Friday, October 18, 2019

Operations Decision Paper Research Example | Topics and Well Written Essays - 1000 words

Operations Decision - Research Paper Example The managers need to develop the skills of handling all the operational problems that arise during the course of decision making. It is important that all the environmental factors are taken into account so that the managers have all the information about the internal and external factors important for the organization’s improved performance and make effective decisions with utmost ease. In order to achieve the maximum level of operational efficiency, the managers need to make sure that they allocate the resources appropriately and utilize them in the best possible manner; the decision for resource allocation is very crucial and it is important that all the factors are properly taken into account. In case of small companies, the environment tends to be less competitive and the decisions can be made on the basis of intuition that require minimum quantitative analysis; while, in the case of large organizations that are operating in a huge market, the managers need to use both qu alitative and quantitative methods so that economical decisions are taken (Matasniemi, 2008). ... y in the case is the Operational Research method as it is the most scientific method of identifying the problems that arise in the management of operations of the business that comprise of employees, machines, material, resources along with macro environment factors such as government, defense, business and industry (Banarjee, 2012). Inline Skating Industry The company â€Å"Skating International† has its own market and currently, there are few competitors that are making foils and sails that are used by few skaters. The brand name is â€Å"Achievers† and it will be the only brand that will provide superb quality skating shoes at reasonable prices. The main aim of the company is to provide the customers with skating accessories that will help them in fulfilling their desire of having exceptional sensation towards enjoying skating. Research has shown that the companies that are manufacturing these accessories don’t use the sails that must be designed for skating; in fact, the sails are suitable for skateboards and windsurfing. Although there are many manufacturers of skates but still there is no single company that is manufacturing the skates’ accessories. The products that are being offered by the company will be Skate Sails, Blade Boots and Skate Aid. All of these products will be made from superb quality raw materials so that they are durable and the customers get their value for money. Competitor Analysis In order to survive in the dynamic environment in which changes are taking place at an accelerating rate, it is important that the companies do their environmental analysis on an ongoing basis. The skate sales have increased drastically in the last couple of years and the distribution within and outside the country has doubled as well. Although Skating

Thursday, October 17, 2019

How did southeast Asia use Western ideas of selfgovernance and Essay

How did southeast Asia use Western ideas of selfgovernance and modernity in their struggles for independence - Essay Example In order to resist this colonial rule and to attain independence, these nations employed several ideals. Of most significant, they applied the western ideas of self-governance and modernity in their struggle for independence (Ruiz, 86). Western ideas spread throughout the countries of Southeast Asia in form of governance and more sophisticated political infrastructure. It was through these established infrastructures that these nations organized several grassroots campaigns and resistance towards the colonial rule. Moreover, the extent and fashion of government, the rising centralization of power and the growth of domestic administrations reflected the impact of European organizational practices (Beeson, 3). Influence of Western Ideas in Southeast Asia Struggle for Independence The colonial period attributed a hypothetical division of independence by European public authorities. There was a lot of influence from the traditional leadership to the colonial rule. The systems of the colo nial rule acquired some privileges from native rulers, originally by publicly owned state ventures and later on, through executive colonial administrators from the European states. This inspiration would count within the bigger expression of European empires while the original drive of colonialism was purely mercantilist. In this way, the core global law standard of esteem for independent states, disintegrated into an adversative selectivity and arbitrariness of states believed to deserve of independence by other, more influential states (Desierto, 396). In most cases, the colonial authorities assigned some administrative powers to the co-opted local rulers thereby changing legal frameworks towards imbalanced relationships. However, the realm of customary law dealt with matters of personal status, although the legal administrations restrained the individual rights and freedoms by controlling and supervising instead of fostering and liberating. The imbalanced relationships sowed the seeds of aspirations towards nationalism, independence and autonomy. The aspirations were mostly because of the different laws applied to the Europeans and the native population (Desierto, 417). In addition, the power bestowed on the new leader brought about an old order, a western-educated middle-class. Of these, most of them were doctors, civil servants, intellectuals, businesspersons, lawyers, and even students. Some had received their higher education in Europe or the United States. The influence of western economic forces and the growth of social services during the last century of the colonial rule instigated this change. For instance, the peasant obtained new ideas concerning garbage removal, latrines, alterations in his farming techniques and other advances (Mills, 4). The root of the1898 revolution in the Philippines was the ideas of the European enlightenment, where they were against Spain first, and then against the U.S. It was a modern nationalist revolution brought back to the Philippines and incorporated freedom, individuality, and citizenship. However, it was also a pre-national resistance movement because it rested in the resistance of people enlightened by the values of folk Christianity. Actually, the struggle itself instigated the creation of a political society founded on Euro-American suppositions of national community (Ruiz, 84). On the other

