Fund Development
This chapter will present the basics of fundraising, including the annual campaign, direct mail, special events, major gifts, and planned gifts. The concept of moving donors from annual giving to major gifts and planned gifts will be presented. This chapter will also explore donor motivation and present a fundraising strategy based on the concept of providing donors with opportunities rather than approaching fundraising as a “begging” activity. Begging is not a strategy to raise funds. The alternative to begging for funds is to have a well-developed fundraising program. Even if the organization employs a professional fundraiser, the administrator is still the chief fundraising officer and, as such, will develop professional fundraising skills or risk becoming the chief beggar for the organization. Securing resources for the organization is ultimately the responsibility of the board of directors, but it is the administrator’s responsibility to develop and oversee a well-developed fundraising program. Effective fundraisers work from a strategic fundraising plan that is long term, has specific goals, and uses a variety of fundraising methods and techniques. The organization’s financial strength can be developed and maintained only through a fundraising strategy that is diversified by using many different fundraising approaches appropriate for their various categories of donors. Fundraising must be approached as any other major project in that it requires the administrator to develop a plan. The planning process for fundraising includes the same steps as any other planning process. As the administrator, you must set goals, allocate resources, develop action steps and timelines. and then evaluate the process. There are many “truisms” in fundraising, but the one most important to remember is that “people give to people, not to organizations.” This is another way to say that fundraising is really “friend-raising.” The people that will give money to your organization are those who share a passion for the mission of the organization and who trust that their money will be used wisely. It is the responsibility of the administrator to develop and nurture relationships that will financially sustain the organization. Another truism is that people will not give anything to meet your agency needs, but they will give when presented with the opportunity to invest in an organization that will make a difference in the lives of others. People will give when they think they can make a positive difference in something they care about. At whatever level of fundraising activity, your approach should be to present opportunities that will make a positive impact in the lives of the people your organization serves and not to present the “needs” of the agency.
11Fund Development
Copyright 2014. SAGE Publications, Inc. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or app ...
Respond to each peer initial post and question at the end with a res.docxcarlstromcurtis
Respond to each peer initial post and question at the end with a response about 3-4 sentences long.
Peer #1
Friend raising is when a nonprofit organization builds a relationship with their clients focusing on the development of a unique and special type of relationship with the hopes of creating passionate supporters that believe in the cause and can help bring in others by word of mouth that they trust that will have some type of loyalty to the organization rather than just someone who it becomes all about the money. Friend raising with a nonprofit organization’s clientele is important because there are is a bigger commitment there in the relationship and gives a little more ease to the organization to ask people they already know for money for a particular cause and wouldn’t make asking difficult. Of course some people do not like to ask others for money but when it’s for something important like for an organization with a good cause then it’s pretty simple to ask your friends whom you know very well to help you and contribute to your cause. “In friend-raising, the relationship is a sustainable practice of genuine care and concern—each party involves itself for the benefit of the others, thereby representing and reinforcing the community” (Allers, 2013).
Solicitation is definitely a part of the relationship between a nonprofit and their donors whether they have any affiliation to them or not because any means of asking someone for something or trying to obtain something from someone is considered soliciting in a positive manner. There is also the means of someone who would barge into or intrude in an organization to ask for either monetary donations or to purchase something from them and in most places this is not allowed. Solicitation can help raise the profile of the business when it reaches a broad market base to help them generate new sales (Martin, 2018). In the nonprofit friend-raising instance, solicitation is a good thing and sets up the friends to be potential customers and helping to advertise the business rather than it being advertised by the business owners (Martin, 2018). Having friend-raisers speak to others about the organization’s cause will help to bring others in the door because they trust them.
A nonprofit must have volunteers in their organization in order for them to be successful, as many of these organization types rely heavily on their volunteers as they are considered their backbone and spread the word about the mission of the organization (Tishman, 2013). These members do not give their support to the organization for a payout and most of the time is not looking to be compensated in any way or receiving a gift, they are only looking for the organization to be successful and see their cause making a difference. There should definitely be a volunteer program in an emerging nonprofit organization especially in our economic times where there are many people who are in need of the communities help. A manage ...
Respond to each peer initial post and question at the end with a res.docxcarlstromcurtis
Respond to each peer initial post and question at the end with a response about 3-4 sentences long.
Peer #1
Friend raising is when a nonprofit organization builds a relationship with their clients focusing on the development of a unique and special type of relationship with the hopes of creating passionate supporters that believe in the cause and can help bring in others by word of mouth that they trust that will have some type of loyalty to the organization rather than just someone who it becomes all about the money. Friend raising with a nonprofit organization’s clientele is important because there are is a bigger commitment there in the relationship and gives a little more ease to the organization to ask people they already know for money for a particular cause and wouldn’t make asking difficult. Of course some people do not like to ask others for money but when it’s for something important like for an organization with a good cause then it’s pretty simple to ask your friends whom you know very well to help you and contribute to your cause. “In friend-raising, the relationship is a sustainable practice of genuine care and concern—each party involves itself for the benefit of the others, thereby representing and reinforcing the community” (Allers, 2013).
Solicitation is definitely a part of the relationship between a nonprofit and their donors whether they have any affiliation to them or not because any means of asking someone for something or trying to obtain something from someone is considered soliciting in a positive manner. There is also the means of someone who would barge into or intrude in an organization to ask for either monetary donations or to purchase something from them and in most places this is not allowed. Solicitation can help raise the profile of the business when it reaches a broad market base to help them generate new sales (Martin, 2018). In the nonprofit friend-raising instance, solicitation is a good thing and sets up the friends to be potential customers and helping to advertise the business rather than it being advertised by the business owners (Martin, 2018). Having friend-raisers speak to others about the organization’s cause will help to bring others in the door because they trust them.
A nonprofit must have volunteers in their organization in order for them to be successful, as many of these organization types rely heavily on their volunteers as they are considered their backbone and spread the word about the mission of the organization (Tishman, 2013). These members do not give their support to the organization for a payout and most of the time is not looking to be compensated in any way or receiving a gift, they are only looking for the organization to be successful and see their cause making a difference. There should definitely be a volunteer program in an emerging nonprofit organization especially in our economic times where there are many people who are in need of the communities help. A manage ...
Is a fund development strategy at your organization non-existent? Are you a grass roots organization looking to establish a fund development strategy? Here are a few things that I have learned while being a fund development professional that will help you begin to wrap your brain around the concept of fundraising.
9 ways nonprofits can connect with supporters and understand why they givedlvr.it
semillasIn an ideal world, generous supporters would give to good causes based on the merits of the mission alone. In the real world, the motivation for giving is much more complex and less rational than a calculated assessment. To successfully connect with potential donors and get them to take action, nonprofit fundraisers and marketers should understand why donors give.
“Building relationships isn’t optional in fundraising, it’s inherent in the definition of what fundraising is.”
One cannot overstate how important the concept of ‘relationship fundraising’ is to fundraisers. Since Ken Burnett coined the term in his 1992 book the idea has become one of the dominant modes of thought about fundraising. Yet there is still little agreement among practitioners about what relationship marketing actually is, what a relationship approach might mean for the way we steward our relationships with supporters and crucially, whether it even works.
We’re proud to have partnered with world renowned fundraising expert Dr Adrian Sargeant, technology provider Bloomerang and Rogare, a world-renowned think tank for fundraising, to sponsor groundbreaking research by Dr Adrian Sargeant, Jen Shang and Rogare’s director Ian MacQuillin.
Grants are always an in demand commodity. Everyone loves the idea of being able to receive funds to further a mission or program without having to repay those funds. This eagerness is often taken advantage of by individuals and companies who range from slightly unethical to those who are blatantly dishonest and deceitful.
How to engage with your donors donor engagement cycleDonorbox
Whether you are a newbie in fundraising or a seasoned expert, you probably know that the key to successful fundraising lies in building relationships.
When a donor is engaged with a nonprofit organization, they are much more likely to donate again and again (and give in other ways too).
This presentation provides tips and tools to help nonprofit organizations develop relationships with funders. It focuses on building relationships with corporate funders, strategically communicating to capture a funder's attention, and how to solidify relationships by providing added value.
The Montana Foundation Fiscal AnalysisThe Defensive Interval” i.docxcherry686017
The Montana Foundation Fiscal Analysis
The “Defensive Interval” is a ratio that is designed to indicate the life of an organization if funding were to be cut. The ratio looks like this: (Cash + Securities + Receivables) ÷ Monthly Expenses. This is looking at what the organization has in liquid funds, assets, and money that it is owed and dividing it by monthly expenses. Note that the cash + securities + receivables equals the total assets.
Regarding the Montana Foundation, this would appear as follows: ($375,544) ÷ (49,551) = roughly 7.56.
This suggests that the Montana Foundation could operate for roughly 7 ½ months if it were to receive no more funding. This would be seen as a positive trait if an investor were to analyze the organization.
The “Savings Indicator” is a ratio that shows how well the organization is adding to its savings (or worth). The ratio looks like this: (Revenue – Total Expense) ÷ Total Expense.
Regarding the Montana Foundation, this would appear as follows: ($585,536 - $594,619) ÷ (594,619) = roughly -.015.
This suggests that the Montana Foundation is used about 1.5% of its savings, suggesting that the Montana Foundation’s savings are not growing but are declining. This would be seen as a negative trait if an investor were to analyze the organization.
The “Liquid Funds Indictor” is a ratio that shows how long an organization can function if it were to use only its liquid funds to operate. The ratio looks like this (Total Net Assets – Restricted Net Assets – Fixed Assets) ÷ Monthly Expenses.
