.

Friday, May 31, 2019

sport marketing :: essays research papers

                    Sport marketThe notion of "marketing myopia" has haunted marketers since Theodore Levitt published his famous article "Marketing shortsightedness" in Harvard Business Re opine in 1960. Levitt argues that companies which narrowly focus on the product to the detriment of customer requirements (i.e., dispensing with the marketing concept) suffer from marketing myopia. Myopia or shortsightedness is often apparent within organizations. Several types of marketing myopia can be identified including classic myopia, competitive myopia and force myopia. Companies displaying one of these three elements are clearly distinguishable from innovative firms which embrace the marketing concept in practice and which have a much broader ground than is required for a single business sector. In order to overcome myopia and become innovative, the following is recommended &61623 Compan ies should hold a generic view of themselves and of the industry in which they operate &61623 Companies should also take the crucial step to monitor other industries &61623 Benchmarking should be conducted &61623 Marketing staff should be recruited but not necessarily from the same sector &61623 Companies should be flexible and seek unique solutions.The biggest reason for market myopia is the neediness of research or the inefficiency of that research. Almost all of the myopia could be avoided if research and the researchers were trained and the thought process was developed in a good fashion.      completely of marketing whether it is in sports or out of sports all revolves around the same basic principles the four Ps. In all of marketing the Ps are Product, Price, Place and Promotion, however in sport there is an added principle and that is Public relations. Even the best marketers can come up short consort to these principles because it does not m atter how much you know but rather in a service business such as sport it most distinguished to be able to interact with the consumers. A great employment of a lack of interaction is here at Merrimack College. Our sport programs do not stick by enough marketing coverage both on and off campus. Our Sports Information Director does not place flyers in the student union and also he does not advertise on the college television channel. Here at Merrimack, they lack the Promotion aspect of their sports, which includes our division one hockey program. A great example of this lack of communication was the fact that when the hockey team was playing against then 1 Maine, the campus was not informed of this huge game.

Thursday, May 30, 2019

Blue Sky Marketing :: Essays Papers

Blue Sky Marketing FilmWatch Division Marketing PlanTreys Best opportunity to Dominate Market Research for the Film IndustryHow To Use This Report templetChange the nurture on the cover page to contain the learning you would like. For the body of your field, use Styles such as Heading 1-5, Body Text, Block Quotation, List Bullet, and List Number from the Style control on the Formatting toolbar. This report template is complete with Styles for a Table of Contents and an Index. From the Insert menu, admit Index and Tables. Click on the tab you would like. Be sure to choose the system Format.XE indicates an index entry field. The index field collects index entries specified by XE. To insert an index entry field, select the text to be indexed, and choose Index and Tables from the Insert menu. Click on the Index tab to receive the Index dialog box.You can quickly open the Mark Index gate dialog box by pressing ALT+SHIFT+X. The dialog box stays open so that you can mark index ent ries. For to a greater extent information, see Indexes in Help.In addition to producing reports, this template can be used to create proposals and work-books. To change the text or graphics, the following suggestions are provided. train any paragraph and just start typing. To save time in the future, you can save the front cover of this report with your company name and lecture. For gradually instructions on how to perserve your changes with the template, please read the following section.How To Modify This ReportTo create your own version of this template, choose File New and select this template. Be sure to indicate template as the document type in the bottom right corner.1. Insert your company information in the name and your address in the frame in the upper right corner of the cover page.2. Choose File Save As. At the bottom of the menu, choose Document Template in the Save File as Type box. Save the file under a new name to protect the original, or use the ve ry(prenominal) name to replace the existing version.To create a document, choose File New and choose the template you just created. Assuming you followed the steps above, your company information should appear in place.How to Delete GraphicsTo delete a graphic, click on each object (in Page Layout View) to select, and press Delete.

Wednesday, May 29, 2019

How does Giddens solve the problem of agency versus structure? Essay ex

Giddens theorizes that structure and agency atomic number 18 a duality that cannot exist apart from whizz another. Human practices create both their consciousness and fellowship. Because individuals confound up societys activities and structural conditions, they can choose to change it. Giddens calls this relationship between familiarity and practices the double hermeneutic. The daily routines and practices of individuals interacting with each other is what shape society. The actors have power over their actions, but the consequences are often unpredictable, allowing for change. Structure is defined by the rules and resources of society but without the human factor it cannot exist (Sociological Theory Chapter 15 Chapter Summary, 2004). In contrast, he argues that an actor ceases to be an agent if he or she loses the power to make a difference (Ritzer, 2011, p 523). Giddens criticized structural theories that forced extreme limitations on the individual and placed them in a pas sive role in the existence of society. He suggested that actors could think about what they were doing and adjust their actions accordingly. He defined this ability as reflexive monitoring which is encompassed under the topic of the knowlegability of actors. Despite this reflective view on the part of the actors, sometimes things still go wrong. Giddens view takes into account a persons tendency to misinterpret a site (no one is perfect). In another scenario, a persons actions might be miscalculated for a number of unconscious reasons. In either case, in his opinion, actors are less knowledgeable than interpretative sociologists would suggest (Gelderblom, 2011). Giddens argues that the interaction, between discursive and practical consciousness, is also how... ... systems allows for social changes while bridging the structure-agency dilemma (Miller, 2007).ReferencesGelderblom, D. (2011). Sociological Theory Study submit 2, Chapter 3 Anthony Giddens. Retrieved January 14, 2012, from http//myedison.tesc.edu/tescdocs/Web_Courses/SOC-417 OL/Study_Guide_8e/Study_Guide_2_417_8e.pdfMiller, S. (2007, January 4). Social Institutions (Stanford Encyclopedia of Philosophy). Stanford Encyclopedia of Philosophy. Retrieved January 14, 2012, from http//plato.stanford.edu/entries/social-institutions/AgeStrRitzer, G. (2011). 10. Sociological theory (8th ed., p. 351-390). New York McGraw-Hill.Sociological Theory Chapter 15 Chapter Summary. (2004). Agency-Structure Integration. Retrieved January 14, 2012, from http//highered.mcgraw-hill.com/sites/0072817186/student_view0/chapter15/chapter_summary.html

Global Warming: Fact Vs. Fiction Essay -- Environmental Global Climate

Global Warming Fact Vs. Fiction Global Warming -- the gradual increase in planet-wide temperatures -- seems to be accepted by many scientists and people now as fact. Generally, this warming is attributed to the increase of green-house gases in the Earths upper atmosphither. However, some solar scientists are considering whether the warming exists at all. And, if it does, might it be caused, wholely or in part, by a periodic but small increase in the Suns energy siding. An increase of just 0.2% in the solar output could have the same affect as doubling the carbon dioxide in the Earths atmosphere. What is the Problem? What is the evidence for globose warming? Certainly, there are considerably more green-house gases (e.g. carbon dioxide) in our atmosphere than in previous times. And there appears to be some evidence that global temperatures are rising. But, how accurate and correct are our global warming statistics? And, do we really know what role, if any, the Sun might play in any global warming patterns? These issues are currently being debated, and may significantly affect you for the rest of your life. Would you like to do some research to find out more about global warming? We suggest here some research topics and places to begin looking for information. But these are all contr all oversial issues, and there are no definitive answers (yet). As an informed, and voting, citizen of the next millenium, you will need to keep listening, looking, and being alert to new research and evidence. Science Is global warming occurri... ... reside with chapter Lead Authors... Some Lead Authors ignored sensible critical comments or failed to... reflect dissenting views... The report was therefore the result of a political rather than a scientific process. Claim The majority of scientists conceptualise global warmin g is a process underway and that it is human-induced. Fact A 1992 Gallup survey of climatologists found that 81 percent of respondents believed that the global temperature had not risen over the past 100 years, were uncertain whether or not or why such warming had occurred, or believed any temperature increases during that period were within the natural grade of variation. Further, a 1997 survey conducted by American Viewpoint found that state climatologists believe that global warming is largely a natural phenomenon by a margin of 44% to 17%.

Tuesday, May 28, 2019

Industrial Robots and Manufacturing Automation Essay -- Robots Automat

Industrial Robots and Manufacturing Automation AbstractAutomation started out as an fiction line of workers doing the same repetitive task all day long. Some of the jobs were very boring, dirty, unpleasant, and possibly dangerous. After the introduction of the first robot in 1961, mechanisation began to advance in ways people could only imagine. Each of the six basic styles of robot used in industry today were designed with incompatible applications in mind. Some of the robots were designed for assembly, others are more suited for simple pick and place applications, while a select few are able of carrying heavy loads over a large area.The operations of the robots have also advanced from simple hard-stop, one-function, hydraulic actuated robots to the more sophisticated, high-precision, servo restrainerled robots that drop be reprogrammed to do many different jobs.Robots have greatly increased production, the quality of the parts, and the safety of workers. The main reason for th e use of robots is to make a confederation profitable while producing a high quality part at competitive prices.The number of robots used in industry increases either year as more companies realize their many benefits. Robots are the future of the manufacturing industry. As the performance and flexibility of robots increases and their prices continue to drop, many companies will uses these added incentives to invest in the future. Soon every company that has an application for a robot will be forced to invest in one, to stay competitive in the world market.IntroductionThe Robotics pains Association defines a robot as ?a reprogrammable, multifunctional manipulator designed to move material, parts, tools, or specialized devices through variable programmed motions for the performance of a commixture of tasks? (Zalda 8). In short, a robot is a machine that is programmed to perform a variety of tasks in place of humans.The first industrial robot, built in 1961, was a mechanical arm u sed to load presses. After the development of the computer and the CNC (Computer Numerical Control) in the 1970?s, the world saw great advances in the development of robotic control and the quality of robot manufacturing. As a result, there has been acceptance of the industrial robot world wide, improving the productivity and quality standards of industry (Hodges 3-5). Robots acco... ...?Automation Reduces weld Spatter? Welding Design & Fabrication (Jun. 2001) 37 EBSCOhost. Online. Nov. 2002 .Cheney, Susan. ?Packaging & Manufacturing.? Candy Industry (Jun. 2000) 20. InfoTrac. Online. Nov. 2002 .Hodges, Bernard. Industrial Robotics, 2nd ed. Boston B.H. Newnes, 1992.?Robotics? McGraw-Hill Encyclopedia of Science & Technology, 1995 ed.?Robotics will get along quality and transfer efficiency levels.? Coatings (Jul.-Aug. 1991) 66 InfoTrac. Online. Nov. 2002. .?Small Shop Gains Edge with Robotic Welding.? Welding Design & Fabrication (Aug. 2001) 42 EBSCOhost. Online. Nov. 2002 .Time Li fe. Computer Age. Alexandria, VA Time-Life Inc., 1992.Weimer, George. ?Robots ?see? grinder?s future.? Material Handling Management (Mar. 2002) 25. InfoTrac. Online. Nov. 2002 .Williams, Gray ?Robots and Automation.? The new book of popular science. Grolier Inc., 1996, 186-94.Woodman, Chester L., Kurt Kuster. ?Small shop, big decision.? American Machinest (Apr. 2001) 78 EBSCOhost. Online. Nov. 2002 .Zalda, Roberta. ?Using flexibility to rid robotics automation costs.? Industrial Management (Nov.-Dec. 1994) 8. InfoTrac. Online. Nov. 2002 .

