Thursday, October 31, 2019

Advice for the Critique of an Academic Journal Article

Advice for the Critique of an Academic Journal - Article Example is, the emphasis is on collecting various manifestations of INV, which the authors divide into three groups: â€Å"born global,† â€Å"born again global,† and â€Å"born international.† (Gabrielsson et al., 2014, p. 450). In the given theoretical framework, the authors use data from several case studies from mostly developing firms in knowledge-intensive sector. So, it is crucial to discuss validity, reliability, and transferability of the given support to the main idea. Based on the presented theoretical assumptions, the discussion seems reasonable. In particular, the examples of real activity fit the theoretical assumptions of its entrepreneurial features. In other words, case studies make the findings on causal relationship between the enterprise and opportunism to be â€Å"really about what they appear to be about† (Saunders et al., 2009, p. 157). Although, the presented data has doubtful actuality. Even though the article was published in 2014, the authors finished their interviews with founders and CEOs before 2011 (Gabrielsson et al., 2014, p. 451). Thus, the data omits recent challenges; for instance, the impact of global economic crisis in 2012. Nevertheless, analysis is deep and comprehensive. In fact, the authors highly value their choice of multiple case studies as they â€Å"are expected to be valid† (Gabrielsson et al., 2014, p. 451). So, the illustrative capacity of above-mentioned evidence is strong, as it has convincin g literature basis and numerous sources of practical evidence; in fact, it seems to be a pioneer research combination in the field. As for reliability of the evidence, it reveals its limits. By being the only source of presented data, multiple interviews with key actors make the selection bias is inevitable. In this context, classification of paths imposes the limit on number of cases. At the same time, this approach increases an accuracy of presented data. Actually, authors achieved their aim to create â€Å"a more holistic and contextual

Tuesday, October 29, 2019

Explore how Goldings categories of thinkers build upon Platos Essay

Explore how Goldings categories of thinkers build upon Platos discussion of the soul as it journeys into the light and out of the light - Essay Example Goulding argues that detachment from the popular perception of reality takes an individual to the grade-one level of thinking, while blindly following the norms would be an attribute of grade-three thinkers. Similarly, in the ‘Allegory of the Cave’, Plato narrates that once a prisoner had been freed, he understands the reality behind the shadows. In this context, it is crucial to understand Goulding`s attribution of grades to the people. His obsession with ‘thinking’ led him to the conclusion that he himself cannot think at all. It was back in school when he observed the statuettes of his headmaster who had asked him, â€Å"Don`t you ever think at all?’. He sought inspiration from his teachers to initiate the process of thinking, which seems too complex at the time. He was even more confused when he realized that those who claimed to think themselves exhibited self destructive behavior for instance drinking, or staring at attractive women. These kinds of people are attributed as grade three thinkers, who according to Goulding are â€Å"all shouting the same thing, all warming their hands at the fire of their own prejudices†. He then says that grade two thinkers are self-contradictory as he observed in conversation with Ruth who was a Methodist by religion and followed all its ideals blindly. He fo und the courage to question her beliefs and bluntly ranting them out to her, thus claiming himself to have turned into a grade two thinker. It was when he met the German Professor Einstien who had fled from the Nazis that he claims to have become have understood what grade-one thinkers would be like. These people, quite rare in existence, question the norms and value the truth as opposed to perception and thus, their lives are characterized by wisdom, truth and knowledge. Also, by the end of the essay Goulding Claims that

Sunday, October 27, 2019

DDS Based Communication Middleware

DDS Based Communication Middleware CHAPTER 1 INTRODUCTION â€Å"Data Distribution Service based communication middleware† to addresses the communication needs of distributed applications. Middleware placed between a software application and the operating system as shown in Figure 1.1[33]. Network middleware segregates the application from the subtle elements of the underlying computer architecture, operating system and network stack. Figure1.1 Middleware (Software layer between OS and application) Network middleware simplifies the development of distributed systems by allowing applications to send and receive information without having to program using lower-level protocols such as sockets and TCP or UDP/IP. Key benefits of a middleware are: Reduce the likelihood of a fault. Perform complex one-to-many and many-to-many network communications. Customize application operation to meet various real-time, reliability, and Quality-of-service goals. Communicating application is entirely decoupled. Middleware Technology Overview Most of the contemporary Message Oriented Middleware has been built around a well-defined and much accepted standard from OMG namely the OMG DDS (Data Distribution Services). This section attempts to give a brief overview of this technology. The Data distribution service is an Object Management Group’s middleware standard that specifically aims to enable high-performance, real-time data between publisher and subscriber. Advantages The DDS middleware is well known â€Å"publish-subscribe† communication paradigm. The middleware is adaptable and has a versatile structural planning that backings auto-discovery of new endpoint applications. DDS middleware has low overhead is utilized with elite systems. DDS based middleware supports Deterministic data delivery. DDS middleware is dynamically scalable depending on requirement. DDS middleware is productively utilizes the more data transfer capacity. DDS middleware not only supports one-to-one it should also provide communication for one-to-many, many-to one, and finally many-to-many communications. Publish-subscribe applications are commonly dispersed applications with endpoint nodes that communicate with one another by sending (publishing) information and accepting (subscribing) information namelessly. Generally the main property a publisher needs so as to communicate with a subscriber is the name and meaning of the information. The publisher does not require any data about the subscriber, and the other way around. The length of the intrigued applications recognize what information is being conveyed, publisher subscribe framework is fit for conveying that information to the fitting nodes without needing to set up individual associations. Publisher is in charge of get-together the fitting information and sending it out to every single enrolled subscriber. Subscribers are in charge of getting data from the proper publishers and exhibiting the information to the intrigued client application. Data-centric driven correspondence gives the capacity to indicate different parameters like the rate of production, rate of membership, to what extent the information is legitimate, and numerous others. These Quality of Service (QoS) parameters permit framework architects to develop a disseminated application in view of the prerequisites for, and accessibility of, every particular bit of information. 1.2 Problem Statement for the project The most existing conventional middlewares which are used for exchanging the data are broker oriented approach (Fig 1.2). Publishers sends the message to the most error free delivery service and more over it is send to broker and subscribers which meant to read the message should register memberships with the broker before reading the message sent by the publisher. The membership is applicable for specific message. Here the functionality of the broker is to hold and send the message from sender to receiver. The Subscribers to read the message enroll for membership for particular messages either at build, initialization or runtime. In short without the broker there is no chance for sender and receiver to exchange the message which is not a better option. Figure 1.2 Existing Broker based Architecture 1.3 Aim of the present Project The project aims to design communication middleware based on a data-distribution service which supports a decentralized broker-less architecture. DDS standard is a absolute data-centric publisher-subscriber message exchange approach. Here the emphasis is on client characterized information (the information model). The unit of exchange in this sort of framework is information esteem. The middleware comprehends the connection of the information and guarantees every intrigued subscriber has a right and reliable perspective of the data. 1.4 Proposed System The proposed system for this project is a decentralized no broker approach building design for empowering consistent messages are exchanged between publisher and subscriber. Data Distribution Service is in view of the thought of a virtual Global data space where publishers enter the new values to the data space and subscribers read the values from the data space. A data model comprising of named topics, their client characterized information sorts and related QoS is utilized to by the DDS framework to control how data is shared. DDS connects publishers to subscribers over the information transport as demonstrated as follows. Figure1.3 Global Data Space for DDS middleware 1.5 Purpose of this Project The purpose of this project is development of technologies and solutions that can be leveraged for the Integration of various components built on different platform. Integration solution should be scalable to accommodate futuristic requirements in the distributed computing. The objective includes development of Message oriented middleware (MoM) leveraging suitably ruggedized versions of Internet protocols (TCP/IP) that are robust under tactical networking constraints which will provide seamless communication between the heterogeneous systems. The middleware should expose standard interfaces to which the application can be hooked and achieve desired levels of interoperability and integration with the help of XML format of messages. The middleware should be portable for the various operating systems. MoM should benefit the end user in supporting large scale system integration via communication infrastructure. 1.4 Organization of the report This section is intended to give a brief overview of the structure of this document and the composition of each chapter. 1.5 Summary In this chapter an overview of the project is described namely, Introduction about Data distribution service communication middleware involving definition and key benefits of middleware, Problem statement which gives main drawback of existing approach for communication between publisher and subscriber i.e. existing approaches are broker based, Aim of the project proposed system is broker less approach between publisher and subscriber i.e. there are no intermediate messaging agents between publisher and subscribers and Purpose of this Project development of technologies and solutions that can be leveraged for the Integration of various components built on different platform. Dept of ISE, NHCE 2014-15Page 1