Regarding the Montana Foundation, this would appear as follows: ($292,949 - $230,319 - $0) ÷ (49,551) = roughly 1.26.
This suggests that the Montana Foundation could operate for roughly 1 ¼ months by only using their current liquid funds. This would be seen as an okay-poor trait if an investor were to analyze the organization. The Montana Foundation has enough cash to operate, but only for about a month. Ideally, they should have enough cash to operate for 6+ months.
The “Debt Ratio” is a ratio that shows the amount of debt of an organization compared to the value of the organization. This ratio would show the value of the organization if they were to pay off all of their debt. The ratio looks like this: (Average Total Debt) ÷ (Average Total Assets).
Regarding the Montana Foundation, this would appear as follows: ($82,595) ÷ ($363,263) = roughly .23 (or 23%).
This suggests that the Montana Foundation could pay off their debt by using only 23% of their assets (be them liquid or assets), resulting in the organization keeping about 77% of their value. This would be seen as a positive trait, in my opinion, because it shows the Montana Foundation as being stable. They would be able to pay off all of their debt and still retain the majority of the organizational value, something that could be seen as a positive if an investor were to analyze the organization.
The “Revenue Ratio” is a ratio that shows how much revenue comes from any giv ...
You have been asked to explain the differences between certain categ.docxshericehewat
You have been asked to explain the differences between certain categories of crimes. For each of the following categories of crime, provide a general definition of the category of crime and give at least two detailed examples of specific crimes that fall into each category:
Crimes against persons
Crimes against property
Crimes of public morality
White-collar crime
Cyber crime
Then for the following scenarios, discuss the categories of crimes involved in each scenario and explain the specific criminal charges that you would apply to each scenario. You can utilize the Library, Internet and other resources to research the criminal statutes of a state of your choice in order to help you determine which criminal charges should be applied:
David S. was running around a public park without his clothes on, singing and shouting loudly, at 3 in the morning. Police arrived after neighbors called to complain. They saw David S. tipping over a garbage can and when they shouted for him to stop, he threw the garbage can into a car, breaking one of its side windows. The police arrested David S, His blood alcohol level was twice the legal limit.
Gary M. was arrested by the FBI when he showed up at a local mall to meet a "14 year old girl" for a date, which he arranged over the Internet. He didn't know that the "14 year old girl" was actually a 35-year old male FBI agent.
Elaine R. was an accountant working for a large corporation. She had been falsifying the accounting records and sending some of the corporate funds to her own bank accounts in an offshore bank. The corporation found out what she had been doing and reported her to the police.
Please submit your assignment.
.
You have been asked to help secure the information system and users .docxshericehewat
You have been asked to help secure the information system and users against hacking attempts. Complete the following:
Take this opportunity to describe the 4 different approaches and techniques a hacker would use to steal the organization's data.
For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.
Include 2–3 pages of material covering the 3 discussion areas in Section 5 of your Key Assignment document (including the completed previous 4 sections).
social engineering,dumpster diving,identify theft,cyberterrorist
.
More Related Content
Similar to Fund DevelopmentThis chapter will present the basics of fundra.docx
Is a fund development strategy at your organization non-existent? Are you a grass roots organization looking to establish a fund development strategy? Here are a few things that I have learned while being a fund development professional that will help you begin to wrap your brain around the concept of fundraising.
9 ways nonprofits can connect with supporters and understand why they givedlvr.it
semillasIn an ideal world, generous supporters would give to good causes based on the merits of the mission alone. In the real world, the motivation for giving is much more complex and less rational than a calculated assessment. To successfully connect with potential donors and get them to take action, nonprofit fundraisers and marketers should understand why donors give.
“Building relationships isn’t optional in fundraising, it’s inherent in the definition of what fundraising is.”
One cannot overstate how important the concept of ‘relationship fundraising’ is to fundraisers. Since Ken Burnett coined the term in his 1992 book the idea has become one of the dominant modes of thought about fundraising. Yet there is still little agreement among practitioners about what relationship marketing actually is, what a relationship approach might mean for the way we steward our relationships with supporters and crucially, whether it even works.
We’re proud to have partnered with world renowned fundraising expert Dr Adrian Sargeant, technology provider Bloomerang and Rogare, a world-renowned think tank for fundraising, to sponsor groundbreaking research by Dr Adrian Sargeant, Jen Shang and Rogare’s director Ian MacQuillin.
Grants are always an in demand commodity. Everyone loves the idea of being able to receive funds to further a mission or program without having to repay those funds. This eagerness is often taken advantage of by individuals and companies who range from slightly unethical to those who are blatantly dishonest and deceitful.
How to engage with your donors donor engagement cycleDonorbox
Whether you are a newbie in fundraising or a seasoned expert, you probably know that the key to successful fundraising lies in building relationships.
When a donor is engaged with a nonprofit organization, they are much more likely to donate again and again (and give in other ways too).
This presentation provides tips and tools to help nonprofit organizations develop relationships with funders. It focuses on building relationships with corporate funders, strategically communicating to capture a funder's attention, and how to solidify relationships by providing added value.
The Montana Foundation Fiscal AnalysisThe Defensive Interval” i.docxcherry686017
The Montana Foundation Fiscal Analysis
The “Defensive Interval” is a ratio that is designed to indicate the life of an organization if funding were to be cut. The ratio looks like this: (Cash + Securities + Receivables) ÷ Monthly Expenses. This is looking at what the organization has in liquid funds, assets, and money that it is owed and dividing it by monthly expenses. Note that the cash + securities + receivables equals the total assets.
Regarding the Montana Foundation, this would appear as follows: ($375,544) ÷ (49,551) = roughly 7.56.
This suggests that the Montana Foundation could operate for roughly 7 ½ months if it were to receive no more funding. This would be seen as a positive trait if an investor were to analyze the organization.
The “Savings Indicator” is a ratio that shows how well the organization is adding to its savings (or worth). The ratio looks like this: (Revenue – Total Expense) ÷ Total Expense.
Regarding the Montana Foundation, this would appear as follows: ($585,536 - $594,619) ÷ (594,619) = roughly -.015.
This suggests that the Montana Foundation is used about 1.5% of its savings, suggesting that the Montana Foundation’s savings are not growing but are declining. This would be seen as a negative trait if an investor were to analyze the organization.
The “Liquid Funds Indictor” is a ratio that shows how long an organization can function if it were to use only its liquid funds to operate. The ratio looks like this (Total Net Assets – Restricted Net Assets – Fixed Assets) ÷ Monthly Expenses.
Regarding the Montana Foundation, this would appear as follows: ($292,949 - $230,319 - $0) ÷ (49,551) = roughly 1.26.
This suggests that the Montana Foundation could operate for roughly 1 ¼ months by only using their current liquid funds. This would be seen as an okay-poor trait if an investor were to analyze the organization. The Montana Foundation has enough cash to operate, but only for about a month. Ideally, they should have enough cash to operate for 6+ months.
The “Debt Ratio” is a ratio that shows the amount of debt of an organization compared to the value of the organization. This ratio would show the value of the organization if they were to pay off all of their debt. The ratio looks like this: (Average Total Debt) ÷ (Average Total Assets).
Regarding the Montana Foundation, this would appear as follows: ($82,595) ÷ ($363,263) = roughly .23 (or 23%).
This suggests that the Montana Foundation could pay off their debt by using only 23% of their assets (be them liquid or assets), resulting in the organization keeping about 77% of their value. This would be seen as a positive trait, in my opinion, because it shows the Montana Foundation as being stable. They would be able to pay off all of their debt and still retain the majority of the organizational value, something that could be seen as a positive if an investor were to analyze the organization.
The “Revenue Ratio” is a ratio that shows how much revenue comes from any giv ...
You have been asked to explain the differences between certain categ.docxshericehewat
You have been asked to explain the differences between certain categories of crimes. For each of the following categories of crime, provide a general definition of the category of crime and give at least two detailed examples of specific crimes that fall into each category:
Crimes against persons
Crimes against property
Crimes of public morality
White-collar crime
Cyber crime
Then for the following scenarios, discuss the categories of crimes involved in each scenario and explain the specific criminal charges that you would apply to each scenario. You can utilize the Library, Internet and other resources to research the criminal statutes of a state of your choice in order to help you determine which criminal charges should be applied:
David S. was running around a public park without his clothes on, singing and shouting loudly, at 3 in the morning. Police arrived after neighbors called to complain. They saw David S. tipping over a garbage can and when they shouted for him to stop, he threw the garbage can into a car, breaking one of its side windows. The police arrested David S, His blood alcohol level was twice the legal limit.
Gary M. was arrested by the FBI when he showed up at a local mall to meet a "14 year old girl" for a date, which he arranged over the Internet. He didn't know that the "14 year old girl" was actually a 35-year old male FBI agent.
Elaine R. was an accountant working for a large corporation. She had been falsifying the accounting records and sending some of the corporate funds to her own bank accounts in an offshore bank. The corporation found out what she had been doing and reported her to the police.
Please submit your assignment.
.
You have been asked to help secure the information system and users .docxshericehewat
You have been asked to help secure the information system and users against hacking attempts. Complete the following:
Take this opportunity to describe the 4 different approaches and techniques a hacker would use to steal the organization's data.
For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.
Include 2–3 pages of material covering the 3 discussion areas in Section 5 of your Key Assignment document (including the completed previous 4 sections).
social engineering,dumpster diving,identify theft,cyberterrorist
.