Industrial Robots and Manufacturing Automation Essay -- Robots Automat

Industrial Robots and Manufacturing Automation AbstractAutomation started out as an assembly line of workers doing the same repetitive trade union movement all day long. Some of the jobs were very boring, dirty, unpleasant, and possibly dangerous. After the introduction of the first zombi in 1961, automation began to advance in ways mass could only imagine. Each of the six basic styles of robot used in industry today were designed with diametrical applications in mind. Some of the robots were designed for assembly, others atomic number 18 more suited for simple pick and place applications, while a select few are capable of carrying heavy ladings over a large area.The operations of the robots have also advanced from simple hard-stop, one-function, hydraulic actuated robots to the more sophisticated, racy-precision, servo controlled robots that can be reprogrammed to do many different jobs.Robots have greatly increased production, the quality of the parts, and the safety of worke rs. The main reason for the use of robots is to make a company profitable while producing a high quality part at competitive prices.The number of robots used in industry increases every year as more companies realize their many benefits. Robots are the future of the manufacturing industry. As the performance and flexibility of robots increases and their prices continue to drop, many companies will uses these added incentives to invest in the future. Soon every company that has an application for a robot will be forced to invest in one, to stay competitive in the world market.IntroductionThe Robotics Industry Association defines a robot as ?a reprogrammable, multifunctional manipulator designed to move material, parts, tools, or specialized devices through variable programmed motions for the performance of a variety of tasks? (Zalda 8). In short, a robot is a machine that is programmed to perform a variety of tasks in place of humans.The first industrial robot, built in 1961, was a m echanical arm used to load presses. After the development of the computer and the CNC (Computer Numerical Control) in the 1970?s, the world saw great advances in the development of robotic control and the quality of robot manufacturing. As a result, there has been acceptance of the industrial robot world wide, improving the productivity and quality standards of industry (Hodges 3-5). Robots acco... ...?Automation Reduces Weld Spatter? Welding Design & fable (Jun. 2001) 37 EBSCOhost. Online. Nov. 2002 .Cheney, Susan. ?Packaging & Manufacturing.? Candy Industry (Jun. 2000) 20. InfoTrac. Online. Nov. 2002 .Hodges, Bernard. Industrial Robotics, 2nd ed. Boston B.H. Newnes, 1992.?Robotics? McGraw-Hill Encyclopedia of Science & Technology, 1995 ed.?Robotics will boost quality and transfer efficiency levels.? Coatings (Jul.-Aug. 1991) 66 InfoTrac. Online. Nov. 2002. .?Small Shop Gains Edge with Robotic Welding.? Welding Design & Fabrication (Aug. 2001) 42 EBSCOhost. Online. Nov. 2002 .Tim e Life. Computer Age. Alexandria, VA Time-Life Inc., 1992.Weimer, George. ?Robots ?see? factory?s future.? Material Handling commission (Mar. 2002) 25. InfoTrac. Online. Nov. 2002 .Williams, Gray ?Robots and Automation.? The new book of popular science. Grolier Inc., 1996, 186-94.Woodman, Chester L., Kurt Kuster. ?Small shop, big decision.? American Machinest (Apr. 2001) 78 EBSCOhost. Online. Nov. 2002 .Zalda, Roberta. ?Using flexibility to justify robotics automation costs.? Industrial Management (Nov.-Dec. 1994) 8. InfoTrac. Online. Nov. 2002 .

Monday, May 27, 2019

Compare and Contrast Presidents Essay

Like any cardinal people in the humankind Franklin D. Roosevelt and Ronald Reagan both have their own views astir(predicate) war, womens rights, gay rights, foreign policy, and many other problems facing our region. These two presidents have greatly impacted our country since they were in office. Roosevelt and Reagan have helped shape our country into what it is today. Franklin D. Roosevelt was born in 1882 in New York. He went to Harvard University and Columbia Law School. He was elected New York senate in 1910. In 1921 he was diagnosed with poliomyelitis. In 1928 Roosevelt became the governor of New York. He was elected the 32nd president of the united States in November 1932. There were thirteen million unemployed by March and nearly each bank was closed. Roosevelt made it his main goal to restore businesses and agriculture. Three years later our nation had achieved somewhat recovery. Businessmen and bankers still blamed the horrific thrift on the current president. His id ea was called the Roosevelts New Deal program. Not too many people were thrilled about this program to say the least. He took the nation off the gold standard and allowed deficits in the budget. After this program failed, Roosevelt made a new program or Hanson 2 reform cognise as Social Security.This put heavier taxes on the wealthy, new controls over the banks, and a huge relief program for the preservation. small-arm Roosevelt was president he also added the United States to the good neighbor policy. Its main principle was that of non-intervention and non-interference in the domestic affairs of Latin America. Another goal was to keep the United States out of war in Europe. A huge event all of us retire was the Japanese feeler on Pearl Harbor on December 7, 1941. This officially got us involved in World War II. Although Roosevelt didnt like confliction he announced a global war. Ronald Reagan was born on February 6, 1911 in Illinois. He tended to(p) Eureka College and studied economics and sociology. As Reagan grew older his political views went from liberal to conservative. In 1966 he was elected governor of California then re-elected in 1970. In 1980 Reagan won the Republican Presidential nomination then took office on January 20, 1981. He won the presidential race easily due to the inflation and unfathomable of Americans in Iran. Only sixty-nine days later after he took office he was shot. While Reagan was in office the economy grew, inflation lessened, physical exercise increased, and national defense was strengthened.He helped the economy by cutting taxes and judicature expenses. In 1984, Reagan won a second term due to his brilliance in his first. At the end of his presidency the nation had the longest period of peacetime prosperity without recession or depression. Both Roosevelt and Reagan dealt with major events involving foreign affairs. During Reagans two terms he increased defense spending 35 percent, but sought to improve relations with t he Soviet Union. He attended meetings with Soviet leader Hanson 3 Mikhail Gorbachev and negotiated a treaty that would eliminate intermediate-range nuclear missiles. Reagan also declared war against international terrorism, sending American bombers against Libya after evidence came out that Libya was involved in an attack on American soldiers in a West Berlin nightclub. While Roosevelt was president he wanted to increase the influence and prestige of the United States on the world and make the country a global power. One of Roosevelts famous quotes was speak softly and carry a big stick. He was voluntary to use force when needed but also using persuasion instead of violence.One of the biggest foreign policies involved in his presidency was that of the Panama Canal. Roosevelt was militant with foreign policy and so was Reagan. During Reagans presidency the economy was in pretty good shape. The economy grew, inflation lessened, employment increased, and national defense was strength ened. He helped the economy by cutting taxes and government expenses as well. Roosevelt on the other hand wasnt as lucky with the economy as Reagan. Roosevelt took presidency during the great depression. He had to make huge efforts and changes to try to get the economy back on track. Over the next eight years, the government instituted a series of experimental projects and programs, cognise collectively as the New Deal. This was aimed to restore some measure of dignity and prosperity to many Americans. Both Franklin D. Roosevelt and Ronald Reagan had very eventful office terms.They also had their differences. While Roosevelt was president the 22nd Amendment wasnt made so the presidential term was longer than it is today. Both presidents had to deal with wars, foreign affairs, tax cuts, and reduction on government Hanson 4 spending. Also, before Reagan and Roosevelt were elected president they were Governors of states as well. Ronald Reagan and Franklin D. Roosevelt played major rol es in making our country into what it is today. Without these two presidents I dont know where our country would be. Both helped our economy tremendously, strengthen our foreign affairs, and made America a global leader. Granted they had different views on some things they still were two great presidents.Hanson 5 Work Cited Beschloss, Michael, and Hugh Sidey. The Presidents of the United States of America. White House Historical Association, 2009. Web. .Beschloss, Michael, and Hugh Sidey. The Presidents of the United States of America. White House Historical Association, 2009. Web. .Garrison, Justin. A Covenant with all valet de chambre Ronald Reagans Idyllic Vision of America in the World. Vol. 21.Issue 1/2 (2008) p34-63, 30p. Print.PIOUS, RICHARD M. Presidential Studies Quarterly. Mar2012, Vol. 42 Issue 1, p190-204. 15p. DOI 10.1111/j.1741-5705.2012.03948.x.

Sunday, May 26, 2019

Project Management E-Mail Essay

Our team was chosen by Mr. Wendell Deirelein, VP, to analyze three intercommunicates and give a recommendation of what confederacy, bagpiper Industries Corp., should cast in. Our recommendation will include our selected throw, a description of the five phases of the tolerate and the key deliverables. Piper Industries Corp needs a completed project that would dedicate gross within 12 months for the Project Management Offices. After much review and evaluation we have selected the Project Code name stargazer as the project for investment next week by Piper Industries Corp., The Stargazer project has a massive research, and development on their new widgets, the company has spent $450,000 on this product and an estimated to bring in $575,000. Stargazer will be implemented by using the feasibleness study. The feasibility study shows that this project has been evaluated and analysis of the potential of proposed project. Although, this product is not in production yet an extensive inv estigation and research to support the process of decision- making.The strengths and weaknesses of this proposed venture, opportunities and threats to carry out this project for its success. The feasibility is the cost required and the values attain to be successful. The risk of completion this project on time is high which will generate revenue within the 12 months. Our team feels that Stargazer will be an innovative money maker for Piper Industries Corp. The five phases of project management need to be fulfilled for a successful project. We have reviewed each phase and found that the following in regards to the Stargazerproject. Project initiation was completed by the feasibility studies, this project was named and defined, sponsors and stakeholders are deciding if they want to participate in this project. During the project planning phase, Stargazer has demonstrable a plan for cost, scope, time, quality, communication, resources, and risk. This project is this first of its kind in the industry, therefore Stargazer will be seen as a leader in the marketplace.In the Project Execution phase, the project deliverable is developed and completed. This phase along with the project monitoring and control phase go hand in hand and are performed simultaneously. In this phase status meetings, project development updates, status reports, performance reports and human resource development are completed. The stargazer project product life is forecasted to be seven years for this product. criterion Stargazers project performance and progression, calculating key performance indicators for cost and time to measure the degree of variation if any and in which depicted object corrective measures are done in the project monitoring and control phase.Stargazer project is forecasted to have an ROI of $300,000 for the first year $550,000 the second year and $750,000 the 3rd year. The final phase of the project management is the project closure, in this phase tasks such as makin g the delivery, relieving resources, reward and recognitions of all the team members and the termination of contractors that were use up in the project. Piper Industries Corp. will have a closure ceremony for the project we selected and recognize all team members that took part in the planning of Stargaze, Piper Industries Corp. will host a launch party to announce that we will invest in Stargazers new widget product to be introduced into the marketplace in June, 2015.