Auto Biography Essay Example | Topics and Well Written Essays - 1000 words

Auto Biography - Essay Example My mother has a rough life, and she is disabled, being a DID with multiple personality disorder, so I help her out as well. Naturally, I am an outgoing, generous, and carefree person. I am smart can learn anything fast, and have a great memory. I have always had a lot of friends at home, school and work. I have always been a leader and I understand how to take on a task and complete with quality. People look up to me at my workplace, and I have been the motivator in the departments I have worked at. I got my GED in 2004 went to the Art institute in Dallas TX for 2 years for visual communications, but stopped going when my mom got ill. Went to Westwood college in Dallas TX for graphic design for a year, but ended it when I found out they are not an accredited school and my credits would not transfer. I finally found Letourneau University from a coworker at work telling me about it. I am going for my bachelors in business management, but also want to get back into graphic and web design after accepting my diploma. I thought an art degree needed something I could fall back on, so going for business since I seem to be good at it in my career. I currently pursue a Bachelor of Arts, Business Management, Letourneau University, Longview, TX, and hopes to graduate in fall 2015. I am a service and administrative professional with more than 10 years of experience leading teams and providing exceptional customer service to clients. I am dedicated to transitioning knowledge and skills from previous experience to build a solid career in the auto finance field. I worked at LA QUINTA, Dallas, TX, from 2002 to 2007, as a front office manager, where I conducted administrative operations, served as first point of contact for all guests, and attended customer phone calls to make room reservations. In addition, I coordinated bookings for conventions, tours, and groups of 50+ people, and collected payments on

Wednesday, October 16, 2019

How did southeast Asia use Western ideas of selfgovernance and Essay

How did southeast Asia use Western ideas of selfgovernance and modernity in their struggles for independence - Essay Example In order to resist this colonial rule and to attain independence, these nations employed several ideals. Of most significant, they applied the western ideas of self-governance and modernity in their struggle for independence (Ruiz, 86). Western ideas spread throughout the countries of Southeast Asia in form of governance and more sophisticated political infrastructure. It was through these established infrastructures that these nations organized several grassroots campaigns and resistance towards the colonial rule. Moreover, the extent and fashion of government, the rising centralization of power and the growth of domestic administrations reflected the impact of European organizational practices (Beeson, 3). Influence of Western Ideas in Southeast Asia Struggle for Independence The colonial period attributed a hypothetical division of independence by European public authorities. There was a lot of influence from the traditional leadership to the colonial rule. The systems of the colo nial rule acquired some privileges from native rulers, originally by publicly owned state ventures and later on, through executive colonial administrators from the European states. This inspiration would count within the bigger expression of European empires while the original drive of colonialism was purely mercantilist. In this way, the core global law standard of esteem for independent states, disintegrated into an adversative selectivity and arbitrariness of states believed to deserve of independence by other, more influential states (Desierto, 396). In most cases, the colonial authorities assigned some administrative powers to the co-opted local rulers thereby changing legal frameworks towards imbalanced relationships. However, the realm of customary law dealt with matters of personal status, although the legal administrations restrained the individual rights and freedoms by controlling and supervising instead of fostering and liberating. The imbalanced relationships sowed the seeds of aspirations towards nationalism, independence and autonomy. The aspirations were mostly because of the different laws applied to the Europeans and the native population (Desierto, 417). In addition, the power bestowed on the new leader brought about an old order, a western-educated middle-class. Of these, most of them were doctors, civil servants, intellectuals, businesspersons, lawyers, and even students. Some had received their higher education in Europe or the United States. The influence of western economic forces and the growth of social services during the last century of the colonial rule instigated this change. For instance, the peasant obtained new ideas concerning garbage removal, latrines, alterations in his farming techniques and other advances (Mills, 4). The root of the1898 revolution in the Philippines was the ideas of the European enlightenment, where they were against Spain first, and then against the U.S. It was a modern nationalist revolution brought back to the Philippines and incorporated freedom, individuality, and citizenship. However, it was also a pre-national resistance movement because it rested in the resistance of people enlightened by the values of folk Christianity. Actually, the struggle itself instigated the creation of a political society founded on Euro-American suppositions of national community (Ruiz, 84). On the other