You have been asked to participate in a local radio program to add.docxshericehewat
You have been asked to participate in a local radio program to address the role of corrections in the community. The audience is specifically interested in discussing whether corrections should be focused on one or all of the following functions:
Rehabilitation of offenders
Punishment of offenders
Isolation of chronic offenders
After carefully considering available information and points of view on the subject, decide which role you believe should be the focus of the community's corrections policy. To prepare for the program, create 5 questions you believe callers may ask. Explain your point of view on the role of corrections in the criminal justice system to each of the questions asked, and draw a connection to the topic you are researching for this course. How do issues in corrections correlate with the topic you are researching?
.
Y
o
u
h
a
v
e
bee
n
h
i
r
e
d
a
s
a c
on
s
u
l
t
an
t
b
y
y
ou
r
t
o
w
n’
s
e
m
e
r
gen
cy
m
anage
m
en
t
c
oo
r
d
i
na
t
o
r
t
o
h
e
l
p
d
e
v
e
l
o
p
e
m
e
r
gen
cy
a
c
t
i
o
n
p
l
an
s
.
O
n
e
o
f
t
h
e
r
ea
s
o
n
s
y
o
u
w
e
re
s
e
l
e
c
t
e
d
i
s
y
ou
r
e
x
pe
r
t
i
s
e
i
n
u
s
i
n
g
t
h
e
G
ene
r
a
l
B
eh
a
v
io
r
M
od
e
l
(
G
E
BM
O
)
t
o
a
s
s
e
ss
r
i
s
k
s
.
Y
ou
r
f
i
r
s
t
t
a
s
k
i
s
t
o
a
ss
e
ss
t
h
e
ha
z
a
r
dou
s
m
a
t
e
r
i
a
l
r
i
s
ks
a
t
a
l
o
c
a
l
ga
s
s
t
a
t
i
on
.
T
h
e
s
t
a
t
i
o
n
ha
s
on
e
30
,
000
-
ga
ll
o
n
unde
r
g
r
ou
n
d
s
t
o
r
ag
e
t
an
k
c
o
m
pa
r
t
m
en
t
a
l
i
z
e
d
t
o
h
o
l
d
10
,
00
0
gal
l
on
s
ea
ch
o
f
t
h
e
t
h
r
e
e
ga
s
o
li
n
e
g
r
ade
s
,
and
t
he
re
i
s
on
e
add
i
t
i
ona
l
10
,
00
0
-
gal
l
o
n
t
an
k
f
o
r
d
i
e
s
e
l
f
u
e
l
.
T
h
e
s
t
a
t
i
o
n
ha
s
f
ou
r
p
u
m
p
s
,
an
d
ea
ch
on
e c
a
n
deli
v
e
r
al
l
f
ou
r
p
r
odu
c
t
s
.
A
l
s
o
o
n
s
i
t
e
i
s
a
2
,
50
0
s
q
.
f
t
.
c
on
cr
e
t
e
b
l
o
ck
b
u
il
d
i
n
g
u
s
e
d
f
o
r
t
h
e
c
a
s
h
i
e
r
an
d r
e
t
ai
l
s
a
l
e
s
o
f
s
e
r
v
i
ce
s
t
a
t
i
o
n
an
d c
o
n
v
en
i
en
ce
s
t
o
re
i
t
e
m
s
.
T
h
e
s
t
a
t
i
o
n
i
s
l
o
c
a
t
e
d
a
t
a
bu
s
y
i
n
t
e
r
s
e
c
t
i
o
n
nea
r
t
h
e c
e
n
t
e
r
o
f
t
o
w
n
.
I
t
i
s
ad
j
a
c
en
t
t
o
s
e
v
e
r
a
l
o
t
he
r
l
o
c
a
l
bu
s
i
ne
s
s
e
s
t
ha
t
d
o a
b
r
i
s
k
bu
s
i
ne
ss
du
r
i
n
g
t
h
e
da
y.
Acr
o
s
s
t
h
e
s
t
r
ee
t
f
r
o
m
t
h
e
s
t
a
t
i
o
n
i
s
a
l
a
r
g
e
hou
s
i
n
g
d
e
v
e
l
o
p
m
en
t
w
i
t
h
a
n
e
l
e
m
en
t
a
ry
s
c
hoo
l
.
B
eh
i
n
d
t
h
e
s
t
a
t
i
o
n
i
s
a
c
i
t
y
pa
rk
w
i
t
h
p
l
a
y
g
r
ou
n
d
s
,
ba
s
e
ba
l
l
f
i
e
l
d
s
,
an
d a
l
a
r
g
e
w
oode
d
a
r
ea
.
U
s
e
t
h
e
G
EB
M
O
f
r
a
m
e
w
o
rk
t
o
a
ss
e
ss
t
h
e r
i
s
ks
r
e
l
a
t
e
d
t
o
t
h
e
f
u
e
l
s
i
n
t
h
e
unde
r
g
r
oun
d
t
an
k
s
.
Con
s
i
de
r
ph
y
s
i
c
a
l
,
c
h
e
m
i
c
al
,
an
d
na
t
u
r
a
l
ha
z
a
r
d
s
t
ha
t
m
a
y
c
on
t
r
i
bu
t
e
t
o
t
h
e
r
i
s
k
s
.
1
.
D
i
s
c
u
ss
h
o
w
y
o
u
app
li
e
d
ea
ch
o
f
t
h
e
s
t
ep
s
i
n
t
h
e
G
EB
MO
p
r
o
c
e
s
s
an
d
w
h
a
t
r
i
s
ks
y
o
u
i
den
t
i
f
i
ed
.
2
.
Pr
o
v
i
d
e r
e
c
o
mm
enda
t
i
on
s
f
o
r
p
r
e
v
en
t
i
n
g
s
pi
ll
s
o
r
r
e
l
e
a
s
e
s
.
3
.
D
i
s
c
u
ss
r
e
s
p
o
n
s
e
a
c
t
i
on
s
r
equ
i
r
e
d
i
n
t
h
e
e
v
en
t
o
f
a
s
p
i
l
l
o
r
r
e
l
ea
s
e
.
S
uppo
rt
y
ou
r
d
i
s
c
u
ss
i
o
n
w
i
t
h
app
r
op
r
i
a
t
e r
e
f
e
r
en
c
e
s
an
d
i
n
-
t
e
xt
c
i
t
a
t
i
on
s
.
.
You have been appointed as a system analyst in the IT department of .docxshericehewat
You have been appointed as a system analyst in the IT department of a selected university in Malaysia. You are responsible to develop an online admission system for the university. For this reason, you have to do an analysis and design to model the online system that could be developed later. Identify the requirements for the system and produce a software requirement specification (SRS) to document all the details.
.
You choose one and I will upload the materials for u.Choose 1 of.docxshericehewat
You choose one and I will upload the materials for u.
Choose 1 of the following 3 questions, and answer it in a paper of no more than 1000 words. Submit that paper by
November 4
at midnight PST in the appropriate IICS515 Moodle dropbox.
4. Monday October 27 lecture
Themes: Global Media Governance and Regulation; The Internet and Digital Media
Readings: Chapter 5, “The Medium: Global Technologies and Organizations,” and Chapter 6, “The Internet”
In this lecture, we discussed the definition and history of communication rights as one element or dimension of communication policy, and used it to bring to life a subject—policy—that sometimes seems abstract and technical in nature.
In doing so, we noted the evolution from a “negative” rights view of communication rights, as expressed in Article 19 of the United Nations Universal Declaration of Human Rights in 1948, to the more “positive” definition of communication rights explained in the lecture content derived from the work of Marc Raboy (and Jeremy Shtern).
Remember that “negative” does not mean “bad” here nor “positive” good. “Negative” and “positive” rights—which are ways of thinking about all human rights, not just communication rights—are instead ways of characterizing the orientation of rights toward individuals and society. Negative rights are defined in terms of freedom
from
things, and positive rights in terms of freedom
to
have or do certain things. Both negative and positive rights derive their legitimacy from fundamental and universal consideration of what it means to be human and to be treat people as human beings.
In our case study at the end of the lecture, we then discussed how a “positive” approach to communication rights could help us better understand and perhaps act against cyberbullying.
In your paper, and in your own words, define “communication rights,” and then briefly explain the evolution from the negative to the positive rights approach to communication rights.
Once you have done that, and with reference to the cyberbullying pamphlet from the Canadian government attached to your lecture notes, demonstrate how a “positive” rights approach to communication rights can help us better understand and prevent cyberbullying. In other words, what are the limitations of approaching cyberbullying from a “negative” rights perspective, and what does a “positive” approach to communication rights do to help us understand and perhaps act against cyberbullying?
Cyberbullying is a problem in international communication that affects many, especially vulnerable teenagers, as illustrated in the case of the late Amanda Todd (from British Columbia).
You do not need to use the McPhail chapter here, as it is not directly relevant to this question. Rather, draw on the lecture notes and the podcast as your sources here.
5. Wednesday October 29 lecture
Themes: Global Media Case Study in Media and the Arab World; Orientalism
Readings: Said, Edward (1978)..
You are Incident Commander and principal planner for the DRNC even.docxshericehewat
You are Incident Commander and
principal planner for the DRNC event. As you commence the planning process, consider the two fundamental types of error committed by policy makers in their reliance on intelligence reports to formulate policy. What would you do to minimize these errors from occurring and adversely affecting your policy decisions?
Min 500 words, In text references, APA format
.
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxshericehewat
You Decide
Cryptographic Tunneling and the OSI Model
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
.
You are working as a behavioral health specialist in a neurological .docxshericehewat
You are working as a behavioral health specialist in a neurological research center and are responsible for participant education. There are three participants to choose from: Stephanie has experienced a stroke; Jamie has experienced an amputation; and Robert has experienced a traumatic brain injury. Choose one participant to work with.