Saturday, May 25, 2019

Risk of Schizophrenia Essay

Over the last few decades Schizophrenia has become embedded in mainstream vernacular as any behavior or emotional response that is out of touch with reality. However even with its popularity heightened through movies and headline news stories, schizophrenic psychosis is still one of the most enigmatic and least understood disorders of the brain. With current research focused on the role of neurobiology and run on a cellular level, investigative analysis has merited new innovations towards its source, however a single organic former for the disorder still eludes scientists. Although the foundation of the affliction is still unknown, its set up argon well documented and over the next few pages will show the changes in the brain as the disease splits, and how those alterations impact the rest of the torso and alter various other functions throughout the viscera.The term Schizophrenia was freshman coined in 1911 by Swiss psychiatrist Dr. Eugen Bleuler and translates from the orig inal Greek as schizo (split) and phrene (mind), devising a literal translation of split-mind, in reference to the disjointed thinking of those with the disease (Johnstone, 1994). Although the term was first used in the early twentieth century, fit in to scholars a madness was described in The Ebers Papyrus, a collection of ancient Egyptian medical papers dating back to 1550 BC, which accurately depicts some of schizophrenic disorders symptoms (Johnstone, 1994). With its possible documentation over three millennia ago and its symptoms documented in a myriad of medical journals throughout history, the disorder itself is very r atomic upshot 18. Those who are at the highest risk of manifestation are offspring whose parents are both schizophrenic, although even at this rate the risk of manifestation is nigh forty-six percent.globally however its prevalence is about 0.9 percent or fifty-eight million people worldwide (Hollandsworth, 1990). According to James G. Hollandworth of the U niversity of Southern Mississippi, dementia praecox is primarily characterized by a disintegration of reality perception, consciousness, and thought process which results in a debilitated proficiency in social and professional faculties (Hollandworth, 1990). tour schizophrenia shadow most arguably be categorize as a predominantly genetic affliction, thither are others factors which depose contrisolelye to its development even without a genetic predisposition. These elements allow birth defects such as hypoxia and low birth rate, neuroanatomical anomalies, viral infections, along with low IQ and cerebralatrophy (Hollandsworth, 1990). While these components in themselves are not sufficient enough to cause the disorder, they result in an increased risk for developing the disease.One theory for the cause of schizophrenia that has been studied with great validity is the dopamine hypothesis. This theory postulates that schizophrenia is caused by an overabundance of the dopamine-depe ndent areas of the brain causation an imbalance that affects the entire system (Hollandsworth, 1990). For this reason many another(prenominal) of todays schizophrenia treatment drugs inhibit dopamine receptor activity in an attempt to return it to its natural equilibrium. Although even with advances in raw science and new drugs being developed every day, the illness is still only treatable and its symptoms still emerge even with proper medication. Even with its origin unknown, scientists feed discovered several chromosomes which when damaged or mutated, greatly increase the risk of developing schizophrenia. The chromosomes in particular that act as catalysts are chromosome numbers twenty-two, six, and xi (Klar, 2004).Chromosome six contains several genes that are linked with immune response which has given rise to the belief that schizophrenia has some association with weakened disease flake agents. While damage to this chromosome may be linked to the source of the ailment, it may only be the j umpire starter that kicks off the path to developing the illness. For as scientists know, a lacking immune response caused by chromosome damage tooshie theoretically leave the body vulnerable to infection, which are facilitators that puke bring about the emergence of the disorder (Hollandsworth, 1990). Chromosome twenty-two on the other hand is linked with the dopamine hypothesis as this area houses enzymes that aid in transporting neurotransmitters. These neurotransmitters, mainly catechol-O-methyltransferase (COMT) and proline dehydrogenase (PRODH) are essential for the breakdown of dopamine. Any disruptions in this particular area can trigger an overabundance or shortage of dopamine, potentially resulting in developing positive(p) or disconfirming schizophrenia symptoms (Chakravarti, 2002).Lastly, chromosome eleven has been associated with schizophrenia on the grounds of genetic translocation, or a chromosome abnormality caused by faulty rearrangements of v arious strands of DNA. These faults can occur in any number of genes, however during this process it occurs at times pivotal to cell division, making it easy for genes to be incorrectly rearranged (Klar, 2004). When this happensit can potentially inhibit the development of lateralization of brain function and act as a precursor not only schizophrenia, but other forms of psychical illness as well as cognitive impairments (Klar, 2004). Once the subject has developed schizophrenia it affects the brain in very specific ways. When the disorder itself first begins to emerge its early symptoms manifest themselves in a period called The Prodormal Phase (Neale &ump Oltmanns, 1980). During this phase, which occurs anywhere from six to thirty months before the disease truly emerges, the soul may experience social withdrawal, dysphoria, and irritability. As the disorder progresses the symptoms may become more intense, and newer or positive symptoms may begin to surface.These positive symptoms can include visual and auditory hallucinations, delusions, and disorganized thought processes. In severe cases of thought process deterioration or cognitive slippage, a somebody can develop schizophasia or word salad where a someones speech is completely incoherent with no understandable thought or message. Following the positive symptoms of the illness, negative symptoms can appear as well. These symptoms are aspects of the persons personality that beat been negated by the disease. They are most commonly expressed by the persons flat or expressionless demeanor, apathy, very little displayed emotion, and continued peculiar behavior (Hollandsworth, 1990). After schizophrenia has completely manifested itself, the patient is usually classified into one of four types. These types are paranoid, disorganized, catatonic, and undifferentiated. Those in the paranoid gathering display an obsession over their delusions or have hallucinations specifically related to a sure subject or idea, and are usually the most functional of all schizophrenics (Johnstone, 1994).Disorganized types are typically ones who display little emotion and act in a disjointed and inarticulate manner, while catatonic schizophrenics are merely ones who appear in torpor and display lethargic indolence. The undifferentiated type however is hybrid of the three previous types and is a miscellaneous combination of all their symptoms combined (Johnstone, 1994). While the outward symptoms may be relatively easy to recognize, inside the brain is a totally different matter. Schizophrenia can cause structural changes in the brain even though a specific cause for these changes is still unknown. These changes in brain structure are illustrated by larger ventricles, a thicker corpus collosum, a decrease in dendritespines in the frontlet lobe, upset hippocampal pyramidal cells, and a shrinkage of the cerebellar vermis, which is mainly responsible for perception.In some studies malformed neuronal migration has been observed which can lead to disjointed thoughts as well as an overall shrinkage of the genus Hippocampus and amygdala (Johnstone, 1994). Due to these changes, a person suffering from the disorder can have reduced execution in the frontal lobe which can affect their logic and critical thinking skills as well as their ability to successfully plan ahead. This reduced functioning is displayed in the Wisconsin card sorting test, which is administered to measure possible brain damage and assess the functioning of the frontal lobe. Schizophrenics who participate in the test show an softness to successfully transfer their attention to the rules of the exam once they begin. Functional imaging has also shown a lack of activity in the right hemisphere of the frontal lobe during their partaking, which does not increase as the task is administered. It is also shown that in a study by a Dr. Nagy in 1963, that of 260 cases of schizophrenia, roughly fifty-eight percent of the group had so me form of cerebral atrophy (Johnstone, 1994).On a cellular level schizophrenia symptoms are thought to be caused by an overabundance of neurotransmitters released amid neurons. These neurotransmitters, mainly dopamine and serotonin, in excess can cause hallucinations and delusions which are referred to as positive symptoms. Too little of these neurotransmitters however can result in lack of emotion and motivation which mirror the negative symptoms of the disorder. Another type of cell affected by schizophrenia is the pyramidal cell in the anterior cortex, or the forehead area of the brain. These cells, which are a type of neuron that serve primarily as excitation units in the prefrontal cortex, are shown to have a decrease in basilar dendrite numbers. These basilar dendrites arise from the base of the pyramidal cells soma, and with a decrease in their numbers it can indicate a shortened synaptic surface area resulting in possible fallacious thought processing (Broadbelt, Byne, &u mp Jones, 2002).Pyramidal cells in the hippocampus are also known to be affected by the disorder can and cause many of the cells in that area to be thrown into disarray, causing cognitive malfunctions. The treatment of this disorder can vary greatly depending on the person however dopamine inhibiting antipsychotics are a very popular remedy. Although prevalent, thesemedications are not perfect and many scientists claim there is still no concrete connection that schizophrenia is exclusively a result of faulty dopaminergic transmissions (Neale &ump Oltmanns, 1980). It has also been noted that many of the dopamine inhibiting drugs serve only to combat the positive symptoms and leave many of the negative symptoms such as emotional absence seizure unaffected. Another treatment that is still widely used, but much less common is electroconvulsive therapy or shock therapy.This treatment is still very controversial but there has been success in treating schizophrenia symptoms completely, alt hough many patients relapse within six months. Studies have also indicated that although this treatment can be effective there are risks of permanent brain damage. According to Dr. Peter Breggin (2008), a psychiatrist at the State University of New York, shock therapy in animal testing showed statistically significant brain structural abnormalities when compared to animals without it. His study showed the electrical shocks caused changes in the nerve cell walls causing gliosis, or a profound increase in the number of astrocytes in impaired areas of the central nervous system (Breggin, 2008). In conclusion, schizophrenia is unique disorder that affects the brain in many ways, yet manifests itself differently from person to person.As there is no tangible rubric for how the disorder will impact the person, it can be a difficult illness to treat. Its effects on the brain, from enlarged ventricles to a decline in dendrite spines, shows the major impact the illness can have on living a no rmal life. Although the disorder afflicts upright over fifty-eight million people worldwide it is still devastating to those who are affected and while the medical community makes leaps and bounds in taking into custody the disease, a cure is still far from the horizon. With psychology grant money from universities being invested predominantly in neuropsychology, perhaps sometime in the near prox scientists will be able to fully understand this illness and find a successful and permanent cure for it.

Friday, May 24, 2019

The Ethics of the American Invasion of Iraq

The American invasion of Iraq in 2003 is certainly one of the to a greater extent contr everyplacesial foreign policy initiatives of the 21st century. The gen agel facts ring this event be wee on the 20th day of May 2003, the United States, with support from Great Britain and a host of other western nations, invaded Iraq in response to intelligence reports of weapons of mass destruction. Up until May 1, 2003, these forces fought to successfully topple the regime of Saddam Hussein and to usher in a new era for the Iraqi people and the Iraqi nation.However, these facts were not the main source of tension that this forces imperative created instead, the moral principleal implications behind the invasion and the debates concerning the reasons for entering the war are what imbibe sparked protest, of which most notably has been the record-breaking anti-war rally in Rome one month before the invasion. Unfortunately the debate is too often discussed in terms of consequences alone.On on e side the pro-war supporters have cited the need to protect America from further attacks, to stave off nuclear holocaust and to remove a maniacal dictator from power, while on the other side anti-war protesters have pleadd that the invasion costs far too many innocent American as nearly as Iraqi lives. Of course, in our ethical discourse we cannot ignore consequences, scarce along with consequences we must also consider principles. Therefore, in this essay, I will face up at the ethics of the American invasion of Iraq through the lens of Kantian ethics.I will begin with a discussion of Kants theory and move from this to argue against the invasion based on Kants first saying of the categorical imperative. Kants ethical theory is deontological in that it does not focus primarily on consequences, but first and foremost on principles. These principles he forms from practical human reason and the moral principle that he names the categorical imperative. In its two forms this imper ative offers a universal ethic that all rational human beings in all ages and from all cultural backgrounds should be able to recognize.The first saw deals with the universalizing of human behaviour Act only on that maxim which you can at the same time will to be a universal justness (Kant, 1785 1948, p. 421). The purpose of this maxim is simple in that it forces the moral agent to take his or her actions as implying a universal code. For example, if a moral agent is considering congress a lie because it will prove beneficial to him or her in that situation, he or she must consider that if all other moral agents told lies in the same situations then any society based on a basic level of trust and truth would inevitably collapse.One persons ethic universalized would destroy an entire social structure. In other words, Kant challenges the ethical person not to make an exception of him or herself. The second maxim deals with the way in which other human beings are to relate to other human beings. Kant states, treat humanitynever simply as a means, but unendingly at the same time as an ends (Kant, 1785 1948, p. 429). People should always be treated as the final goal of our moral actions and not merely the way in which we realize other personal agendas.Although both of these maxims may lend important ethical insights to a discussion on the invasion in Iraq, the first maxim offers a far much concrete model in which to discuss the invasion and in that locationfore we apply it alone. There are many criticisms against the invasion into Iraq, but I will focus on three specific criticisms insufficient evidence for the invasion, going beyond the United Nations, and the use of military force over diplomacy. Firstly, as admitted by the C. I. A in 2005 and verified by the invasion itself, the claim that Saddam Hussein had weapons of mass destruction was a weakor even falsereason for going to war.It seems, therefore, that the U. S. was simply taking far too drastic steps with egress proper research. If we were to universalize this practice, the world would be go about with a terrible increase in violence and war. Not only would enemies attack one another on good suspicions, but even ally would be lead to attack one another based on the weak suspicion that each country may have bad intentions toward the other. This subject of worldwide policy is not acceptable for a single nation, and this is made perfectly clear in the fact that it cannot be responsibly universalized.Secondly, the U. S. went above the recommendations of the U. N. and acted out of line with the U. N. s policy. In this respect, according to the definition of Kofi Annan and the U. N. Security Council, the invasion of Iraq was technically illegal. If we again apply Kants universalizing maxim to the U. S. s behavior we have another strong criticism of the invasion. The U. N. was expressly created by the consent of most of the countries of the world as a sovereign power that would be allowed to resolved global conflict between nations.As Thomas Hobbes points out in his Leviathan, any individual or group that submits to a sovereign has the responsibility to accept the judgments of that power. The U. S. , in its conspicuous disregard of the U. N. s policy, clearly did not respect the power of the sovereign and in this way set a dangerous precedent for unilateral military action. If the entire world were to universalize this ethic there would remain no authority in the world and all nations would return to the brutal Hobbesian state of nature. Lastly, the U. S.s decision to invade made a clear statement that military action is preferable to the diplomatic option. For any civilized society, war must always be the last option, if it is to be used at all. Many supporters of the invasion may claim that the Bush administration had no other option, but it is clear that the administration did not do nearly as much diplomacy as it could have. Other nations should have bee n included in the process and negotiations should have been more controlled within the influence of the U. N. If we universalize the U. S.s action to go to war before pushing for diplomacy, the diplomatic option in the world would collapse. In this sense, there would be little hope of peaceful solutions to inter-national conflicts, but instead a future of pre-empted strikes and quick invasions. If this would indeed become the case, the world would need far more than Kantian ethics to save it from its inevitable decline. References Hobbes, Thomas (2006). Leviathan. New York Dover Publications, Incorporated. Kant, Immanuel (1948). Groundwork of the Metaphysics of Morals. (H. J. Paton, Trans. ). London Hutchinson.(Original work published 1785, and published in a appeal in 1903 page references to this edition). Kant, Immanuel (1836). The Metaphysics of Ethics. (John William Semple, Trans. ). Edinburgh Thomas Clark. (Original work published 1785). Paton, Herbert James. (1971). The Categ orical Imperative A Study in Kants Moral Philosophy. Philadelphia University of Pennsylvania Press. Ross, Dennis. (2008). Statecraft And How to bear upon Americas Standing in the World. New York Farrar, Straus, and Giroux. Steel, Jonathan. (2008). Defeat Why America and Britain Lost Iraq. Berkeley Counterpoint.