Tuesday, October 15, 2019

Human Resource Management in Construction Essay

Human Resource Management in Construction - Essay Example Training involves various methods and programs all with intentions of improving workers performance and also self-fulfilment. Due to current advancements, training applies to all kinds of employees from line workers to chief executive officer. Construction companies require a skilled workforce and thus encourage training to improve efficiency in their organizations. Developmental training programs involve broader skills that apply to a wider several situations. It will further increase the competence of the employees. According to the section, 42 of the Industrial Relations Act, 1990 stipulates for the formulation of draft Regulation of Practice by the Labour Relations Commission. The code of practice includes general guidelines on the application of grievance and disciplinary procedures. The law outlines principles of fair procedures between the employees and their employers. The procedures are necessary to ensure that claims are dealt with in relation the principles of natural justice and fairness. They are essential in maintaining discipline in the workplace by implementing disciplinary measures in a consistence manner that is fair to all people involved.2 The procedures have an advantage in that they allow for updating n reviewing periodically being consistent with changing circumstances and developments in the workplace and employment legislations. There are number of stages in handling discipline and grievance procedures. In the first instance, one needs to raise the issue with the immediate officer. If not solved the matter can progress to higher management following the agreed arrangements. According to Acas’ booklet â€Å"code of practice 1: Disciplinary and Grievance Procedures† (2009) Third party may be involved to aid in solving the issue. He may be either an internal or external mediator as long as he is not part of the disciplinary or grievance issue.3 Some cases will not be capable of being solved

