STRATEGIC MANAGEMENT - Essay Example A business is said to have competitive advantage when it is able to utilize its resources as well as competencies to generate a value-creating strategy that its competitors find difficult to copy for their business (Fitzroy and Hulbert, 2005, p. 201). Competitive advantage is the influential power of a firm that in turn convinces the potential customers to buy its products or choose its services rather than its competitors’. Hill and Jones (2009, p. 74) argued that firm can be said to have attained competitive advantage when its profitability is greater than the average profitability of all companies in the industry and this become ‘sustainable’ when the firm is able to maintain above average profitability over a number of years. Fierce competition among firms resulted in varying levels of performance as individual firms may choose to pursue different objectives and strategies to gain increased profits, sales growth, better market share, and cash flow and so on. S trategy has got significant stance in the competitive business landscape and that has become the cornerstone to achieve competitive advantage. Successful firms are those that demonstrate long-term advantage over its competitors with their ability to do its core business activities better than how its rivals do in the market. As firms are highly focusing on achieving competitive advantage, they are attempting to find the best way to position itself against its rivals by using and implementing business-level strategies. Business-level strategy is the plan of action that managers adopt certain methods and ways to effectively use company’s resources and distinctive competences to gain competitive advantage over its counterparts in the market (Hill and Jones, 2011, p.119). Michael Porter, often credited as father of modern business strategy field, has profoundly impacted modern thoughts of management and business strategies through his works ‘competitive advantage’. H e wrote that competitive advantage is at the heart of any business strategy and it is extremely important for a firm to make a choice about the types of competitive advantage if it seeks to attain competitive advantage (Porter, 2008, p. 12). Michael Porter argued that firms, no matter they operate nationally or internationally, face an issue of strategic choice in relation to generic strategy. The basic generic strategy described by Michael Porter involved competing either on the basis of low-cost strategy or product differentiation strategy. He argued that a company’s position in its concerned industry can be determined by its competitive advantage and its competitive scope (Gilles, 1996, p. 214). He suggested that each of the generic strategies involved a basically distinctive route to achieving competitive advantage and he recommended a choice for type of competitive advantage a firm may consider for the strategic target. Michael Porter illustrated the combination of compe titive advantage and competitive scope through a two-by-two strategy choice matrix as illustrated below. The above depiction of the generic strategy illustrates that cost leadership and differentiation strategies pursue competitive advantage in quite a broader range of industry areas whereas focus strategies tend to vary largely from industry to industry since it represents narrow market segments. Since there are different strategies to achieve competitive advantage and all their routes are different from each other, it is very important that a firm should take a choice among them in order to see and implement the best appropriate strategy for the firm. Michael Porter stressed

Wednesday, February 5, 2020

Black community of America Essay Example | Topics and Well Written Essays - 2500 words

Black community of America - Essay Example Same applies to the political system. According to Professor Greenburg, there is a slight difference between white and black children, when it comes to political system, because the black children a they grow older become less supportive. The blacks are really 'invisible men' when it comes to political region. Possible racial differences in political socialization are persisting. Meredith v Jefferson had been an interesting case showing a small flaw in the policy of modern schooling. Education system in America over the years had been painstakingly non-racial. Americans have been happy over the education policies that treated the children equally, irrespective of class, region, creed and race. Minority children had not been marginalized in any way. Still, in Kentucky's Jefferson County, some Black children were subjected to long journeys up to three hours to reach schools and return, for the simple reason, because there existed a law saying that every public school should not have more than 50% black student population, but not less than 15%. The law existed not due to racial discrimination, but only because it was thought not to have too overwhelming a majority of any race. Only a minority number of students were affected due to this