Friday, October 25, 2019

George Orwell’s Down and Out in Paris and London Essay -- Down and Out

George Orwell’s Down and Out in Paris and London Days without food, nights without shelter and clothes without buttons are reality for homeless people around the world. Many are incapable of escaping their poverty and can not seem to find a way out of their bleak oppression. The few that do escape often help each other find a way to make their lives better and do not forget how to maintain friendships. George Orwell’s novel, Down and Out in Paris and London, displays the ability of those in poverty to escape their horrific lot in life through friendships and connections. The common goal of shelter and freedom from oppression bonds many of the lower class. Many in poverty work together to find the best means to achieve their common goal through locating employment and safe places to sleep. Orwell tries to display the lower classes sense of friendship and commitment though his interactions with the people he meets while in poverty. The individuals he describes have the same dismal prospects and must try to find a way to overcome poverty. It is the common goal of freedom from oppression that bonds many of the lower class to work together to break free. Orwell’s experience in poverty helps him gain a strong understanding of class structure and the separation of the classes. The realization that many in poverty do not deserve to be oppressed causes Orwell to take political action and to search for a way to help those in oppression. With Orwell’s strong examples of the lower class working together, he tries to display his belief that a socialistic society can solve the separation of classes. Many of the lower class band together to survive in an inhospitable world. While in poverty, Orwell experiences first hand the b... ...truly progress. This realization helps Orwell develop many of his socialist views. Orwell wants to demonstrate that those in poverty are often forced to lead that lifestyle and can not better their societal position because of the government. The need to change the governmental system is critical to truly change society and to work towards a brighter and more equal future. Orwell’s experience in poverty opened his eyes to the disparities in classes, but more importantly, the ability of those in poverty to bond together to overcome oppression set an example that awakened an individual’s desire for governmental change. Works Cited - Beadle, Gordon B. â€Å"George Orwell’s Literary Studies of Poverty in England.† Twentieth Century Literature 24.2 (1978): 188-202. - Kazin, Alfred. â€Å"Not One of Us.† The New York Review of Books 21.10 (1984): 13-18.