Understand how to set up a home based childcare service Essay Example for Free

Understand how to set up a home based childcare service Essay This was the name of the green paper produced in response to the laming inquiry into the death of Victoria Climbie in 2000. It went on to form the basis of the 2004 children’s act. The paper lists five outcomes which were identified in consultation with children and young people; Being healthy; enjoying good physical and mental health and living a healthy lifestyle staying safe; being protected from harm and neglect. Enjoying and achieving ; getting the most out of life and developing the skills for adulthood making a positive contribution; being involved with the community and society and not engaging in anti-social or offending behaviour economic well- being; not being prevented by economic disadvantage from achieving their full potential in life. Children’s act 2004 This act sets out the processes for integrating services to children in England and wales, requiring local authorities and their partners to co-operate in promoting the welfare and wellbeing of children.it created the post of children’s commissioner for England and introduced the requirement for local authorities to have a director of children’s services. Children’s act 1989 First acknowledgement in UK law of children’s rights, none as ‘the needs of the child are paramount`. Education act 1993   Secretary of state are required to publish a code of practise for children with special educational needs parents of children under 2 years have the right to ask for the child to be formally assessed. Data protection act 1998 It protects sensitive personal information being published without a person’s consent. where children are involved consent has to be given by a parent or guardian. Food safety (general food hygiene) regulations 1995 Local authorities require registered child-minder’s are to register with their local environmental health department and obtain the following  document. ‘safer food, better business for childminders` Special educational needs and disability act 2001 This act protects persons from discrimination on the grounds of a disability, and it requires that reasonable adjustments must be made to services, provisions and/or premises so that disabled persons do not suffer significant disadvantages compared to non-disabled persons. Children are covered by this legislation as they are persons in the eyes of the law. Role of regulatory bodies Regulatory bodies in the UK are Ofsted (England) The fundamental role of these regulatory bodies is to ensure that all children receive the best possible care in all settings a child attends away from their home. The systems they have in place will also reassure parents, guardians and carers who have to be able to entrust their child to an organisation or individual to look after. They will make sure you meet the welfare requirement’s and learning and development requirement’s as set out in the early years statutory framework for the early years foundation stage, Are a suitable person to provide care for children and can promote an environment where children are well cared for, are safe and their learning and development is catered for. The regulatory bodies have processes and systems to control home based childcare in the following ways. Registration – This covers checks on you, other adults who live with you and the premises where you plan to carry out your business. Inspection This is when inspectors carry out checks on the service you offer and on you once you are registered they produce a report which is then available on the websites of the regulatory bodies and must be offered to parents. Investigation – Following a complaint or concern, an inspector may carry out an investigation into your childcare service to make sure that you are meeting and complying with the welfare requirements. This is in addition to an inspection. Enforcement – If you do not meet the welfare requirements  or standards of your country, the regulatory body can take action against you.in England there are five general welfare requirements. Safeguarding and promoting children’s welfare Suitable people Suitable premises, environment and equipment Organisation Documentation. 1.2 Develop policies and procedures for; * Accidents, illness and emergencies The safety of your child is paramount and I will take every measure I can to protect your child from hurting themselves. However, sometimes accidents do happen. I have written the following procedure on how I will deal with such a situation: *I will comfort the child and reassure them. *I will assess the extent of their injuries and if necessary call for medical support/ambulance. *I will give any first aid procedures that are necessary. I have been trained to carry out to these procedures and have required certificate. *Once the child is more settled I will contact you as soon as possible to inform you of the accident, and if necessary I will ask you to return to care for your child / meet me at the hospital. After every accident, however minor I will: *Complete a report in my accident book. *Ask you to sign the report. If the incident requires any medical treatment then I will: *Inform Ofsted *Inform my Insurance Company. *Contact the NCMA for additional advice/support. It is important that you keep me informed regarding your child’s condition following an accident and if you have sought medical advice. Back up registered childminder:_____________________________ Known responsible adult:________________________ *Behaviour Biting can be an uncomfortable subject for parents of both the biter and the child who is bitten. I hope that this policy will explain how I deal with biting in my home. Please do discuss any concerns you may have regarding this issue with me. If your child is known to bite I would prefer to know in advance. Children bite for a variety of reasons. This may be because they are teething, frustrated, exploring using their mouth, asserting their independence and wanting to gain control, maybe of a toy or they could be stressed. It may also be because they want to gain attention. I will work with you and your child to establish when and why they are biting. I will observe the child closely to see if certain conditions or situations trigger the behavior and then work with them to try and avoid the incidents occurring. This may involve altering the child’s routine, giving them more one to one attention, purchasing additional resources so sharing is not such a major issue or if it is because a child is teething provide suitable teething resources. I will ensure that if a child is bitten that they are comforted and given lots of attention. I will ensure that any first aid is applied correctly if required and the incident will be