We are chosing Robert and his traumatic brain injury
Prepare
a 1,000- to 1,200-word paper that explains the functions and limitations of neural plasticity in the participant's recovery process.
Include
two to three peer-reviewed sources.
.
You are to write up a reflection (longer than 2 pages) that discusse.docxshericehewat
You are to write up a reflection (longer than 2 pages) that discusses what happened in the prisoner's dilemma activity we did in class on Monday, April 20. Some points to cover include why you took the action you took, what you thought others were going to do and why, and what actually happened. And what implications this has for situations in the work place where individuals may take different actions than might be the most beneficial for the team as a whole.
.
You can only take this assignment if you have the book Discovering t.docxshericehewat
You can only take this assignment if you have the book Discovering the Humanities. This homework needs to be done by reading Chapter Nine. It needs to be a minimum of 150 to 200 words. It needs citations and referances.
Western art and architecture has influenced and been influenced by cultures in India, China, and Japan.
Part I:
Using examples provided from this unit's reading, discuss how the artistic culture in either India, China, or Japan (select one) exhibits influence from Western cultures. Discuss, too, the reciprocal connection, specifically explaining how India, China, or Japan influenced Western art and architecture.
Part II:
Add to your post by discussing the similarities and differences between art from your selected culture (India, China, or Japan) and ancient Greek sculpture. Use examples and images to support your ideas.
.
You are to interview a woman 50 and older and write up the interview.docxshericehewat
You are to interview a woman 50 and older and write up the interview
in a 5 page MLA paper. You ask questions intended to elicit information about her life
and how it relates to the history of women in the late 20th century. Your paper
should be normal margins, 10-12 pt. font, typed and double-spaced. It should
include the approximate age of your interviewee—it does not have to include her
name.
EXAMPLE QUESTIONS ..........
What’s your first, most vivid memory? Going to my grandma and grandpa’s farm and making grandma walk me out to the outhouse for fear of a mean bannie rooster would peck me to death. He was afraid of grandma.
What was the apartment or house like that you grew up in? How many bedrooms did it have? Bathrooms? I lived with my mother and father mostly in a house in the city that had 2 bedrooms, 1 bathroom. I had to share a room with my older brother that was upstairs.
What was your bedroom like? Very simple. It had 2 beds made of feathers, a desk with a lamp and one dresser for our clothes. Dallas (my brother got the bottom 2 and I got the top 2)
Can you describe the neighborhood you grew up in? Not really. Every chance I got I went to grandma and grandpas and spent time with them. They lived deep in the country. I had one friend out there that lived about 3 miles away on the next farm. His name was Carl.
Tell me about your parents. Where were they born? When were they born? What memories do you have of them? Both parents were born in Richmond, IN. Memories include more of my mother than my father. He was a drunk that stayed out all the time. He only came home when he was ready to pass out or to beat us.
Who was more strict: your mother or your father? Do you have a vivid memory of something you did that you were disciplined for? Since mom was the main one around I would say that she was more strict. I remember one instance when I was about 16 and mom had kicked me out of the house because she was forced to work with dad being gone all the time and I was telling her that I no longer wanted to take care of my little brother because I felt like I was his mother rather than her and that I didn’t want to do anymore of the house work. It was her house she should have to clean it. She kicked me out. I was sitting on the porch crying and dad came home (sober for once) and sat on the porch with me, got me calmed down and offered to give me a ride to grandma and grandpa’s.
Did your parents have a good marriage? No they had a horrible marriage.
How did your family earn money? How did your family compare to others in the neighborhood – richer,
poorer, the same? My family earned money from my mother working in a diner. Dad worked in a mill but we rarely saw his money. We did alright but I would say that we were on the poorer end of society.
What kinds of things did your family spend money on? The necessities and that was it.
How many brothers and sisters do you have? When were they born? What memories do yo.
You are to complete TWO essays and answer the following questions. .docxshericehewat
You are to complete TWO essays and answer the following questions. Here are your questions:
1) How has the information provided in this class changed or reinforced your perspective on an issue(S). Please provide details.
2) What do you believe is the biggest challenge facing our nation and why? Be specific and detailed. What can be done to address this challenge? Be realistic and detailed in your responses.
750 - 800 words each essay
no plagiarism
.
You are the vice president of a human resources department and Susan.docxshericehewat
You are the vice president of a human resources department and Susan has been your executive assistant for one (1) year. She effectively completes her given assignments, sometimes ahead of schedule. Susan has a welcoming personality and is commended on her willingness to help when asked. As a result of her efficiency, Susan often has spare time on her hands.
In several conversations, you have spoken with Susan about taking a proactive stance and involving herself in the business to increase her knowledge base. You have suggested she attend strategic planning meetings, shadow other Business Partners, and take professional development courses geared towards human resources. Susan has not incorporated any of these suggestions.
The organization promotes and encourages employee development and has a requirement of 24 professional development (PD) hours for each employee per annual review cycle. As VP of the department, you have offered to mentor Susan; yet she has not taken advantage of the offer. Given Susan’s capabilities and potential, you want to mutually establish future performance goals and developmental opportunities to enhance her effectiveness and maximize her organizational contributions.
Susan’s professional appearance and interaction with co-workers is superb. When asked to complete a task, she fulfills the assignment willingly and with very few errors. She is well liked and respected by her peers. She has impeccable oral and written communication skills. Overall, you are pleased with her performance but want to see Susan take initiative to seek out tasks to complete rather than waiting to be told what to do.
As the VP of HR, you have been tasked with a two part assignment. In part one of this assignment you will explain the importance of performance appraisals, analyze the essential elements which should be included and describe how performance appraisals can be used to promote employee growth. In part two of this assignment you will create a performance appraisal for Susan.
Your paper should be 8-10 pages in length incorporating both parts I and II. You can either design a performance appraisal document or use an existing template. The performance appraisal should be no more than 3 pages of the total page count for the assignment. Be sure your paper addresses all of the following components:
Part I: Importance of Performance Appraisals:
Explain how performance appraisals can be used as part of employee development.
Explain why rankings are given to employees and the advantages and disadvantages of including rankings.
Address why organizations should deliver appraisals in a timely manner to employees.
Discuss the advantages and disadvantages of three different types of performance appraisals. Make a recommendation of which type of performance appraisal is most appropriate for Susan.
Provide suggestions on how the manager can give feedback on a continual basis to the employee to encourage continual development.
Part II: Sus.
You are the purchasing manager of a company that has relationships w.docxshericehewat
You are the purchasing manager of a company that has relationships with many different suppliers. All information about orders, shipments, etc. is still manually exchanged. You have discussed incorporating Internet technologies to help manage the supply chain.
In 1-2 pages, summarize the advantages of using Internet technologies versus traditional methods in supply chain management.
.
You are to briefly describe how the Bible is related to the topics c.docxshericehewat
You are to briefly describe how the Bible is related to the topics covered in the course. An integration of the Bible must be explicitly shown, in relation to a course topic, in order to receive points. In addition, at least two other outside scholarly sources (the text may count as one) should be used to substantiate the group’s position.
.
You are the manager of an accounting department and would like to hi.docxshericehewat
You are the manager of an accounting department and would like to hire another managerial accountant to focus on internal accounting. The chief executive officer (CEO) is not convinced that a managing accountant position is needed. Prepare a 2-page memo for the CEO on the following:
Explain the objectives and characteristics of an internal accounting system.
.
You are the new chief financial officer (CFO) hired by a company. .docxshericehewat
You are the new chief financial officer (CFO) hired by a company. The chief executive officer (CEO) indicates that in the past, there was little rhyme or reason for the prior CFO to approve or disapprove of large capital projects or investments that various managers proposed. You mentioned to the CEO that there are three primary methods of capital budgeting, and they are as follows:
Simple payback method
Net present value method
Internal rate of return (IRR) method
Discuss the following topics on the Group Discussion Board and write a group paper between 700–850 words. Assign topics to be written by each group member and compile it all together before submitting your group paper:
A company's cost of capital and how it is calculated
What the marginal cost of capital is and how it differs from the weighted average cost of capital
.
You are the manager of a team of six proposal-writing professionals..docxshericehewat
You are the manager of a team of six proposal-writing professionals. You are tasked with completing one 50 page formal proposal as well as a 1-2 page summary advocating funding for a new sports arena. Your supervisor, a member of the senior leadership team, wants to know how you plan to successfully accomplish the assignment. Prepare a PowerPoint Presentation to your supervisor that conveys the following information:
As manager, how will you organize the work to prepare a proposal?
What tasks will each professional be assigned and why?
What three or four communication tools will you propose be used to effectively articulate the proposal and why? (For example, formal paper-based, PowerPoint Presentation, blog, Twitter, Facebook, LinkedIn, etc.)
