Thursday, October 31, 2019

Exploring Refugees religion continuity and change Essay

Exploring Refugees religion continuity and change - Essay Example She motivated me to participate on local and international events. I consider myself a lucky woman because I had the chance to come to the United States and experience the richness of the culture and knowledge. I was blessed to meet fantastic people who I learned something from each one of them. Through my study in University of Delaware, I have had the honor of taking many inspiring classes taught by intelligent, passionate, and caring professors, and I learned many things through my discussion with my friends and colleagues whom I had classes. During the past three years, my family and friends contributions were very essential on my emotional support. I could not have done any of this without their support, prayers, encouragement, and advices that helped me through stress and confusion. In addition, I am truly thankful for my friend Saied who encouraged me through tough time, and who was always there for me. He made sure to take care of my health problem, and volunteered to drive me for conducting the interviews. I would like to thank all the individuals who agreed to be interviewed. I greatly appreciate their hospitality to invite me to their houses, giving me their time, and speaking freely about their religion, rituals, challenges, and hopes. They gave me the opportunity to gain a deeper understanding of their lives. It is my hope that this research project help to promote a better image about Muslims, and that American gain better understanding for Muslim families. 24 I follow the same rituals same as back home. For example, I only eat halal food where we buy a whole slaughtered sheep and we keep it in the freezer. Also, I do not shake men’s hands, and people know I am a Muslim and these things are forbidden. (H, 39, 131) 60 The studies of Arab Muslim refugees in the United States are just in the beginning; research is needed on wellbeing of families. Refugees have more challenges than many other immigrants because of what they have experienced

Tuesday, October 29, 2019

Optimizing Ermergeny Room Staff Statistics Project

Optimizing Ermergeny Room Staff - Statistics Project Example Collected data included age and sex of patient, date and time patient arrived, date and time patient treatment began and triage number, Triage number is a scale used in the ER that identifies the urgency of care, standard waiting time, average length of treatment time and the number of nurses required. See Appendix A. The number of patients was summarized according to a 1-hr time interval of its arrival to the ER. Frequency distribution, time series and regression analysis were created to determine the trend. See Appendix B. The wait time in minutes was summarized according to a 4-hr interval of the patients arrival. See Appendix C. The 4-hr interval is also identified as the 4-hr work shift of nurses. The distribution of average wait time per month was made to identify the volume of patients having a long wait time in the 4-hr work shift. Analysis of variance was conducted to determine if there are any significant differences between them with respect to mean waiting time. The treatment time in minutes was also summarized according to a 4-hr time interval of nurse's work shift. The treatment time is the average time needed by the nurses to care for patients with respect to its urgency according to the triage number. The distribution of total treatment time per month was made to identify the volume of nurses time in the 4-hr work shift. Figure 1 shows the frequency distribution of the number of patients arriving per month on a 1-hr... Figure 2 shows the time series of the patients arriving per day on a 1-hr time interval. There is a seasonal trend identified per day which further confirms the observation from the frequency diagram. A single factor analysis of variance was conducted using Microsoft Excel Add-In. The results in Table 1 show that the F-value is smaller than the F critical and the P-value is relatively large. The null hypothesis stating that all means of patient arrival per month is equal and there is no statistical differences between the monthly data. This concurs that the data of patients per month can be summarized into a 24 hr patient arrival behavior. Table 1. Anova: Single Factor SUMMARY Groups Count Sum Average Variance JUN 24 326 13.5833 60.3406 JUL 24 305 12.7083 56.1286 AUG 24 364 15.1667 69.0145 SEP 24 362 15.0833 92.5145 OCT 24 293 12.2083 55.6504 NOV 24 334 13.9167 53.9058 Source of Variation SS df MS F P-value F crit Between Groups 175.14 5 35.028 0.542 0.744 2.280 Within Groups 8913.75 138 64.592 Total 9088.889 143 Figure 3 shows the best fit line graph of patients arrival from 3:00 am to 22:00 pm. The R-squared value of 0.8839 shows high linearity on the trend. The number of patients increases with time during this period. The coefficient of increase is 0.1148. 2. Wait Time of Patients The frequency distribution of wait time is shown in Figure 4. The mean time to wait is 131.11 minutes with a standard deviation of 87.62 minutes. The confidence level at 95% is 3.85 minutes. The shape of the distribution is skewed to the left. This means that the data may contain outliers with very large waiting time. Figure 5 shows the patient's average time