recorded in my book and parents asked to sign it. If your child bites then I will remove them from the situation. I will explain to them, according to their age and understanding that biting is unacceptable behavior. For younger child this may be by my tone of voice and facial expressions rather than lots of words. It may be necessary for me to exclude the child from an activity and use ‘time out’ until they are calm enough to return. I will also encourage the child to apologize to the child they have bitten and work with them to develop strategies to help them deal with the reasons. Many children go through a stage of biting, please don’t be alarmed it doesn’t last forever! Please sign and date to say you have read and understand Managing Behavior Policy Promoting positive behavior is very important and I do this by: *Giving lots of praise for good behavior *Giving the children individual attention so they feel valued *Setting a good example, being a good role model *Listening to what the children have to say *Rewarding good behavior (choosing next activity etc) *Giving children stickers for good behavior, sharing etc. I help the children understand my house rules, which are realistic and I am consistent in the enforcing of them. I do not give out confusing signals, Saying No means No! I am aware of the different reasons why children misbehave and will endeavour to keep to routines so that your child feels safe and is not over tired or hungry. However all children will misbehave at sometime. I have developed several different strategies on how to deal with a child misbehaving and use different ones depending on the age/stage of ability of the child and the situation: *Distraction. Remove the child from the situation and give them an alternative activity. *Ignore. Depending on the situation I may ignore the bad behavior as I feel it is being done to get a reaction. *Discuss with Child. If the child is able to understand I will discuss their behavior and try and get them to appreciate the consequences of their actions on others. I inform them that it is their behavior I do not like, not them. *Time Out. Removing the child from the activity and sitting them quietly for a few minutes. I will never smack, shake or hurt your child. I will not humiliate your child. If a child misbehaves I will let you know by either writing it in their contact book or by ringing you later after collection. Some children can become upset if the incident is retold in front of them. I will also inform you of how the matter was dealt with. If you have any concerns regarding the managing of your child’s behavior, please do not hesitate to contact me. It is important that we work together on managing behavior in order not to confuse your child. Please sign and date to say you have read and understand *safeguarding My responsibility as a childminder is to ensure the safety and welfare of children in my care. I have received training on safeguarding children issues and am aware of the signs and symptoms of abuse, physical, emotional and sexual, and those of neglect. If I have any reason to suspect a problem I will seek advice from the Child Protection Team and / or discuss with the parent. If I have reason to believe that any child in my care is being  abused in any way I will follow the local safeguarding children board procedures and report the matter to the Social Services. Under these circumstances I will not be able to keep information relating to your child confidential, but will need to share it with Ofsted, Social Services and the Police if requested. Please sign and date to say you have read and understand Equal opportunities I give all children in my care the opportunity to reach their full potential. Sometimes this means adapting an activity to the child’s ability and stage of development, providing additional resources or giving one child more attention and support than others during a particular activity or routine. All children in my care are given the opportunity to play with all the toys (subject to health and safety with children under 3 years of age). No toys are just for girls or just for boys. I try to ensure my toys reflect positive images of children and people from different cultures and with different abilities. No child in my care will be discriminated against in anyway, whether for their skin colour, culture, gender, ability or religion. I will challenge any remarks that I feel are inappropriate. I encourage the children in my care to learn more about their own culture and to find out about the culture and religions of other children. We do in this in a fun way through sharing book s, cooking and eating food from around the world. I encourage the children to develop a healthy respect of each other’s differences and to value everyone as an individual. I encourage Parents to share with us any festivals, special occasions or artefacts, which may enhance the children’s learning and understanding. Please sign and date to say you have read and understand All these policies will be implemented by letting the parents no on signing the contract and experience along the way as working as a professional child-minder. 1.3 Explain the importance of confidentiality and data protection. It is important to maintain confidentiality in order to build a relationship of trust between the parent and child-minder. It is important that they can trust you with their personal data and have peace of mind that  you will respect data they have provided. A child –minder is looking after the parent’s most precious thing in their life their child, therefore a relationship of trust and a mutual respect is incredibly important. One sure way of losing this trust is to disrespect the importance of the data to which you are provided. If you cannot be trusted with personal information it may become difficult for a parent to trust you with their child. It is also important to maintain confidentiality to protect the children the children in your care as well as their families, sharing information with the consent of the parent can be of great benefit as long as every party involved is working for the best interest of the child. In the interest of safety the sharing of information could save a child’s life for example medical issues or allergies. Sharing of information can also support learning as a setting can build a solid base for teaching based on a child’s likes and dislikes. If there is an issue at home that affects the child’s behaviour or progress for instance a family death sharing of information can help all involved understand the situation and deal with it appropriately. The main priority should be the interest of the child and this is where it is important to have up to date record, respectfully handled and shared responsibly with parent’s permission.