.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Fund DevelopmentThis chapter will present the basics of fundra.docx
1. Fund Development
This chapter will present the basics of fundraising, including
the annual campaign, direct mail, special events, major gifts,
and planned gifts. The concept of moving donors from annual
giving to major gifts and planned gifts will be presented. This
chapter will also explore donor motivation and present a
fundraising strategy based on the concept of providing donors
with opportunities rather than approaching fundraising as a
“begging” activity. Begging is not a strategy to raise funds. The
alternative to begging for funds is to have a well-developed
fundraising program. Even if the organization employs a
professional fundraiser, the administrator is still the chief
fundraising officer and, as such, will develop professional
fundraising skills or risk becoming the chief beggar for the
organization. Securing resources for the organization is
ultimately the responsibility of the board of directors, but it is
the administrator’s responsibility to develop and oversee a well-
developed fundraising program. Effective fundraisers work from
a strategic fundraising plan that is long term, has specific goals,
and uses a variety of fundraising methods and techniques. The
organization’s financial strength can be developed and
maintained only through a fundraising strategy that is
diversified by using many different fundraising approaches
appropriate for their various categories of donors. Fundraising
must be approached as any other major project in that it requires
the administrator to develop a plan. The planning process for
fundraising includes the same steps as any other planning
process. As the administrator, you must set goals, allocate
resources, develop action steps and timelines. and then evaluate
the process. There are many “truisms” in fundraising, but the
one most important to remember is that “people give to people,
not to organizations.” This is another way to say that
fundraising is really “friend-raising.” The people that will give
2. money to your organization are those who share a passion for
the mission of the organization and who trust that their money
will be used wisely. It is the responsibility of the administrator
to develop and nurture relationships that will financially sustain
the organization. Another truism is that people will not give
anything to meet your agency needs, but they will give when
presented with the opportunity to invest in an organization that
will make a difference in the lives of others. People will give
when they think they can make a positive difference in
something they care about. At whatever level of fundraising
activity, your approach should be to present opportunities that
will make a positive impact in the lives of the people your
organization serves and not to present the “needs” of the
agency.
11Fund Development
Copyright 2014. SAGE Publications, Inc. All rights reserved.
May not be reproduced in any form without permission from the
publisher, except fair uses permitted under U.S. or applicable
copyright law.
EBSCO Publishing : eBook Collection (EBSCOhost) - printed
on 12/5/2019 7:27 AM via RASMUSSEN COLLEGE AN:
972400 ; Watson, Larry D., Hoefer, Richard.; Developing
Nonprofit and Human Service Leaders : Essential Knowledge
and Skills
124 LEADERSHIP SKILLS
Remember that people want to give to successful causes. You
want to give the donor not only the opportunity to give but also
a reason to contribute to a cause that will support success. Your
appeal is not that your organization has great needs, but that it
is successful in meeting the needs of your clients. Before we
explore the many levels of activities in a fundraising program,
we will look at the factors that motivate people to give.
DONOR MOTIVATION
Why do people give? Often, you will hear that most people give
a donation because they will get a tax break. It is very seldom
that tax donations are the major reason for making a donation.
3. You may need funds to hire a new counselor, but the
fundraising approach should be to secure funds to serve more
clients. You must tell the potential donor why the clients need
this service and what difference it will make in their lives if the
services are provided. The approach should NOT be that your
organization needs a new counselor.
A new executive director was excited to learn that an elderly
couple had decided to leave their 1,000-acre ranch to the
organization in their will. The executive went to visit the couple
and raised the possibility that they could use a planned giving
vehicle to go ahead and make their gift to the agency and at the
same time enjoy a tremendous tax advantage, plus increase their
income for the rest of their lives. In fact, through this gift, the
couple could be rich. After listening politely, the elderly woman
said, “Young man, I don’t want to be rich. I want to go to our
ranch and hunt birds!” It is important to know what motivates a
donor. In this case, it was certainly not a tax break or more
income.
So why do people give? In a review of over 500 articles on
charitable giving, Bekkers and Wiepking (2011) found eight
mechanisms as the most important forces that determine a
person’s decision to give. These are (1) awareness of need, (2)
solicitation, (3) costs and benefits, (4) altruism, (5) reputation,
(6) psychological benefits, (7) values, and (8) efficacy. People
will give only when they are interested and involved in your
cause. Of course, there are different levels of giving. The new
donor, responding to a direct mail piece, will be very different
from a board member donor with years of experience with the
organization. People will respond to different kinds of appeals
because they have different reasons. So, why do they give?
Giving behavior is just as complex as any other behavior. In his
book Tested Ways to Successful Fund Raising, George A.
Brakeley, Jr. (as cited in “8 Rules of Thumb,” 2012) wrote that
virtually every fundraising campaign and development program
depends on nine factors in motivating donors to support their
organization:
4. 1. The right person or persons ask them, at the right time, and in
the right circumstances. 2. People have a sincere desire to help
other people.
Copyright 2014. SAGE Publications, Inc. All rights reserved.
May not be reproduced in any form without permission from the
publisher, except fair uses permitted under U.S. or applicable
copyright law.
EBSCO Publishing : eBook Collection (EBSCOhost) - printed
on 12/5/2019 7:27 AM via RASMUSSEN COLLEGE AN:
972400 ; Watson, Larry D., Hoefer, Richard.; Developing
Nonprofit and Human Service Leaders : Essential Knowledge
and Skills
Fund Development 125
Whatever their other motivations, people will give only when
they are interested and involved, and when they are asked. To
determine how to ask for a gift, we must know where our donors
fit on the “donor pyramid.”
THE DONOR PYRAMID
Fundraising professionals often use the donor pyramid as a way
to conceptualize the fundraising program (see Figure 11.1).
Each level in the pyramid builds on the level beneath it. For
example, direct mail solicitation is appropriate to attract new
donors to your organization, but once they have responded with
even a small gift, your goal is to move them up to the next level
of the pyramid. You want your new direct mail donors to
become major givers. Of course, some donors will always be
small givers or even stop giving to your organization, but most
of your future major gift donors of tomorrow are your small gift
givers today. Also, remember that all those small gifts add up
and are very important to your overall fundraising plan. The
Association of Fundraising Professionals (AFP) Fundraising
Dictionary (2004) describes the donor pyramid as:
A diagrammatic description of the hierarchy of donors by size
of gifts. The diagram reflects that: as the size of donations
increases, the number of donations decreases; as the number of
years a donor is asked to renew increases, the number of donors
5. decreases; as campaign sophistication progresses from annual
giving to planned giving, the number of donors decreases; as
donor involvement increases, the size of the donor’s
contribution increases and the response to campaign
sophistication increases.
As you work through this chapter, refer back to the donor
pyramid. In a sophisticated fundraising program, donors will be
treated differently depending on where they are on the donor
pyramid. Donors will move up the donor pyramid through
involvement with the organization and through receiving
personal attention from the board and staff of the organization.
Notice that, as you move up in the pyramid, the fundraising
techniques become increasingly more personalized. What seems
to be a simple and obvious truism is, “No one gives at any level
unless they are asked!” As uncomfortable as it may be at times,
eventually someone has to ask for the gift, but, if you and your
board believe in your mission and truly believe you are giving
others the opportunity to participate in your important work,
then the “ask” will be less difficult.
Annual Campaign
The annual campaign consists of the fundraising activities that
are conducted for the purpose of supporting the organization’s
annual operating budget. Even though these funds will be used
for the organization’s operating budget, your approach will
focus on the services to be provided, not on the need for things
like staff raises or paying the electric bill. The operating
expenses support the services your organization provides. Ask
your donors to help serve your clients. Generally, the largest
number of donors will be giving to the annual campaign. Some
organizations may not think of their many and diverse
fundraising activities as an “annual campaign,” but whether it is
thought of in these terms or not, it is in effect the annual
campaign for the organization. The approaches used in the
annual campaign may include direct mail, phonathons, or
special events such as golf tournaments or galas. The defining
feature of annual fund activities is that they are activities
6. intended to raise gift income, every year. It is expected that you
will approach the same donors every year and, sometimes,
several times within the same year. Funds donated to the annual
campaign are intended to support operational costs such as
salaries, supplies, utilities, and client needs. The purpose is to
support any part of the organization’s operation that requires
continuous and regular support. Most donors will come into
your organization through the annual campaign. It is rare that a
person’s first gift to the organization will be a major gift. More
likely, those who become major donors are those who have been
consistent annual campaign donors.
Direct Mail
You probably know about direct mail fundraising from your
personal experience. Direct bulk mail is used to ask millions of
people for money, and most people receive solicitations in their
mail on a regular basis. What rate of return should you expect
for your direct mail campaign? Typically, the response is
somewhere in the range of 1%. Even though the return is small,
it is an economical way to get your message before thousands of
potential donors and a key strategy in bringing new people into
the bottom of your pyramid. The typical direct mail package
includes the carrier (outside), the letter, a reply device, and a
return envelope. The carrier or outside envelope should be
designed with one objective in mind: to get the recipient to open
it. If the piece goes into the trash, your chance of getting a
donation is zero. The goal is to make the pieces look as much as
possible like a personal letter and to make it look different from
other solicitations in the mail box that day. Ideally, the
envelope could be hand addressed, but since direct mail is a
strategy of large numbers, this is rarely possible. Pre-cancelled
bulk mail stamps give a more personal look than the standard
postal indicia used on most bulk mail. The other strategy is to
use an envelope other than the standard “number 10” business
envelope that many fundraisers refer to as “the number 10
ugly.” Choose an envelope that is smaller, larger, or a different
shape. You may also want to consider using color or a see-
7. through window to peak your potential donor’s interest. Once
you get the potential donors to open the letter, your task is to
capture their attention long enough to consider making a gift to
your cause. The task here is not to write a scholarly piece or to
impress anyone with your vocabulary. The letter should strike
an informal tone and be easy to read and understand. Kim Klein
(2000) proposes a set of principles to remember as you develop
your letter:
1. People have a very short attention span. Sentences should be
short and take no more than six to fifteen seconds to read.
Copyright 2014. SAGE Publications, Inc. All rights reserved.
May not be reproduced in any form without permission from the
publisher, except fair uses permitted under U.S. or applicable
copyright law.