Sunday, October 27, 2019

FPGA Stage for Application-Level Network Security

FPGA Stage for Application-Level Network Security A Self-Versatile FPGA Stage for Application-Level Network Security A Research Report for the DSCI 60998 Capstone Project in Digital Sciences Course Vamsi Krishna Chanupati Ramya Ganguri Kent State University Fall Semester, 2016 Abstract Wireless communication networks are subjected to vulnerable attacks. The extent of attacks is rising day by day. The proposed work shows the extent of attacks growing in every-day life and a counter method to minimize the extent of these vulnerable attacks. Several studies shows that new and more stable security methods need to be developed by considering information safety, confidentiality, authentication and non-repudiation in the wireless sensor networks. The proposed study shows a self-adoptable FPGA Stage for Application-Level Network Security using application-independent core process IP, UDP and TCP protocols as well as ARP and ICMP message plots. The altered quickened figure outline utilizes information subordinate changes, and can be utilized for quick equipment, firmware, programming and WSN encryption frameworks. The approach exhibited demonstrated that figures utilizing this approach are more averse to endure interruption of differential cryptanalysis than as of now utili zed famous WSN figures like DES, Camellia. In this report an overview of existing FPGA algorithms for application level network security is examined and a new FPGA algorithm is proposed. Keywords: FPGA, WSN encryption, computer aided systems design. Introduction The Purpose of the Study (Statement of the Problem) With the developing dependence of business, government, and additionally private clients  on the Web, the interest for fast information exchange has swelled. On a specialized level, this  has been accomplished by enhanced transmission advancements: 10 Gb/s Ethernet is now in  across the board reasonable use at the ISP and server farm levels, gauges for 40 Gb/s and 100 Gb/s speeds have as of now been figured. The information volume exchanged at these velocities introduces a huge test to current efforts to establish safety, particularly while going past straightforward firewalls and additionally considering payload assessment, or even application- level conventions. Wireless Sensor Networks are most pre-dominant with this speeds and it is very difficult for customary programmable processors are to stay aware of these speeds. A wireless sensor network (WSN) is a gathering of spatially dispersed, free gadgets that gather information by measuring the physical or ecological conditions. A portion of the conditions are being measured is temperature, weight, dampness, sound, position, lighting, and use data. These readings, as information, are gone through the network, are ordered and sorted out, and later it is conveyed to end client. WSNs are utilized for some applications like power framework controls, modern process checking and control, human wellbeing observing. Generally, these WSNs tend to require a considerable measure of energy to work, yet diminishing the power is needed for the framework, It builds the lifespan of the sensor gadgets and also leaving space for the battery-fueled applications. As an option, both programming customized committed system handling units and equipment quickening agents for these operations have been proposed. The utilization of reconfigurable rationale for the last permits more noteworthy adaptability than hardwiring the usefulness, while yet permitting full-speed operation. This research gives a detailed description of present day FPGA (Field Programmable Gate Array) and examines the extent of security level standards in the existing FPGA algorithms. The proposed research study has free key preprocessing which gives elite in regular keys trade. The prime objective of this research is to design an application level network security algorithm using FPGA. This research incorporates the study of various possible threats and vulnerable attacks in wireless communications networks and their effects. It includes the detailed study of design and implementation of application level network security algorithms on FPGA (Field Programmable Gate Array) The Justification/Significance of the Study This research proposes a self-adoptable FPGA Stage for Application-Level Network Security for application level wireless network security. A lot of research is required on wireless network security, to improve the performance efficiency and to make the system smart. The research on the latest trending technologies, and a proposed solution to a problem will be carried out in this project, hence it is justified. This research study is a part of huge project, which involves the use of FPGA for network security. The basic design of the proposed research remains the same although the scale of the projects varies. The study will include the research in FPGA algorithm development WSN encryption and computer aided systems design. Different views on the technology design, its applications and implementation will be presented in the research report. This research also adds to current research going on in field of the application level wireless network security, Data encryption and crypto-analysis. The Research Objectives The objectives of this research are Wireless level networks and analysis of security issues This step involves the study of the existing techniques in wireless network security. The research of the existing literature reveals that the wireless sensor network security techniques have been proposed for network security by some researchers and the existing models does not consider the use of feistel ciphers in the research. Design of the algorithm model The model to be proposed uses self-adoptable FPGA (Field Programmable Gate Array) for application level network security. A new FPGA based algorithm is designed in order to decrease the extent of attacks in application level network security. It shows that new and more stable security algorithms need to be developed to provide information safety and confidentiality in the networks. This is useful in minimizing the vulnerable attacks in application level networks. There are several other indirect applications of the model to be proposed. Literature Review A survey on FPGA for network security that was presented by Muhlbach (2010) depicts an execution of an intrusion detection system (IDS) on a FPGA for network security. Various studies have analyzed string-coordinating circuits for IDS. A strategy for producing a string based coordinating circuit that has expandability of handling information width and radically lessened asset prerequisites. This circuit is used for packet filtering for an intrusion protection system (IPS). An apparatus for consequently creating the Verilog HDL source code of the IDS circuit from rules set is developed, utilizing the FPGA and the IDS circuit generator, this framework can redesign the coordinating origin relating to new interruptions and attacks. The IDS circuit on a FPGA board has been assessed and its exactness and throughput is calculated. There are various methods, which depicts the usage of Simple Network Intrusion Detection System (SNIDS) detailed explanation is given by Flynn, A (2009), basic equipment arrange interruption recognition framework focusing on FPGA gadgets. SNIDS snoops the activity on the transport interfacing the processor to the Ethernet fringe center and identifies the Ethernet outlines that match a predefined set of examples demonstrating malevolent or refused content. SNIDS depends on an as of late proposed engineering for high-throughput string coordinating. This method executes the SNIDS utilizing the Xilinx CAD (Computer Aided Design) devices and tests its operation on a FPGA gadget. Moreover, programming instruments that empower programmed era of a SNIDS center coordinating a predefined set of examples. They exhibit the utilization of SNIDS inside a practical FPGA framework on a chip associated with a little system. Chan et al. exhibited that the PIKE plans include lower memory stockpiling necessities than arbitrary key circulation while requiring practically identical correspondence overheads. PIKE is as of now the main symmetric-key predistribution plot which scales sub-straightly in both correspondences overhead per hub and memory overhead per hub while being flexible to an enemy fit for undetected hub bargain. PIKE appreciates a uniform correspondence design for key foundation, which is difficult to irritate for an assailant. The dispersed way of PIKE likewise does not give a solitary purpose of inability to assault, giving versatility against focused assaults. There are certain challenges to be overcome while designing an FPGA algorithm for application level network security, a detailed explanation and analyses is given in (Koch Cho., 2007). The first and difficult challenge is designing an FPGA based algorithm for network security. The system to handle and analyze such data should be super-fast and compatible. The existing hardware is able to do many operations to handle the data; however, special computing systems should be designed to process larger data in shorter time. Another challenge in this area is to secure the data that is generated by multiple sources of different nature. The data needs to be processed before analyzing it for pattern discovery. The data generated is not necessarily complete because of different usage cases of the device. In addition, this feature is used to predict the events of a device and manage every other device and network connected to the device for efficiency, performance and reliability. Preparing abilities in wireless network hubs are ordinarily in view of Digital Signal Processors (DSPs) or programmable microcontrollers. In any case, the utilization of Field Programmable Gate Arrays (FPGAs) gives particular equipment innovation, which can likewise be reprogrammable in this way giving a reconfigurable wireless network framework. The incomplete reconfiguration is the way toward altering just areas of the rationale that is executed in a FPGA. Accordingly, the comparing circuit can be adjusted to adjust its usefulness to perform diverse assignments. This adjustment ability permits the usage of complex applications by utilizing the fractional re-configurability with low power utilization. This last element additionally speaks to a critical perspective when FPGAs are connected in wireless network frameworks. These days, the wireless network frameworks are required to give an expanding exactness, determination, and accuracy while diminishing the size and utilization. Also , FPGAs and their fractional re-configurability permit us to furnish wireless network frameworks with extra properties like high security, preparing abilities, interfaces, testing, arrangement, and so on. The present capacities of FPGA designs permit not just execution of basic combinational and consecutive circuits, additionally the incorporation of abnormal state delicate processors. The utilization of incorporated processors holds numerous uncommon points of interest for the fashioner, including customization, out of date quality moderation, and segment and cost lessening and equipment increasing speed. FPGA implanted processors utilize FPGA rationale components to fabricate inside memory units, information and control transports, interior and outer fringe and memory controllers. Both Xilinx and Altera give FPGA gadgets that install physical center processors worked inside the FPGA chip. These sorts of processors are called hard processors. Such is the situation for the PowerPCà ¢Ã¢â‚¬Å¾Ã‚ ¢ 405 inside Virtex-4 FPGA gadgets from Xilinx and the ARM922Tà ¢Ã¢â‚¬Å¾Ã‚ ¢ inside Excalibur FPGA gadgets from Altera. Delicate processors are microchips whose design is completely constructed utilizing a hardware description language (HDL). The proposed research uses an efficient method of Self-adoptable FPGA Stage for Application-Level Network Security. Research Design Description of the Research Design Wireless communication is one of the latest and the revolutionary technology of the last decade. It intends to connect every device on the planet wirelessly. This number could be billions or even trillions. These communication networks have higher transmission speeds and capable of handling the entire load. Security of this wireless communication network plays an important role to keep it robust and yet flexible. Network security is a basic issue for the application of new technologies in every aspect of society and the economy. It is especially critical for e-exchanges, where it is an essential to provide security for the transactions. The future threats to network security are still severe. As per a Computer Security Institute (CSI) survey, companies reported average annual losses of the $168,000 in 2006 and $350,424 in 2007, up forcefully from (Hao Chen Yu Chen, 2010). This data reflects both the serious circumstance of system security, and also individuals accomplishment in this issue. Focused on attacks have turned into a pattern in system security. A focused attack is a malware targeted to a particular segment. Around 20% of the respondents of the CSI review endured this sort of security attacks are turning out to be more prominent than any time in recent time. Among the type of notorious target attacks, Denial-of-Service (DoS) attack is the most threatening system security. Since 2000, DoS attacks have become quickly and have been one of the significant dangers to the accessibility and unwavering quality of system based administrations. Securing the network infrastructure has turned into a high need because of its fundamental impacts for data protection, ecommerce and even national security (Hao Chen Yu Chen, 2010). Data security principally concentrates on information, data protection and encryption. The following are some of the Requirements for a Successful Security Application. Real-Time Protection: It is key for a powerful data instrument to process information at line-speed with moderate cost. All the data movement is subjected for examination in a convenient way, and alerts are produced precisely when unusual circumstances happen. Flexible Updating: Constantly developing malicious attacks require security answers for be versatile to hold viability. The redesign could be of the learning databases (marks) that the security examination relies on upon, another answer for determining, or even the framework itself. Redesigning an application will frequently be more functional than supplanting it practically speaking. Well Controlled Scalability. Scalability is another basic concern toward functional development. Numerous reported approaches function admirably on a little scale look into system, be that as it may, their execution weakens quickly when conveyed to down to earth scale systems, for example, grounds level systems on the other hand bigger. The principle purpose behind this is framework multifaceted nature for the most part increments at a much more noteworthy rate than the system. In contrast to programming executions, application oriented and very parallel plan standards make equipment usage prevalent as far as execution. For instance, Transmission Control Protocol (TCP) Stream Reassembly and State Tracking, an Application Specific Integrated Circuit (ASIC) could dissect a solitary TCP stream at 3.2Gbps in (M. Necker, D. Contis 2002). A FPGA-based TCP-processor created by Open Network Laboratory (ONL) was equipped for checking 8 million bidirectional TCP streams at OC-48 (2.5Gbps) information rate. ASIC-based gadgets not just have the upside of elite, accomplished through circuit plan committed to the errand, yet have the potential for low unit cost. Notwithstanding, generous cost alleviation from enormous non-repeating building venture must be accomplished when ASIC gadgets accomplish adequately high-volume creation. Shockingly, this may not be appropriate to network security applications. Steady developing guidelines and prerequisites make it unfeasible to manufacture ASIC-based system security applications at such a high volume. In addition, custom ASICs offer practically zero reconfigurability, which could be another reason that ASICs have not been generally connected in the system security zone. Reconfigurability is a key prerequisite for the accomplishment of equipment based system security applications and the accessibility of reconfigurable equipment has empowered the plan of equipment based security applications. A reconfigurable gadget could be considered as a hybrid equipment/programming stage since reconfigurability is utilized to stay up with the latest. FPGAs are the most illustrative reconfigurable equipment gadgets. A Field-Programmable Gate Array (FPGA) is a kind of broadly useful, multi-level programmable rationale gadget that can be customized. At the physical level, rationale squares and programmable interconnections make the principle structure out of a FPGA. A rationale square more often than not contains a 4- input look-into table (LUT) and a flip slump for essential rationale operations, while programmable interconnections between pieces permit clients to actualize multi-level rationale. At the plan level, a rationale circuit chart or a high level hardware description language (HDL), for example, VHDL or Verilog, is utilized for the programming that indicates how the chip ought to work. In the gadgets business it is imperative to achieve the market with new items in the briefest conceivable time and to lessen the monetary danger of executing new thoughts. FPGAs were immediately embraced for the prototyping of new rationale outlines not long after they were designed in the mid 1980s because of their one of a kind component of adaptability in equipment improvement. While the execution and size of FPGAs restricted their application in, thickness and speed have brought about narrowing the execution hole amongst FPGAs and ASICs empowering FPGAs to serve as quick prototyping devices as well as to wind up essential parts in installed networks. Description of the Subject Matter(and/or), Procedures, Tasks Current FPGAs share the execution favorable position of ASICs in light of the fact that they can execute parallel rationale works in equipment (Flynn, A., 2009). They additionally share a portion of the adaptability of implanted system processors in that they can be powerfully  reconfigured. The architecture of reconfigurable network platform, called Net Stage/DPR. The  application-free center uses IP, UDP and TCP conventions and additionally ARP and ICMP  messages. It has a hierarchical design plan that permits the quick expansion of new conventions  in modules at all layers of the systems administration.   From figure 1, Handlers are connected to the core by using two different shared buses  with a throughput of 20 Gb/s each, one for the transmit and one for the receive side. Buffers boost the different processing stages and limit the impact of Handler in the processing flow. The  interface between the buffers and the actual handlers acts as a boundary for using dynamic  partial reconfiguration to swap the handlers to and fro as required.   All handlers have the same coherent and physical interfaces to the center framework. The  physical interface comprises of the association with the buffers, strategic flags, for example,  clock and reset. However, the handlers communicate with the rest of the framework simply by  sending and accepting messages (not really relating to real system bundles). These messages  comprise of an inner control header (containing, e.g., charges or state information) and  (alternatively) the payload of a system bundle. In this form, the physical interface can stay  indistinguishable over all handlers, which significantly rearranges DPR. For a similar reason,  handlers ought to likewise be stateless and utilize the Global State Memory benefit by the Net  Stage center rather (state information will then simply turn out to be a piece of the messages).   This approach avoids the need to explicitly reestablish state when handlers are reconfigured.   Incoming packets must be routed to the fitting Handler. In any case, utilizing the Handler  may really be arranged onto diverse parts of the FPGA. In this manner, we require an element  routing table that coordinates the message encapsulated payloads to the suitable administration  module. Our routing table has the standard structure of coordinating convention, attachment, and  address/net mask information of an approaching bundle to discover the related Handler and it can  get information for a whole subnet. On the transmitting side, handlers store active messages into  their departure cushions, where they will be grabbed by the center for sending. This is done  utilizing a straightforward round-robin approach, yet more perplexing plans could, obviously, be  included as required. On the off chance that bundles are bound for a Handler with a full entrance  cradle, they will be disposed of. Nonetheless, since the greater part of our present handlers can work at any r ate at the line rate; this will not happen with amid standard operation. Bundles for  which a Handler is accessible disconnected (not yet arranged onto the gadget) will be checked  before being disposed of, in the long run bringing about arranging the Handler onto the FPGA.   This technique does not ensure the gathering of all bundles yet speaks to a decent tradeoff  between speed whats more, many-sided quality. In this case that no fitting Handler exists  bundles will be discharged immediately. From Figure 2, The system can perform the self-ruling of a host PC. A committed  equipment unit is utilized as Controller of an implanted delicate center processor, since the last  would not have the capacity to accomplish the high reconfiguration speeds. Since of the capacity  prerequisites the Handler bit streams are put away in an outside SDRAM memory, and sustained  into the on-chip arrangement get to port (ICAP) by utilizing quick exchanges. For effective  results, underlying execution requires isolate bit streams for each Handler, comparing to the  physical area of the in part reconfigurable regions. To this end, the SDRAM is composed in  groups, which hold various forms of every Handler, tended to by the Handler ID and the  objective Slot number. For more accurate implementation we set the group estimate to the  normal size of every Handlers bit stream. In a more refined execution, we could utilize a solitary  bit stream for every Handler, which would then be moved to the objective Slot at run-time, and  bit stream pressure strategies to encourage lessen its size. A rule based adjustment system is executed in the Adaptation Engine that deciphers  packets measurements. In particular, bundles at the attachment level got in a period interval.   These measurements are kept for packets for which a Handler is really accessible. The design  looks for quick run queries and insights upgrades (few cycles) not withstanding for high packet  rates (10 Gb/s, bundle estimate Since they depend on similar information structures, the Packet Forwarder and the  Adaptation Motor are acknowledged in a typical equipment module. It contains the rationale for  following insights, deciphering rules, and overseeing Handler-Slot assignments. Double ports  Block RAMs are utilized to understand the 1024-section Rule and 512-section Counter Tables.   Hence, queries to decide the Slot of the goal Handler for an approaching bundle can be  performed in parallel to the run administration whats more, counter procedures. For range  proficiency, the CAM is shared between the capacities. Be that as it may, since the throughput of  the framework is straightforwardly influenced by the Packet Forwarding execution, the  comparing opening steering queries will dependably have need while getting to the CAM. Since  the CAM is utilized quickly for every procedure, it wont turn into a bottleneck. The Packet  Forwarder rationale puts the goal Handler opening for an approaching parcel in the yield line.  The sending gaze upward is pipelined: by beginning the procedure when convention, IP address  and port number have been gotten, the looked-into goal opening will by and large be accessible  when it is really required (once the bundle has gone through the entire center convention  handling). Since parcels will be neither reordere d nor dropped some time recently the Handler  arrange, basic lines suffice for buffering look-into results here. Since not every approaching  parcel ought to be numbered (e.g., TCP ACKs ought to be disregarded), the Adaptation Engine  utilizes a different port to upgrade the Counter Table just for particular bundles. The Rule  Management subsystem acknowledges orders from the administration organize interface through  a different FIFO, and has an inward FIFO that monitors accessible line addresses in the Rule  Table. From Figure 3, The FPGA locales for every Slot have been measured to 1920 LUTs  (only twice as the normal module measure). All openings have rise to region about demonstrate   that module sizes are moderately close. This rearranges the adjustment handle, since else we  would need to play out different sweeps while selecting on-line/disconnected hopefuls (one for  each unique Slot measure class). The dynamic halfway reconfiguration times and the subsequent  number of conceivable reconfigurations every second for the ICAP recurrence of 100 MHz we  utilize. We demonstrate the times not just for the 1920 LUT Slots we have utilized additionally  for both littler and bigger decisions (the best size is application-subordinate). By and large, LUTs  are not rare while acknowledging bigger Slots; however the predetermined number of accessible  Block RAMs can oblige a plan to fewer than 16 Slots if a Slot requires committed Block RAMs.  Considering the total adjustment opera tion, the time required is ruled by the real reconfiguration  time, as ICAP throughput is the restricting figure. Every single different process is  fundamentally speedier. For instance, the procedure to look over every one of the 512 Counter  Table passages to locate the following competitors requires just around 3 µs at 156.25MHz clock  speed, an immaterial time relative to the reconfiguration time (Hori Y, Satoh.2008)   Possible Errors and Their Solutions The following are the possible errors accustomed in FPGA, tampering threats such as destructive analysis, over- and under-voltage analysis, and timing analysis. Using destructive analysis, each layer of the device is captured to determine its functionality. This process requires expensive equipment and expertise. Timing analysis and over- and under-voltage analysis do not require expensive equipment, but are error prone, so are less frequently used to reverse-engineer complex FPGA designs. Also, timing analysis on an FPGA is deterministic, so the time taken from input to output can be determined by passing a signal through a multiplexer. Findings Wireless communication is one of the latest and the revolutionary technology of the last decade. It intends to connect every device on the planet wirelessly. This number could be billions or even trillions. A Self Adoptable FPGA for application level network security is must in order to have effective network security (Sascha Andreas, 2014). Since they depend on similar information structures, it contains the rationale for following insights, deciphering rules, and overseeing Handler-Slot assignments. Block RAMs are utilized to understand the section Rule and section Counter Tables. This method has very low security and the security standards can be easily cracked. (Deng et al. R. Han, 2006) created INSENS, a protected and Intrusion tolerant routing algorithm for application level security in wireless Sensor Networks. Excess multipath routing enhances interruption resilience by bypassing malignant nodes. INSENS works effectively in the nearness of interlopers. To address asset requirements, calculation on the network nodes is offloaded to asset rich base stations, e.g. registering routing tables, while low-multifaceted nature security techniques are connected, e.g. symmetric key cryptography and one-way hash capacities. The extent of harm delivered by interlopers is further constrained by limiting flooding to the base station and by having the base station arrange its bundles utilizing one-way grouping numbers. (Kang et al. K. Liu 2006) investigated the issue of versatile network routing algorithm. Regardless of the possibility that area data is checked, nodes may in any case get into mischief, for instance, by sending an extreme number of packets or dropping packets. To powerfully maintain a strategic distance from un-trusted ways and keep on routing packets even within the sight of attacks, the proposed arrangement utilizes rate control, parcel planning, and probabilistic multipath routing joined with the trust-based course choice. They examined the proposed approach in detail, sketching out effective decisions by considering conceivable attacks. They analyzed the execution of their strong network routing protocol and its performance in various situations. Several algorithms are proposed by researchers in order to improve the efficiency of application level network security, every method has its own merits and demerits. A new method to improve the algorithmic efficiency has been proposed in this research by examining all the previous algorithms. Proposed method will be high efficient when it is related to the existing techniques. The new algorithm proposed uses spacecraft network standards of communications by upgrading the data transfer processing speed to higher performance speeds with the available standards. Analysis This research is concept based and discusses the feasibility of FPGA in application level wireless communication networks to enhance applications. This study reviews the existing literature thoroughly and also proposes the use of FPGA to be applied as the next version to the application level network security The model to be proposed uses self-adoptable FPGA for application level network security. A new FPGA based algorithm is designed in order to decrease the extent of attacks in application level network security. It shows that new and more stable security algorithms need to be developed to provide information safety and confidentiality in the networks. This is useful in minimizing the vulnerable attacks in application level networks. The applications of the proposed model are infinite. FPGA intends to strong network security. Therefore, these are not specific to any field or application. There are different classifications of the applications. These classifications are required for better understanding and not necessarily research requirements. These are useful to the users in a way that increases the extent of safety and security of data in wireless data transmission. The performance analysis in network security is determined based of the extent of vulnerable attacks. The proposed algorithm is not tested further research is required for implementing this algorithm in a real time platform. Conclusions Restatement of the Problem With the developing dependence of business, government, and additionally priv