Monday, October 14, 2019

Intelligent Transmit Power Control

Intelligent Transmit Power Control The Intelligent Transmit Power Control In Expanding The Limitation Of Range For Bluetooth Communication For Indoor Navigation System Jamilah Binti Mohamed INTRODUCTION As time goes by, the technology is grown up very fast. The technology is created and invented according to the necessities of consumers. In addition, there have many scientist did researched and experiment to find the solutions for our problems in our life. Therefore, some of researcher had found the Bluetooth technology to settle several problems that come into our life. For instants, we need a cable to transfer any information and to have that cable, we need to spend our money to buy it. Thus the creation of Bluetooth can reduce our cost. Bluetooth is the one of the indoor navigator that play its own functions. In 1994, Bluetooth was initiated by the team of researchers at Ericsson Mobile Communications. According to the history of the creation of Bluetooth : â€Å"The name â€Å"Bluetooth† is taken from the 10th century Danish King Harald Blatand-or Harold Bluetooth in English. During the formative stage of the trade association a code name was needed to name the effort. King Blatand was instrumental in uniting warring factions in parts of what are now Norway, Sweden, and Denmark – just as Bluetooth technology is designed to allow collaboration between differing industries such as the computing mobile phone and automotive markets. The code name as stuck.† (Bluetooth SIG 2006) Nowadays, many of the gadgets like handphones, smartphones, printers, fax machines, computers and other device provide Bluetooth technology as one of the facilities and attraction to their customers. That why most of the people in the world know about the technology of Bluetooth. Bluetooth has their own characteristics. Firstly, Bluetooth is short range communication. There have three types of distance that Bluetooth can function which are the longest distance is 100 meters , intermediate distance is 10 meters , and the shortest distance is 10 cm. However, it is very effective at the short distance and in noisy frequency. Bluetooth is different with the Wi-Fi and WLANs technology, Wi-Fi and WLANs had long range communication but need to have networks. Secondly, Bluetooth supply cable-free environment which can replace the portable cable to connect between two devices and can use to build ad hoc network either at the same device or at different device. At that time, Bluetooth is the most suitable technology for consumers to use it even it have several weaknesses. In addition, to use Bluetooth, Third, among the technology system that appeared nowadays, Bluetooth is more cheap than other devices. Usually, a traditional testing technology show that most of the devices are expensive because of the use of cable, use an expensive measurement equipment, put many sensors to the measurement and so on. All of the action above will increase cost of the device. Different with Bluetooth, it is a simple process that only used radio waves and spread-spectrum frequency-hopping technique. The cost for adding Bluetooth in any device is not more than $5 to $10. Most of the people are afford to have it. Besides that, Bluetooth use two types of links for it process. First is Synchronous Connection Oriented (SCO) and second is Asynchronous Connectionless Link (ACL). The process of Bluetooth use the concept of master and slave. For Synchronous Connection Oriented (SCO), the process is between master and a single slave in the piconet which is symmetric point to point. SCO need a symmetric point to voice link point for sending and receiving voice packets from one device to another device at certain time intervals. SCO process is started from a master device. When the master device send any data via SCO link in a slot, the slave will send back to the following slot. There are several type of SCO. â€Å"HV1 carries 10 data bytes and is transmitted every 2 slots, HV2 carries 20 data bytes and is transmitted every 4 slots and HV3 carries 30 data bytes and is transmitted every 6 slots.