law, resulting in long journeys spending more time than they should to reach school and back home. It was also argued that ch ildren and their parents were kept out of the entire community because they go to a far off schools and that community could not belong to them as they were not part of it. "The current arrangement, instituted in 2001, has some students being bused cross-county, taking up more time per day than most students spend in transit in several weeks. It poses obvious logistical issues and detaches children and their parents from the communities they call home, parents say" http://docket.medill.northwestern.edu/archives/003698.php Parents were also upset about the long process of annual admissions to magnet and non-magnet schools, and brought a civil suit against the county in the US District Court for the Western District of Kentucky. The claim was that their children's equality rights have been violated, and this particular act was against the 14th Amendment on the Equal Protection Clause and the District Court upheld this claim and gave the following ruling:"The 2001 Plan is a proper 'fit' because it is sufficiently flexible to determine school assignments for all students by a host of factors, such as residence, student choice, capacity, school and program popularity, pure chance and race." (ibid). It also opined that the plan was 'narrowly tailored' and should not have been based on race alone, which could give a discriminatory color to it, because America is not a separated society any more, like it was in the 1950s. The attorney representing the county argued that a small amount of inconvenience is negligible while comparing to the diversity that prevailed due to the plan in educational institutions. The plan came into existence in 1975 and under this plan, the Board maintained the same system for 25 years. POLITICAL

Monday, January 27, 2020

Vehicle-to-Infrastructure (V2I) Architecture

Vehicle-to-Infrastructure (V2I) Architecture   Introduction Vehicle-to-Infrastructure (V2I) architecture allows multiple vehicles to communicate with the roads infrastructure. This is then directed towards a central tower that allows multiple vehicles to operate on the same bandwidth. This helps all servers maintain the acceleration and position of all vehicles on streets and roads. This assists in determining everything such as fastest path and/or nearby accidents. Because of this, traffic safety enhancement is the largest factor when it comes to obtaining data from vehicles on and off the road. Also roadside infrastructures are included to provide warnings to vehicles about weather and accidents on its path. For this process to work, gathered speeds and locations within the proximity are reported to the server then to the other vehicles. Because of the large number of vehicles on the road, a central server is needed to relay all the data to each individual vehicle. Dedicated Short Range Communication (DSRC) There are multiple infrastructures that a vehicle can communicate with such as other cars or a control building. Vehicle to Vehicle (V2V) lets multiple vehicles communicate with one another on a given network. DSRC works as a two-way short-range wireless connection. It works similar to WiFi since it allows vehicles to exchange data such as speed, distance, position, and mass of separate vehicles [7]. The primary use of DSRC is for collision prevention. These are achieved by frequent data exchanges among vehicles within a certain range. Each vehicle that utilizes DSRC, casts data from the vehicle to neighboring vehicles multiple times per second within a range between 100-1000 meters in a radius based on the technology [8]. Each vehicle also receives safety messages to warn other vehicles of collisions that the vehicle is driving towards to prepare the driver for what is ahead. Even though DSRC is mainly for collision prevention, it can also be used for assisted navigation such as GPS , electronic payments for tolls, improved fuel efficiency and present traffic updates. According to the U.S. Federal Communications Commission, there is an allocated 75 MHz of licensed spectrum in the 5.9 GHz band for DSRC [9]. This is what the Dedicated is DSRC refers to. This spectrum is divided into several channels. Safety messages are exchanged on Channel 172 and have been designated for safety among vehicles [12]. The term Short Range in DSRC is meant to convey that the communication takes place over a few hundred meters which is shorter than cellular and WiMax services. DSRC communication relies on a manufacturer based standard among devices from different manufacturers for interoperability. The concept of proposed system architecture is shown in Fig. 1. In the United States, vehicles operate on a 5.9 GHz band to operate DSRC. This is then divided into seven 10 MHz channels [11]. Because its running on a 10 MHz channel, all frames within a modulation takes only half as long to transmit than on a 20 MHz channel. This helps reduce collision probability for every f rame transmission per second. Vehicular