Friday, October 25, 2019

Biography of Isaac Newton :: Sir Isaac Newton Essays

Through his early life experiences and with the knowledge left by his predecessors, Sir Isaac Newton was able to develop calculus, natural forces, and optics. From birth to early childhood, Isaac Newton overcame many personal, social, and mental hardships. It is through these experiences that helped create the person society knows him as in this day and age. The beginning of these obstacles started at birth for Newton. Isaac was born premature on Christmas Day 1642, in the manor house of Woolsthorpe, 7 miles south of Grantham in Lincolnshire. It is said that â€Å"Because Galileo, . . . had died that year, a significance attaches itself to 1642†(Westfall 1). Though his father had died before Isaac was born, he was given his father’s name. He was born into a farming family that had worked their way slowly up the â€Å"social ladder†. The Newton’s were one of the few families to prosper in Lincolnshire(Westfall 1). At the age of three Isaac’s life would take a drastic turn. When Isaac was three his mother, Hannah Ayscough, remarried to the Reverend Barnabas Smith(Internet-newtonia). Isaac and the Reverend never got along and the Reverend would not have a child that was not his living with him. Isaac stayed with his grandparents when his mother went to live with the Reverend in North Witham. His maternal grandmother raised Isaac until he was ten. It is believed that his mother’s second marriage and her leaving caused many problems for Isaac as a child. While living with his grandparents he attended day school nearby in Skillington and Stoke. Many cousins and other family members in the area surrounded Isaac though, â€Å"He formed no bond with any of his numerous relatives that can be traced later in his life†(Westfall 11). In 1653 his mother returned after her second husband died. With her she brought one half brother and two half sisters. Although it is not known, bitterness may have inflicted Isaac when his three new siblings arrived. Never the less, two years later at the age of twelve he was sent to Grantham to attend grammar school. While attending grammar school Isaac lived with the apothecary Mr. Clark(Westfall 12). Mr. Clark had three stepchildren from the first marriage of his wife, Miss Storer, who were also living in his house. In school and at home Isaac was apparently different and did not get along with any other boys.