Thursday, October 24, 2019

People With Disabilities

The nature, causality, assessment, prevention, accommodation, and my personal reflection of the hearing loss will be discussed in my paper. I. Nature of the Exceptionally: According to Gallaudet University, approximately 1 of every 1,000 infants is born deaf while 6 of every 1,000 are born with some degree of hearing loss. Permanent hearing loss at birth annually affects 24,000 infants in the USA. In other words, 6 infants per 1,000 will have a hearing loss in a least one ear that will affect communication, cognition, and educational development. Twenty to thirty percent of hearing loss in children occurs during infancy and early childhood. Some will suffer hearing loss in one ear or possibly both. There are different types of hearing loss. A conductive hearing loss occurs in the middle ear. This is where three small bones involved in hearing are located. A hearing loss that occurs in this part of the ear is usually temporary. A chronic or recurrent ear infections may cause a hearing loss in the middle ear. There are cases where there is a malformation in this area that can be improved or corrected through surgery. There are occasions when a problem in the middle ear can not be corrected. A sensori-neural hearing loss occurs in the middle ear and indicates that there is nerve damage. This type of loss is not reversible. In summary, there are different natures of hearing loss some that can be corrected or others that are irreversible. II. Etiology/Causality: Parents sometimes ask Why did this happen to my child In some cases, the cause of a childs hearing loss may be easy to trace. There may be a family history of deafness, a congenital condition, an illness, an accident, a prescribed edication, etc. that may obviously be cause of the hearing loss. In many cases, there may be no obvious reason for the hearing loss. Parents must come to understand that they may likely never know the cause of this hearing loss. In my case, Meningitis was the cause of my hearing loss. When I was one year old, I was not responding to my parents calls. They took me to the hospital to get tested and found that I had Meningitis. III. Assessment Many birthing facilities in our country have currently adopted the Universal Testing of all infants for hearing loss. The two most frequently used measures for testing infants are the ABR (Auditory Brainstem Response) and Otoacoustic Emissions (OAEs). Both measures can be made on an infant while he or she is sleeping and requires no response from the child. The ABR monitors brain activity. It looks specifically, however, the activity that happens in response to sound. OAEs are a quick, non-invasive probe measure that determines cochlear, or inner ear, function. The importance of early childhood development is critical for a child with a hearing loss. Early diagnosis and intervention of hearing loss can mean the difference etween toddlers entering school with severe language and concept delays versus children with age appropriate language and concept development. Early hearing screening paves the way for children to be able to begin life on an equal footing with their hearing peers. Recent research at Gallaudet University indicates that children whose hearing losses are identified in the first 6 months of life, and who receive intervention services, developed language within the normal range. IV. Prevention/Remediation/Accommodation: The law mandates that public schools are responsible for providing an appropriate education ithin the childs neighborhood school. School districts are required to educate students the least restrictive environment with the related services necessary to allow for their success. Some counties/states will have what is called cluster programs. This is when classes for the deaf or hard of hearing are located in specific schools. Students can be in an environment with a teacher of the deaf and hard of hearing and deaf and hard of hearing peers but also be in a regular school setting. Another options for family is a school for the deaf. Most schools for the deaf now offer different communication options rom which a family can choose. Schools must take language and communication needs, opportunities for direct communications with peers and professional personnel in the childs language and communication mode, academic level, and full range of needs, including opportunities for direct instruction in the childs language and communication mode into consideration. This does not mean that the peer will also have a hearing loss but should be able to communicate in the deaf or hard of hearing childs mode of communication. Many parents choose to have their children in a setting where other deaf and hard of earing students are also in attendance thereby allowing for friendships with other deaf and hard of hearing students to develop naturally. Teacher may need to adjust their classroom to meet the students needs. The teacher must focus on reducing background noises as much as possible. To reduce background noises the classroom can have carpeting, area rugs, or drapes. If the classroom do not have drapes, tennis balls can be attached to the bottom of chair legs to stop chairs from scraping on the floor. Noise absorbing material such as a corkboard can be added to the classroom as well. The teacher should consider background noise when choosing the childs seating placement. The school should adjust their teaching strategies to accommodate their students needs. When teaching in the classroom, the teacher needs to remember that a hearing aide do not correct hearing in the same way that eyeglasses correct vision. When speaking to the class, the teacher needs to be in a distance where the child will be able to understand speech and speak at a normal tone. They need to remember that the deaf or hard or hearing child may have fluctuating hearing oss as a result of colds or ear infections changing what we can hear from day to day. There are communication options that teachers can use in the classroom. American Sign Language (ASL) is a manual language that is distinct from spoken English. Extensively used within and among deaf community. English is, however, taught as a second language. Closed Captioning is way of communication used on the television set. Words appear on the bottom of the screen to communicate to a deaf or hard of hearing student. Another form of communication is an interpreter. Interpreters are used for deaf and hard of hearing students to communicate in ASL what the teacher is discussing. Total Communication is the philosophy of using every to communicate with deaf and hard of hearing students. The child is exposed to a formal sign-language system, finger spelling, natural gestures, speech reading, body language, oral speech, and use of amplification. The idea is to communicate and teach vocabulary and language in any manner that works in the classroom. V. Personal Reflections: When I wrote this paper, I have never given my culture background any thought. Deaf culture is part of my ife. I have basically been raised in more of a hearing culture setting then a deaf culture setting. I went to school with my hearing peers but yet had many deaf friends. I went through the nature, causality, assessment, and the accommodation discussed in this paper. I have experienced this first hand and am lucky to have this support. Deaf and hard of hearing has their advantages. We have a right to sit up front at a concert or event. We can also shut people out by just switching off our hearing aides. Being part of the Deaf community is a great experience and I would not change that for the world.

Wednesday, October 23, 2019

Nacl on Peroxidase Activity

NaCl Effects on Peroxidase Activity My experiment was to see if adding NaCl to solution would have any effects on peroxidase activity. The materials that were used in this experiment were pH 7 buffer(DI water), peroxidase, NaCl, guaiacol and hydrogen peroxide; added in that order. Blanks were created for each NaCl concentration, 0%, 5%, 7. 5% and 10%. Each cuvette had . 5ml of pH 7 buffer, 1ml of peroxidase, . 02ml guaiacol for the experimental cuvettes and 0ml of guaiacol for the blank cuvettes, . 2ml of hydrogen peroxide and . ml of different concentrated NaCl in each cuvette. When it came to recording data for my experiment, I placed the cuvette in the spectrometer, which was set to 500nm, after adding the guaiacol and hydrogen peroxide right before. I recorded the absorbance every 15 seconds for 3 minutes. I ran the experiment twice for precision and got the average of the two tests. I then entered the data into JMP and made two graphs; one to see the relationship between the con centration of NaCl and activity and the other to see how salt affect enzyme activity.The first graph only required the time and the mean absorbance. To make the second graph, I had to find Time X, the time where reaction starts to slow down, which in my case was 90 seconds. The axes for the graph were Time X as the y-axis and NaCl concentrations as the x-axis. The graphs showed me that there is a relationship between NaCl concentrations and peroxidase activity. More the concentration of NaCl, the faster the reaction occurs.