†( For Asynchronous Connectionless Link (ACL), the system is different with SCO because it need to wait for acknowledgement from the receiver. This style of link is more safe than SCO. If the signal do not receive to the receiver, ACL will send it back until the receiver get it. After that, the recipient will check the packet and clarify the data transmission via cyclic redundancy code (CRC) to make sure the data is correct. ACL is point-to-multipoint link which is between master and slaves in the piconet. In the piconet, ACL can work only in a single link. The process of Bluetooth is started when there have piconet master link with slave devices. â€Å"One piconet can have a maximum of seven active slave devices and one master device. All communication within a piconet goes through the piconet master. Two or more piconets together form a scatternet, which can be used to eliminate Bluetooth range restrictions† (Haataja, 2006). After that, data will transfer between Bluetooth devices and physical channel. Transmission is occur in packets that is subdivided into time units known as slots. THESIS STATEMENT LITERATURE REVIEW Bluetooth is created for short range communication without using any cable or cable free environment. Most of the people nowadays use Bluetooth instead of transfer information via cable. Usually, Bluetooth can use at computers, mobile phones, cars, headphone earphone, camera and printer. It is easy and not expensive. However, there are lot of problem during using Bluetooth. 1. PROBLEM Bluetooth does not have licensed frequency band. The way it works may cause the security of the system easy to attack by other people. It will make harm to the devices. The intruders are easily interrupted the process and know the information transfers during the devices communicate to each other. Thus , Bluetooth need increase the quality of the system to be more safe for consumers to used the communication style. However, the most important problem that occurs in Bluetooth technology is range limitation or range constraint during the process of transferring data. It is possible for data transmission in a short range. There have three classification of distance that Bluetooth can function. First, data transmission at 100 meters , second is 10 meters and the shortest distance is 10 centimeter but the consumers must remember that the shortest distance, the fastest the data transmission process. In addition, the amount of data can affect the effectiveness of Bluetooth during the process of transferring the data. If the data is large or big in size, the rate of the transferring data is become slow. This is because the network is over loaded then the data transmission become slower than usual. Sometimes, somebody need to wait for a few minutes and unluckily, if the devices have problem with it, the process will stop without any notice. That why we need to confirm that the data is safely receive to the recipient device. If not, it is just waste your time for waiting the Bluetooth process to finished. Not only that, Bluetooth always can not reach the device properly even the device is on for Bluetooth, only for certain devices they can pair to each other. Sometimes, they can pair to each other but need an afford to pair them by doing it several times. It will takes time to pair the devices. After that, if the data transmission is large, a lot of time is needed. Therefore, time dilation is occur during using the Bluetooth technology either waiting the devices paring each other or the data safely transmitted to the receiver. Moreover, the battery of the devices will decrease not same as usual. Transmission of data will cause a little bits of battery. As we know, most of the technology devices are created with short durability of battery like smartphone and laptop. The causes of the decreasing of the battery in a short time for certain devices are there have lots of system installed at the devices with high intensity of light and many more factors. Therefore, the uses of Bluetooth will increasing the rate of battery of the devices getting low. Lastly, among the problems above, it is easily to say that the most affected is the range limitation in the Bluetooth. Because of the range limitation, the distance to connect the devices is limited, takes time if the data is quite large, security of the system is vulnerable and difficult to pair among the devices. Thus, a few research was occur to settle the problems. The researchers try to find a single way to expanse range. 2. LIMITATION Connection– Bluetooth can connect after transmitter and receiver getting pair to each other. Otherwise, those device can not connect to each other and the data transmission will not happen. Speed Bluetooth was created for low speed transmission of data. If the amount of  data is larger, the speed become slower. Therefore , we can conclude that transferring data will take time because the speed of Bluetooth process is slow. Range The range of the Bluetooth is limit only for 100 meters (the longest  distance that Bluetooth can function). If the distance between the devices far from that, Bluetooth system will does not work. 3. SIGNIFICANT Actually Bluetooth is important in replacement of wire or cable during communication between