Ad-Hoc Network (VANET) In VANETs, a vehicle moving along streets in an urban city establishes a network among themselves. Since its development, there have been an increase in commercial and research. In VANETs, mobile nodes are the travelling vehicles since it has high mobility and speed. The main disadvantage of VANET is that the network topology changes rapidly to other forms of vehicle communication. Since VANET equipped vehicles only move on predefined streets, they do not have problems for resource limitation. It is possible for vehicles to obtain a geographic position by using GPS. This can provide good time synchronization through the network. Vehicles within a VANET infrastructure moves within the constraints of traffic flow. This is done while communicating with others. Ad hoc networks use less specialized hardware for infrastructure support. This allows all the stability of the network to be placed on individual nodes. Without dedicated communication hardware, there are other methods placed to attempt to optimize the networks communication to develop a hierarchical based system within the network to help with clustering. To support the VANET environments dynamic nature, clustering must be updated every so often to reflect geographical changes with vehicle movements. The networks clustering must be extremely quick to minimize time lost within the network [13]. VANET has a set of unique characteristics to aid in traditional ad-hoc devices on a mobile network. VANET with high dynamic topology, enough energy and storage space, moving track predictable and diversified automotive network scenarios, has many significant applications in transportation and communication, such as vehicle safety, road traffic efficiency, and information and entertainment [14]. VANET does not have a difficult time when it comes to vehicle shadowing. This happens when a smaller vehicle is shadowed by a much larger vehicle which complicates its communication with infrastructures on the road. In a VANET system, the synchronization between vehicles at a particular speed might be fast due to the networks topology modification [15]. Keeping vehicles anonymous with its data such as the location of vehicles on highways are unidentified to each other. Periodic data exchanges from individual vehicles explain direct infrastructures/vehicles about its position. Yet, the address- position map (APM) will vary frequently because of the relative movements among neighboring vehicles. It is the receivers responsibility to determine the relevance of important messages and decide on appropriate actions [15]. For a VANET system, location based broadcast to other vehicles is the most suitable communication technique when it comes to collision avoidance. Location-based information is an extremely vital measurement when it comes to distance and speed within a VANET system. Geographical routing protocol is important for VANETs since all nodes can determine their own position. All nodes know the position of their direct neighbor. The source node knows the location of the destination. Geographical routing protocol for VANET is more suitable for routing because it doesnt necessarily need route maintenance and does not occupy more bandwidth. Global Positioning System (GPS) The Global Positioning System (GPS) is frequently used in road navigation. Global Position System (GPS) based vehicle tracking is an important application when dealing with mobile Geographic Information system (GIS) in V2V communication. Using GPS for V2V communication has many benefits. One of the main benefits of using GPS is that it is based off of geographic location with a satellite. The main downside of using this technology is that the connection can be lost when driving through a tunnel or a parking garage. There is a plethora of applications to be utilized for GPS vehicle communication. This includes shortest path algorithms based on distance or traffic in a busy city. One of the downsides to GPS is not getting an accurate position for neighboring vehicles to use for data communication with other vehicles. GPS, however, can be used in conjunction with other forms of V2V communication to achieve accurate data that is necessary to relay information to and from one another. One form of this is GPS used in conjunction with DSRC. DSRC gives local data amongst vehicles within a short distance [8], GPS is then used to relay the data that was gathered kilometers away based on the information given from another district that the vehicle is heading towards. In general, GPS devices are used more to navigate rather than to be used for Vehicular communication. It allows needed information such as speed, location, and distance to be communicated from the satellite to the vehicle. Differential Global Positioning Systems (DGPS) can limit the amount of errors from GPS by minimizing or removing them. These include ionospheric effects which affect the propagation of radio waves to and from the vehicle and the tropospheric delay which receives and processes an algorithm to