Tuesday, October 22, 2019

The Nighttime Sky Holds Many Stars

The Nighttime Sky Holds Many Stars The nighttime sky looks like it has millions of stars visible to observers. Thats because we live in a galaxy that has hundreds of millions of them. However, we cant really see all of them with the naked eye from our backyards. It turns out that the skies of Earth have, at most, around ten thousand stars that can be spotted with the naked eye. However, not everyone can see all the stars; they see only whats overhead in their own region. Light pollution and atmospheric hazes reduce the number of stars that can be seen even more. On average, however, the most anyone can really see (with very good eyesight and from a very dark viewing area) is around three thousand stars. People living in very big cities still see a few stars, while those in country areas away from lights can see more.   The best places to see stars are dark-sky sites, such as Canyonlands National Park or from onboard a ship in the middle of the ocean, or high in the mountains. Most people do not have access to such areas, but they can get away from most city lights by going out into the countryside. Or, if viewing from in the city  is someones only choice, they can pick an observing spot that is shaded from nearby lights. That increases the chances of seeing a few more stars.   If our planet was in a region of the galaxy with a lot more stars, chances are stargazers really WOULD see tens of thousands of stars at night. Our section of the Milky Way is, however, less well-populated than the core for example. If our planet could be in the center of the galaxy, or perhaps in a globular cluster, the sky would shimmer with starlight. In fact, in a globular cluster, we might never have dark skies! In the center of the galaxy, we might be stuck in a cloud of gas and dust, or perhaps be subjected to forces from the black hole at its heart. So, in a way, while our location in the outskirts of the Milky Way reveals fewer stars to stargazers, its a safer place to have a planet with dark skies.   Stargazing Among the Visible Stars So, what can be learned from the stars that observers CAN see? For one thing, people often notice that some stars appear white, while others are bluish, or orangey or reddish.   Most, however, appear to be a dull white.  Where does the color come from? The stars surface temperature gives a clue- the hotter they are, the more blue and white they are. The redder they are, the cooler they are. So, a blue-white star is hotter than a yellow or orange star, for example. Red stars are usually fairly cool (as stars go). Its important to remember, however, that a stars color isnt vivid, its more likely very pale or pearlescent. Also, the materials that make up a star (that is, its composition) can make it look red or blue or white or orange. Stars are primarily hydrogen, but they can have other elements in their atmospheres and interiors. For example, some stars that have a lot of the element carbon in their atmospheres look redder than other stars.   Figuring out Brightness of Stars Among those three thousand stars, observers can also notice differences in their brightnesses. A stars brightness is often referred to as its magnitude and thats simply a way to put numbers to the different brightnesses we see among all the stars. What affects that brightness? A couple of factors come into play. A star can look bright or dim depending on far away it is. But, it can also look bright because its very hot. Distance AND temperature play a role in magnitude.   A very hot, bright star that lies very far away from us appears dim to us. If it was closer,   it would be brighter. A cooler, intrinsically dim star might look very bright to us if it was very close by. Most stargazers are interested in something called visual (or apparent) magnitude, which is the brightness it will appear to the eye. Sirius, for example, is -1.46, which means that its quite bright. It is, in fact, the brightest star in our night sky. The Sun is magnitude -26.74 and is THE brightest star in our daytime sky. The dimmest magnitude anyone can detect with the naked eye is around magnitude 6.   The intrinsic magnitude of a star is how bright it is due to its own temperature, regardless of distance. Astronomy researchers are much more interested in this number since it gives some clue about conditions inside the star. But, for backyard stargazers, that figure is less important than visual magnitude.   While our viewing is limited to a few thousand stars (with the naked eye), of course, observers can seek out more distant stars using binoculars and telescopes. With magnification, new populations of stars widen the view for observers who want to explore more of the sky. Edited and expanded by Carolyn Collins Petersen.

Monday, October 21, 2019

Free Essays on Market Segmentation

INTRODUCTION Je Voudrais will be the pioneers in the market for creating distinctive and indulgent taste experiences by marketing to an untapped segment - the adult soft drink consumers. The Je Voudrais brand will quickly developed a loyal following. Its early success was created by word of mouth and praise. Without the benefit of advertising the story of an incredibly rich and healthy drink spread rapidly. At first, it was only available at gourmet shops but soon distribution expanded. Since then, it has become a global phenomenon. Soft Drink lovers the world over now recognize the unique Je Voudrais logo as synonymous with the ultimate super-premium soft drink. However, for the company to reach where it is today, a sincere marketing effort was undertaken from its early days to understand customers and their needs. Since the beginning, Je Voudrais has kept a keen focus on developing an internal Developing the brand with an attached history of perfection and luxury Using the finest ingredients to deliver product excellence Invested in consumer research to understand tastes and preferences of customers Used selective distribution and did not mass market until the minimum critical mass of opinion leaders were established Did not change their objectives in between Used creativity and innovativeness to support brand identity FOCUS ON CUSTOMER NEEDS Je Voudrais continuously researches its market because this is exactly what got them into the business in the first place. Effective marketing is based on three key elements, the marketing philosophy, market segmentation and consumer behaviour. Je Voudrais has been noted to practise the consumer-driven philosophy whereby they rely on research to discover consumer preferences, desires and needs before produc... Free Essays on Market Segmentation Free Essays on Market Segmentation INTRODUCTION Je Voudrais will be the pioneers in the market for creating distinctive and indulgent taste experiences by marketing to an untapped segment - the adult soft drink consumers. The Je Voudrais brand will quickly developed a loyal following. Its early success was created by word of mouth and praise. Without the benefit of advertising the story of an incredibly rich and healthy drink spread rapidly. At first, it was only available at gourmet shops but soon distribution expanded. Since then, it has become a global phenomenon. Soft Drink lovers the world over now recognize the unique Je Voudrais logo as synonymous with the ultimate super-premium soft drink. However, for the company to reach where it is today, a sincere marketing effort was undertaken from its early days to understand customers and their needs. Since the beginning, Je Voudrais has kept a keen focus on developing an internal Developing the brand with an attached history of perfection and luxury Using the finest ingredients to deliver product excellence Invested in consumer research to understand tastes and preferences of customers Used selective distribution and did not mass market until the minimum critical mass of opinion leaders were established Did not change their objectives in between Used creativity and innovativeness to support brand identity FOCUS ON CUSTOMER NEEDS Je Voudrais continuously researches its market because this is exactly what got them into the business in the first place. Effective marketing is based on three key elements, the marketing philosophy, market segmentation and consumer behaviour. Je Voudrais has been noted to practise the consumer-driven philosophy whereby they rely on research to discover consumer preferences, desires and needs before produc...