Thursday, October 24, 2019

Feedback in Communications Essay

When you make a conscious choice to give and receive feedback on a regular basis you demonstrate that feedback is a powerful means of personal development. Done properly, feedback need not be agonizing, demoralizing, or daunting and the more practice you get the better you will become at it. It may never be your favorite means of communicating with employees, co-workers, or bosses but it does have the potential to make your workplace a much more productive and harmonious place to be. No doubt the process of giving feedback is seen as unnerving and fear provoking. And the workplace can sometimes be the wrong emotional environment in which to discuss performance, introduce suggestions for improvement, and talk about goals for the future. This is a shame, because giving and receiving feedback is some of the most important communication you can engage in with members of your organization. When done in the right way and with the right intentions, feedback communication is the avenue to achieve good performance. Employees have to know what they are doing well and not so well. For them to really hear your thoughts and suggestions on ways to improve, though, that feedback has to be delivered carefully and frequently. Giving feedback effectively is a skill. And like all skills, it takes practice to build your confidence and improve. The following is a collection of â€Å"feedback giving† tips that organizations can try and use. Try to make is positive. Before giving feedback managers or employees should remind themselves why they are doing it. The purpose for giving feedback is to improve the situation. Being confrontational will not accomplish anything.. That’s not to say you must always be positive. There is a role for negativity and even anger if someone isn’t paying attention to what you’re saying. However, this should be used only if necessary. You’ll most often get much more from people when your approach is positive and focused on improvement. Be Timely The closer to the event you address the issue, the better. Feedback isn’t about surprising someone so the sooner you do it, the more the person will be expecting it. IT is much easier to give feedback about an issue that was just completed/not completed than is it to give feedback about a whole years performance. The exception to this is if the situation involved is highly emotional. Waiting until everyone has calmed down before you engage in feedback may help you avoid further confrontation on both sides. You can’t risk letting yourself get worked up and risk saying something you will regret later. Make it Regular When something needs to be said, say it. People then know where they stand all the time and there are few surprises. Also, problems don’t get out of hand. This is not a once-a-year or a once-every-three-months. While this may be the timing of formal feedback, informal, simple feedback should be given much more often depending on the situation. Be Specific Tell the person exactly what they need to improve on. This ensures that you stick to facts and there is less room for vagueness. Remember to stick to what you know first hand: You’ll quickly find yourself on shaky ground if you start giving feedback based on other people’s views. Criticize in Private and Use â€Å"I† Statements While public recognition is appreciated, public scrutiny is not. Establish a safe place to talk where you won’t be interrupted or overheard.. Give the feedback from your perspective. This way you avoid labeling the person. Say, â€Å"I was angry and hurt when you criticized my report in front of my boss† rather than â€Å"You were insensitive yesterday.† Limit Your Focus and Talk Positive A feedback session should discuss no more than two issues. Any more than that and you risk the person feeling attacked and demoralized. You should also stick to behaviors the person can actually change or influence. A good rule is start off with something positive. This helps put the person at ease. It also lets them â€Å"see† what success looks like and this helps them to take the right steps next time. As long as it’s not forced, it can also help to give positive feedback at the end of a feedback session too. Otherwise, people can finish feeling despondent and worthless. Provide Specific Suggestions and Follow Up Make sure you both know what needs to be done to improve the situation. The main message should be that you care and want to help the person grow and develop. Set goals and make plans to monitor and evaluate progress. The whole purpose of feedback is to improve performance. You need to measure whether or not that is happening and then make adjustments as you go. Be sure to document your conversations and discuss what is working and what needs to be modified. The Benefits of Receiving Constructive Feedback Constructive Feedback is important to the achievement of any professional business connection. Providing feedback is something individuals do to offer suggestions or assessments of someone else’s job performance. As stated in the article, â€Å"Giving Constructive Feedback,† giving constructive feedback is an essential and effective tool in boosting much-needed morale, supporting career progression and encouraging good teamwork. Constructive Feedback should not make people feel discouraged, but make them feel like their work and contributions are appreciated. Constructive Feedback can also better a person by the improvement of work performance. Here are some benefits of receiving constructive feedback listed on helium.com: 1. â€Å"It gives individuals the ability to correct any mistakes you make before you either make the same mistake again, or make your current error worse†. 2. â€Å"It Help individuals learn a new skill as quickly as possible.† An examp le of this is learning a skill such as self defense. If the teacher does not give constructive feedback on how the student is shaping their method, progress will come much slower. 3. â€Å"It helps individuals improve on their current skill set.† For example, many professions benefit from others giving them feedback on their current projects. Feedback is like guidance that will allow employees to learn as well improve their quality of work. 4. â€Å"Trust is established between management and staff when constructive feedback is rendered.† When the staff sees that management care, they will begin to care as well. There will be a change in how feedback improves the interpersonal relationships with higher authority and employees. 5. â€Å"Managers providing constructive feedback practice a process of mentoring and developing their staff to stardom within the organization.† 6. â€Å"Providing feedback can improve employee morale and reduce confusion regarding expectations and current performance†. Some individuals do not have the ability to give others constructive feedback. Feedback should be significant and beneficial. If an individual is put in a position to give another person feedback, that individual must make sure the criticism is helpful, not cruel. â€Å"Constructive feedback presents you with the perfect opportunity to grow and learn from your mistakes. But, one of the biggest things that can harm your chances of getting constructive feedback is to become defensive or not listen to the person when they are giving you the feedback† (helium.com). As stated in the article, â€Å"The Importance, Benefits and Fundamentals of Providing Feedback in Sales,† it is suggested that an individual giving constructive feedback should identify the problem, explain how the behavior is wrong or detrimental, help the individual acknowledge the problem, develop goals with the individual, and then monitor the individual’s performance.The main benefit of constructive feedback is to help individual’s advance, acquire information faster, or to better themselves. Examples of effective and ineffective feedback Throughout this paper, giving and receiving feedback has been defined. Also, the different ways to give and receive feedback has been established. This section will elaborate on examples of giving and receiving feedback. Many people experience ineffective feedback on a daily basis. Most often the cause is a supervisor or manager who does not want to release control, however, ineffective feedback is not limited to this particular situation. In the book, Coaching for Performance by John Whitmore, he states there are â€Å"five levels of feedback that are in common use† (Whitmore, 2010, p. 123). Below is a scenario that will be used to show the different types of criticism most commonly experienced by most people. Scenario A project has been assigned to Jane who is a new member of the Cost-Cutters Team. The goal of the team is to brainstorm, propose, and implement a new way of cutting the company’s cost in the most effective manner. Jane is to write the proposal which will be submitted to board for approval. Once the brainstorming has been completed, the team leaves everything in Jane’s hand with a warning. They tell her, â€Å"Do not mess this up.† Jane feels confident she can write the proposal and does not take the warning personal. Once the proposal is finished, Jane comes back to the team to receive feedback from them. The proposal is handed around to each member of the team with many comments being made on everything from the design of the proposal to the steps of implementation. Ineffective feedback Team member #1 stated, â€Å"You really missed the mark with this assignment.† Making this type of statement does not help anyone. The feedback is extremely critical and offers no direction or opportunities for the receiver to learn or make improvements. Personal criticism is a very ineffective way to critique (Whitmore, 2010, p. 124). Team member #2 told Jane, â€Å"This will not do. We will have to scrap this and begin again.† According to Whitmore, the feedback displayed by this statement is judgmental and by directing the comments at the proposal instead of the person, â€Å"damages self-esteem† (Whitmore, 2010, p. 124). Team member #3 made this statement to Jane. â€Å"You have a clear plan; however, the design and packaging of the proposal will not be well received by the board.† Team member #3’s statement is mildly better than the two before. The beginning of the statement gives some direction for Jane. The plan outlined in the proposal is a good one. When it comes to a design for the proposal, however, Team member #3 did not give any clear instruction or insight to assist Jane, leaving her on the outside (Whitmore, 2010, p. 124). Team member #4 asked Jane this question, â€Å"Do you like your proposal?† Although the statement allows Jane the opportunity to actually acknowledge she is the â€Å"owner† of the proposal, without more in-depth questions, Jane is still left without clear direction. Effective feedback Team member #5 took a different approach to the situation by asking a series of question to get Jane to thinking about the proposal and how it could be improved (Whitmore, 2010, p. 124). Team member #5 also thanked Jane for taking on the assignment in the first place because it freed the other members to focus on other issues assigned to the team. According to Don and Sheryl Grimme, authors of The New Manager’s Tool Kit, use of this type of positive feedback increases the chances that Jane will â€Å"repeat the desired behavior† in the future and not shrink away from an assignment (Grimme & Grimme, 2009, p. 82). The questions not only got Jane to thinking about what she was trying to express with the proposal, the questions reminded Jane that she wrote this proposal. It was â€Å"her† proposal and she regained her confidence in her ability to produce an acceptable proposal for the board. Whitmore says that by asking a series of questions void of criticisms and judgmental comments leaves room for â€Å"accelerated learning and improved performance (Whitmore, 2010, p. 124). How Feedback Can Effect Development Feedback plays a critical part on a person’s cognitive development because it is a method to how individuals associate with others and the world around them. It is how people learn to make decisions. However, there is more to giving or receiving feedback when it is a matter of cognitive development concerns. Instead it becomes a question of how much feedback is necessary and what other functions can help to receive beneficial results. Therefore other functions are introduced such as physical activity, practice or repetition. The idea is to combine both feedback and practice, where as the two components become interdependent. The research of Motor Learning in Children: Feedback Effects on Skill Acquisition may help to understand why considering how much feedback for an individual is really necessary. There are various methods of feedback and examples that will further exemplify how cognitive development and feedback play a major role in today’s experiences. According to recent case studies by Katherine J Sullivan, Shailesh S Kantak, and Patricia A Burtner, cognitive theory is one of the factors among effective feedback-processing capability from the receiver. In their study, processing capability determines the affect of feedback among motor skills training. Half of the participants, both children and young adults receive either %100 feedback with motor skill practice or reduced feedback with motor skill practice. The result of the study is all participants who receive %100 feedback show more signs of accuracy and consistency. On the other hand young adults with reduced feedback still show signs of accuracy and consistency with additional practice; which means equal results can come from reduced feedback. Another interesting fact in the research is how children processed information differently than that of adults. It’s obvious that children would need more practice in order to process the information, but does that mean adults do not need as much feedback as children? Although the example above surrounds skill development among children and young adults, it is still informative for all professionals in various settings to determine the frequency of effective feedback along with helpful components. This may be relevant in situations where professionals such as managers, teachers, or doctors- who preside over various groups or individuals have to determine the level of feedback that is necessary to gain the intended result. Furthermore, there are similar ways of feedback that are used for adults as it is for children, such as corrective feedback, by immediately responding to an error. However, adults do not require continuous or %100 feedback to gain a skill, or retain new information as children do. For example: a manager is presenting a new system for meeting daily quotas. This new system requires employees to rearrange his/her method for recording data. After training, employees are judged by production and/or quality for the next three weeks to determine whether employees are using the system correctly. If not, the employees are given feedback, either by verbal correction or additional training. Then, after that period, employees are not as often monitored or corrected by superior staff. This is because adults do not require %100, feedback. Reduced feedback along with practice or other active components can produce the same results. For children, the frequency of feedback is much more intense due to children’s cognitive processing capabilities. The children involved in the research previously mentioned are between the ages of 8 to 14. According to Piaget’s Stages of Development, a child within these ages is within the concrete operational stage, which explains why feedback is important for children this age. It’s because children are at a stage where they are capable of thinking logically- associating action with a reaction. Hence, feedback is frequently used in many ways for their benefit. For example, children receive report cards and progressive reports from school; rewards for good behavior and grades. Children also receive feedback from their peers and adults (good or bad). For instance, if a child is a disruptive student in class and other students laugh or encourage the behavior, then the behavior will more likely continue. However, if the teacher provides corrective feedback to redirect the behavior and maintain appropriate behavior in the classroom, then the child can associate the teacher’s feedback with his/her actions. Feedback also may spark motivation for academic achievement, which teachers or parents may use to encourage children with rewards, such as money or privileges. Summary Feedback is a very important factor in any situation. The way feedback is given will directly impact the outcome of the situation. Ineffective feedback can leave the receiver feeling inadequate and diminish the receiver’s self-esteem. Surprisingly, the least effective methods are the ones most commonly used (Whitmore, 2010, p. 125). On the contrary, effective feedback will empower the receiver and allow learning and critical thinking to take place (Whitmore, 2010, p. 124). Not only will the receiver benefit; the person giving the feedback will benefit also. When someone learns to give effective feedback, that person becomes an effective leader and is able to guide others into their full potential. Giving and receiving feedback is a very strong; necessary tool in any situation. Reference Grimme, D., & Grimme, S. (2009). The New Manager’s Tool Kit. New York:American Management Association. Huether, Katherine. â€Å"The Benefits of Constructive Feedback.† Helium. Helium, 02 Sept. 2007. Web. 01 Feb. 2013 Moore, Krista. The Importance, Benefits and Fundamentals of Providing Feedback in Sales.† The Importance, Benefits and Fundamentals of Providing Feedback in Sales. N.p., n.d. Web. 01 Feb. 2013. Sullivan, K., Kantak, S., & Burtner, P. (2008). Motor learning in children: feedback effects on skill acquisition. Physical Therapy, 88(6), 720-732. doi:http://dx.doi.org/10.2522/ptj.20070196 Wardy, Joseph. â€Å"The Benefits of Constructive Feedback.† Helium. Helium, 27 Jan. 2010. Web. 01 Feb. 2013 Whitmore, J. (2010). Coaching for Performance 4th Edition. Boston: Nicholas Brealey.