two or more than two devices. It is also important in GPS receivers and medical equipment. The development of Bluetooth is become fastest and the product of Bluetooth devices appeared into our life with many variation like Bluetooth home-network, Bluetooth earphone, and Bluetooth head phone. Typical Use of a Bluetooth enabled phone as a data modem for a PC In addition, Bluetooth is popular because it can share the data with different device. For example, data from laptop can be transfer via Bluetooth to the smartphone. Furthermore, Bluetooth can transfer data to the eight devices by using piconet. The application is easy and does not need a large provision. Besides, we can control the data transmission by accepting or rejecting it from any devices that we do not know. Bluetooth can our device more safe from any unneeded data. Indirectly, we can protect our devices from any virus via Bluetooth. Several common misperception about the function of Bluetooth such as Bluetooth and Wi-Fi competing to each other. In fact, Bluetooth and Wi-Fi were created with different function and ability. Bluetooth is created for wire replacement at short distance connection while Wi-Fi is used for getting data, video and voice at 300 meters. Therefore, Bluetooth and Wi-Fi not competing to each other but help to complete and settle the problem of consumers. This is one of the research do by connectBlue 2014. 4. RANGE EXPANSION First of all, we need to identify the power transmitted in the Bluetooth process. There have 3 classess of power range which are 1mW (1 meter), 2.5mW (10 meters) and 100 mW (100 meters). According to the range above, we can see the power restrictions. The highest transmitting power when access at the short distance or small size in data. But if the distance between the Bluetooth devices is far or have large size of data, the lowest transmitting power will access. Due to this problem, there have one way to increase the power during transmit the data or any information via Bluetooth. Therefore we can do a hypothesis that when the distance between two Bluetooth devices is lower, the power control transmit the data will increase. So, it will slow down the interference with other transmitter. As we know apart of problems come from Bluetooth can be settle if the range of connection is large. Therefore, the range is the most important parameter for any Bluetooth devices to increase the power control. So, there have one way to overcome the basic limitation of range in Bluetooth. Establish a network through enabled intermediary device. Due to the broadcast nature of wireless communication and omni-directional antennae among the most electronics devices nowadays, the transmission of data will sent to any hosts that on the Bluetooth. In addition, the host can on or off the wireless connection without notifying other hosts. Therefore , during the connection ,both two devices must know and on the Bluetooth system to transfer and receive the data. If both devices that want to connect each other are out of their transmission range, the other devices that around the sender of data will receive it and can forward to another devices. According to the increasing of mobility of wireless hosts, every host must have their own capability of an autonomous system, or centralized administration. Not only because end-hosts are transient the mobility and autonomy introduces a dynamic topology of the networks but also because intermediate hosts on a communication path are transient. That why both devices must have a network to allow the intermediary device function and Bluetooth process will occur. Moreover , to start the connection of Bluetooth device without any limitation of range, we must provide an ad-hoc network with available to all devices. For easy understanding, we can apply network at our devices spontaneously and available to who ever at that area. Not only that, the network can use for a specific applications and at temporary usage. However, every devices need to upgrade their accessible devices due to theis list. Thus, it is easy to all consumers to transfer data by using Bluetooth if that network can provide for any devices. A process to expand the range of Bluetooth or broke the limitation of range in Bluetooth are not complex and only need intermediate hosts. The process need two type of routing process which are static and dynamic. In static routing process, it is independent and maintained for every node for every requirement. While for dynamic routing process , it is work when it is needed in the process. If the sender and the receiver want to transfer the data, they need to send data and find the route by their own then create the routing table.