Thursday, May 23, 2019

Design of a New Security Protocol Using Hybrid Cryptography

Subasree & Sakthivel ? propose of a New Security protocol IJRRAS 2 (2) ? February 2010 DESIGN OF A NEW SECURITY PROTOCOL USING crown of thorns CRYPTOGRAPHY ALGORITHMS S. Subasree and N. K. Sakthivel School of Computing, Sastra University, Thanjavur 613401, Tamil Nadu, INDIA. ABSTRACT A countr Network is an interconnected group of autono mous computing nodes, which use a well defined, mutually agree set of rules and conventions known as converses protocols, interact with one -another meaningfully and allow resource sharing preferably in a predictable and controllable manner. confabulation has a majo r impact on today? s business. It is desired to communicate data with high security. Security accesss compromises the security and hence various Symmetric and irregular cryptanalytic algorithms accommodate been proposed to achieve the security services such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms atomic number 18 required to provide data security and users authenticity.To improve the strength of these security algorithms, a new security protocol for on line exercise can be designed victimization combination of both symmetric and asymmetric cryptographic techniques. This protocol provides third cryptographic pr imitives such as integrity, confidentiality and authentication. These three primitives can be achieved with the help of oval burn cryptanalysis, triple -RSA algorithm and Message Digest MD5. That is it uses Elliptic Curve cryptograph for encryption, Dual -RSA algorithm for authentication and MD-5 for integrity.This new security protocol has been designed for better security with integrity using a combination of both symmetric and asymmetric cryptographic techniques. strikewords Network Security, Elliptic Curve Cryptography, Dual-RSA, Message Digest-5. 1. INTRODUCTION Curio sity is one of the most common human traits, matched by the wish to cloak private information. Spies and the phalanx all resort to information hiding to pass messages securely, some clock times deliberately including misleading information 12. Steganography, a mechanism for hiding information in obviously innocent pictures, may be employ on its own or with other methods.Encryption fundamentally consists of scrambling a message so that its contents are not readily accessible while decryption is the reversing of that process14. These processes depend on particular algorithms, known as engraves. Suitably scrambled text is known as bet text while the victor is, not surprising ly, redundant text. Readability is neither a necessary nor sufficient condition for something to be plain text. The original might well not make any obvious virtuoso when read, as would be the case, for example, if something already encrypted were being further encrypted.Its alike quite accomplishable t o construct a mechanism whose take is readable text but which actually bears no relationship to the unencrypted original. A key is used in coalition with a cipher to encrypt or decrypt text. The key might appear meaningful, as would be the case with a character string used as a password, but this transformation is irrelevant, the positionality of a key lies in its being a string of bits determining the mapping of the plain text to the cipher text. 1. 1 Why we need cryptanalytics?Protecting access to information for reasons of security is still a major reason for using cryptography. However, its also more and more used for identification of individuals, for authentication and for non -repudiation. This is particularly important with the growth of the Internet, global trading and other activities12. The identity of e -mail and Web users is trivially easy to conceal or to forge, and secure authentication can give those interacting remotely confidence that theyre dealing with the right person and that a message hasnt been forged or changed.In commercialised situations, non-repudiation 12 is an important concept ensuring that if, say, a contract has been agreed upon one party cant then renege by claiming that they didnt actually agree or did so at some different time when, perhaps, a price was higher or lower. Digital signatures and digital timestamps are used in such situations, often in conjunction with other mechanisms such as message digests and digital certificates. 95 Subasree & Sakthivel ? Design of a New Security protocol IJRRAS 2 (2) ? February 2010The range of uses for cryptography and related techniques is considerable and growing steadily. Passwords are common but the protection they offer is often illusory, perhaps because security policies within many organizations arent well concept out and their use causes more problems and inconvenience than seems worth it14,15. In many cases where passwords are used, for example in protecting word process ed documents, the ciphers used are extremely lightweight and can be attacked without difficulty using one of a range of freely available cracking programs. 2.TYPES OF CRYPTOGRAPHIC ALGORITHMS 2. 1. Elliptic Curve Encryption When using elliptic curves in cryptography11, we use various properties of the points on the curve , and functions on them as well. Thus, one common task to complete when using elliptic curves as an encryption tool is to find a way to turn information m into a point P on a curve E. We assume the information m is already written as a number. There are many ways to do this, as frank as setting the letters a = 0, b = 1, c = 2, . . . or there are other methods, such as ASCII, which accomplish the a analogous(p) task.Now, if we have E y2 = x3 + Ax + B (mod p), a curve in Weierstrass form, we want to let m = x. But, this will only work if m3 + Am + B is a unbowed modulo p. Since only half of the numbers modulo p are squares, we only have astir(predicate) a 50% cha nce of this occurring. Thus, we will sift to institute the information m into a take account that is a square. Pick some K such that 1/2K is an acceptable failure rate for embedding the information into a point on the curve. Also, make sure that (m + 1)K p. Let xj = mK + j for j = 0, 1, 2, . . . ,K ? 1 Compute x 3j + Axj + B.Calculate its square root yj (mod p), if possible. If there is a square root, we let our point on E representing m be P m = (xj , yj) If there is no square root, try the next value of j4,5. So, for from each one value of j we have a probability of about 1/2 that xj is a square modulo p. Thus, the probability that no xj is a square is about 1/2K, which was the acceptable failure rate6. In most common applications, there are many real-life problems that may occur to damage an attempt at send a message, like computer or electricity failure.Since people accept a certain 16 amount of failure due to uncontrollable phenomenon, it makes sense that they could agree on an acceptable rate of failure for a controllable feature of the process. Though we will not use this specific process in our algorithms10. 2. 2. Dual RSA In practice, the RSA decryption computations are performed in p and q and then combined via the Chinese Remainder Theorem (cathode-ray tube) to obtain the desired solution in ? N, rather of directly computing the exponentiation in ? N. This decreases the computational costs of decryption In two ways.First, computations in ? p and ? q are more efficient than the same computations in ? N since the elements are much smaller. Second, from Lagrange? s Theorem, we can replace the private exponent d with dp = d mod (p 1) for the computation in ? p and with dq = d mod (q 1) for the computation in ? p, which reduce the cost for each exponentiation when d is larger than the primes. It is common to refer to dp and dq as the CRT -exponents. The first method to use the CRT for decryption was proposed by Quisquater and Couvreur 7,8.Since t he method requires knowledge of p and q, the key contemporaries algorithm needs to be modified to output the private key (d, p, q) instead of (d,N). Given the pri vate key (d, p,q) and a valid ciphertext C ? ? N, the CRTdecryption algorithm is as follows 1) Compute Cp = Cdp mod p. 2) Compute Cq = Cdq mod q. 3) Compute M0 = (Cq Cp) . p-1 mod q. 4) Compute the plaintext M = Cp + M0 . p. This version of CRT-decryption is simply Garner? s Algorithm for the Chinese Remainder Theorem applied to RSA.If the key generation algorithm is further modified to output the private key (dp, dq, p, q, p -1 mod q), the computational cost of CRT-decryption is dominated by the modular exponentiations in go 1) and 2) of the algorithm. When the primes p and q are roughly the same size (i. e. , half the size of the modulus), the computational cost for decryption using CRT -decryption (without parallelism) is theoretically 1/4 the cost for decryption using the original method7. Using RSA-Small-e along wi th CRT-decryption allows for extremely fast encryption and decryption that is at most quadruplet times quick than standard RSA. 96IJRRAS 2 (2) ? February 2010 Subasree & Sakthivel ? Design of a New Security Protocol 2. 3 MD5 Algorithm MD52 consists of 64 of these operations, grouped in four rounds of 16 operations. F is a nonlinear function one function is used in each round. Mi denotes a 32 -bit close of the message input, and Ki denotes a 32 -bit constant, different for each operation. s is a shift value, which also varies for each operation1. MD5 processes a variable length message into a fixed -length output of 128 bits. The input message is broken up into chunks of 512-bit blocks the message is padded so that its length is divisible by 512.The padding works as follows first a single bit, 1, is appended to the end of the message. This is followed by as many zeros as are required to bring the length of the message up to 64 bits less than a multiple of 512. The re maining bits are filled up with a 64-bit integer representing the length of the original message9. The main MD5 algorithm operates on a 128 -bit state, divided into four 32-bit words, denoted A, B, C and D. These are initialized to certain fixed constants. The main algorithm then operates on each 512 -bit message block in turn, each block modifying the state.The bear on of a message block consists of four similar stages, termed rounds each round is composed of 16 similar operations based on a non -linear function F, modular addition, and left rotation. Many message digest functions have been proposed and are in use today. Here are just a few like HMAC, MD2, MD4, MD5, SHA, SHA-1. Here, we concentrate on MD5, one of the widely used digest functions. 3. HYBRID SECURITY PROTOCOL ARCHITECTURE It is desired to communicate data with high security. At present, various types of cryptographic algorithms provide high security to information on controlled networks.These algorithms are required to provide d ata security and users authenticity. This new security protocol has been designed for better security using a combination of both symmetric and asymmetric cryptographic techniques. depend 1 interbreeding Protocol computer architecture As shown in the figure, the Symmetric Key Cryptographic Techniques such as Elliptic Curve Cryptography, and MD5 are used to achieve both the Confidentiality and Integrity. The Asymmetric Key Cryptography technique, Dual RSA used for Authentication. The above discussed three primitives can be achieved with the help of this Security Protocol Architecture.The Architecture is as shown in the Figure 1. As shown in the figure, the Symmetric Key Cryptographic Techniques such as Elliptic Curve Cryptography, and MD5 are used to achieve bo th the Confidentiality and Integrity. The Asymmetric Key Cryptography technique, Dual RSA used for Authentication. 97 Subasree & Sakthivel ? Design of a New Security Protocol IJRRAS 2 (2) ? February 2010 The new Security Pr otocol has been designed for better security. It is a combination of both the Symmetric and Asymmetric Cryptographic Techniques.It provides the Cryptographic Primitives such as Integrity, Confidentiality and Authentication. The given plain text can be encrypted with the help of Elliptic Curve Cryptography, ECC and the derived cipher text can be communicated to the destination through any secured channel. Simultaneously, the Hash value is calculated through MD5 for the same plain text, which already has been converted into the cipher text by ECC. This Hash value has been encrypted with Dual RSA and the encrypted message of this Hash value also sent to destination. The intruders may try to hack the original information from the encrypted messages.He may be trapped both the encrypted messages of plain text and the hash value and he will try to decrypt these messages to get original one. He might be get the hash value and it is impossible to extract the plain text from the cipher text, because, the hash value is encrypted with Dual RSA and the plain text is encrypted with ECC. Hence, the message can be communicated to the destination with highly secured manner. The new hash value is calculated with MD5 for the received originals messages and then it is compared with decrypted hash message for its integrity.By which, we can ensure that either the origi nal text being altered or not in the communication medium. This is the primitive feature of this hybrid protocol. 4. RESULTS AND resultant 4. 1 Comparison of RSA and Dual RSA 1) The Public Key Algorithms, RSA and Dual-RSA have been implemented in VC++ and we got the following results. As shown in the Figure 2, the original message for communication is stored in MyFile. txt and its size is 547 Bytes, which is shown in the report file. Figure 2 Input File MyFile. txt Figure 3 shows that the project main menu, which consists of various features. They are i. RSA Encryption, ii.RSA Decryption, iii. Dual RSA Encryption, iv. Dual RSA Decryption, and v. Graph, which is used to compare the computational costs of both the RSA and Dual -RSA Figure 4 shows that RSA Encryption and Figure 5 shows that Dual RSA encryption. From the figure 6 it is clear that the RSA take one block at a time for encryption and decryption at a time. But the dual RSA take more time for encryption of two block at a time, but it take less time for decryption of two blocks. So, the RSA encryption and decryption time is greater than Dual RSA because Dual RSA perform the encryption and decryption operation for two blocks. 8 IJRRAS 2 (2) ? February 2010 Subasree & Sakthivel ? Design of a New Security Protocol Figure 3 Process of RSA and Dual RSA Encryption/Decryption Figure 4 RSA Encryption 99 Subasree & Sakthivel ? Design of a New Security Protocol IJRRAS 2 (2) ? February 2010 Figure 5 Dual RSA Encryption 5. 2 Performance analysis of RSA and Dual RSA Figure 6 RSA vs Dual RSA 100 IJRRAS 2 (2) ? February 2010 Subasree & Sakthive l ? Design of a New Security Protocol Figure 7 Computational costs of RSA vs Dual RSA Figure 6 shows that the Perfor mance Analysis of RSA vs Dual RSA.From this figure, it is clear that the hit computation time for Encryption and Decryption of Dual -RSA is less than that of ordinary RSA. From the Figure 7, it is observed that the total computation time for Encrypt ion and Decryption of RSA is 4314ms as compared with the total computation time for Encryption and Decryption of Dual RSA is 3203ms for the file size 547 Bytes. From the analysis it is clear that Dual RSA is better than RSA algorithm. So, for authentic ation we are issue to use Dual RSA. Dual RSA take two block for encryption and decryption simultaneously. . 3 Results of Hybrid protocol Architecture Here, we are using three different mode of operation. The sender, Receiver and Intruder. We have t o select the mode and process the information. The following figure represent the three different mode. Figure 8 Mode selec tion If the mode is the sender, then we have to provide the key val ue and messages in the specified location. Figure 9 Sender Mode hundred and one Subasree & Sakthivel ? Design of a New Security Protocol IJRRAS 2 (2) ? February 2010 Figure 10 shows that the Receiver received the sender message with the key.From the figure, it is noted that, the intruder also received the key and not the message. Because, the message is encrypted with ECC and key is encrypted by using Dual RSA. And also noted that, the intruder derived different key for decryption, which is akin to the original key. Even though the intruder got the key he cannot able to get the orig inal message because of Dual RSA. Because of Dual RSA we got two advantages one is the message cannot be decrypted and time required to perform the encryption and decryption operation less compare to RSA because Dual RSA perform encryption and decryption by two block at a time.The new Public Key Cryptographic algorithm, Dual RSA has b een developed for better performance in terms of computation costs and shop storage requirements. It is also called RSA -CRT, because it is used Chinese Remainder Theorem, CRT for its Decryption. From the output, it is noted that Dual -RSA improved the performance of RSA in terms of computation cost and computer storage storage requirements. It achieves parallelism. The CRT Decryption is achieved roughly ? times faster than original RSA. Figure 10 Secured communication of Hybrid Protocol 102 IJRRAS 2 (2) ? February 2010 Subasree & Sakthivel ?Design of a New Security Protocol 6. REFERENCES 1 2 3 4 5 6 7 B. den Boer and A. Bosselaers, An attack on the last two rounds of MD4, Advances in Cryptology, Crypto ? 05, pages 194-203, Springer-Verlag, 2005. B. den Boer and A. Bosselaers, Collisions for the compression function of MD5, Advances in Cryptology, Eurocrypt 07, pages 293-304, Springer-Verlag, 2007. D. Bleichenbacher and A. May, New attacks on RSA with small CRTexponent in Pub lic Key Cryptography, PKC 2006, volume 3968 of Lecture Notes in estimator Science, pages 1 13. Springer-Verlag, 2006. D. Bleichenbacher and A.May, New attacks on RSA with small secret CRT -exponents, in Public Key CryptologyPKC 2006, ser. Lecture Notes in Computer Science. New York Springer, 2006, vol. 3958, pp. 113. D. Boneh and G. Durfee, Cryptanalysis of RSA with private key d less than N , IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 13391349, Jul. 2000. E. Jochemsz and A. May, A polynomial time attack on standard RSA with private CRT -exponents, 2007. Hung-Min Sun, and et al. , Dual RSA and its Security Analysis, IEEE Tra nsaction on Information Theory,Aug 2007, pp 2922 2933,2007 8 H. -M. Sun, M. J.Hinek, and M. -E. Wu, On the design of Rebalanced-RSA, revised version of 37 Centre for Applied Cryptographic Research, Technical Report CACR 2005 -35, 2005 Online. Available http//www. cacr. math. uwaterloo. ca/techreports/2005/cacr2005 -35. pdf 9 H. Dobbertin, The Status of MD5 afte r a Recent Attack, CryptoBytes, 2(2) 1-6, 2007. 10 M. J. Hinek, Another look at small RSA exponents, in Topics in Cryptology-CT-RSA 2006, ser. Lecture Notes in Computer Science, D. Pointcheval, Ed. New York Springer, 2006, vol. 3860, pp. 82 98. 11 N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), 6th world-wide Workshop, pages 119 132, 2004. 12 Ravindra Kumar Chahar and et. al. , Design of a new Security Protocol, IEEE International Conference on Computational Intelligence and Multimedia Applications, pp 132 134, 2007 13 Ramaraj, E and Karthikeyan, S, A Design of Enhanced Security Protocol for Wireless Communication using Hybrid Encryption Technique, Indian Journal of Computing Technology, pp 22 -29, May, 2006. 14 S. D. Galbraith, C. Heneghan, and J. F. McKee, Tunable balancing of RSA, 2005. Updated ACISP 2005. version of 15 S. D. Galbraith, C. Heneghan, and J. F. McKee, Tunable balancing of RSA, in Proc. Inf. Security and Privacy, 10th Australasian Conf. , ACISP 2005, C. Boyd and J. M. G. Nieto, Eds. , 2005, vol. 3574, pp. 280 292, Springer, Lecture Notes in Computer Science. BIOGRAPHY Dr. S Subasree got Bachelor Degree from Madras university in 1991 and she done her post graduate degree from Bharathidasan Univeristy in 1995 and M. hil from Manonmaniam Sundaranar Univeristy in 2001. She done her M. Tech and Ph. D in SASTRA University in 2006 and 2009 respectively. She got 13 years teaching experience. Now she will be serving as a Senior Assistant Professor in SASTRA Univeristy, Tamil Nadu, India. She has create more than 15 papers in International and National Journals and Conferences. Her research area includes Network Security, High Performance Soft Computing Techniques, Communication Network, and B iometric Cryptography. Dr. N K Sakthivel got Bachelor Degree from Madras university in 1991 and she one her post graduate degree from Bharathidasan Univeristy in 1994 and M. phil from Bharathidasan Univeristy in 2000. She done her M. Tech and Ph. D in SASTRA University in 2004 and 2009 respectively. She got 15 years teaching experience. Now She will be serving as a Professor in SASTRA Univeristy, Tamil Nadu, India. She has published more than 18 papers in International and National Journals and Conferences. Her research area includes High Speed Communication Networks, Network Security, High Performance Computing, and Biometric Cryptography. 103