Saturday, October 19, 2019

Capital Aasset Pricing Model and Techniques

Before understanding the relationship of sensitivity analysis to capital budgeting it is very important to understand the concept of capital budgeting and sensitivity analysis. Capital budgeting is a procedure which helps the businesses to take decisions with regards investing into a project or not. Basically it helps to determine the investment that an entity has to make in a particular project and the expected revenue and income that the project will generate in future for the entity. Sensitivity analysis is nothing but a method which helps to analyse the same in detail so that a more sound decision can be taken with regards the same. Sensitivity analysis helps the organization to gauge into various scenarios and circumstances with regards the project in case the estimates and circumstances do not fall into place and become undependable. It is basically changing the assumptions and applying a hit and trial method to the calculations basis the changed assumptions so as to find out the expected result out of such a change. Thus in this manner the decision makers can give a second thought before investing in their money (Koening, 2015). They can come to know what losses they may have to suffer by investing in any project basis this assumptions and estimate. The said analysis highlights upon the modification in the input that would affect the net result from any project. Change is constant and hence variations will happen to the base suppositions and it is this alteration which the sensitivity analysis details about. It helps to find out the most favourable levels of inputs in a project. Therefore this is a statistical analysis of the data basis changes in the numbers such as quantity and prices. Thus sensitivity analysis details about finding the extent to which changes can be made to the input factors so that the ultimate result remains unchanged. Thus sensitivity analysis helps in capital budgeting because of the following reasons: Helps in taking a more sound decision and thus testing the results in a more detailed manner. Helps to detect errors and thus try to mitigate the same Helps to develop the model more accurately by detecting errors and trying to find solution to mitigate those errors. Develop a will knitted linkage between the input and the output variables. Therefore it is understood that the main purpose of this analysis is not assess risk but to make certain the receptiveness of the NPVs to the various variables which help to calculate it. The same is because NPV is calculated basis assumptions which is why the scenario in which capital budgeting decisions are taken is uncertain (Zhamoida, & Matsiuk, 2011). It is the most acceptable method of analysis of various changes one by one in the variables and the assumptions being made which would in turn have a bearing on the cash flow and the return from a project. As the name suggest, scenario analysis helps in taking capital budgeting decisions and techniques by taking into account unconventional possible results. The analysis is conducted in a fashion which would help to find out the net result due to an action or activity under various other set of factors such as how an NPV of a project would differ if the inflation shoots up or down. However it is equally important to know that scenario should be such which can exist in actual sense and not fictional in nature. Generally three kinds of scenarios are considered good, base and worst for computing the NPVs of a project (Boundless.com., 2012). It is an analytical tool unlike the sensitivity analysis which uses statistical tool. After the NPVs are computed then a probability of occurrence of such a scenario is allotted to ease situation and then the expected NPV and standard deviation of the NPV is calculated. This is known as coefficient variation and a CV of 1 is considered to be ideal. However on comparing the two CV basis the scenario then the one with a lower CV is considered to be more preferable than the one with a higher CV. Thus it can be said that scenario analysis although is also a behavioural approach similar to sensitivity analysis yet the former defines the capital budgeting techniques more broadly. It takes into consideration various variables together such as cash inflows, outflows and cost associated with capital invested. For example an entity should take into consideration both high and low inflationary factors and compute the implication of the same on the project’s Net present value. Each situation will affect all the above mentioned variables at the same time thus resulting into differing levels of NPV. Thus giving the decision makers a more detailed method of analysing the capital budgeting techniques used by organizations before investing into a project. Furthermore scenario analysis used in various capital budgeting techniques helps to give a summary about the risk associated with the various assets wherein the assets with higher risk will have more volatile values and vice versa. Scenario analysis entails how much economic sense does it make in investing into any project for an organization. Further by doing the analysis taking into consideration the worst scenario as well, one can take proactive measures to try to reduce the risks associated with the worst scenario   (Kengatharan, 2016). Thus on a summarizing note one can say that scenario analysis helps in detailing investments during situations which are even unfavourable in nature. It helps to find solutions during worst cases also thus trying to consider investment in various projects minutely. Definition of the Capital Asset Pricing Model: The said model is built on the Markowitz’s mean-variance-efficiency model where the patrons who are reluctant towards taking risk on investments are concerned only about the returns and the profits they expect from their investment and the difference of returns and risk. Thus the said model defines the linkage between the return and risk associated with an asset. It enables determination of the appropriate required rate of return of an asset but only in theory. It helps to take calls about addition of assets or more investment securities to an already diversified portfolio (Fama & French, 2004). The graphical representation of the formulae of CAPM is known as the security market line. Definition of Capital Market line: The Capital Market Line is plotted on the capital asset pricing model which helps to illustrate the rate of return that could be expected to receive from a well built portfolio but depending upon the level of risk associated with the portfolio of the entire market and the risk free rate of return. It is a digression from the point of interception found on the efficient frontier stretched towards the return expected from an investment which is equivalent to the risk free rate of return. There lie a number of differences between the two mentioned terms. Similarities also exist but the same is very few in comparison to the differences. The similarities between a CAPM and CML would be discussed in the form of a relationship that exists between the Capital market line and the Security market line which is a graphical representation of the CAPM. The SML is considered to be an integral part of the CML in a Capital Asset Pricing Model specifically when the risk attached to a security or an investment is computed. Their relationship depicts the similarity as one shows the risk associated with individual securities whereas the other considers these individual securities and forms the entire portfolio.   Thus performance of a single security will impact the performance of the portfolio as well. Therefore we can say that both these help to depict the association of risk with various investment securities as well as portfolio as a whole. Thus the similarity is such that both the CML and SML hypothesize a straight line association between risk and return. The CML and SML also talks about systematic risks and portfolios whic h are risk free although the SML also includes the inefficient portfolios as well. Just as their exists a relationship between CAPM and CML due to similarities between the two, similarly the two concepts differ amongst each other for various reasons illustrated below. The CML is a line that depicts the rate of return which is dependent upon the rate of return which is free from adequate risk and the level of risk for various investment groups. However CAPM or the SML line used to represent the CAPM formulae is a graphical presentation of the risk and return in a market at a particular point of time. The measurement of risk factors is another difference between the two concepts. The CML uses standard deviation to gauge risk whereas for CAPM the risk factors are firmed via the beta coefficients. Therefore the former is a measurement basis which risk is calculated in totality whereas the later tells about the contribution of the security or the investment towards the risk on the entire portfolio. CML portrays only portfolios which are competent and proficient whereas the Security Market Line used to depict the CAPM, portrays both competent and non-competent portfolios. While calculating the return, the Y Axis depicts the return anticipated from a portfolio in case of a CML and the return that the individual investments gives are shown by the Y axis in case of the SML. The X axis of CML depicts the standard deviation whereas the X axis of the SML depicts the Beta of the shares and individual investments. The two axis is well depicted in the graphs below of both CML and SML wherein the horizontal axis of the SML depicts the methodical risk and that of CML is overall risk. The CML establishes the portfolio of the entire market and such assets which are free from any risks, SML establishes all the factors associated with investments made (Campbell, 2013). Boundless.com., (2012), Scenario Analysis, Available at https://www.boundless.com/finance/textbooks/boundless-finance-textbook/the-role-of-risk-in-capital-budgeting-12/scenario-and-simulation-assessments-99/scenario-analysis-427-7232/ (Accessed 19 th January 2017) Campbell, B., (2013), CAL vs. CML vs. SML., Available at https://luckyhy.weebly.com/uploads/3/9/3/2/39328787/cal_vs._cml_vs.pdf (Accessed 19th January 2017) Fama, E.F., & French, K.R., (2004), The Capital Asset Pricing Model: Theory and Evidence, Journal of Economic Perspectives, vol.18, no. 3, pp. 49-51 Kengatharan, L., (2016), Capital Budgeting Theory and Practice: A Review and Agenda for Future Research, Applied Economics and Finance, Vol. 3, no.2, pp.15-38 Koening, E., (2015), Sensitivity Analysis for Capital Budgeting, Available at https://smallbusiness.chron.com/sensitivity-analysis-capital-budgeting-10153.html (Accessed 19th January 2017) Zhamoida, O.A., & Matsiuk, M.S., (2011), Sensitivity Analysis in Capital Budgeting, Economic Herald of the Donbas, vol.4, no.26, pp.132-136