EBSCO Publishing : eBook Collection (EBSCOhost) - printed
on 12/5/2019 7:27 AM via RASMUSSEN COLLEGE AN:
972400 ; Watson, Larry D., Hoefer, Richard.; Developing
Nonprofit and Human Service Leaders : Essential Knowledge
and Skills
Fund Development 129
2. People love to read about themselves. The letter should refer
to the reader at least twice as often and up to four times as often
as it refers to the organization sending it. For example, “You
may have read . . . ” or “If you are like me, you care deeply
about . . . ” 3. People must find the letter easy to look at. The
page should contain a lot of white space and wide margins, and
be in a clear and simple font. Paragraphs should be short, no
more than two or three sentences. You should feel free to use
contractions (won’t, you’re, can’t, we’re) as this will add a
more informal tone to your letter. 4. People read the letter in a
certain order. First, they read the salutation and the opening
paragraph, but then, no matter how long the letter is, they read
the closing paragraph and then the postscript. Only a small
number of people will read the entire letter.
The opening paragraph of your letter is critical. It must capture
the attention of your readers and make them want to read on.
8. Remember the truism that people will not give anything to meet
your agency needs, but they will give when they have an
opportunity to invest in a service that is of interest to them.
Your letter must be about the people you serve, not the needs of
your organization. Also, people do not relate well when you talk
about the thousands of people you serve. Your letter should tell
the story of one person helped by your organization and how
this potential donor can make a difference in the life of
someone else. How long the letter should be is always a debate.
Our natural instincts tell us that the letter should be short and to
the point, but many fundraising consultants counsel that long
letters are better and claim that a two-page letter will get a
better response than a one-page letter, and that even three- and
four-page letters will often outperform a shorter letter. There
are many theories about why you should consider writing a
longer letter. Some will say that it gives the impression that
your organization has a lot to say, while others believe that
more pieces of paper and longer letters give an opportunity for
the potential donor to feel more involved with your
organization. In the closing paragraph, you ask for the money.
Tell the reader what you want them to do. They have read your
letter, now what do you want them to do about it? For example,
say, “Send your gift of $25, $50 or $100 today.” It needs to be
direct and specific. No one gives unless they are asked. The
postscript is that small P.S. at the end of the letter. The reader
will read the P.S. if they do not read anything else in the letter.
This is your final opportunity to ask for the gift. Examples are,
“ Send your check today” or “Johnny needs your help.” Finally,
the reply device is a small card that gives the potential donor
the opportunity to respond. It will typically have a box to check
that says something like, “Yes! I’ll help” and then gives several
options of giving—$10, $25, $50, $100, or more. The donor
completes the card, encloses the check, and returns it in the
enclosed return envelope. With that, your campaign is a
success—at least with this donor. Special events are limited
only by your imagination. The events may be galas, golf
9. tournaments, walk-a-thons, performances—the possibilities are
endless. Many times, special events do not raise large sums of
money for the first few years but, over time, grow into major
events that raise large amounts of money. When planning a
special event, there are considerations other than the amount of
money to be raised. The special event may be the activity that
will raise the visibility of your organization in the community
and an opportunity to involve more volunteers in your work.
Special events are by their nature very labor intensive and can
take a great deal of your time and staff time. Before deciding on
a special event, it is important to consider the volunteer and
staff resources necessary for a successful event. Any special
event will require a major investment of time in planning,
marketing, and execution.
Copyright 2014. SAGE Publications, Inc. All rights reserved.
May not be reproduced in any form without permission from the
publisher, except fair uses permitted under U.S. or applicable
copyright law.
EBSCO Publishing : eBook Collection (EBSCOhost) - printed
on 12/5/2019 7:27 AM via RASMUSSEN COLLEGE AN:
972400 ; Watson, Larry D., Hoefer, Richard.; Developing
Nonprofit and Human Service Leaders : Essential Knowledge
and Skills
130 LEADERSHIP SKILLS
Major Gifts
Major gifts are the larger gifts that you will solicit for your
cause. These gifts will typically come from those individuals,
foundations, and corporations with whom you have developed a
long-term ongoing relationship. Many times, major gifts are
solicited within the framework of a “capital campaign” for the
purpose of capital improvement, such as building a new
building or, in some cases, to develop or strengthen the
endowment of an organization. An organization will often
contract with a consulting firm to conduct a capital campaign.
You, your board, and your staff will still have to solicit the
gifts, but a good consultant can help structure and focus a
10. successful campaign. Major gifts require personal solicitation
and the preparation of a proposal. A foundation may require a
fully developed proposal, but an individual donor may prefer a
short, well-developed statement of the purpose of the proposed
donation. These donors are higher on the “pyramid” and, in
most cases, know about your organization, believe in your work,
and are willing to make a major contribution. When seeking a
foundation or corporate gift, it is important to research the
previous gifts and areas of interest of the foundation or
corporation. As in all fundraising, finding a personal connection
between your organization and the foundation or corporation is
a great asset in your attempt to secure a gift.
Planned Gifts
Planned giving is a complex area. The bequest is the simplest
form of planned giving. This means that someone has named
your organization in a will and that, on passing away, a portion
or sometimes all of that person’s estate will come to your
organization. As the administrator, you have an awesome
responsibility to see that a person’s life work is used for the
intended purposes. Other planned giving arrangements include
charitable gift annuities, revocable and non-revocable trusts,
and other financial vehicles to transfer funds from the donor to
the organization. These gifts have tax implications for the donor
and are in many cases a part of the estate planning process. Any
gift of this type will involve an attorney or certified public
accountant. The role of the administrator is to see that the
organization has the structure and the advisors necessary to
accept gifts of this nature.
Say Thank You!
It is impossible to say thank you too much to your donors. The
acknowledgement or “thank you” is a vital part of your
fundraising system. Donors should be thanked in writing as
quickly as possible for their gift, and, whenever possible,
donors should be thanked with a telephone call. For large
donations, you as the administrator or your board chairman
should make a phone call or a visit to thank donors for their
11. gifts. Since successful fundraising is based on relationships, it
is important to nurture and sustain relationships by showing
gratitude to those who invest in the mission of your
organization.
SUMMARY
Effective fundraisers work from a strategic fundraising plan that
is long term, has specific goals, and uses a variety of
fundraising methods and techniques. The organization’s
financial strength can be developed and maintained only
through a fundraising strategy that is diversified by using many
different fundraising approaches appropriate for their various
categories of donors. Fundraising must be approached as any
other major project in that it requires the
Copyright 2014. SAGE Publications, Inc. All rights reserved.
May not be reproduced in any form without permission from the
publisher, except fair uses permitted under U.S. or applicable
copyright law.
EBSCO Publishing : eBook Collection (EBSCOhost) - printed
on 12/5/2019 7:27 AM via RASMUSSEN COLLEGE AN:
972400 ; Watson, Larry D., Hoefer, Richard.; Developing
Nonprofit and Human Service Leaders : Essential Knowledge
and Skills
Fund Development 131
Administrator to set goals, allocate resources, develop action
steps and timelines, and then evaluate the process.
Helpful Terms:
Annual campaign—the fundraising activities that are conducted
for the purpose of supporting the organization’s annual
operating budget.
Direct mail—a fundraising approach using bulk mail to reach
potential donors. The typical direct mail package includes the
carrier (outside), the letter, a reply device, and a return
envelope.
Donor pyramid—a diagrammatic description of the hierarchy of
donors by size of gifts. The diagram reflects that: as the size of
donations increases, the number of donations decreases; as the
12. number of years a donor is asked to renew increases, the number
of donors decreases; as campaign sophistication progresses from
annual giving to planned giving, the number of donors
decreases; as donor involvement increases, the size of the
donor’s contribution increases, and the response to campaign
sophistication increases.
Major gifts—the larger gifts that typically come from
individuals, foundations, and corporations with whom the
organization has developed a long-term, ongoing relationship.
Some major gifts are solicited within the framework of a
“capital campaign” for the purpose of capital improvement,
such as building a new building or, in some cases, to develop or
strengthen the endowment of an organization.
Planned gifts—The bequest is the simplest form of planned
giving. Other planned giving arrangements include charitable
gift annuities, revocable and non-revocable trusts, and other
financial vehicles to transfer funds from the donor to the
organization. These gifts have tax implications for the donor
and are, in many cases, a part of their estate planning process.
Special events—events such as galas, golf tournaments, walk-a-
thons, performances, and so on; very labor-intensive activities
that have the advantage of increased volunteer participation and
the opportunity to increase the visibility of the sponsoring
organization.
REFERENCES
Bekkers, R., & Wiepking, P. (2011). A literature review of
empirical studies of philanthropy: Eight mechanisms that drive
charitable giving. Nonprofit and Voluntary Sector Quarterly,
40(5), 924–973. 8 rules of thumb when soliciting prospects.
(2012, May 23). The NonProfit Times. Retrieved from
http://www.thenonprofittimes.com/management-tips/8-rules-of-
thumb-when-soliciting-prospects Hoffman, M. (2011).
Americans give $241 billion to charity in 2003. Foundation for
the Carolinas. Retrieved from
http://fftc.pgdc.com/pgdc/americans-give-241-billion-charity-
2003 Klein, K. (2000) Fundraising for social change (4th ed.).
13. Oakland, CA: Chardon Press.
Generalized Semi-Orthogonal Multiple-Access for
Massive MIMO
Majid Nasiri Khormuji
Huawei Technologies Sweden AB, Stockholm
Emails: [email protected]
Abstract—We propose a novel framework to enable concurrent
transmission of multiple users to an access node equipped with
a
massive multiple-input multiple-output (mMIMO), which
encom-
passes and extends the conventional time-division duplex
(TDD)
protocol and the recently proposed semi-orthogonal multiple-
access (SOMA). The new solution is referred to generalized
semi-
orthogonal multiple-access (GSOMA). To enable GSOMA, the
users are grouped such that the users within each group are
assigned mutually orthogonal pilot sequences. However the
pilot
sequences can be reused in different groups and the users in
different group are coordinated such that their pilot sequences
do not interfere by a semi-orthogonal mechanism enabled by a
resource-offset sequence. We describe the general framework
and
analyze a case of GSOMA and show that a properly designed
GSOMA can outperform the conventional TDD and SOMA.