Wednesday, October 23, 2019

Music Appreciation Essay

Sound – any sensation that is perceived by the aural senses. – Physically, sound is vibrational, mechanical energy that moves through matter (usually air) as a wave. The Hearing Process – Vibration, resonation, transmission, reception, interpretation, music appears. Pitch – relative highness or lowness of a sound, speed of vibration. Tone – a sound that has a definite pitch. Interval – the distance in pitch between any two tones, ex: half step. Accent – emphasis on a certain tone. Tone Color/Timbre – quality of sound that distinguishes on instrument or voice from another. – timbre contrast, one instrument vs. another. Dynamics- Associated Terms – Degrees of loudness or soften in music: Pianissimo (pp) – very soft Piano (p) – soft Mezzopiano (mp) – moderately soft Mezzoforte (mf) – moderately loud Forte (f) – loud Fortissimo (ff) – very loud Crescendo – gradually get louder Decrescendo – gradually get softer Chordophones – make their sound when a stretched string vibrates. – there is usually something they makes the sound reverberate such as the body of a guitar or violin. – the strings are set into motion by either plucking, strumming or by rubbing with a bow. Membranophones – Any musical instrument that produces sound primarily by the way of a vibrating stretched membrane. Ex: timpani Roto toms non-pitched drums snare drum (S. Dr.) tenor drum (T. Dr.) field drum (F. Dr.) bass drum (B. Dr.) Tom-Toms Bongos Timbales (Timb.) Conga Drums Tambourine Idiophones – Ex: Marima Crotales Steel Drums Cymbals (cym.) Suspended Symbol Hi-Hat Finger Symbols Triangle (trgl.) Anvil (anv.) Cowbells Tam-Tam (t.t) and other Gongs Sleigh Bells (sl.b.) Bell Tree (bl.t.) Brake Drum (br. dr.) Thunder sheet (th. sh.) Rachet (rach) Wood Blocks (w.bl.) Temple Blocks (t.bl.) Claves (clav.) Castanets (cast.) Maracas (mrcs.) Guiro Whip (wh) Aerophones – any musical instrument that produce sound primarily by causing a body of air to vibrate. 1st class: where the vibrating is not contained in the instrument itself. Ex: Harmonica 2nd class: where vibrating air is contained by the instrument. Ex: Flute Identify Basic String Instruments – Violin Viola Cello Double Bass Renaissance Lute/Music Dulcimer The Koto-Koto Music The Sitar Identify Basic (Wood)Wind Instruments – Piccolo Flute Clarinet Bass clarinet Oboe English horn Bassoon Identify Basic Percussion Instruments – Timpani Xylophone Snare drum Bass drum Cymbais Identify Basic Keyboard Instruments – Piano Pipe organ Harpsichord Notation/Identify Basic Symbols Staff/Identify Lines and Spaces Time Signature Meter-7,6,5,4,3,2 Downbeat Tied vs dotted rhythms Syncopation Tempo Metronome Arpeggio Half-Step Whole-Step Texture Polyphony Monophonic Homophonic Heterophonic Counterpoint Key Major vs minor vs chromatic scales Key Signature Modulation/Key Change Chord/Progression Harmony Consonance Dissonance Dominant Chord Tonic Chord Sub Dominant Chord Musical Form/Ternary/Binary Phrase/Antecedent/Consequent Cadence Melody/Theme Must Be Prepared to Write Scales and A Chord Progression I –IV-V-I on the staff. Be prepared to insert the Minor chord. Four flats or sharps is the max. . Must be prepared to identify musical instruments and the families they belong to.

Tuesday, October 22, 2019

Boiling Point Elevation Definition and Process

Boiling Point Elevation Definition and Process Boiling point elevation occurs when the boiling point of a solution becomes higher than the boiling point of a pure solvent. The temperature at which the solvent boils is increased by adding any non-volatile solute. A common example of boiling point elevation can be observed by adding salt to water. The boiling point of the water is increased (although in this case, not enough to affect the cooking rate of food). Boiling point elevation, like freezing point depression, is a colligative property of matter. This means it depends on the number of particles present in a solution and not on the type of particles or their mass. In other words, increasing the concentration of the particles increases the temperature at which the solution boils. How Boiling Point Elevation Works In a nutshell, boiling point increases because most of the solute particles remain in the liquid phase rather than enter the gas phase. In order for a liquid to boil, its vapor pressure needs to exceed ambient pressure, which is harder to achieve once you add a nonvolatile component. If you like, you could think of adding a solute as diluting the solvent. It doesnt matter whether the solute is an electrolyte or not. For example, boiling point elevation of water occurs whether you add salt (an electrolyte) or sugar (not an electrolyte). Boiling Point Elevation Equation The amount of boiling point elevation can be calculated using the Clausius-Clapeyron equation and Raoults law. For an ideal dilute solution: Boiling Pointtotal Boiling Pointsolvent ΔTb where ΔTb molality * Kb * i with Kb ebullioscopic constant (0.52Â °C kg/mol for water) and i Vant Hoff factor The equation is also commonly written as: ΔT Kbm The boiling point elevation constant depends on the solvent. For example, here are constants for some common solvents: Solvent Normal Boiling Point, oC Kb, oC m-1 water 100.0 0.512 benzene 80.1 2.53 chloroform 61.3 3.63 acetic acid 118.1 3.07 nitrobenzene 210.9 5.24

Monday, October 21, 2019

PITCH-RESO Essays - Language, Learning To Read, Lexicography

PITCH-RESO Essays - Language, Learning To Read, Lexicography The lack of consistency among the junior high students that affect their English proficiency skills Members Minioza, Carpo, Ronquillo, Agustin, Espejo, Viagedor Ronquillo: (Will facilitate the short activity and explain each after the students have given their own explanation about the pictures)Espejo:Introduction: Learning English aims at helping students use the language effectively for real life purposes. Students need to use English to become functional in professional, academic and social settings. In the Philippines, English proficiency is found out to be declining. A recent language test result showed that the Philippines is no longer the top one English-speaking country in Asia. Sam: (Read and Explain the slide about The Importance of English Language )Minioza:Why do some students students lack the consistency in speaking in english?An illusion to think that students like us will learn to speak and pronounce words with a decent accent by simply reading or listening to a teacher, or a classmate.Speaking is the most difficult of the four skills. Reading, Listening, and writing can be learned with a teacher or on one's own. It requires immediate comprehension and real time reaction. Students have to produce language instantaenously with the correct vocabulary, right use of tense and sentence structure. Even if we ask students to read texts or search for information in the internet, they will only learn to read and pick up passive vocabulary which we all know will not help to improve our English Speaking Skills.Programs and projects conducted by schools are not enough to promote the development of English language proficiency among Filipino students. As we can all see, even if we have this "English Campaign" implemented in our school, but do students really follow this program? Instead, they would most likely to speak in English, whenever they feel like to, they would also feel unmotivated because of their Non-english speaking environment. With this causes, It would definitely result to the lack of consistency among all of us. Carpo:Facundo stated that, In the Philippine, People are familiar with the frequent judgm ents made on that classmate who speaks better English than most.Adults say that looking up to them is the colonial mentality. More deprecating comments dismiss them as "nosebleed" - because exerting effort to speak English the way they do or simply understanding what they say demands too much effort.Sta. Ana (2013) pointed out 7 reasons why people can't deny the fact that most Filipinos can't speak in English better. Filipinos get engaged to their mother tongue which is the Filipino language. Next one is that Filipinos find it hard to adjust to the pronunciation of English words, each words and letters have different pronunciations. However in the English language, it is pronounced differently with various sounds. If a person spoke the language, they might get mocked by the others simply because of its incorrect pronunciation.Viagedor, Agustin:ResolutionThere are various ways that we could to avoid lack of consistency and to pursue the improvement of the students English language pr oficiency, The group have suggested few programs for the students.Picture Describing Activity It is similar to the activity that we have done a while ago.English Teachers must allot 5 mins of their time to involve each student in speaking activity.Picture Describing is to give students set of different pictures and having them describe what it is in the picture.This may be done individually or by group. Students discuss the picture with their groups, then a spokesperson from each group describes the picture to the whole class.This activity fosters creativity and imagination of the learners as well as their public speaking skills.Goal of this program is to provide maximum opportunity to students to speak the target language by providing a rich environment that contains collaborative work, authentic materials, and shared knowledgeStory Completion This is a very enjoyable, whole-class, free-speaking for which students sit in a circle. For this activity, a teacher starts to tell a story , but after a few sentences, he or she will stop narrating.Then, each student starts to narrate from the point where the previous one stopped. Each Students should add from 4-10 sentences. They can add new characters, events, descriptions and so on.The goal of this program is to reduce teacher speaking time in class while increasing students' speaking time.Reference:https://www.quora.com/What-makes-Filipinos-speak-English-well

Sunday, October 20, 2019

Chemicals That Could Make You Fail a TSA Swab Test

Chemicals That Could Make You Fail a TSA Swab Test If youre flying, you may get pulled aside by a TSA agent for a swab test. Also, your baggage may get swabbed. The purpose of the test is to check for chemicals that might be used as explosives. The test cant check for all the chemicals that might be used by terrorists, so it looks for two sets of compounds that can be used to make many types of bombs: nitrates and glycerin. The good news is the test is highly sensitive. The bad news is, nitrates and glycerin are found in some harmless everyday products, so you could test positive.   Getting swabbed doesnt seem to be particularly random. For example, some people get swabbed nearly every time they fly. This may be because theyve tested positive before (possibly related to a penchant for making smoke bombs and other small pyrotechnics) or because they meet some other criteria. Just expect to be swabbed and be prepared. Heres a list of common chemicals that may cause you to test positive. Avoid them or else be ready to explain the test result, because it can take a while for TSA to complete its evaluation of your belongings, which can translate into a missed flight. Common Products That Test Positive Hand soaps that contain glycerin (Rinse very thoroughly after washing your hands.)Lotions that contain glycerinCosmetics or hair products, which may contain glycerinBaby wipes, which may contain glycerinCertain medications (such as nitroglycerin and other nitrates)Lawn fertilizers (Nitrates: Wash your hands and especially your shoes.)MunitionsAccelerantsFireworks and other pyrotechnics What to Do If Youre Flagged Avoid becoming hostile and aggressive. It wont speed the process. Youre likely going to get patted down by an agent of the same gender who will also empty your bag for additional testing. Theres a chance your luggage may get pulled, although this rarely happens; its also unlikely that you will miss a flight because of the test. Be aware of chemicals in your environment and able to trace your steps to help TSA identify the source of the triggering compound. Sometimes you wont have any idea why you flagged the test. But, careful attention to hygiene may help you avoid the situation. The best advice is to arrive early enough before your flight to get through security. Try to avoid the problem, plan for it, and dont overreact if it happens to you.