Friday, October 18, 2019

The Bridge Project Essay Example | Topics and Well Written Essays - 1250 words

The Bridge Project - Essay Example The Bridge Project Economics We will ensure that the cost is as low as possible by first, limiting the weight to 254.9 or below then use both glue and sticks in reduced quantity. The truss bridge that we managed to design had its cost greatly reduced. It will therefore, require several joints hence will not be much effective. Load Since the higher the load the more successful the structure will be, we managed to make the normal bridge structure withstand the weights easily. We also managed to lower the tensional and compressional force, which will be adjusted by increasing overlaps to the high beams. Aesthetics The more appealing to the eye a bridge is, the more it will be used. We plan to make our bridge very attractive by even introducing advertisement pictures on it. Ease of construction Since we only have a short time for this project, it must be easy to construct. This will allow us to carry out this project with minimal errors. We managed to design a bridge without many complexities but with seve ral parts. This will also enable to build it without much flaws. There were several alternatives that we could choose from based on the sustainability of engineering materials i.e. strength, recyclability and cost effectiveness. However, we had to choose an alternative, which was very economical, simple and strong. The main factor that we had to consider was that the material had to be readily available and be relatively cheap for us to afford. Moreover, it had to be stronger to sustain the expected load. Selection of the Bridge type We settled for the sticks bridge due to its strong nature, simplicity and cost effectiveness. It is less expensive to construct yet can still hold the weight quite well. All the rest were weaker compared to these two. Thus, these two were more sustainable than the rest. Prototype construction We curved the top and the bottom into their maximum heights, directed the beams towards the center, and had the cross section at the middle. It was constructed to meet the minimum requirements for width and height. The weight was set at 140.4 gm. and had load to weight ratio of 105:7. Estimated load capacity This was established by the breaking point of the design’s beam. In addition, it was determined by comparing the previously tested ones with our bridge. Prototype testing We used two beams to place the bridge 29 inches apart. Then added a wooden block on it and hang a chain from it. We then added a bucket below it to add the weights. Prototype performance It managed to hold 32.72 lbs. and broke at the point where the height begun reducing and at the joint right above it. Results The bridge held on to the weight as required but broke when the weight was increased. For the bridge to support more weight we need to add more support beams and change the materials used to construct the bridge. Discussion Shorter distances between the beams that supported the bridge are needed to make the bridge more strong. This will help in distributing the weight evenly on the bridge the beams will increase the load capacity by twice. The chain that was used before needed a change. A stronger chain that can withstand a higher strain is needed. With the extra beams, the bridge is bound to be heavier. Changes are needed in all materials used. The wooden block that was on the other bridge needed a change.

Pressure Ulcers Risk Management Essay Example | Topics and Well Written Essays - 1500 words

Pressure Ulcers Risk Management - Essay Example Apart from being static in a position there are some other reasons responsible for this like fragility of skin, chronic problems like diabetes, lack of nourishment, mental disability, incontinence or old age. Pressure ulcer management has definitely changed dramatically over the last 3 decades or so. Earlier, pressure ulcers did not receive much attention and they were treated with betadine, maalox, heat lamps and there were no low air loss beds. After the works of Braden and Bergstrom, pressure ulcers began to receive the attention deserved. Still lot of work is yet to be done to get the word out. That is why this project needs to be taken up. In year 2000-2002, there were 474,692 new cases of pressure ulcer( Patient safety in American Hospitals, Health Grades 2004) it is about 0.17% incidence rate. Out of this 13.13% of pressure ulcer cases resulted in death. 34,320 deaths due to pressure ulcer were attributable to patient safety. It also has a cost factor to it. In the year 200-2002 in US, $2,574.02 million were spent to treat pressure ulcers. At the same time $2.57 were spent to prevent pressure ulcer. (WD) Regulatory agencies such as CMS, JCAHO & the State Departments of Health consider pressure ulcers to be preventable and so nosocomial pressure ulcers are the fault of the facility or agency in which they occur. Nursing Homes receive citations, fines and even criminal charges for these types of wounds. Patients sue facilities and nurses and win. This is such a hot topic that all the agencies that deal with this problem are busy updating information, preventative measures and heightened awareness. If a streamlined process can be developed that addresses education and a nursing focused approach, perhaps we will see a drop in pressure ulcers. The National Pressure Ulcer Advisor Panel (NPUAP) has recently (Feb 2007) released some updates. The staging system was updated to both clarify the four stages AND name deep tissue injury into the staging system. They have also added the definition of pressure redistribution to replace the old pressure reduction and pressure relief definitions. Thi s was mainly due to new findings associated with shearing injuries.CMS is changing reimbursement on nosocomial pressure ulcers. Basically, CMS will reimburse to acute care facilities for pressure ulcers if the patient was admitted with the pressure ulcer, but if it is a nosocomial pressure ulcer then CMS will not pay. JCAHO has added pressure ulcers to the 2008 National Patient Safety Goal list for long term care:- "Goal 14 Prevent health care-associated pressure ulcers (decubitus ulcers). 14A Assess and periodically reassess each resident's risk for developing a pressure ulcer (decubitus ulcer) and take action to address any identified risks." Braden scale Braden Scale is a clinically validated tool used in the medical profession to get a reliable score of the risk level for developing pressure ulcers in a patient. With its help even those nurses who do not have uniform level of experience and capacity of judgment, can have consistency in identifying the risk level of the patient. This also helps them to monitor their patient care in a busy schedule. It also helps them to pay appropriate attention to the six specific risk factors.

Is Infant Industry in Vietnam A Good Idea Essay

Is Infant Industry in Vietnam A Good Idea - Essay Example The researcher states that international trade is deemed as one of the essential steps towards success in the global industry. It is also expected that trade liberalization could alleviate poverty rate in the country. On the downside, there will always be an increasing demand from developed, First World countries towards excessive liberalization of foreign imports and investment. In some cases, free trade has been helpful for China and Taiwan, albeit with some violations and tremendous criticisms. At the international forefront, it has received a tremendous setback such that the Doha trade talks had been stalled while governments block the acquisition of foreign companies. Only a tip-in of the iceberg, Vietnam is faced with the need to broaden and widen its free trade defenses while maintaining its infant industry towards economic and improvement of rural development in the countryside. Aimed at protecting an industry, or a country in this particular scenario, the infant industry is an argument claiming the need for, as well as allowing, small firms in underdeveloped or developing countries to have a protection mechanism or policies against large, well-established, and well-developed industries or countries. Because new firms, particularly in developing countries, are not yet capable to go on a head-to-head battle with well-recognized business establishments from developed countries, the infant industry argument allows a developing country to impose a protective tariff, or tax, to imported goods and products. When this occurs, imported goods are obliged to increase prices, thus making them less competitive as compared to those local businesses in developing economies. In return, local businesses are able to gain a strong footing in their local economy until such time that it could achieve a sufficient size and obtain a significant economy of scale.