attempt to model or predict the impact of the signal travel time. DGPS is accurate compared to GPS since it gets the information of the vehicle up to a miniscule accuracy. DGPS assists autonomous vehicles with other peripherals to help vehicles accomplish driving tasks such as staying in lane, collision prevention, and checking for speed limits. Even though DGPS is only off by a few centimeters, there are ways to improve its performance. A common solution is integrating with an Inertial Navigation System (INS) [16]. The most common configurations integrate DGPS with high performance 6 degree of freedom INS units. Existing methods for this includes separated INS and GPS units and embedded GPS with INS hardware [17]. GPS/INS integration is typically some form of a Kalman filter (KF), which uses a series of measurements over time. KF based GPS/INS integration can be classified into two categories. GPS-aiding INS where each state in the EKF are INS sensor errors; and the inputs to the EKF are measured between INS and GPS. And INS-aiding GPS where the extended KF states are the INS integration states and the extended KF inputs are GPS measurements [18]. Medium Access Control (MAC) The default MAC layer protocol in V2V Communications uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) to avoid collision. A node within the networks infrastructure can sense the communication channel and begin to send out messages once the channel becomes free. However, if two nodes cannot sense each other attempt to send messages to a similar destination concurrently, then both transmissions will fail and retransmissions will be needed. This problem is called the hidden terminal problem. Another type of delay comes from redundant transmission. A vehicle may receive the same message multiple times from different senders. These redundancies will postpone the transmission of other emergency messages. Many solutions have been proposed to reduce the V2V Communications delay. For the interference delay, the key is to let nodes in the interference range transmit at different time, i.e., assigning different transmission slots to these nodes. Decentralized MAC protocols are suitable for vehicular networks due to the dynamically changing set of vehicular nodes [19], and the MAC protocol combining the aspects of centralized and decentralized protocols is proposed in [20]. Each cycle begins with a beacon message from an access point (AP), where the message contains information on the AP and the number of backoff slots. A cycle consists of reassociation slots, data contention slots, and data transmission slots. Based on the slot occurrence information on the previous cycle, the estimation of the number of active nodes and the decision of contention slot size are performed. The MAC protocol is designed for single-rate wireless networks.

Sunday, January 19, 2020

Short Skirt, Long Jacket :: Personal Narrative Writing

Short Skirt, Long Jacket After stuffing my brains with knowledge of Communication, Controls, and Signal Processing and then force-feeding my eyes with 150 pages of text for my literature class, I leave the library dispirited and walk slowly home. My mind has left my body and is hovering overhead, observing me go through the simple motion of placing one foot in front of the other on the sidewalk. What seems to be an effortless action is actually a complex system of muscles, nerves, and electric impulses that culminate in a carefully rehearsed pattern, the perfected sloppy shuffle of my feet. Totally discouraged and ready to go to sleep, I enter my room and continue with my automated performance for my suspended self. The first thing I do when I get back is to take out my contacts. Since it also happens to be Sunday, I must add an enzymatic cleaner tablet to the storage solution. I do this with an efficiency that would put any clock to shame. I then drag myself to the bathroom sink and brush my teeth, returning to my room to Oxy cleanse my face. I briefly toy with the idea of wearing my retainers but decide against it and leave them to hibernate peacefully in their protective plastic yellow case. When I am done with this ritual, I indulge myself with the thought of falling asleep, but I know I have work waiting for me. It’s two o’clock and my brain is still good. I marvel at its ability to think, at its ability to perform under such adverse conditions. However, those superior skills tend to annihilate their own greatness when the part of my brain that finds ways to procrastinate continues to be productive. My blinding intelligence formulates some complex string of logic that tells me it is okay to give up, and I begin to head for bed, but then I remember†¦I have Cake. I want a girl with a mind like a diamond. I want a girl who knows what's best. I want a girl with shoes that cut and Eyes that burn like cigarettes. No, not cake the dessert, although I enjoy that also. That kind of cake tends to appear on birthdays, which is when I will consume it, but for everyday pleasure there are Pop Tarts from the vending machine.