Wednesday, May 22, 2019

Impact of Jet

C IMPACT OF JET EXPERIMENT 1 Aim To find the impact force caused by a silver tarry on a plain plate and a hemispherical shell and compare it with the expected theoretical force. 2 Theory When a safety ball strikes a solid surface it nicely rebounds from the solid surface. The amount of rebound would depend on the coefficient of restitution. However, when a steady fluid yard strikes a solid surface, it does not rebound. But, a stream of fluid is formed which moves over the surface and the fluid leaves the surface tangentially. If a fluid jet is impacting a horizontal plate, at an angle ? the consecrate of change of momentum can be equated to the force exerted by the jet on the plate. When a vertical fluid jet strikes a horizontally positioned plate, the value of ? will be 90. A control volume analysis can be performed to give the force F = ? QV, (1) where ? is the density of the water, Q is the jet flow rate and V is the velocity of the jet. For the case of a hemispherical shell when the stream of water is turned back by 180o, the force experienced by the shell will be F = 2? QV, (2) two times the force experienced by the flat plate. data-based Set-up The set up consists of a closed cylindrical container housing the horizontal plate/hemispherical shell to receive the impact of the jet. The vertical water jet is produced by a pump forcing water through a snot of diameter 6mm for the flat plate and of diameter 8mm for the hemispherical set up. The flow rate through the nozzle is measured by a rotameter. The velocity of jet could be obtained by knowing the flow rate. 4 Experimental Procedure tilt on the motor and using the two gate valves control the flow rate.Place suitable weights to counter balance the impact force of the liquid jet. When the load is high than the impact load of the jet, the jet will be blocked by the plate. When the load is low the load arm will rise up and stain the top part of the housing. Adjust the flow rate for any selected weigh t so that the load arm stays in the middle of the distance from the nozzle tip to the top part of the housing. check over that the steady flow rate is maintained and take at least sestet independent measurements by choosing six different flow rates that would balance the weights.Important steps 1 Allow the float to be steady before you start noting down the readings. 2 Ensure that the fluid jet nicely counter balances the weight it is carrying. Flat plate S. nary(prenominal) Flow Rate Q (m3/s) Velocity V (m/s) Force (Experimental) Fex (N) Force (Theoretical) Fth (N) S. No. Flow Rate Q (m3/s) Hemispherical shell Velocity V (m/s) Force (Experimental) Fex (N) Force (Theoretical) Fth (N) 5 Results and Discussion Plot the following graphs. Fex vs Fth 2. Fex/(1/2 ? V2 A) vs Re=Vd/? , where A is the field of operation of cross section of the jet and Re is the Reynolds human activity of the jet 1.The graphs for the flat plate and the hemispherical shell should be plotted on the same gr aph. Based on these plots answer the following questions 1. Do a control volume formulation to derive (1) and (2). 2. Why is the force independent of the area of the plate/shell? 3. What is the slope of the Fex vs F th plot. What should the ideal value of this slope be? If the slope is different from the ideal value, why is it different. 4. What non dimensional number is the y axis of the second plot? What is the significance of the variation this non dimensional number that you observe from your experiments?

Tuesday, May 21, 2019

Magazines play in womenâۉ„¢s lives Essay

The womans time came into existence in the late eighteenth and beforehand(predicate) nineteenth century (Margaret Beetham, 1996 pg 6). They were loosely aimed at the upper and middle class ladies, as these were the only wo workforce who had spare leisure time and the disposable income to purchase luxuries such as weekly magazines. During 1949-74 in that remark were two extremely dominant themes in womens magazines. First at that place was the overwhelming star billing given to love and marriage- and the family.Second there was the healthy emphasis placed upon the Self, and the responsibility ethic laid upon every woman to be the self staring, self finishing producer of herself (Marjorie Ferguson 1983 pg 44). It is clear from the beginning that womens magazines promoted a picture of a perfect woman, which still exists today. One could argue the continued success of womens magazines is due to the development of the magazine as a commodity. They dumbfound also become a crucial si te for the advertising and sale of other commodities, whether nightgowns or convenience foods (Margaret Beetham 1996 pg 2).Womens magazines play a vital role in many readers lives. But do they wrongly portray a perfect woman? Many women clamber to maintain a perfect home, their children and a happy marriage. One could argue womens magazines both add to this pressure, and act as a form of advice to women ineffectual to cope with what is expected from them according to the media and gender stereotyping. In the early years of womens magazines the emphasis was put upon providing entertainment and practical advice.In this case the magazine fulfilled a role of a reference text, which women could refer to for recipes and other advice. The entertainment factor meant the magazines were viewed as a bit of light relief for women with lodge in lives. Janice Winship portrayed the role of womens magazines in the eyes of the existing culture extremely differently. Men do not have or need magazin es for A Mans World it is their world, out there, beyond the shelves the culture of the workplace, of politics and public life, the world of business, property and technology, there they are all boys together.Women have no culture and world out there other than the wizard which is controlled and mediated by men (Janice Winship 1987 pg 6). In this respect womens magazines provide an insight into the muliebritys world. The womans world which womens magazines represent is created precisely because it does not exist outside their pages (Janice Winship 1987 pg 7). Therefore the role which magazines play in this respect is of high importance to women. It acts as an escape into their own world which suggests why womens magazines have been so popular in the past and continue to be as successful today.Marjorie Ferguson argued that womens magazines collectively comprise a social institution which serves to foster and maintain a cult of femininity (Marjorie Ferguson 1983 pg 184). She puts f orward a much more positive view of womens magazines and feels that the magazines purely identify their target market and then aim to provide their readers with encouragement and entertainment to do with the business of being a woman (Marjorie Ferguson 1983 pg 184). It is clear from the above that in the past when women had little rights the role of the womens magazines had a great importance to women.It enabled them to have a world of their own almost, a world which was not purely occupied with males. In todays society where women have equal rights to men (supposedly ) the role of their magazine is not nearly as important in their lives. It does continue to provide the same features although there is a world out there not purely controlled by men, therefore the role of womens magazines is slightly less important in the day to day activities of women. One could claim it acts as light relief although the images portrayed in these magazines burn lead to this portrayal of the perfect woman. In todays society, it is difficult not to examine ones body and feel a sense of dis marrow if it doesnt mirror the lanky images one sees in not only fashion magazines, only when also all areas of advertising (Annie Doig 1998). Women are increasingly faced with images of the perfect woman. The portrayal of women in womens magazines all follow the same pattern, they have a well-groomed appearance and a slim body image. Media such as television, movies, and magazines are considered to be among the most influential promoters of the thin standard, given their popularity and accessibility to the people (Anne Marlowe1998).As womens magazines have a massive influence on womens self-concept many women quickly become dissatisfied with their body even at an early age. Ironically the ideal of feminine beauty which is being promoted is impossible for the average woman to achieve. This level of unhappiness can lead to an eating disorder in an attempt to conform with the publicised norms . Between 1970 and 1990, there was an overall increased emphasis on weight loss and body shape in the content of a popular womens magazine (Anne Marlowe 1998).This concludes that the roles of womens magazines changed from traditional and entertaining values into portraying women as consumers and directly targeting womens own anxieties to make money. interestingly there is evidence to suggest that eating disorders, especially anorexia and bulimia, are most prominently seen in white women (Molloy 1998). One could claim a high ratio of womens magazines are aimed at white females. They are not directly discriminative but you rarely see a black cover miss with features on how to cope with African hair types for example.This example outlines the impact these magazines have upon womens self-perception. Males are also less likely to suffer with an eating disorder. This can be directly linked with the fact that male magazines are primarily concerned with leisure, pleasure and activities, i n contrast as discussed womens magazines focus on beauty, dieting and domesticity. Women are under massive pressure to conform to these unrealistic pictures of beauty. That in turn results in many women in narcissistic absorption with oneself- with ones physiologic appearance (The image of femininity in womens magazines 1998).