I. INTRODUCTION TO MMIMO
14. Massive multiple-input multiple-output (mMIMO) commu-
nication is considered as one of promising physical-layer
solutions to enable multi-user communication for future com-
munications systems [1]–[4] in response to ever-increased
demand for high data rate applications as well as to a more
homogenous quality-of-service across the service area. Time-
division duplex (TDD) protocol in which the uplink pilot
symbols are used to estimate both uplink and downlink is
proposed to cope with the pilot overhead for mMIMO arrays.
In TDD protocol [1]–[4], the transmission time over each
coherence time is divided into four non-overlapping phases:
Channel training to learn the channel between the users and the
base station, each user transmits some known pilot symbols;
Uplink Data: the uplink data of all users are transmitted
over the same time–frequency resources in a non-orthogonal
fashion such that the base station receives a superposition of
all transmitted symbols; Processing Time: the time which is
needed to perform the channel estimation and precode the
users data for the downlink transmission; and Downlink Data:
finally the downlink data of all users are precoded using
the estimated channels and transmitted over the same time–
frequency resources in a non-orthogonal fashion. The duration
of uplink and downlink transmissions may vary and can be
adjusted based on the amount of the users’ data and the traffic
demands.
In this paper, we investigate the communication of K single-
antenna users to a common receiver with a massive antenna
array over an uplink shared channel. To estimate the channel
between two antenna ports, the transmitting node sends pilot
symbols which are known at the receive node (the time–
frequency location and the associated value are generally
preset). The pilot symbols from each user should have the
periodicity of N = TcBc symbols in order to track the channel
variation over the time and frequency where Tc and Bc denote
15. the coherence time and bandwidth, respectively. It is desirable
to coordinate as many users as possible for uplink transmission
such that the receiver can perform spatial-division multiple-
access (SDMA); i.e. the receiver is able to obtain interference-
free signals associated to each user via spatial filtering (e.g.
projection of the received signals in the space that is spanned
by the associated channels from the users to the antenna
array). In mMIMO, the receiver can asymptotically separate
the uplink data of different users without inter-user interfer-
ence if the spatial channels are for example independent [1].
Hence ignoring the processing time, the maximum number
of the coordinated users, under successful decoding, can be
obtained by maximizing the total number of transmitted data
symbols that are separable at the receiver, which is given by
K(BcTc − K), where the maximum is taken over the active
number of users, K, for a given coherence interval spanning N
symbols. Under assumption that all data symbols contain equal
information; i.e. all users employ the same modulation order,
this concludes that the coherence interval should be equally
divided between the channel training and data transmission
as considered in [1]. So the optimal number of active users
operating over the same time–frequency resources should be
set to
⌊
1
2
N
⌋
and the total number of data symbols that can be
transmitted hence becomes
⌊
1
2
17. User K
Pilot symbol
Baseline UL data symbol
NEW UL data symbol
Blank symbol
... ...
Channel Training
UL Data
... ...
... ...
Coherence Interval
... ...
... ...
...
User K+1
User K+2
User N-1
NEW UL data symbol
18. of NEW users
Fig. 1. Illustration of Semi-Orthogonal Multiple-Access
(SOMA) transmission.
II. SOMA
We next briefly discuss the semi-orthogonal multiple-access
in [5] which is designed to address the uplink capacity shortage
problem in mMIMO. SOMA coordinates up to K ≤ N − 1
users, where N = TcBc is the number of resources in time and
frequency over which the channel is approximately constant,
i.e. the coherence interval. Fig. 1 depicts an example of how
the uplink transmission is configured in which K = N − 1
users are scheduled. Over each coherence block, the user
1 ≤ j ≤ N − 1, transmits one pilot symbol and N − j data
symbols such that the pilot symbols of users are transmit-
ted over orthogonal time–frequency resources, and the data
symbols of user j, for all 1 ≤ j ≤ N − 1, consume all the
time–frequency resources of users j + 1 ≤ k ≤ N −1, which
are used for both pilot and data transmission. The received
signals at the access node in a coherence window is illustrated
in Fig. 1. In a given time-slot, some of the users are silent
and appears orthogonal while some other users transmit non-
orthogonally. For example, in time slot one, only user one
transmits its pilot and all other users appear orthogonal and
in the second time slot the first user transmits its data symbol
and second user transmits its pilot symbol and so forth; cf.
semi-orthogonal feature. SOMA when used with an access
node with a very high number of antennas can schedule K
users where user k can transmit N − k asymptotically error-
free symbols. Therefore, for very large antenna arrays, SOMA
solution nearly doubles the throughput as compared to the
baseline TDD with optimal number of users. The receiver is
constructed using a sequential channel estimation and data
detection enabled by the designed semi-orthogonal feature
19. embedded in the transmitted signals.
III. GENERALIZED SOMA
We next present the generalized SOMA (GSOMA). Fig. 2
depicts multi-user GSOMA transmission in which the users
are grouped into J groups where each group contains kj
users for j ∈ {1, 2, . . . , J} and K =
∑J
j=1 kj is the total
number of the users. The user i in group j uses the pilot
sequences si for all j ∈ {1, 2, . . . , J}. That is the pilot
sequences are reused. The pilot sequences within each group
are orthogonal such that it allows interference-free channel
estimation for the users in each group. The maximum number
of pilot sequences therefore is maxj kj . The conventional
reuse of pilot sequences where the pilot symbols interference
with one another results to “pilot contaminations” which
severely degrades the performance of the users. However with
this new solution, it is allowed to reuse the pilot sequences
in a controlled fashion. A pilot reuse is performed semi-
orthogonally to boost the spectral efficiency of the system.
However, the interference is controlled by a transmission of
a resource-offset (e.g. timing-offset or frequency-offset) such
that the received packets at the access node have the following
structure
• The pilot signals of different groups are received non-
orthogonally (for example non-overlapping time slots
with timing-offset)
• The pilot sequences of the group j ∈ {1, 2, . . . , J}, are
only interfered by data symbols of users in the groups
1 to j − 1. The pilot sequences of the first group are
20. received interference-free. That is the other users appear
silent at the receiver side.
With GSOMA, the user may use partial blanking which has
the same granularity as the length of pilot region to control
to the inter-group interference. GSOMA includes both SOMA
scheme described in [5] and the conventional TDD solution
proposed by Marzetta in [1] as special cases. When each group
contains one user and no blanking is used, GSOMA reduces to
SOMA. When there is only one group with maximum number
of users, then GSOMA reduces to the conventional TDD
wherein only orthogonal pilot sequences are used. Therefore,
a properly designed GSOMA can combine the advantages
of both SOMA and conventional TDD. The advantage of
GSOMA with respect to the conventional TDD is that it sched-
ules more groups, which enhances the aggregate rate. Since
DataPilot 1 Pilot 1 DataPilot 1 Data Pilot 1 DataPilot 1 Data
Pilot 1 Data
DataPilot 1 Pilot 1 DataPilot 1 Data Pilot 1 DataPilot 1 Data
Pilot 1 Data
Pilot 1 Data Pilot 1 DataPilot 1 Data Pilot 1 Data
Pilot 1 Data Pilot 1 DataU
s
e
rs
w
it
h
24. Controller
Resource-Offset Sequence
Pilot Sequence Index
Access Node
Blanking Pattern
Channel Estimation Uplink data and pilot signals over
shared channels
Spatial FilteringDetection
D
M
U
X
Blank
Blank
Blank
� �
�
�
�
Users
25. Fig. 2. Generalized Semi-Orthogonal Multiple-Access
(GSOMA) transmission.
within each group the pilot sequences are mutually orthogonal
as that in the conventional TDD, it allows performing joint
channel estimation without interference for all users in each
group and employing joint spatial filtering such as zero-forcing
per group to suppress the inter-user interference among the
users in each group. This also increases the aggregate rate.
IV. TWO-GROUP GSOMA
In this section, we tailor the design of GSOMA to the cases
with two groups and discuss two modes of transmission.
A. Mode 1: without blanking
Fig. 3 shows the transmission protocol and the receiver for
the case with two groups where there is no blanking. The
users are grouped into two groups such that each group is
designed according the conventional TDD wherein the half of
the coherence time, i.e. 1
2
Tc, is used for pilot transmission and
the other half is consumed for the data transmission. To enable
the channel estimation without interference, a time-offset equal
to 1
2
Tc is used. The receiver first estimates the channel of the
users in the first group using the knowledge of the orthogonal
pilot sequences and then performs joint spatial filtering to
26. decode the data of the first group. The decoded data are fed
back to the channel estimator of the second group to perform
interference cancellation prior to the channel estimation. After
the interfere cancellation, the channels of the second group are
estimated using the known orthogonal pilot sequences used for
the users in the second group. The decoded data of the second
group is used to cancel the interference over the pilot symbols
of first group. This sequential channel estimation and decoding
is iteratively continued until all data are successfully decoded.
We next present the single-cell uplink throughput for the
protocol in Fig. 4 with L consecutive sub-frames when the
receiver has nt antennas and the channels are i.i.d. Rayleigh
fading with unit variance. We first consider matched-filtering
(MF) and then zero-forcing (ZF). The proofs, which are
omitted due the space limitation, can be obtained by similar
approaches as those in [5].