Saturday, October 19, 2019

Framework for Ethics Coursework Example | Topics and Well Written Essays - 1000 words

Framework for Ethics - Coursework Example is end, Anandarajan (2002) observed that it is of an importance measure the organization’s structural and ethical behavior through some structured frameworks. It is evident that various organizations employ these models to measure their structural and moral conduct as a way of saving the trust of stakeholders. This can be alluded to the successful ends that these models attain in establishing ethical culture in an organization, steer moral decision making as well as enhancing the overall execution of results (Anandarajan, 2002; Ferrell, Fraedrich & Ferrell, 2013). The scope of this paper is thus limited in the discussion of only two of these frameworks that organization can employ, namely; Balanced Scorecard and the Triple Bottom Line. The component of these framework models would be analyzed in relation to how they can be used to enhance ethics and business performance. Moreover, the paper presents how organization can make use of these models as approaches of driving ethical decision-making as well how organization incorporate the ethical models in the corporate relations. Balanced scorecard model is defined as a multidimensional way of making executive estimations and administration control within a particular organizational structure (Henriques, 2004). In other words, Balanced Score Card (BSC) can be defined as an execution metric which is used mostly in strategic management to improve and advance various internal functions and so their resulting external outcomes (Boatright, 2009). A single most formidable quality of the model is the great emphasis it places on ensuring that performance measures are linked with the activity plans at all levels within a business unit. To further explicate on BSC, Brown (2000) posits two significant approaches to implementing it; centralized and decentralized. Centralized approach is mainly a tool for top management to impart centrally formulated strategies down the organizational administration. On the other hand, a

Friday, October 18, 2019

GMCs Hummer Vehicle Essay Example | Topics and Well Written Essays - 1000 words

GMCs Hummer Vehicle - Essay Example The realist considers Hummer for its practical purposes, and will therefore make use of the vehicle's off-road prowess. The discerner is a connoisseur for the finer things in life, who appreciates Hummer's status, but is unlikely to go off-roading. The conqueror is a successful person who wants people to know it, who appreciates Hummer for its exclusivity and attention grabbing looks. The fourth type of buyer is the adventurer, who wants to take the Hummer off-road. (Amazing Cars - Magazine) By analyzing the percentage of the population that has these qualities, Hummer's U.S. target market segment is males between the ages of 25 and 64 who earn over $100,000 per year. ANALYSIS Demographic Information: "Hummer's target market segment cannot be very large because of the high price of the vehicle, which can be in excess of $90,000. Hummer must gear its marketing strategies towards this small group of individuals."1 Hummer's market segment consists of males between the ages of 25 and 44 who earn over $100,000 a year. This demographic group consists of Generation X'ers and some of the Baby Boom generation. These males are looking for specific vehicles that are geared towards luxury and status. According to 1999 census data , in the approximation of 40,698,000 males between the ages of 25 and 44, only 2,011,000 of them earn enough money to purchase a Hummer. This would give Hummer a market base of over 2 million consumers. This market segment is growing because of the change in this base from 2005 to 2006. The number of males within this age group who earned over $100,000 was 1,730,000 in 2004. That reveals a growth rate of 16% in one year. Also, you can infer that the number of people in general who can afford a Hummer is increasing due to the low unemployment rate, and the steadily growing U.S. economy. 1 ANALYSIS Demographic Information Hummer's sales would continue to grow due to the increase of its market segment coupled with the fact that the company is preparing to release new models that may cater to a whole other marketing segment. Cultural Trends, Attitudes, Values of Target Market The outlook on the buying attitudes of Hummer's target market remains robust in the future. The demand for luxury items has been steadily growing for the past couple of years. With the existence of a bull market, and a steady increase in national prosperity, today's high-income individuals have a healthy demand for luxurious goods and services. The SUV market in general has been steadily increasing over the past five years. According to American Demographics , forecasters estimate that 49% of the new vehicle market will be that of light trucks in 2005, and light truck sales will be greater than that of car sales in 2005. Today's consumers stress safety over other attributes when buying vehicles, which show the increase in demand for SUV's, which are proven to be safer than most cars in crashes. Also, American Demographics' study revealed that empty nest baby boomers are not moving towards sedans, but towards SUV's. Another value of today's consumers is in styling. Today's SUV's have been appealing to consumers because of their current styling blend of ruggedness and beauty. The image factor is also big in analyzing consumer trends. Consumers have a liking for

From the perspective of UN peacekeeping operations, was the Essay

From the perspective of UN peacekeeping operations, was the humanitarian intervention in Libya justified - Essay Example Considering both the views listed above and the situation that existed in Libya during the unrest, an important question arises: was humanitarian intervention justified? By considering the systematic violation of human rights by the regime, the aggravating refugee situation and the rampant anarchy, do the UN protocols really reflect changes in international politics? In addition to this, does it justify the need for humanitarian intervention in such a way that the needs of the country are met without negative impacts such as exploitation? Did the situation in Libya really necessitate UN humanitarian intervention? And do the rules and regulations laid down by the UN justify military intervention in Libya under international law? As a result of these questions, the underlying factor that stands is whether there is need to justify the UN Humanitarian Intervention in Libya. In this paper, I shall review the problem statement in order to understand the background of the situation. Review of the various literatures concerning humanitarian intervention with a focus on the United Nation shall then be carried out. I shall then develop a testable hypothesis which will then be tested to show a causal-effect relationship. Problem Statement This research seeks to find out whether UN peace keeping protocols are in compliance with international law on matters regarding military intervention with a focus on the Libyan civil unrest. The research intends to justify the military operation carried out in Libya based on the provisions of the United Nations Security Council charter as well as international law. On February 2011, protests began in Libya to oust the government of Muammar Gaddafi. The protests were part of a bigger revolution that was taking place in most of the Islamic nations at the time including Tunisia, Egypt and Syria (Pargeter, 2012). Gaddafi unleashed his military force on his quest to crush the rebellion. After this, the rebellion spread rapidly throughout Lib ya and soon Gadhafi lost hold over most of the eastern part of his country. On 26th February 2011, the United Nations Security Council adopted the resolution 1970 calling upon member states to: ensure that no arms exchange took place across their borders to Libya, freeze assets owned by Gaddafi and those in his government allied to him, and to facilitate humanitarian aid in Libya (Cheslow 2012). The resolution however did not ratify the use of military force in Libya. Due to increasing fighting and an increase in oppression of Libyans by Gadhafi’s loyalist, a multistate coalition began military operations on 19th march 2011 (Noueihed 2012). Air strikes against army tanks and bases were carried out thereby frustrating the efforts of Gaddafi’s forces to bring the country to heel. International law generally proscribes that nations should apply the doctrine of non-intervention when dealing with intervention of parties within the territory of a sovereign nation. Von Hippel (1995) defines intervention as the use of coercive tactics to direct a given nation to take a particular course that it would not have likely taken and may involve military action by a foreign power in a domestic conflict. Intervention may take other forms than military

Thursday, October 17, 2019

The Simulator-Manual Paper Essay Example | Topics and Well Written Essays - 1000 words

The Simulator-Manual Paper - Essay Example :   Ã‚   This is a sample experimental run file   Ã‚   Seed: 0  Ã‚   Algorithm: FCFS Group Processes First Arrival Interarrival Duration CPU Burst I/O Burst 1 8 2.0 constant 4.00 uniform 8.00 14.00 constant 10.00 constant 6.00 Experimental Runs For 1 Experiment Experiment Commentary Run Modifications myexp This experiment contains 1 run myrun_1 algorithm FCFS key First Come First Served Starting run from experiment myexp Tue Feb 21 05:07:29 EST 2012 Starting run from myrun_1 Starting to run events using FCFS 40 events done in 18 milliseconds Event List at Time 86.58 Process  Scheduling  Simulator version  1.100L288  by  S.  Robbins   supported  by  NSF  grants   DUE-9750953  and  DUE-9752165. ... 1  05:07:32  EST  2012 Event  list  size  is  0  at  86.58 Tue  Feb  21  05:07:33  EST  2012 Number  of  new  processes  0  at  time  86.58 Tue  Feb  21  05:07:34  EST  2012 Number  of  waiting  processes  0  at  time  86.58 Tue  Feb  21  05:07:36  EST  2012 Number  of  processes  8  at  time  86.58   ID  Ã‚  Ã‚  State  Ã‚  Ã‚  Started  Ã‚  Ã‚  Finished  In  CPU  Ã‚  Ã‚  Ã‚  Ã‚  Used  Ã‚  Ã‚  Ã‚  Total  Ã‚  Waiting   Ã‚  1  Ã‚  Ã‚  done  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  2.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  43.10  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  2  Ã‚  Ã‚  Ã‚  12.44  Ã‚  Ã‚  Ã‚  12.44  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  22.66   Ã‚  2  Ã‚  Ã‚  done  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  6.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  76.72  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  2  Ã‚  Ã‚  Ã‚  13.62  Ã‚  Ã‚  Ã‚  13.62  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  51.10   Ã‚  3  Ã‚  Ã‚  done  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  10.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  31.52  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   1  Ã‚  Ã‚  Ã‚  Ã‚  9.52  Ã‚  Ã‚  Ã‚  Ã‚  9.52  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  12.00   Ã‚  4  Ã‚  Ã‚  done  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  14.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  40.66  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  1  Ã‚  Ã‚  Ã‚  Ã‚  9.14  Ã‚  Ã‚  Ã‚  Ã‚  9.14  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  17.52   Ã‚  5  Ã‚  Ã‚  done  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  18.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  86.43  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  2  Ã‚  Ã‚  Ã‚  10.42  Ã‚  Ã‚  Ã‚  10.42  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  52.01   Ã‚  6  Ã‚  Ã‚  done  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  22.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  86.53  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  2  Ã‚  Ã‚  Ã‚  10.10  Ã‚  Ã‚  Ã‚  10.10  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  48.43   Ã‚  7  Ã‚  Ã‚  done  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  26.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  86.58  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  2  Ã‚  Ã‚  Ã‚  10.05  Ã‚  Ã‚  Ã‚  10.05  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  44.53   Ã‚  8  Ã‚  Ã‚  done  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  30.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  86.01  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  1  Ã‚  Ã‚  Ã‚  Ã‚  9.29  Ã‚  Ã‚  Ã‚  Ã‚  9.29  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  46.72 Tue  Feb  21  05:07:37  EST  2012 Number  of  ready  processes  0  at  time  86.58 Tue  Feb  21  05:07:38  EST  2012 Number  of  finished  processes  8  at  time  86.58   ID  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Started  Ã‚  Ã‚  Finished  Ã‚  CPU  Total   Ã‚  Ã‚  3  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  10.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  31.52  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  9.52   Ã‚  Ã‚  4  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  14.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  40.66  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  9.14   Ã‚  Ã‚  1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  2.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  43.10  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  12.44   Ã‚  Ã‚  2  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  6.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  76.72  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  13.62   Ã‚  Ã‚  8  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  30.00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  86.01  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  9.29