Thursday, October 17, 2019

How are things different today for working class people and unions Essay

How are things different today for working class people and unions than in the days of Working Class New York - Essay Example In the United States, for instance, the working class people are mainly employed in jobs that do not require a lot of skills like clerks, retailers, and blue collar or manual jobs. Some white collar jobs like secretaries and call center employees also fall under the category of working class jobs (Shipler, p.36) For many years, New York City has been a working class city. During the period of the working class in New York, most people were employed in the manufacturing sector since there were many industries then. However, this is not the case today. Today there are fewer workers working in the manufacturing sectors in New York than during the period of working class in New York. Most people are employed in the service sector (Freeman, p.30) During the working class era in New York, workers were assured of the job security. They were not subjected to being laid off as a result of hard economic times. However, today’s working class face the challenge of ‘irregular employment’ since they are fired every now and then and hired again due to economic changes. It mainly affects workers in weak labor markets and those employed on a part-time basis. The economy of many nations all over the globe has continued to face stagnant growth unlike the period of the working class in New York. This has in turn slowed down creation of job opportunities and retrenching of many people who are in the working class category. Therefore, unlike in the past, many people in the United States and other parts of the world are unemployed. The unemployment rate in the United States in 2003 was at around 7%. Real wages for all workers have continued to decline due to inflation and other economic factors. Today, even when workers ar e employed they still continue to get by as compared to the period of Working Class Period in New York. During the period of working class New York, workers’ rights were protected by strong trade unions. In the United States, trade unions experienced many

How did the interest rate affect the housing prices What drives Essay

How did the interest rate affect the housing prices What drives overseas investors to invest in UK housing market - Essay Example These rates determine the volume of economic activities within the different sectors of the economy Let’s take the example of housing market and understand what the impact of interest rates is over the housing market. In general perspective, the interest rates varies indirectly with housing prices. Any rise in the interest rates makes the market unattractive for the buyer buying the house and therefore demand falls which ultimately leads to falling house prices. On the other hand, any increase in interest rates will increase the monthly payments on a variable mortgage over the house Interest rates and housing prices Interest rate affects the value of income-producing real estate mostly as compared to any investment parameter/factor in the economy. Due to such greater degree of impact of interest rates on an individual's ability to purchase housing properties many people incorrectly assume that the only deciding factor in real estate valuation is the mortgage rate. However, mor tgage rates are only one interest-related factor that influence the property values In developing countries US and UK, the rising interest rates have a big impact over the housing prices. Few years ago, the world has witnessed the global economic turmoil due to the high failures in relation to sub prime mortgages. This means that many homeowners have got a mortgage by borrowing a greater portion of their disposable income The relation between interest rates and housing prices is stronger at lower real interest rates, but even at low real rates, when time trend is included, prices seem to rise by x% as interest rates fall by much lower at y% point. The most common reason with regard to rising housing prices is the availability of easy credit, which took the form of high loan-to-value ratios, low interest rates and permissive approvals. These variables certainly affect housing prices Some of the exceptions to the case i.e. cases where the rising interest rates may not cause fall in ho use prices: Due to time lags: Suppose, someone have a house but any rise in interest rates is unlikely to make him/her sell the house, unless it becomes very serious. Generally a rise in interest rates will not reduce demand straight away Due to confidence: Suppose if the confidence level over the market is high, people may continue to spend money and respond to rising interest rates. This would lead to a fall in the savings ratio while the demand for housing doesn’t fall Due to real interest rates: The affordability of housing is majorly affected by the real interest rates. Suppose, if the interest rates are 9% but the inflation is 8%, the real interest rate is only 1%. In other terms, though the interest rates seem high, but in practices the real cost of borrowing is low Due to Other factors: Many a times, it depends on basic supply and demand analysis as well. Suppose, if there are severe supply constraints (like in the Great Britain) house prices may continue to rise, eve n though interest rates are higher Many a times some of the small developers and second-hand house owners may first reduce housing prices: Any increase in the down payment for the first house would also lead to increase in bank interest rates. This would lead to rise in the down payment pressure and interest costs on buyers Interest rates and impact on capital flows over housing market Since interest rates affects the capital flows, the demand and the supply for capital and investors' required rates of ROI,

Wednesday, October 16, 2019

Is Infant Industry in Vietnam A Good Idea Essay

Is Infant Industry in Vietnam A Good Idea - Essay Example The researcher states that international trade is deemed as one of the essential steps towards success in the global industry. It is also expected that trade liberalization could alleviate poverty rate in the country. On the downside, there will always be an increasing demand from developed, First World countries towards excessive liberalization of foreign imports and investment. In some cases, free trade has been helpful for China and Taiwan, albeit with some violations and tremendous criticisms. At the international forefront, it has received a tremendous setback such that the Doha trade talks had been stalled while governments block the acquisition of foreign companies. Only a tip-in of the iceberg, Vietnam is faced with the need to broaden and widen its free trade defenses while maintaining its infant industry towards economic and improvement of rural development in the countryside. Aimed at protecting an industry, or a country in this particular scenario, the infant industry is an argument claiming the need for, as well as allowing, small firms in underdeveloped or developing countries to have a protection mechanism or policies against large, well-established, and well-developed industries or countries. Because new firms, particularly in developing countries, are not yet capable to go on a head-to-head battle with well-recognized business establishments from developed countries, the infant industry argument allows a developing country to impose a protective tariff, or tax, to imported goods and products. When this occurs, imported goods are obliged to increase prices, thus making them less competitive as compared to those local businesses in developing economies. In return, local businesses are able to gain a strong footing in their local economy until such time that it could achieve a sufficient size and obtain a significant economy of scale.