Saturday, January 11, 2020

Dota Addiction Effects in Academic Performance Essay

INTRODUCTION As time continues to run, our world keeps getting more advance and modernize and until now, it doesn’t stop. One of the finished products of modernization is the machine called â€Å"Computer†. Since, it was invented and being developed, it gives us benefits and brings significance and importance to our lives. But as we all know that when things are not used properly, there’s always a negative effect that occurs. It can be in our thoughts, behaviors, actions, and or in other ways. Computer games are slowly arousing and it is one of the things that bring the negative effect. Many people are playing and having so much fun with this that can be a form of entertainment. DOTA is one of the examples of computer games. And this is whereour topic began to star. DOTA means Defense of the Ancients. It is commonly the word that we can hear on most people especially the youth and some actually doesn’t have any idea about it. We usually observed some students talking about â€Å"Laro tayo DOTA mamaya.† or â€Å"We play DOTA later.† not going straight at home after school. It captures our attention when we are hearing those students talking about the thing DOTA .and actually; we observed that it affects their behavior especially in academic standing. Defense of the Ancients (DOTA) is a custom scenario for Warcraft III, based on the â€Å"Aeon of Strife† map for StarCraft .The objective of the scenario is to destroytheopponents†Ancient.† The two team’s ancients are heavily guarded structures at opposing corners of the map. Players use powerful units known as heroes, and are assisted by allied heroes and AI-controlled fighters called â€Å"creeps†. As in role-playing games, players level up their hero and use gold to buy equipment during the mission. The scenario was developed with the â€Å"World Editor† of Warcraft III: Reign of Chaos, and was updated upon the release of the Warcraft III: The Frozen Throne. There have been many variations of the original concept; currently, the most popular is DOTA All-stars, which has been maintained by several authors during development.Since its release, Allstars has become a featureat several worldwidetournaments, including Blizzard Entertainmentâ€℠¢s Blizz Conand the Asian World Cyber Games, as well as the Cyber athlete Amateur and Cyber Evolution leagues; Gama sutra declared that DOTA was perhaps the most popular â€Å"free, non-supported game mod in the world†. The map has gone on to influence other maps and games, including the upcoming strategy game Demigod. DOTA GAMES have now been with us for over 30 years. The Atari 2600 is nearly 25 years old. Civilization is now nearly 10 years old. Yet, many Americans fail to recognize these complex achievements as more than fads or child’s play. Ask most people what they think about video games, DOTA and many will respond that they’re a waste of time. Many critics argue that games produce socially isolated people or promote violent behavior. DOTA games are simple, mind numbing entertainment. Playing games is a waste of time. Some of these criticisms may (or may not) be true, but to view all game playing through this lens is to ignore the broader history of games and the diverse range of game playing experiences available. In fact, the DOTA games sales charts reflect this diversity. The Sims Theâ€Å"animated dollhouse† game where players create and play out digital fantasy hous eholds has dominated the charts for 18 months straight. There are so many computer games which is being addicted by the children or students either in high school and college and even the elementary really like the DOTA games or video games. Today millions of students has been playing DOTA games and become their habits it is so hard for them to avoid playing DOTA games. It is a big Physical and Psychological effects for them mostly to their studies. According to Guinsoo, the creator and the first head developer of Ice frog, he and his men (including â€Å"Buff Me Please† who had retired a few months ago) created DOTA in 2003 as a customized game in Warcraft 3: Reign of Chaos created by Blizzard Entertainment. DOTA is popular not only here in the Philippines but also in other countries like Germany, United States of America, Canada, Slovenia and England. This phenomenal PC game had released many versions, and the latest version of DOTA is DOTA All-stars 6.70. Most of its players are males, for about 94%, and the remaining players ar e females. From elementary, high school, college, out of school youth and even adults, DOTA dominates the gaming life of most gamers. DOTA offers a variety of game modes, selected by the game host at the beginning of the match. The game modes dictate the difficulty of the scenario, as well as whether people can choose their hero or are assigned one randomly. Many game modes can be combined, allowing more flexible options. As DOTA arises, many issues also arise. It may be about on relationships, peers, foes, and most especially, education. This introductory message will begin to tackle the effects of playing Defense of the Ancients in academic performance among male freshmen college students of freshmen in academic year of 2010-2011. Backgrounds of the Study Technology today is very advanced and widely used by people in working, studying, communicating, and even for games and entertainment. Games are very popular with teenagers these days. It entertains them and made them have fun. â€Å"Responsible gaming is an attitude we need if we are engage into Computer Game. Developing this attitude is not a personal choice alone, it requires the participation of society (parents, school, game developer and government). Statement of the problem This research seeks to evaluate the effect of DOTA game in academic Performance of Information Technology Students of STI Education Services Group Inc. Semester 2012 – 2013. 