Proposition 1: The transmission protocol in Fig. 3 where
each group contains K users and the receiver employs MF
achieves the sum-rate
RMF∑,1 = K2L + 1
L∑
l=1
(R1,l + R2,l) (1)
where
R1,l = log
(
1 +
27. (nt −1)(1−Ne1,l)Pd1,l
N0 + Ne1,lPd1,l + Pp2,l + (K −1)Pd1,l
)
R2,l =log
(
1 +
(nt −1)(1−Ne2,l)Pd2,l
N0 + Ne2,lPd2,l + Pp1,l+1 + (K −1)Pd2,l
)
Ne1,l =
N0 + KNe2,l−1Pd2,l−1
N0 + Pp1,l + KNe2,l−1Pd2,l−1
Ne2,l =
N0 + KNe1,lPd1,l
N0 + Pp2,l + KNe1,lPd2,l
and Ppj,l , Pdj,l denote the average power consumed for the
pilot and data symbols of the users in group j ∈ {1, 2} and
sub-frame l ∈ {1, 2, . . . , L}, and Nej,l and N0 respectively de-
Pilot 1 Data Pilot 1 Data
Pilot 1 Data Pilot 1 DataPilot 1
Group 1 with BcTc/2 users with orthogonal pilot sequences
Group 2
28. Data Pilot 1 Data
Pilot 1 Data Pilot 1 Data
Pilot 1 Data Pilot 1 DataPilot 1 Data Pilot 1 Data
Channel Estimation
Group 1
Spatial Filtering, Data
Detection or Decoding
Channel Estimation
Group 2
Spatial Filtering, Data
Detection or Decoding
Timing offset
Tc Tc/2
a) Transmission Protocol
b) Receiver
D
M
U
X
Fig. 3. Two-Group GSOMA without blanking.
29. note variance of AWGN at the receiver and channel estimation
error, and Ne1,0 = Pd1,0 = Pp1,L+1 = 0.
Proposition 2: The transmission protocol in Fig. 3 where
each group contains K users and the receiver employs ZF
achieves the sum-rate
RZF∑,1 = K2L + 1
L∑
l=1
log
(
1 +
(nt −K)(1−Ne1,l)Pd1,l
N0 + KNe1,lPd1,l + Pp2,l
)
+ log
(
1 +
(nt −K)(1−Ne2,l)Pd2,l
N0 + KNe2,lPd2,l + Pp1,l+1
)
(2)
where Nej,l is defined in Prop. 1.
B. Mode 2: with blanking
30. For the case the array contains not so many antenna
elements with respect to the scheduled number of users in
each group, it is beneficial to partially blank some part of
sub-frames to enhance the channel estimation and to improve
consequently the performance of spatial filtering which in turn
improves the spectral efficiency of the system. The blanking
pattern, should be chosen based on the inter-user interference
when for higher interference a blanking pattern with a higher
density is selected and similarly a sparser blanking pattern
should be selected for lower interference to improve the
spectral efficiency of the system. Fig. 4 shows the transmission
protocol and the receiver for the case with two groups where
the blanking is used. The users are grouped into two groups
and transmission is arranged such that the pilot symbols of first
group do not experience any interference. This is useful for the
case that one to enhance the channel estimation for the users in
the first group, this also enhances the interference cancelation
for channel estimation of the second group. Additionally, this
arrangement is also useful for the case where first and second
groups compromise far and near users, respectively.
Proposition 3: The transmission protocol in Fig. 4 where
each group contains K users and the receiver employs MF
achieves the sum-rate
RMF∑,2 = 13K log
(
1 +
(nt −1)(1−Ne1)Pd1
N0 + Ne1Pd1 + Pp2 + (K −1)Pd1
)
+
31. 1
3
K log
(
1 +
(nt −1)(1−Ne2)Pd2
N0 + Ne2Pd2 + (K −1)Pd2
)
(3)
where Ppj , Pdj denote the average power consumed for the
pilot and data symbols of the users in group j ∈ {1, 2}, and
N0 denotes variance of AWGN at the receiver. The quantity
Nej = Nej,1 denotes the variance of channel estimation error
for users in group j ∈ {1, 2}.
Proposition 4: The transmission protocol in Fig. 4 where
each group contains K users and the receiver employs ZF
achieves the sum-rate
RZF∑,2 = 13K log
(
1 +
(nt −K)(1−Ne1)Pd1
N0 + KNe1Pd1 + Pp2
)
+
1
32. 3
K log
(
1 +
(nt −K)(1−Ne2)Pd2
N0 + KNe2Pd2
)
(4)
where Nej = Nej,1 for j ∈ {1, 2} is given in Prop. 3.
From the sum-rates in Propositions 1–4, one can see that
the imperfections due to inter-user interference, the channel
estimation error and AWGN are linearly reduced by the
factor of 1
nt−1
and 1
nt−K
for MF and ZF, respectively. We
additionally see that ZF removes the inter-user interference
in each group due the data transmission which is one of the
advantages of GSOMA with respect to SOMA.
V. NUMERICAL EVALUATIONS
For comparison, we consider time-shared TDD as a baseline
when the resources are shared between two groups of users
when each group is designed according to the conventional
TDD. This, using ZF, gives the sum-rate
33. RZF∑,TS = 14K log
(
1 +
(nt −K)(1−Ne1)Pd1
N0 + KNe1Pd1
)
+
1
4
K log
(
1 +
(nt −K)(1−Ne2)Pd2
N0 + KNe2Pd2
)
(5)
Pilot 1
Pilot 1Pilot 1 Data Pilot 1
Pilot 1 Data Pilot 1Pilot 1
Group 1 with BcTc/2 users with orthogonal pilot sequences
Group 2Data Pilot 1
Pilot 1 Data Pilot 1
34. Pilot 1 Data Pilot 1Pilot 1 Data Pilot 1
Blank
Blank
Timing offset
Partially Blanked
Tc Tc/2
Fig. 4. Two-Group GSOMA with blanking.
where Nej =
N0
N0+Ppj
.
We next discuss two numerical examples of the sum-rate.
Fig. 5 and 6 show the sum-rate of the schemes as a function of
number of antennas for N = BcTc = 100, where the number
of users in each group is K = 1
2
N = 50. We set Pd1,l = Pd1 ,
Pd2,l = Pd2 (i.e. uniform power allocation across the sub-
frames) and N0 = 0 dB and the power of the associated
pilots are set 10 dB higher than the data for all users to
ensure a good channel estimation. In each figure, four schemes
are considered: time-shared TDD with ZF, SOMA with MF,
GSOMA with transmission protocol in Fig. 3 (i.e. Mode 1)
with ZF and L = 100, GSOMA with transmission protocol
in Fig. 4 with ZF (i.e. Mode 2). In Fig. 5 we set Pd1 = 0,
35. Pd2 = −20 dB and in Fig. 6 we set Pd1 = 10, Pd2 = −5
dB. In both cases, GSOMA provides an enhanced aggregate
rate as compared to the time-shared TDD. The gain is more
pronounced for the case that the groups are higher difference
in the received signal strength for which Mode 1 performs
better. Fig. 6, Mode 2 performs better than Mode 1 due to the
fact that the channel estimation for the high-power users in
group 1 is less degraded as compared to that in Mode 1.
VI. CONCLUSIONS
We presented a new multiple-access solution and analyzed
its aggregate rate. The new solution is constructed using a
semi-orthogonal feature for a group of users wherein each
group employs the conventional TDD. The numerical eval-
uation showed that the new proposal can provide a higher
aggregate rate as compared to the conventional TDD solution.
REFERENCES
[1] T. L. Marzetta, “Noncooperative cellular wireless with
unlimited numbers
of base station antennas,” IEEE Transactions on Wireless
Communica-
tions, vol. 9, no. 11, pp. 3590–3600, 2010.
[2] E. G. Larsson, F. Tufvesson, O. Edfors, and T. L. Marzetta,
“Massive
MIMO for next generation wireless systems,” IEEE
Communications
Magazine, pp. 186–195, 2014.
[3] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L.
Marzetta, O. Edfors,
and F. Tufvesson, “Scaling up MIMO: Opportunities and
challenges with
36. very large arrays,” Signal Processing Magazine, IEEE, vol. 30,
no. 1, pp.
40–60, 2013.
[4] J. Hoydis, S. Ten Brink, and M. Debbah, “Massive MIMO in
the UL/DL
of cellular networks: How many antennas do we need?” IEEE
Journal
on Selected Areas in Communications, vol. 31, no. 2, pp. 160–
171, 2013.
[5] M. N. Khormuji and B. M. Popović, “Semi-orthogonal
multiple-access for
massive MIMO,” Submitted to IEEE Trans on Wireless
Communications,
2014.
0 200 400 600 800 1000
0
20
40
60
80
100
120
140
160
37. 180
Number of antennas: n
t
S
u
m
−
ra
te
[
b
it
/s
/H
z]
Time−shared TDD
SOMA
GSOMA: Mode 1
GSOMA: Mode 2
Fig. 5. The sum-rate of the schemes for Pd1 = 0, Pd2 = −20 dB.
0 200 400 600 800 1000
0
50
38. 100
150
200
Number of antennas: n
t
S
u
m
−
ra
te
[
b
it
/s
/H
z]
Time−shared TDD
SOMA
GSOMA: Mode 1
GSOMA: Mode 2
Fig. 6. The sum-rate of the schemes for Pd1 = 10, Pd2 = −5 dB.