Globlisation and forgen direct investment Essay

Globlisation and forgen direct investment - Essay Example According to Encyclopaedia Britannica globalization is the course through which the understanding of day to day life is becoming harmonized all over the globe. (King, 126) In economics, a wide description is that globalization is the union of prices, wages, products, profits and rates of interest in synchronization with developed nation norms. Globalization of the financial system depends on the position of international business, human migration, incorporation of pecuniary markets, and mobility of capital. The International Monetary Fund observes the increasing financial interdependence of countries all over the world through rising quantity and multiplicity of cross-border dealings, gratis international capital flow, and comparatively faster and extensive dissemination of technology. Theodore is more often than not attributed with globalization's initial utilization in an economic perspective. (Kar, 145) Globalization in the period from the time after World War II has been driven by improvement in technology which has declined the expenses of trade, and business arbitration rounds, initially under the sponsorship of GATT, which led to a succession of concords to do away with restrictions on gratis deals. Given that the end of World War II, after the arrival of the United Nations and the Bretton Woods institutions, there has been a sudden increase in the attainment and influence of Multinational corporations and the fast expansion of global civil society. (Border, 227-228) There are disagreements between media conglomerates, among various nations-states and speed and character of technical growth might facilitate in approaching one or another way out. While there is a measure of globalisation, its speed and direction is variably contested. The nation-state continues to keep hold of most of its authority, but it requires unfolding them and implementing them in innovative ways, if it d esires to fulfil defies of global forces and global actors. For instance in a global structure of governance the perception of sovereignty is becoming a much more expandable and absorbent one. Sovereignty requires be sharing, passing to global with local bodies. It is put into effect by states in combination with local and supranational bodies. (Fletcher, 188) This does not essentially signify that globalisation is deterioration the power of nation-states. However it does imply that this authority, in turn to be effectual, has to be transformed and reorganized. And this is to a degree already taking place. According to some, for instance, certain international institutions are in reality best implicit as a response to global forces or better as a reemphasize in a dynamic method of the authorities of nations. Thus for transformationalists the particular forms followed by globalisation are not predictable. (Lamb, 243-245) Detractors of the economic issues of globalization challenge that it is not an unalterable procedure which flows logically from the economic requirements of every person, as its supporters naturally argue. The opponents generally accentuate that globalization is a course that is arbitrated in accordance with the commercial benefits, and naturally elevate the prospect of

Wednesday, October 16, 2019

Financial Statements Essay Example | Topics and Well Written Essays - 1500 words

Financial Statements - Essay Example This project aims at studying and analyzing the annual report of Home Depot as submitted to the United States SEC in the year 2008. The basic financial statements including the income statement, the balance sheet and the cash flow statements of the company are studied and mapped against the managerial decision making processes of the company in the specific year under study. The consolidated statement of earnings of Home Depot indicates that the company has been extremely proficient in generating revenues in 2008. The total revenue in 2008 was USD 77349 million. The operating expenses of the company were USD 18755 million. This indicates that the company was much efficient in generating high revenues while being able to maintain much lower operating expenses. The net earnings of Home Depot in 2008 were USD 4395 which is favorable when mapped against the industry requirements. In overall, as per the consolidated statement of earnings of Home Depot, the company was performing at a standard level in the year 2008 (Home Depot Inc., 2008, p. 4). The consolidated statement of earnings or the income statement of a company summarizes the revenues that a company has earned during the period of reporting through the sale of its products and services. Also, it includes the expenses that a company has made to produce the revenues during the same period. These expenses may include the selling expenses, overheads, general expenses and depreciation of the assets. The comparison of the revenues and the expenses of a company show the net operating profit of a company. After the deduction of various statutory deductions like taxes and interest expenses, the consolidated statement of earnings of a business represents the net earnings of the company over a specific period of time. The key business decisions like how the return on investment for the company can be improved are

Globlisation and forgen direct investment Essay

Globlisation and forgen direct investment - Essay Example According to Encyclopaedia Britannica globalization is the course through which the understanding of day to day life is becoming harmonized all over the globe. (King, 126) In economics, a wide description is that globalization is the union of prices, wages, products, profits and rates of interest in synchronization with developed nation norms. Globalization of the financial system depends on the position of international business, human migration, incorporation of pecuniary markets, and mobility of capital. The International Monetary Fund observes the increasing financial interdependence of countries all over the world through rising quantity and multiplicity of cross-border dealings, gratis international capital flow, and comparatively faster and extensive dissemination of technology. Theodore is more often than not attributed with globalization's initial utilization in an economic perspective. (Kar, 145) Globalization in the period from the time after World War II has been driven by improvement in technology which has declined the expenses of trade, and business arbitration rounds, initially under the sponsorship of GATT, which led to a succession of concords to do away with restrictions on gratis deals. Given that the end of World War II, after the arrival of the United Nations and the Bretton Woods institutions, there has been a sudden increase in the attainment and influence of Multinational corporations and the fast expansion of global civil society. (Border, 227-228) There are disagreements between media conglomerates, among various nations-states and speed and character of technical growth might facilitate in approaching one or another way out. While there is a measure of globalisation, its speed and direction is variably contested. The nation-state continues to keep hold of most of its authority, but it requires unfolding them and implementing them in innovative ways, if it d esires to fulfil defies of global forces and global actors. For instance in a global structure of governance the perception of sovereignty is becoming a much more expandable and absorbent one. Sovereignty requires be sharing, passing to global with local bodies. It is put into effect by states in combination with local and supranational bodies. (Fletcher, 188) This does not essentially signify that globalisation is deterioration the power of nation-states. However it does imply that this authority, in turn to be effectual, has to be transformed and reorganized. And this is to a degree already taking place. According to some, for instance, certain international institutions are in reality best implicit as a response to global forces or better as a reemphasize in a dynamic method of the authorities of nations. Thus for transformationalists the particular forms followed by globalisation are not predictable. (Lamb, 243-245) Detractors of the economic issues of globalization challenge that it is not an unalterable procedure which flows logically from the economic requirements of every person, as its supporters naturally argue. The opponents generally accentuate that globalization is a course that is arbitrated in accordance with the commercial benefits, and naturally elevate the prospect of

Tuesday, October 15, 2019

Sophie Neveu Finds the Truth Essay Example for Free

Sophie Neveu Finds the Truth Essay In the Da Vinci Code by Dan Brown, Sophie embarks on a journey to not only to find the Holy Grail but also the truth about her family. Sophie’s character changed a lot throughout the story, she became a lot more aware about what is goes on in the world and how one’s past and history can have a big impact in life. She had to learn and grow as a person because of how much pressure she was on while figuring out the answers to all of the secret messages her grandfather left her. She also had to face a lot of difficulties due to the fact that she had so many people standing in the way and trying to hurt her and reveal the secret. Sophie Neveu is the granddaughter of the Grand Master of the Priory of Sion, Jacques Sauniere, the only real background we have of her is that her grandfather raised her from a very early age, after her parents were killed in a car accident (82). We find out that Sauniere trained her to solve complicated word puzzles as a young girl and that it was these puzzles and riddles that sparked her interest in solving them (218). The fact that she was exposed to puzzles and riddles when she was a child is likely the reason why she ended up working in a field that revolved around that topic. One of the things that give us some insight into Sophie’s personality is when we are told about a day when she accidentally discovered a strange key in her grandfathers room inscribed with the initials P.S. (118). This isn’t until much deeper into the book but it really defines who Sophie Neveu is because it shows how she struggled to find the truth about her family’s history from a very young age and that Sauniere was keeping secrets from her. This caused her to get even more curious about her past and is one of the main reasons why she becomes so dedicated to finding the Grail. Something that is really interesting about Sophie is the fact that her name’s meaning is that of the ancient goddess of wisdom, the icon of the divine feminine, Sophia; which means wisdom, this is very interesting becau se she does display wisdom at many points throughout the novel and out-shinning Robert most of the time. Throughout the book Sophie learns the reasons behind her grandfathers strange behavior and why he kept so many things hidden from her. At the beginning of the story we are told that she had stopped all forms of communication from her grandfather because of an estrange ritual she saw him be a part of and we are told that she had not spoken or seen him until the night of his murder (76-77). This shows that at a very young age Sophie had to deal with a very traumatic experience that shaped her personality and made her become a strong woman and caused her to not show much emotion. Sophie is a cryptologist working for the Parisian police and therefore a very intelligent woman. She shows she’s intelligent because she realizes that the message â€Å"P.S: Find Robert Langdon† is meant for her; She delivers a message to Robert Langdon letting him know that Officer Fache finds him as the prime suspect of Sauniere’s death. She reveals to Langdon that she is Sauniere’ s granddaughter and tells Langdon that she was sure of it because her grandfather used to call her Princess Sophie as a child. (76-77). Sophie’s talk to Langdon in the bathroom of the Louvre sets up the plot for the entire novel as well as give us some very important background information about Sophie, not only do we become aware of how intelligent she is but we also realize that she is brave enough to go against Fache and the Parisian police if it means finding out the truth about her past and family. Sophie doesn’t tell anybody else about the message her grandfather left her because she realizes that if her grandfather didn’t want anyone else to know what had happened. Being the only one that knows that Sauniere was hiding something important causes Sophie to act impulsively and helps Langdon escape from the police. It isn’t until farther into the book that we are told that her grandfather raised her from a after her parents were killed in a car accident and that he then proceeded to train her to solve complicated word puzzles and even made a cryptex for her (216). We are given brief flashbacks of her life, which prove that she was curious and hungry for knowledge from an early age. An example of this is that we are told that she accidentally discovered a strange key in her grandfathers room inscribed with the initials P.S. and that she tried looking for information about her family but anytime she tried Sauniere would get mad and tell her to forget about them. (118). This has a lot to do with her personality as an adult and being part of the Parisian police as a cryptographer, the fact that she spends her days at work figuring out puzzles and hidden messages shows that living with Sauniere made her become good at unscrambling and finding out the truth, the way she was brought up by Sauniere shaped her personality to be that of a person who doesn’t fully trust people and that is worthy of knowing important information such as the location of the Holy Grail. Sophie finds out at the end of the book that she is a descendant of the Merovingians, a living descendant of Jesus Christ and Mary Magdalene and that she is; literally, what her grandfather nicknamed her when she was a child: â€Å"Princess Sophie.† She also finds out that Sauniere wasn’t really her grandfather but that since he was the Grand Master of the Priory of Sion she would be safer with him. He chose to protect her and prepare her for what he knew was coming. The rest of the Priory then welcomes Sophie and tell her that they will protect her. At the beginning Sophie is brave and intelligent, she exhibits confidence and knowledge about her job and surroundings, but thought-out the novel and as she starts to unravel more of the secret and the Holy Grail she seems to leave that confidence behind and start questioning he past and who Sauniere really was. She starts showing more emotion throughout the novel and the closer we get to the end. Sophie is a strong woman who got a bit confused because of the uncertainty of her past and not knowing that she could trust. Works Cited Brown, Dan. The De Vinci Code, NY: Anchor, 2003. Print.