Monday, May 20, 2019

Mjkknhjk

Running conduct THE RHETORICAL ANALYSIS IN NO WOMAN NO CRY The rhetorical Analysis of No adult female No send for by pier Marley and the Wailers Karen Start Dr. Felicia Dziadek Composition 1301 October 1, 2011 Abstract In this paper, the rhetorical analysis of the lyrics to No womanhood No phone call, made famous by pier Marley and the Wailers, has been analyzed to reveal the rhetoric mean. historic events in the Jamai lav disposals actions influenced the singer to protect, in a peaceful manner, the great deal and culture of his country, Jamaica.Repetition of phrases, sentence building, tones and values of the pains are employ by the artist to second move the great deal then and still to daytime. The Rhetorical Analysis of No cleaning woman No let loose by dockage Marley and the Wailers Try not start the opening sentence with a acknowledgment. 1979, Boston, MA, live at Amandla Festival-Harvard Stadium, Bob Marley and the Wailers per stamped the meter No Woman No waul mid day because promoters feared a riot would spark in the streets. (moga1985s Channel, 2006) One of the great songs ever written, number 37 on axial motion Stones 500 Greatest Song of All Time (Wailers, B. M. , 2011. ), made a long impact on society when the famous musician Bob Marley helped to bring peace into his country. But what is it that attracts and persuades heap to react after listening to haggling of a performer? The music, run into out the the lyrics, tones, beat, or is it the rhetorical story within the song?After completing the recent research of No Woman No Cry, the proposed purpose of this melody is said to preach the word for a better governance, and is dedicated to Bob Marleys mother, Ciddy, for the love and support she provided through the invigoration-threatening times in Trenchtown, Jamaica. The people of Jamaican alsok the rhetorical heart and soul of the song into action. Rebellions and riots were feared to hit the streets to fight for peace an d love the natives deserved in Jamaica. Bob Marleys facial expression and name revolves around the drastic change of Jamaica. Taking the hetorical meaning of this simple song is strong luxuriant to be used as a weapon to protect rights to possess a better flavour. To help further understanding of Bob Marleys words, the randomness collected has been constructed, analyzed, and developed into a thought of the rhetorical analysis, (and the argueing for the words carefully chosen for the song No Woman No Cry) take this out. Bob Marley carefully chose his words for the song No Woman No Cry to show the heroic necessity for peace and to love to his nation by using repetitions, a variety of tones and crush, and peaceful rebellion.The rhetorical analysis of Bobs songs helped to motivate the people into an understanding of the need for peace. In e actuallyday intent we experience rhetorical situations, such as advertisements or fairish simply trying to get psyche to raise the therm ostat without asking nevertheless initially presenting the issue. In most rhetorical situations, people proceed to retain the music or rhythm without noticing the rhetoric in songs, poems, and articles. Such an example is the famous repetative song No Woman No Cry by Bob Marley and the Wailers.It is believed the song was intentionally written for Bob Marleys mother, Ciddy, or for the sake of his country and religion. Reason for such rhetorical words was because of the independence of Jamaica. Marley was be exposed to the staunch realities of abject poverty, low pay, malnutrition and disease and a need of political rights by the poor, houses which were anything from cardboard boxes to get the better of out oil drums nailed together, roadblocks, migration, and food shortage. (rasta man vibrations, 2011. Life became hard for the Jamaicans therefore the songs rhetorical message relates to the politics at the time being and influenced millions initiation-wide for peace. The phrase in the government yard in Trenchtown, Oba, ob-serving the hypocrites (Ford, Vincent, 1976) refers to the lack of help and support for the people suffering. Marleys rebellion wasnt just to preach how bad the government is or to persuade the public to revolt in fact his voice rang another bell. To teach the world to love and take care of one another is the message in between the transmission lines of the lyrics.His famous quote No Woman No Cry has imprinted the Jamaican government with a rhetorical situation of hard times in life, and the tone peace and love sets a good state of mind in the peoples hearts in which helped the movement of Jamaican independence. The message from the lyrics means more than just singing to be heard, its about having a better life, and to show that No Woman should Not Cry (Ford, Vincent. ) because the future will be better. To get to the rhetorical message, you must first discover the features of the song No Woman No Cry for a better understanding of how and why the lyrics and beats influence the message.The turn of events of a song can show other characteristics about the artists appearances or beliefs. starting signal recognized by the audience are the diction and the chronological put in of ideas from the performer. Bob Marleys chose of words are mainly informal diction. He speaks to his audience as if he own(prenominal)ly knows them. Bobs language is so passionate and his words relate to the audience on a deep personal level. A popular choice of writing is repetition of words or phrases also used in the No Woman No Cry. The lines No Woman No Cry and Everythings gonna be alright (Ford, Vincent. are repeated and detain a deeper message verses just seeing the plain text. time structure is also a helpful tool used by artist. The arrangement of ideas in a song is very important. In the Also, the performance of the song is very sophisticated. Because Marleys words were so passionate, people literally took the rhetorical message i nto action. Most reggae music is a form of steady beat and ska unite and slowed. Usually the third or fourth string is accented and this tends to be the standard rhythm.The rhythm, beats, repetition of words, and the order of Bob Marleys ideas all contribute to the rhetorical message of the song. Content and form are presented in the song and correspond to one another. The main purpose acquire from No Woman No Cry was the simple fact to not worry or stress and that the individual will be still everything will be alright. The author of the song appeals to the reason of hardship in Trechtown, Jamaica. Such reason of this is the change of Jamaicas government control. Independence was won shortly before the burst of reggae music.People began to view life differently and shift to a new prospective. Not only does Bob Marley make music but he also changes many another(prenominal) individual minds on a variety of subjects. When individuals listen to the words presented in a song, they fo rm an image or story of what the performer is introducing. For the song No Woman No Cry, the audience infers it is about a woman and the performer is trying to reassure her that there is no reason to cry. But in reality, the sweet words are directed into two ways. One line in the lyrics Then we would cook cornmeal porridge (Ford, Vincent. ) is eferring to the dinners Marley would enjoy with his mother. Although porridge for dinner was an indication of the familys economic need it was also conversely an indication of strength and love through Bobs satisfaction with having such a meal. (rasta man vibrations, 2011. ) This line is so sincere about the memories he contributiond with his mother suppuration up poor without food. After analyzing the song, a different perspective is formed. Majority of the audience assume the rhetorical message is directed to the relationship between Marley and his family and also to preach for a better system of government for Jamaica.Emotionally the aud ience feels a reek of hurt, hope, and calming peace from the performer. To contribute to this sense, form of the lyrics helps to portray such emotions. The structure of communication is sculpted into public communication In other words, it is the intention of the communicator that what is communicated might be received/apprehended by anyone. (Faulkner, Andrew, 2009. ) The performer, Bob Marley, uses such communication in hopes the audience will receive the information of the public to understand and continue to fight for the hope of having a free and peaceful country.This usage of form and content helps the artist reach out to the public. Marleys approach to the public and the techniques he had chosen were very useful to get his rhetorical message in his song clear to the point. Performers write and sing for dissimilar reasons and another key element to a performers writing is his audience. When listening to a song, a thought of whom the lyrics are directed to is proposed. Who co uld the writer possibly be directing his attention to? is question much brought to mind. In the perspective of Marley, his intentions were to his people the natives suffering in Jamaica. Then we would cook corn meal porridge, Of which Ill share with you this line considers the meals Bob Marley would eat with his mother. At the time in Jamaica, the public was so poor they couldnt afford to have a diversity of food. The message within these lines is directed to his mother. Like many of the Jamaicans, Marley had experience hardship therefore we can only assume his audiences are the people of Jamaica. In its literal sense the song can be interpreted as an ode to Marleys mother and the hardships they both faced in Trench Town. (Rasta man vibration, 2011).The performer used much of his personal experiences show that he too feels the same as the rest of the public. In sense that the public wanted a better life to have food, free of diseases, and a home to live in. We as the modern day l isteners, interpret the song into manners in which we can understand. It is believed the information Marley has given to his audiences is exposed for the spread of the good word peace. Historical events influence the people experiencing the change of life, hardship, pain, and the need of support from those who want to rule.The wide range of audiences Bob Marley has obtain have continued to spread the peace, love, and happiness in hope that one day the people of the world will not have to shed no tears. (Ford, Vincent, 1974. ) Out of such powerful performances and importantly constructed communication culture and values can be produced. Marley had moved the people into a cultural learning people today continue to practice his motivations. Individuals practice the art of marijuana, love, peace movements, and creating reggae music. Marleys face can be seen from posters to T-shirts and his words are used as greetings or goodbyes.Till this day, Marleys name is best know for his perspec tive on life, the fight for his people, to keeping his religion, and a better government in his country. Many audiences have been reached out by the words of Bob Marley and his music lives on today touching the hearts of many people. The only clear cut rhetorical message Bob Marley has given to the world is the uplifting phrase, Peace, Love, and Happiness. Rhetorical analysis can provide a deeper intellectual thought of an article, book, poem, or song. In this case, the song No Woman No Cry by Bob Marley and the Wailers was analyzed to receive the message within the lines.Love, hope, pain, and tribulation all contribute to the long lasting song Bob Marley has given us. The sentence structure, structure of communication, and features used help to contribute the reasoning of No Woman No Cry. The performances of the artist contribute to the supine moving lyrics as well. A performer will most likely present the rhythm and beats to help the sentence stucture of the lyrics. Looking thr ough the fine print of casual writings reveals rhetorical analysis with a little research and historical fact support. References 1. Bob Marleys song No Woman No Cry. n. d. ). rasta man vibration. Retrieved October 2, 2011, from http//www. rasta-man-vibration. com/no-woman-no-cry. html. 2. __video_username__, m. (2006, April 2). moga1985s Channel YouTube . YouTube Broadcast Yourself. . Retrieved October 2, 2011, from http//www. youtube. com/user/moga1985. 3. BobMarley. com The appointed Site of Bob Marley . (2010, December 27). BobMarley. com The Official Site of Bob Marley . Retrieved October 2, 2011, from http//www. bobmarley. com/. 4. Wailers, B. M. (2011, September 20). No Woman, No Cry Wikipedia, the free encyclopedia.Wikipedia, the free encyclopedia. Retrieved October 2, 2011, from http//en. wikipedia. org/wiki/No_Woman. 5. No Woman No Cry Lyrics Bob Marley. Lyrics, Song Lyrics LyricsFreak. com. N. p. , n. d. Web. 2 Oct. 2011. http//www. lyricsfreak. com/b/bob. 6. For d, Vincent. No Woman No Cry lyric credit. (1976) 7. Faulkner, Andrew. The Structure of Communication Reflections and Insights on Transformation. Reflections and Insights on Transformation. N. p. , 17 May 2009. Web. 2 Oct. 2011. http//sureshfernando. wordpress. com/2009/05/17/the-structure-of-communication/.

Sunday, May 19, 2019

Native Americans vs. American Settlers Essay

There are a effect of dissimilarities amongst the primaeval Americans and the American Settlers. Although the Native Americans wanted to live in peace with American Settlers, their pagan differences led to warfare. This essay entrust compare and contrast a couple differences of these two cultures. I will discuss both groups opinion on kill and resources. Then, I will explain both groups views on Nature. Native Americans Conserved land and viewed its resources as scared, while the Americans felt as though the land was slide fastener but opportunity for their colonies.While hunting, Native Americans used every piece of the animal from the hide to the bone and everything in between. They respected the land and believed it belonged to m opposite-nature, so it could not be owned or sold. On the other hand, American settlers viewed the land and its resources as limitless opportunity. It is little wonder they went land-mad, because there was so much of it (Steinbeck 69). They invade d the lands claiming territory, putting to death buffalo, and plowing through the grassy plains to make room for their crops.American settlers often fought to try to obtain land that they thought was free for the taking, whereas, the Native Americans tried to live in harmony with nature and its inhabitants. In the movie, We Shall Remain, Native Americans would try and negotiate with the Americans only to be threatened with the violence of warfare. Native Americans believed the creator put everything on this earth to live together and be used respectfully. They accepted nature and did not try to dislodge it. The American settlers, however, didnt hold the same beliefs.The railroads brought new hordes of land-crazy people, and the new Americans moved like locust across the continent Coal and copper drew them on they savaged the land, gold-dredged the rivers to skeletons of pebbles and debris (Steinbeck 69). They viewed nature as nothing to a greater extent than an obstacle and commod ity. American settlers engaged in warfare, defending what they thought they discovered, to claim as their own. They were land empty-bellied and the more they got, they more they wanted. American colonist never tried to understand the Native Americans culture.Instead they tried to push their European based ways onto them. This, in turn, caused a number of wars between the two. Sometimes its better to agree to disagree rather than to wage war on what is believed to be right/wrong. Works cited Steinbeck, John. Explaining Relationships Americans and the Land. the Composition of Everyday Life. 3rd ed. Boston Wadsworth, 2010. Pgs. 68-70. Print. We Shall Remain. Dir. Ric Burns. Perf. Benjamin Bratt, Alex Meraz, Dweir Brown. PBS Home Video, 2009. Film.