1. Is there a significant effect in DOTA addiction to the academic performance of Information Technology Student of 2nd semester 2012- 2013? 2. Number of time spent in playing DOTA games. CONCEPTUAL FRAMEWORK This chapter presents different approaches which may be necessary to the development of this paper work. For better understanding, the researchers have sought other perspective to further discussion. Independent variableDependent variable Number of time spent in playing DOTA games Academic Performance of Information Technology Student ASSUMPTION Assumptions The researcher came up with following assumption as the basis of their studies: DOTA game affects the academic performance of Information Technology students of STI Education Services Group Inc. 2nd semester 2012-2013. HYPOTHESIS There is no significant effect DOTA game to the academic performance of Information Technology Student of STI Education Services Group Inc. 2nd semester 2012-2013. Significance of the Study The findings of this research may benefit the students, teachers as well the researcher. The result of this study will lead to the improvement of the academic performance of Information Technology Students. The result will benefit the student the awareness the effect DOTA addiction to their Academic performance and knowledge on the magnitude of effects whether it is health, study, social, and family and even money issues. SCOPE AND THE LIMITATION The study to determine the significant effect of DOTA to the academic performance of INFORMATION TECHNOLOGY Students of STI Education Services Group Inc. 2nd semester 2012-2013. The available Academic Performance Rating of Students Of 2nd semester 2012-2013 in the registrar’s Office will be used a basis of research study. Scope of Key Terms These terms are defined operationally for in depth understanding on the use of the words in the research DOTA– is a game expanded from version of War of War Craft, defense of the Ancients is a custom scenario for Warcraft III Information technology (also referred to as IT)- is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. The term is commonly used as a synonym for computers and computer networks, but it also encompasses other information distribution technologies such as television and telephones. Humans have been storing, retrieving, manipulating and communicating information since the Sumerians in Mesopotamia developed writing in about 3000 BC, but the term â€Å"Information Technology† in its modern sense first appeared in a 1958 article published in the Harvard Business Review; authors Leavitt and Whisler commented that â€Å"the new technology does not yet have a single established name. We shall call it information technology (IT).† Based on the storage and processing technology employed, it is possible to distinguish four distinct phases of IT development: pre-mech anical (3000 BC – 1450 AD), mechanical (1450–1840), electromechanical (1840–1940) and electronic (1940-present). This article focuses on the most recent period, (electronic) which began around the year 1940. CHAPTER II Review of Related Literature The researcher cited related studies in local setting and foreign setting in order to support the present study. This will help the researcher to determine the similarities and differences of past studies obtain the aspect of the problem that is critical. And to determine the importance of this study. Concept of Intelligence Individuals differ from one another in their ability to understand complex ideas, to adapt effectively to the environment, to learn from experience, to engage in various forms of reasoning, to overcome obstacles by taking thought. Although these individual differences can be substantial, they are never entirely consistent: a given person’s intellectual performance will vary on different occasions, in different domains, as judged by different criteria. Concepts of â€Å"intelligence† are attempts to clarify and organize this complex set of phenomena. (Sternberg & Detterman, 1986). Such disagreements are not cause for dismay. Scientific research rarely begins with fully agreed definitions, though it may eventually lead to them. The Psychometric approach ever since Alfred Binet’s great success in devising tests to distinguish mentally retarded children from those with behavior problems, psychometric instruments have played an important part in European and American life. Tests are used for many purposes, such as selection, diagnosis, and evaluation. Many of the most widely used tests are not intended to measure intelligence itself but some closely related construct: scholastic attitude, school achievement, specific abilities, etc. Tests of intelligence itself (in the psychometric sense) come in many forms. Some use only