Monday, October 14, 2019

Effects of Derivatives

Effects of Derivatives Abstract Banks and other financial institutions have progressively understood the need to measure and manage the credit risk they are exposed to. Derivatives, therefore have ascended in retort to the surge in demand of financial institutions to create vehicle tools for hedging and shifting credit risks. Derivatives over the years have become a valuable financial tools with system-wide benefits. However as innovative as the derivatives have been, they carry inside themselves so many threats that in the hand of inexperienced market participants, destabilize the whole economic system. Inside such a Pandora box were the instruments that would participate in amplifying the 2008 financial crisis. This paper postulates that derivatives may have contributed to the 2008 crisis. Derivative contracts are probabilistic bets on future events, as defined on Investopedia they are securities with a price that are dependent upon or derived from one or more underlying assets. Many people argue that derivatives reduce systemic problems, in that participants who cannot bear certain risks are able to transfer them to stronger hands. These people believe that derivatives act to stabilize the economy, facilitate trade, and eliminate bumps for individual participants (Buffett, 2016). We have now reached the stage where those who work in finance, and many who work outside finance, need to understand how derivatives work, how they are used, and how they are priced (Hull, 2015). For this reason, derivatives are at the center of everything. However, in 2008 the world witnessed a financial and economic hurricane that left massive financial and economic damages. It was universally recognized as the worst economic crash since the Great Depression. The old saying has it that success has a hundred fathers, but failure is an orphan (Davies, 2016). In this situation, it was the opposite as this failure had a long list of guilty men. While some argued that the changes in the law are the cause of the crisis, others pointed out the role derivatives played via the crash in the value of subprime mortgage-backed securities. The main thesis of this paper is that, while derivatives contributed a lot for the financial market would we be better off them? After a discussion of the positive effects of derivatives (their ability in refining the management of risk), the paper will analyze the negative aspects of them (enhancing risk-taking, evading taxes and creating financial crises). And we finish by looking at how derivatives fueled the financial crisis. Derivatives are instruments that derive their performance from some other instruments or assets. In contrary to the spot market, derivative markets require less capital and usually are more liquid.   Higher liquidity means more efficiency such that prices change more rapidly in response to new information, which is a good thing (Chance, 2008). There are different types of derivatives that an individual can use to protect himself against volatile time. Derivatives confer to the financial market different types of benefits such as risk management, price discovery, enhancement of liquidity. Fundamentally they are instruments that permit the transfer of risk from a seller to a buyer. Exporters, exposed to foreign exchange risk, can reduce their risk using derivatives (forward, futures, and options) (Viral Richardson, 2009). Derivatives can be viewed as insurance; one party gives up something in order for the other party to accept the risk. Some say that derivatives are nothing mo re than gambling (Peery, 2012). But derivatives can be compared more to insurance than be called gambling. In insurance, we have an insurer collecting the premiums where in derivatives, we have speculators receiving fees for speculation. Without speculators, hedging risk is impossible. Another benefit is price discovery; derivatives provide information to the market about the expectations of people on the future spot price. The ABX indices (i.e., a portfolio of collateralized debt obligations (CDOs) of subprime mortgages) which were one of the first instruments to provide information to the marketplace on the deteriorating subprime securitization market (Viral Richardson, 2009). Moreover, they also give the opportunity to market participants to extract forward information instead of historical information. Such information is used, among others, by central banks in making policy decisions, investors for risk and return decisions on their portfolios and corporations for managing financial risk (Viral Richardson, 2009). An additional positive benefit is the enhancement of liquidity. When derivatives are added to an underlying market, it brings additional players who use the derivatives and give the opportunity to companies to earn income that would not be available to them or available but the cost would be high. By and large, spot markets with derivatives have more liquidity and thus lower transaction costs than markets without derivatives (Viral Richardson, 2009). If derivatives provide to the financial market all those useful benefits, how come they were accused of player a role in the financial crisis of 2008? Derivatives play an important role in reducing the risk that companies face, but they are a synonym of danger to the stability of the financial market and in doing so, the economy in general. Within the field of finance, derivatives are the most dynamic instruments because they have no limits unless parties, markets, or governments set them (Peery, 2012). In his annual letter to shareholders in 2002, Warren Buffett branded derivatives as time bombs, both for the parties that deal in them and the economic system (Buffett, 2016). However, that fear of derivatives existed way before Warren Buffett expressed it.   Max Webers 1896 essay on the stock exchange lingered over the concern that derivative contracts encouraged speculation and increased market instability (Maurer, 2002). Years after the financial crisis, (Hoefle, 2010) argued that derivatives were doomed from the start, that they were the answer to the stock market crash of 1987, the demise of the SL industry, and bankrupt cy of U.S banking system. Why are some people against the use of derivatives? At first, derivatives were tools that can be used to hedge against pre-existing risks, in another word a form of insurance. But as time went on, people realised that they can use derivatives in another form than insurance. They went from hedge to speculation, implying that they tried to earn a profit by prophesying future events better than another can, including future asset prices, interest rates, or credit ratings. While doing that most companies got themselves hugely exposed to derivatives. As you can see in the example I have in the appendix Table 1, most of those companies total assets cannot match the leverage the companies are facing throughout the use of derivatives. And when the corporations exposure becomes large to the overall market, that could translate to problems, for example the collapse of Long-Term Capital Management in 1998. The company at that time had capital of $4 billion, assets of $124 billion, but their exposure to derivatives was more than $1 trillion. How all of these translated into becoming one of the causes of the financial crisis? The Bank for International Settlements has only published statistics on the Credit Derivatives market since the end of 2004 when the total notional amount was $6 trillion (Stulz R. M., 2009). The market grew hugely and by the time we get to the middle of 2008 the notional amour was $57 trillion. Quickly Credit Derivatives became an important tool to manage credit exposure. There are different reasons to why market participants have found credit derivatives appealing.   First you do not need a deep pocket in order to take a position, secondly, CDs can be used as insurance against any type of loans, not just a specific. In addition to that, the largest derivatives market is for swaps. With a swap, two parties exchange the rights to cash flows from different assets (Stulz R. M., 2009). In principle, credit default swaps should make financial markets more efficient and improve the allocation of capital (Stulz R. M., 2009). As time went on people were more focused on CD contracts o n subprime mortgages. Although subprime mortgages carried inside them significant default risk, as other mortgages they were securitized. As (Stulz R. M., 2010) explained in his article, mortgages are placed in a pool, and notes are issued against that pool. In the pool, the highest notes always have an AAA rating. In the case of mortgages default, the lower-rated notes suffer first, but as the default losses increase the higher rated notes will be affected too. In 2006 the ABX indexes were introduced, it was based on the average of credit default swaps for identical superiority securitization notes. Every six months, ABX indexes played an important role as they made it possible for an investor to take positions on the subprime market, even though they have no ownership of subprime mortgages or as insurance for subprime exposure. As a result, it was possible for investors to bear more subprime risk than the risk in outstanding mortgages (Stulz R. M., 2009). As all good thing must co me to an end, in 2008 financial institutions faced counterparty risks in derivatives that they had never factored in their calculations. Renà © M. Stulz (2010) offers a more detailed explanation of the counterparty risks and the problem that can arise. As for the causes of the counterparty risk, some people argued that derivatives lead to huge web exposure across financial institutions. In case one of the financial institution fails, the others will follow. And as we saw with the failure of Lehman, which had at that time derivatives contracts with other financial firms. Those firms were expecting payments from Lehman on their derivatives. Sadly, for them, Lehman at that time had filed for bankruptcy. While they could have managed their exposure to the counterparty risk, as they were high rated counterparties something unexpected happened. The failure of Lehman had as consequence a huge increase in the price of derivatives, at that moment the collateral amount would not be enough to cover the default of other counterparties default. As a domino effect, most firms were hit by the default of Lehman and without the help of the government to bail them out some would not have survived. The CDs market grew too fast for its own good and it created a bubble that fooled the financial markets. The lack of regulations, transparency, and clarity in financial statements made it hard to prevent. And before people realised we were in what some people call the worse financial crisis of all time. No matter the instruments you give to someone the results will depend on his intention. A good instrument in the hand of an evil person who focuses on profit over ethics will make that instrument look evil. Pablo Triana in his book The number that killed us gave a perfect example of a situation where a red Ferrari was involved in an accident that had civil casualties. Should we blame the car for the accident or the driver who was guilty of speed driving in the past? Same dilemma with the derivatives, we have seen how derivatives allow firms and individuals to take risk efficiently and to hedge risks. However, they can also create risk when they are not used properly. And the downfall of a large derivatives user or dealer may create a systemic risk for the whole economy. Which is why as for any instruments that may harm the world, derivatives should be regulated more effectively. We did not ban the atomic bomb after Hiroshima, nor we did with planes for their risk of a crash, but bett er regulations were introduced to make them safe as sense to be. While derivatives have been blamed, sometimes wrongly, for large losses from Barings to Enron the benefits are widely dispersed and may not make for good headlines. On balance, the benefits outweigh the threats (Balls, 2016). Appendix Table 1 References Ahmad, I. M. (2010). Greed, financial innovation or laxity of regulation? a close look into the 2007-2009 financial crisis and stock market volatility. Studies in Economics and Finance, 110-134. Alnassar, W. I., Al-shakrchy, E., Almsafir, M. K. (2014). Credit Derivatives: Did They Exacerbate the 2007 Global Financial Crisis? AIG: Case Study. Procedia Social and Behavioral Sciences, 1026-1034. Balls, A. (2016, 12 12). The Economics of Derivatives. Retrieved from nber.org: http://www.nber.org/digest/jan05/w10674.html Buffett, W. E. (2016, 11 28). Letters. Retrieved from berkshirehathaway: http://www.berkshirehathaway.com/letters/2002pdf.pdf Chance, D. M. (2008). Essays in Derivatives . New Jersey: Jonh Wileys Sons. Crotty, J. (2009). Structural causes of the global financial crisis: a critical assessment of the new financial architecture. Cambridge Journal of Economics, 563-580. Davies, H. (2016, 11 20). The Financial Crisis: Who is to Blame? Retrieved from Google Books: https://books.google.ie/books?hl=enlr=id=MNH6q2YGEUkCoi=fndpg=PR1dq=financial+derivatives+and+crisisots=2_ZzDDFPS3sig=JW59MDMZt2HWvDWthLHWtyDyZwcredir_esc=y#v=onepageq=financial%20derivatives%20and%20crisisf=false Hoefle, J. (2010). Ban, Dont Regulate, Derivatives. Executive Intelligence Review, 32-34. Hull, J. C. (2015). Options, Futures, and other Derivatives. New York: Pearson Education. Lebron, M. W. (2016, 12 20). Derivatives: The toxic financial instrument on par with terrorism . Retrieved from rt.com: https://www.rt.com/op-edge/325982-derivatives-toxic-instrument-review/ MacKenzie, D., Millo, Y. (2016, 11 12). Negotiating a Market, Performing Theory: The historical sociology of a financial derivatives exchange. Retrieved from SSRN Electronic Journal : https://ssrn.com/abstract=279029 Maurer, B. (2002). Repressed futures: financial derivatives theological unconscious. Economy and Society, 15-36. Peery, G. F. (2012). The Post-Reform Guide to Derivatives and Futures. New Jersey: John Wisley Sons. Stout, L. A. (2011). Derivatives and the legal origin of the 2008 credit crisis. Harvard Business Law Review, 1-38. Stulz, R. M. (2009). Financial Derivatives: lessons from the subprime crisis. The Milken Institute Review, 58-70. Stulz, R. M. (2010). Credit Default Swaps and the Credit Crisis. Journal of Economic Perspectives, 73-92. Triana, P. (2012). The Number That Killed Us: A Story of Modern Banking, Flawed Mathematics, and a Big Financial Crisis. New Jersey: John Wiley Sons. Viral , A. V., Richardson, M. (2009). Restoring Financial Stability: How to Repair a Failed System. John Wiley Sons.