Saturday, May 18, 2019

Thtr 100

1. __________ argued for light as the direct principle of all design and defined the role of the modern lighting designer. Adolphe Appia2. A member of the earreach may see a play from five-spot divergent critical and dramaturgical perspectives. What are five perspectives? social, personal, fastidious, theatrical performance, and entertainment value3. All plays and play productions can be usefully analyzed and evaluated on the dash they use the theatrical format to the best advantage and make us rethink the nature of theatrical production. true4. Avant-garde means, literally, the major assault or shock troops. true5. Dramatic criticism ordinarily appears in all the following forms EXCEPT annotated versions of a playscript used in production.6. Dramaturgy is fundamentally a subset of directorial responsibilities false7. Eschewing realism, romanticism, and rationality to create relentlessly unenlightening plays, which playwright said, Art has nothing to do with clarity, does no t dabble in the clear, and does not make clear? Samuel Beckett8. Flashbacks that are not clearly border as such, shuttling instead between time zones without narrative warning, are examples of nonlinear theater9. Founded by Luis Valdez in 1965, which contemporary Chicano theatre was created to dramatize the farm workers situation in California through didactic actos? Teatro Campesino10. mainly the playwright is more intelligent and better informed than the members of the audience. false11. How did Stanislavsky contri furthere to realist theatre? He brought realist acting to realist plots12. If you were to join a discussion about macaronic drama, you would be chatting about plays that include speeches in different languages.13. In describing dramatic space as psycho-plastic, which scenographer (Europes most celebrated in the 20thcentury) said The goal of a designer can no longer be a description of a copy of actuality, but the creation of its multidimensional model? Joseph Svoboda 14. Opera bouffe is a type of lightweight, sentimental musical. false15. Plays that give out with theatrical matter not simply as a vehicle but as a theme are called metadrama or metatheatre.16. Postmodern playwrights and directors are mainly concerned with the discontinuity meaning17. Postmodernism relates to previous artistic movements in all the following ways EXCEPT postmodern theatre attempts to illuminate the received truths of

Friday, May 17, 2019

Bass River

In the short storys, The Bass, The River, and Shelia Mant written by W. D Wetherall and dupe the dream written by Judith Ortiz Cofer, the two main characters realize who they truly be by the abate of the story. In The Bass, The River, and Shelia Mant the narrator is in love with a girl he meets at his cottage in the summer. The narrator describes her in the story as There was a summer in my life when the provided creature that seemed lovelier to me than a largemouth bass was Sheila Mant. The story Catch the Moon includes the main character Luis who overcomes umteen obstacles, leading up to meeting a perfect girl for him, Naomi. In The Bass, The River, and Shelia Mant and Catch the Moon the effeminate characters have a direct impact upon the lives of the male protagonists. The main characters both realize who they truly are by the end of the story. The change within each of these characters reveal theme. The theme in Catch the Moon states that love can help us move on, and conf ront our problems.The theme in The Bass, The River, and Shelia Mant concentrates on interest your heart and not letting other people change you. In The Bass, The River, and Shelia Mant the narrator undergoes a knockout interaction with Shelia Mant. During the story Shelia says to the narrator Look, she said. I can get Dads car. Its immediate this way, I lied. Parkings tense up there. Hey, its safe. I wont termination it or anything. Shelia could not of broken the narrators heart any more at this point. The narrator had spent hours of the sidereal day trying to make the canoe sparkle and clean it up.The narrator was shooken up by this, but as the story continued he realized Shelias attitude. Shelia told the narrator straight up that she does not same(p) fishing. Once the narrator catches the fish he has always dreamed of cathching gets on his fishing rod Shelia states she doesnt like fishing and its dumb. He had realized she was so careless slightly him or anyone else and ju st cared about herself. When they get to concert she rides home with another guy leaving the narrator on their date. Human interactions take in best or worst have to know how to react