a single type of item or question; while some instruments have different types of items, both verbal and nonverbal tests. Test-takers may be asked to give the meanings of words, to complete a series of pictures, to indicate which of several words does not belong with the others, and the like. Local setting As in any situation where new technology is introduced to the Filipino youth, the social impact of the Internet is being looked at. One social problem that has been observed is that the Internet cafà © has become mainly game centres. About one-half to two-thirds of the computers in a typical Internet cafà ©, according to one study, are devoted to games (violent and gory games). The use of the remaining computers was roughly split between browsing, email, online chat, word processing and research. The Internet cafà ©s have become not just game centres. They are becoming centres off addiction among the youth, mostly boys, including elementary school pupils. Accordingto one concerned Internet cafà © entrepreneur, â€Å"Internet cafà ©s are seducing youths to a new form of addiction, one which may not destroy their bodies as drugs do, but which is certainly twisting their minds. To the young play is reality and reality is play.† (Maslog C. (1998) Internet and Social Issues, Philippine Communication Today, Quezon City: New Day Publishers). Games come in many forms and style; like clothes, but unlike clothes however, you cannot wear them and it isn’t food so you cannot eat them. So why are people going gaga over such an ironically powerful phenomena? The answer lies in us, as human. Foreign Setting Lepper, M. R. &Gurtner, J (2000), states that prolonged and excessive use of these games can cause, mainly upon children, a number of physical and psychological problems which may include obsessive, addictive behavior, dehumanization of the player, desensitizing of feelings, personality changes, hyperactivity learning disorders, premature maturing of children, psychomotor disorders, health problems (due to lack of exercise & tendonitis), Development of anti-social behavior and loss of free thinking and will. Anderson and Bushman (2001), found that across 54 independent tests of the relation between video game violence and aggression, involving 4262 participants, there appear to be five consistent results of playing games with violent contents. Playing violent games increase aggressive behaviors, increases aggressive cognitions, increases aggressive emotions, increases physiological arousal, and decreases pro-social behaviors. Since most electronic games are violent, children below legal ages are emotionally disturbed and caused several changes on their behavior. Austin, Pinkleton & Fujioka (2000), quoted that â€Å"parental meditation is correlated with better academic performance. And has been shown to increase beliefs in social norms, and to decrease fear.†Which refers to the parental consent of the player as they play a violent-oriented game. Gentile & Walsh (2002), wherein 55% of parents said that â€Å"always† or â€Å"often† should parents put limits on the amount of the time their children may play computer and video games, and 40% said they â€Å"always† or â€Å"often† check the video game rating before allowing their children to buy or rent computer or video games. Even through these numbers are not particularly high, they may overestimate the amount of parental monitoring of children’s video game play. DOTA basically is a game expanded from version of War of War Craft, which initially a strategic game similar to Red Alert series. But eventually evolved into current state. Gamers can play DOTA on a wide range; from single player, local LAN, or LANover internet connection with various countries’ gamers. There contain variety of Heroes to be chosen as your character, there are many type of gaming modes, and different type of map for the game modes. There’s no need for me to explain how the game is conducted and the features of the game. Because there are lots of gamers who are more expert than me exist in the DOTA community. For me, this DOTA is not a difficult game for amateur; you can start play DOTA anytime and familiar with this game easily over 2 or 3 days. But one thing to remind you is, DOTA is not easy to master and play like a Pro. You can take up to several years spent on this game but still behave like amateur. There are lots of effects which DOTA brings to our society, to be particular, the youth. Bibliography * ](2011, 02). The Effects of Playing Defense of the Ancients in Academic Performance Among Male Freshmen College Students of Freshmen in Academic Year of 2010-2011.. StudyMode.com. Retrieved 02, 2011, from http://www.studymode.com/essays/The-Effects-Of-Playing-Defense-Of-580808.html * http://www.scribd.com/doc/43813815/Impacts-of-Dota-in-Students * (2011, 03). The Effects of Dota. StudyMode.com. Retrieved 03, 2011, from http://www.studymode.com/essays/The-Effects-Of-Dota-626652.html * (2011, 04). Dota: Recreation or Addiction?. StudyMode.com. Retrieved 04, 2011, from * â€Å"//en.wikipedia.org/wiki/defense_of_ancients† * (Maslog C. (1998) Internet and Social Issues, Philippine Communication Today,Quezon City: New Day Publishers) * Lepper, M. R. &Gurtner, J (2000), United States= * Anderson and Bushman (2001) * Austin, Pinkleton& Fujioka (2000) * Gentile & Walsh (2002)