Thursday, May 16, 2019

Assingments 2012-2013

ASSINGMENTS 2012-2013 Marketing Studies (1 class, Diploma) 1 BUSINESS ENGLISH engagement 1 a) Luis St. Jean is a famous design ho exercise in France with annual sales of $1. 2 billion in clothing, perfume, scarves, and otherwise designer items. Each year it prep atomic number 18s more than than 150 original designs for its seasonal collections. As head buyer for Cindys, an upscale womens clothing store at the Mall of the States in Minneapolis, you think you might like to start offering the LSJs line of perfume. You ingest to go to sleep more to the highest degree pricing, types of perfume offered, minimum ordering quantities, and marketing assistance p rovided by LSJ.You would overly like to k flat if you can wear exclusive marketing rights to LSJ perfumes in the Minneapolis area and whether you would welcome to enchant LSJs complete line (you dont think the most(prenominal) expensive perfumes would be full-gr birth sellers in your area). Write to Mr. Henri Vixier, Lic ense Supervisor, Luis St. Jean, 90513 Cergy, Pointoise Cedex, France, seeking answers to your questions. Your answer should be in a letter change requesting the necessary product information. You can make up all the necessary details. b) You are the marketing tutor of a company selling electronic goods.You are having a meeting with the board directors for introducing close to in the altogether products in the Cypriot market. You need to prepare an agenda for the meeting and send that agenda to the board of directors in the form of a memo. In your answer, include all the necessary details you think are essential. 2 Format (a) Letter (b) Memo, approx. 2000 give-and-takes (in total), produced on a laser pressman Deadline fourteenth celestial latitude 2012 (No fitting pull up stakes be accepted later this date) 3 subsidization 2 You are an external adviser for an airline company.You have been hired to assess the current declining customer numbers and provide advice to the comp any. Develop a tale to be turn over to the CEO including new ways/techniques to promote the company in twain local and international markets. In your answer you should include examples to support your arguments taking into account the current warring market, where the flight destinations for Cyprus are increasing as new airlines enter the Cypriot market. Format Essay Type, 2000 formulates, produced on a laser printer Deadline twelfth April 2013 (No duty grant go forth be accepted afterwards this date) 4 BUSINESS ORGANISATION assigning 1 The meeting is to analyse a showcase study and prepare visors around identifying threesome key OB issues in the case germane(predicate) OB theories for distributively of the OB issues recommendations for action to modify each of the three issues. The case study result be distri scarceed during Week 5 of the staff. Your seminar separate leave alone be asked to form syndicate groups of 5 people to develop answers to the case. Your p oster group whitethorn use words, diagrams, drawings, images and cartoons on the posters to make your key points. The poster first appearance willing take place during Week 8 at a succession and place notified by the tutors in week 8.There will be circumscribed time for your group to rub down together in seminars and you whitethorn decide to meet proscribedside of ballock teaching times and communicate by phone, e-mail, conference calls and social ne tworking sites. Each group member essential complete a Peer Review Sheet. This is an assessment by each member of a group on e actually other group member. It requires objective skills to critically assess the contri besidesion of other members in your group. Your Peer Review Sheet must be given to your seminar group tutor during the poster beation session.A example of the Peer Review Sheet follows the Poster Presentations Marking Criteria. The poster presentation will be marked over against the assessment criteria sh avouch and individual tag adjusted taking into account the Peer Review. elaborate will be double marked and externally moderated in accordance with the University regulations. Assessment criterion 5 requires evidence in the form of agendas and minutes for meetings held by the group together with a one scallywag analysis of 5 the group working process. This should be submitted to your seminar group tutor on the poster presentation day together with your Peer Review Sheets.Please note All members of your group MUST be present and prepared to answer any question stimulated by your poster from both the tutors and fellow students. either person who is absent will receive a mark of zero for this assessment and fail the module. Deadline 14th December 2012 (No assignment will be accepted after this date) 6 BUSINESS ORGANISATION denomination 2 The final reflective report requires you to identify how you have applied OB theory, learned in the module, to develop your knowledge and skills in worki ng with others.You are to identify three issues, or topics, from the OB module where you can identify relevant experience to which you can harbour OB theory. The experiences may be from your studies, from work, or from social groups or clubs to which you be persistent. For each of your three topics you are to identify relevant experience and select and apply appropriate OB theory to those experiences. You should evaluate the theory in analysing what happened and in guiding future action. To ease you plan your final report you are to submit a proposal that forms part of the Groups and Teams portfolio. The proposal should be no more than 150 words.Also a list of at least five academic references you think of to use, in Harvard format, should be provided. The final report should be a business report of 1500 words. Actual word count should be specified on the cover page of your report and outside +/ 10% will incur a penalty of 10%. References and any appendices should not be include in the word count. Deadline 12th April 2013 (No assignment will be accepted after this date) 7 COMMERCIAL LAW Assignment 1 a) P, a car salesman, is advertising one of his cars, made by Ferrari for sale at the wrong of 50000 Euro in the newspaper.N sees the advertisement and calls to P offering him 40000 Euro. P rejects Ns offer and tells N that he would be willing to discuss an offer for 45000 Euro. N agrees on the expenditure but under the setting that P proves to her that the car is indeed a genuine Ferrari. P promises to disclose all necessary documents in the next 3 weeks. N agrees and waits. 2 weeks posterior N discovers that P has sold the car to C for 50000 Euro. Advise N. b) Why is Carlill v Carbolic Smoke Ball Co (1893) a very important case? Format Essay, approx. 2000 words (in total), produced on a laser printer Deadline 14th December 2012 No assignment will be accepted after this date) 8 COMMERCIAL LAW Assignment 2 unified personality refers to the fact that as far as the law is concerned a company rightfully exists. As a result of this a company can sue and be sued in its own name, hold property under its own name and most importantly be liable for its own debts. Discuss Format Essay Type, 2000 words, produced on a laser printer Deadline 12th April 2013 (No assignment will be accepted after this date) 9 ECONOMICS Assignment 1 Analyse the productionion Possibilities limit (PPF) and explain how it illustrates the main economic concepts of scarcity and opportunity cost.Format Essay Type, 2000 words, produced on a laser printer Deadline 14th December 2012 (No assignment will be accepted after this date) 10 ECONOMICS Assignment 2 Given the table below a) Draw the demand and supply curves and show equilibrium. b) Demonstrate the put precedent due to the increase in quantity demanded on the same graph, illustrating clearly the new equilibrium. c) Analyse the factors that may cause a shift of the demand curve, both internals and outwards. d) A nalyse the factors that may lead to an inward or outward shift of the supply curve. ) Discuss the laws of demand and supply. f) Analyse the theory behind a movement along the 2 curves or a shift of the curves. Demand 1 Quantity expense 65 EUR 2. 60 78 EUR 2. 30 98 EUR 1. 95 124 EUR 1. 63 156 EUR 1. 30 Demand 2 Quantity Price 52 EUR 2. 60 65 EUR 2. 30 85 EUR 1. 95 111 EUR 1. 63 143 EUR 1. 30 Supply 1 Quantity Price 65 EUR 1. 56 78 EUR 1. 69 98 EUR 1. 95 124 EUR 2. 23 156 EUR 2. 80 Format Applied Essay Type, approx. 2000 words, produced on a laser printer Deadline 12th April 2013 (No assignment will be accepted after this date) 11 MARKETING MANAGEMENTAssignment 1 The dead body stock good luck or good marketing? The body Shop may have liberal rapidly during the 1970s and 1980s, but its founder, the late Dame Anita Roddick publicly dismissed the role of marketing. Roddick ridiculed marketers for putting the interests of shareholders beforehand the needs of society. She had a simila rly low opinion of the financial community, which she referred to as merchant wankers. While things were red well, nobody seemed to mind. Maybe Roddick had found a new way of doing business, and if she had the results to prove it, who needed marketers?But how could level(p) such an icon as Anita Roddick manage indefinitely without consulting the fundamental principles of marketing? By embracing good issues, was she way ahead of her rivals in understanding the public mood, long before the major(ip) retailers piled into Fairtrade and green products? Or did the troubles that the organic structure Shop suffer in the late mid-nineties indicate that a company may publicly dismiss the value of marketing while the going is good, but sooner or later it will have to come back to earth with good old-fashioned marketing plans? Roddick had been the dynamo behind the body Shop.From her first shop, which opened in Brighton in 1976, she inspired the growth of the chain of familiar green-fronte d shops, which in 2006 comprised 2,100 stores in 55 countries around the world. She was the first to introduce socially and environmentally responsible business onto the High route and was talking about fair trade long before it became a popular corporate buzzword. Her pioneering products included naturally based skin and hair preparations, such as Fuzzy Peach Bath and rain shower Gel and Brazil Nut Conditioner. Her timing was impeccable, coming just at a time when increasingly affluent consumers were 12 ecoming concerned about animal visitationing and the use of chemicals in cosmetics. She had gone obliterate the classic market route of understanding consumer trends and and so developing the appropriate products with the right positioning. She simply had a passion for humanely produced cosmetics and was just luc ky with her timing more consumers were coming round to her view just as she was launching her business. As for planning a promotion campaign, she did not really need to do very much at all. With her boundless energy, outspoken views, and unorthodox dress sense, she was continually being talked about in the media.Her flair for publicity won free editorial space for the Body Shop worth millions of pounds. overmuch of the companys success has been tied up with its campaigning approach to the pursuit of social and environmental issues but while Roddick campaigned for everything from battered wives and Siberian tigers to the poverty-stricken mining communities of southern Appalachia, the company was facing major bothers in its key markets. Yet until the late 1990s, she boasted that the Body Shop had never been used, or needed, marketing.By the late 1990s the Body Shop seemed to be running out of steam, with sales plateauing and the companys share outlay falling from 370p in 1992 to just 65p in 2003. What was previously unique about the Body Shop was now being copied by others, for example, the Boots company matched one of the Body Shops earliest rents that it did not test its products on animals. Even the very feel of a Body Shop store including its decor, staff, and product displays had been copied by competitors. How could the company stay ahead in terms of maintaining its distinctive positioning?It causes seemed to be increasingly hostile from the real concerns of shoppers. Whilst most UK shoppers may have been swayed by a companys unique claim to protect animals, how legion(predicate) would be moved by its support for Appalachian miners? If thither was a Boots or a Superdrug store next door, why should a buyer pay a premium price to buy from the Body Shop? The Body Shop may have pioneered a very intellectual retailing formula over 20 years earlier, but, just as the product range had been successfully copied by others, other companies had made enormous strides in terms of their social and environmental awareness.Part of the problem of the Body Shop was its failure fully to understand the dynamics of its marketplac e. Positioning on the basis of good causes may have been enough to launch the company into the publics mind in the 1970s, but how could this position be sustained? Many commentators blamed the Body Shops problems on the inability of Roddick to delegate. She is describe to have spent much of her time globetrotting in support of her good causes, but had a problem in delegating marketing strategy and carry throughation. Numerous strong managers who had 13 een brought in to try to implement professional management practices apparently gave up in bewilderment at the lack of discretion that they had been given, and then left. The Body Shops experience in America had typified Roddicks pioneering style which frequently handle sound marketing analysis. She sought a new way of doing business in America, but in doing so dismissed the experience of older and more sophisticated retailers such as Marks & Spencer and the have sex Shop, which came unstuck in what is a very difficult market.The Body Shop decided to enter the US markets not through a safe option such as a joint endanger or a franchising agreement, but instead by setting up its own operation from itch fine, according to Roddicks principle of changing the rulebook and cutting out the greedy American business community, but dangerously risky. Her store format was based on the British town-centre model, despite the fact that Americans spend most of their money in out-of-town malls. In 1996 the US operations lost ? 3. 4 million. Roddicks critics claimed that she had a naive view of herself, her company, and business generally.She had consistently argued that profits and principles do not mix, despite the fact that umteen of her financially successful competitors have been involved in major social initiatives. Critics claimed that, had Roddick not dismissed the need for marketing for so long, the Body Shop could have avoided future problems but by the early 2000s it was paying the price for not having devot ed sufficient resources to new product maturation, to innovation, to refreshing its ranges, and to moving the business forward in a competitive market and fast-changing business environment.It seemed the heroes can change the rulebook when the tide is flowing with them but adopting the disciplines of marketing allows companies to anticipate and react when the tide begins to turn against them. The year 2006 turned out to be a turning point for the Body Shop. In that year, the cosmetics giant LOreal acquired the company for ? 652 million. LOreal was part have by Nestle, and both companies had suffered long disputes with ethical campaigners.LOreal had been the subject of boycotts because of its involvement in animal testing, and Nestle had been criticized for its handling of third-world producers. Ethical Consumer magazine, which rates companies ethics on its Ethiscore, immediately down-rated the Body Shop from a rating of 11 to 2. 5 out of 20, following the takeover by LOreal. A con tributor to the magazine commented about the Body Shop. I for one will certainly not be shopping there again and I urge other consumers concerned about ethical issues to follow my example. There are the great unwashed of other higher scoring ethical companies out there. 14Not be to outdone, Roddick dismissed claims that she was selling out to the two by arguing that she would be able to use her influence to change LOre al from inside(a) the company. Suppliers who had formerly worked with the Body Shop would in future have contracts with LOreal, and through an agreement to work with the company for 25 days a year, Roddick would be able to have an input into its ethical sourcing decisions. It seemed that the Body Shop was destined to become a safe, predictable company, carrying out marketing in more of the standard fashion that had allowed its new owners to grow steadily but surely over the years.Maybe the missionary zeal had long ago gone out of the Body Shop, so perhaps having new owners who placed less speech pattern on ethics would not be too great a price to pay in return for bringing the huge wealth of marketing experience of LOreal to the Body Shop. Part of the marketing experience of LOreal led it to believe Body Shop as an independent brand and to attentiveness its trusted heritage. It was aware that ecological concerns were rapidly rising up mainstream consumers concerns, and having Roddick on board would not all be good for PR, it could also change mindsets with LOreal more generally.Roddick died soon after selling out to LOreal and her obituaries agreed that she had made a difference to the world. She certainly had put enormous energy into her mission and had been lucky with her timing. However, critics were more divided on whether she was a good marketer for the long haul after all, its relatively easy to make money when the tide is going with you and your luck is in, but much more difficult to manage a changing a nd increasingly saturated m arketing environment.Like many entrepreneurs who have been good at creating things, but not so good at maintaining them, was it simply time for Roddick to hand over to classically trained marketers who could rise to this challenge? Case study review questions 1. critically assess the extent to which you consider the Body Shop to be a truly marketing-oriented organization passim its 30+ years history. (50%) 2. What are the basic lessons in marketing that the Body Shop might have taken on board in its early years in order to improve its chances of long success? (50%) 15Format Essay Type, 2000 words, produced on a laser printer Deadline 14th December 2012 (No assignment will be accepted after this date) 16 MARKETING MANAGEMENT Assignment 2 To be handed out later Format Essay Type, approx. 2000 words, produced on a laser printer Deadline 12th April 2013 (No assignment will be accepted after this date) 17 STATISTICS Assignment 1 The assignment is a development of the activities from Ch apters 1 and 2 of the workbook. It consists of (a) A short presentation made by groups of 2 or ( uttermost) 3 students based upon one of the research activities from chapter 1.This will take place during the tutorials in week 5 (week commencing twenty-ninth October) and will account for 25% of the marks for the assignment. (b) An individual report of around 1200 words submitted by each student. This will account for the remaining 75% of the marks for the assignment. The handing -in deadline for this is 19th November. Tasks 1. After forming groups of 2 or maximum 3 students, firstly you need to agree with yo ur RBD tutor which topic you are going to research from partition 1. 9 of the RBD workbook. Within a seminar group, each group of 2/3 students will research a different topic. . During your tutorial of week 5, you will present the basic facts that you have discovered to the rest of your tutorial group. This will involve an explanation of what you are researching, how you have ch osen to answer the question (for some of the activities there are various ways of measuring the results), and what your findings are. You should use visual aids e. g. slides, to help your presentation. The individual report involves a discussion of the findings in your own words plus some further research and supposition 18 3.Use the data you have collected to answer the research question chosen by your group i. e. report on what you have discovered. Basically you are repeating here, in your own words, the things that were mentioned in your groups presentation. 4. By conducting some further research from published sources, try and give an explanation for the results i. e. respond the question why? . For example, if you were asked to produce some figures on crime, you might try to explain the reasons why the figures have changed over the years, or why they are higher in certain places or amongst certain groups of people.By researching the relevant sources describe how the data were originally collected, including the sampling procedure where relevant. For example, if the figures were derived from the Opinions and Lifestyle Survey, you would be expected to obtain some information about this survey. Discuss any potential sources of error in the figures, such as reaction errors and errors caused by non-response. 5. Learning Outcomes The following learning outcomes are being assessed Collect data using radical and secondary sources. Describe the procedures involved when conducting a sample survey.Communicate findings using appropriate business formats. Allocation of marks Presentation 25 marks See the handout on Blackboard (filename Presentation assessment 2012 -13. docx) for an feature of what the assessors are looking for in the presentation. The content of the presentation carries a higher weighting than the style. Individual theme Clarity of expression, use of English, grammar Answering the research question Further research into reasons behind the results , influential factors etc. Discussion of sampling procedures and non-sampling errors. 10 marks 25 marks 20 marks 20 marksAdditional discipline Group sizes are 2 or 3. Four people = 2 groups i. e. 2 different topics. disaster to attend the presentation will result in a mark of zero out of 25. 19 An assessors report for this type of assignment is also available on Blackboard (filename RBD assessment feedback. docx). Deadline 14th December 2012 (No assignment will be accepted after this date. 20 STATISTICS Assignment 2 interrogation 1 CALCULATE 8 P 3 8 P 4 7 P 6 6 P 1 8 C 3 7 C 5 6 C 2 5 C 0 5. 9 10. 4 5. 7 6. 2 10. 7 11. 7 6. 8 11. 5 13. 1 7. 1 11. 6 13. 6 7. 8 8. 2 8. 1 4. 4 QUESTION 2 12. 3 9. 9 9. 0 a. b. c. . e. f. 5. 8 10. 1 10. 0 8. 3 12. 9 8. 8 6. 7 9. 2 7. 9 9. 4 8. 4 strike the maximum Find the minimum Find the mode Calculate the arithmetic mean Calculate the geometric mean of 5. 3 and 7. 8 and 10. 4 If the mean family size is 4. 75 what is the total population of a city of 25000 families? QUESTION 3 If the mean rate of arrival in a restaurant is 10 customers per hour, what is the probability of having 4 customers arriving in any hour? 21 QUESTION 4 Defects Workers 0-2 7 3-5 9 6-8 10 9-11 8 12-14 11 15-17 6 18-20 5 21-23 8 24-26 7 a. Calculate the arithmetic mean b. Calculate the medial . Calculate the standard deviation QUESTION 5 Listed below are the commissions earned ($000) last year by the sales representatives at the Furniture Patch, Inc. $3. 9, $5. 7, $7. 3, $10. 6, $13. 0, $13. 6, $15. 1, $15. 8, $17. 1, $17. 4, $17. 6, $22. 3, $38. 6, $43. 2, $87. 7 a. Compute the Pearsons skewness coefficients. b. What is your conclusion regarding the skewness of the data QUESTION 6 A box contains 20 balls of which 2 are red, 5 are black, 5 are sacrilegious and 8 are green. A ball is drawn at haphazard from the box the color is marked each time and then placed back in the box.The examine repeated three times. Find the probability that (i) All are red . (ii) Neither is black. (iii) One black, one is blue and one red. (iv) At least one red. 22 QUESTION 7 Find the correlation amidst the 2 stock prices for the period given. Draw a graph showing the correlation between the two stocks and briefly explain your answer. Day 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Stock A 12. 4 12. 5 12. 9 12. 1 11. 8 12. 3 11. 4 11. 0 10. 4 10. 4 10. 8 10. 1 10. 2 9. 4 Stock B 31. 0 31. 4 30. 4 30. 0 28. 7 28. 9 29. 2 27. 8 27. 0 27. 2 26. 9 26. 2 25. 0 25. 7QUESTION 8 A company wants to estimate the relationship between its countrys quarterly Growth Domestic Product (GDP) and quarterly net income margin ((Net Income/Sales)*100). Calculate the intercept and the slope and explain the relationship. Quarter GDP % 1 2. 4 2 2. 1 3 2. 0 4 1. 8 1 0. 9 2 1. 3 3 1. 9 4 1. 8 1 2. 3 2 2. 9 3 2. 1 4 2. 2 NI margin % 0. 32 0. 78 0. 67 0. 44 0. 91 1. 10 0. 80 0. 87 0. 78 1. 3 0. 83 0. 84 23 Format serviceable/Calculations, produced on a laser printer Deadline 12th April 20 13 (No assignment will be accepted after this date) 24