How did the interest rate affect the housing prices What drives Essay

How did the interest rate affect the housing prices What drives overseas investors to invest in UK housing market - Essay Example These rates determine the volume of economic activities within the different sectors of the economy Let’s take the example of housing market and understand what the impact of interest rates is over the housing market. In general perspective, the interest rates varies indirectly with housing prices. Any rise in the interest rates makes the market unattractive for the buyer buying the house and therefore demand falls which ultimately leads to falling house prices. On the other hand, any increase in interest rates will increase the monthly payments on a variable mortgage over the house Interest rates and housing prices Interest rate affects the value of income-producing real estate mostly as compared to any investment parameter/factor in the economy. Due to such greater degree of impact of interest rates on an individual's ability to purchase housing properties many people incorrectly assume that the only deciding factor in real estate valuation is the mortgage rate. However, mor tgage rates are only one interest-related factor that influence the property values In developing countries US and UK, the rising interest rates have a big impact over the housing prices. Few years ago, the world has witnessed the global economic turmoil due to the high failures in relation to sub prime mortgages. This means that many homeowners have got a mortgage by borrowing a greater portion of their disposable income The relation between interest rates and housing prices is stronger at lower real interest rates, but even at low real rates, when time trend is included, prices seem to rise by x% as interest rates fall by much lower at y% point. The most common reason with regard to rising housing prices is the availability of easy credit, which took the form of high loan-to-value ratios, low interest rates and permissive approvals. These variables certainly affect housing prices Some of the exceptions to the case i.e. cases where the rising interest rates may not cause fall in ho use prices: Due to time lags: Suppose, someone have a house but any rise in interest rates is unlikely to make him/her sell the house, unless it becomes very serious. Generally a rise in interest rates will not reduce demand straight away Due to confidence: Suppose if the confidence level over the market is high, people may continue to spend money and respond to rising interest rates. This would lead to a fall in the savings ratio while the demand for housing doesn’t fall Due to real interest rates: The affordability of housing is majorly affected by the real interest rates. Suppose, if the interest rates are 9% but the inflation is 8%, the real interest rate is only 1%. In other terms, though the interest rates seem high, but in practices the real cost of borrowing is low Due to Other factors: Many a times, it depends on basic supply and demand analysis as well. Suppose, if there are severe supply constraints (like in the Great Britain) house prices may continue to rise, eve n though interest rates are higher Many a times some of the small developers and second-hand house owners may first reduce housing prices: Any increase in the down payment for the first house would also lead to increase in bank interest rates. This would lead to rise in the down payment pressure and interest costs on buyers Interest rates and impact on capital flows over housing market Since interest rates affects the capital flows, the demand and the supply for capital and investors' required rates of ROI,

Tuesday, October 15, 2019

Criminal Profiling Questions Essay Example for Free

Criminal Profiling Questions Essay 1. Analyze inductive/deductive reasoning. Inductive criminal investigative assessments: The inductive approach to profiling is a based on the simple premise that If certain crimes committed by different people are similar, then the offenders must also share some type of personality traits. (Holmes Holmes, 2009) Inductive reasoning seems to be the more scientific of the two as it is strictly based on criminals that have committed the same or same type of crime. It is much quicker as it is strictly based upon statistics and easily conducted (with the proper databases) searches based on the types of crimes. When you combine the simplicity and the speed at which it can be done, it would seem it would be a foregone conclusion that this is the technique to use. However, inductive assessments are not completely reliable due to no connection to the current crime and strictly relegated to using similar facts and types of crimes to aid in creating a profile. Deductive criminal investigative assessments: From a thorough analysis of the crime scene and the evidence left at the crime scene, the profiler is able to construct a mental picture of the unknown offender. (Holmes Holmes, 2009). Deductive profiling is based upon the artistic ability of putting together the available information and picturing the events that occurred and the offenders that committed these events. Deductive profiling is more complex and takes longer to conduct a thorough enough investigation to begin putting the pieces together to form the entire puzzle. Deductive profiling is much more reliable as it is based on information pertinent to the specific crime committed and not simply based upon similar types of crime that are typically not in any way related to the current crime being investigated. The most popular form of profiling is a combined inductive/deductive profiling. Using inductive profiling, you would compile statistics about similar crimes and use the similarities between the multiple offenders and begin to form the outline of your profile. Using the crime scene information, you would then begin to evaluate from a perspective that is specific to your crime scene and not based on similarities in crimes. Upon completion of using your criminal database to build you outline, you would then apply the specific data derived from the crime scene and begin to apply the details of the offender to complete your profile. Holmes, R. and Holmes, S. (2009). Profiling Violent Crimes, an Investigative Tool (4th Ed.). Thousand Oaks, CA: Sage Publications, Inc. 2. Goals of criminal profiling 1. Provide the Criminal Justice system with a social and psychological assessment of the offender. Goal 1 is to provide a detailed assessment of the offender which should include specifics (i.e. race, gender, employment, age range, etc.) that narrows the possibilities in which law enforcement can focus their efforts and reduce the scope of the investigation. 2. Provide the Criminal Justice systems with a Psychological evaluation of belongings found in the possession of the offender. Goal 2 is specific to the physical evidence and relevant information in a case and how it relates to the specific offenders psychological profile. This will help in the case by adding to the offenders profile and by helping derive locations, times, etc.. 3. Provide interviewing suggestions and strategies. Goal 3 is to help investigators get to the ground truth, through different methods, during the interrogation process. Different types of people respond to different stimulus, therefore different strategies must be emplaced based upon multiple categories your offender falls into.

Monday, October 14, 2019

Cryptographic Techniques For Network Security Cryptography Computer Science Essay

Cryptographic Techniques For Network Security Cryptography Computer Science Essay The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Message exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Cryptography provides solutions to all these problems. Cryptography, a word with Greek origins means secret writing. We use the term to refer to the science and art of transforming messages to make them secure and immune to attacks. Cryptography is the practice and study of hiding information. In modern times, cryptography is considered to be a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. Cryptography is used in applications present in technologically advanced societies; examples include the security of ATM cards, computer passwords, electronic commerce, which all depend on cryptography. SECURITY GOALS Availability Integrity Confidentiality Security goals CONFIDENTIALITY Confidentiality is probably the most common aspect of information security. We need to protect our confidential information. An organization need to guard those malicious actions that endanger the confidentiality of its information. In the military, concealment of sensitive information is the major concern. In industry, hiding some information from competitors is crucial to the operation of the organization. In banking, customers account need to be kept secret. Confidentiality not only applies to the storage of the information, it also applies to the transmission of information. When we send a piece of information to be stored in a remote computer or when we retrieve a piece of information from a computer, we need to conceal it during transmission. INTEGRITY Information needs to be changed constantly. In a blank, when a customer deposits or with draws money, the balance of her account needs to be changed. Integrity means that changes need to be done only by authorized entities and through authorised mechanisms. Integrity violation is not necessary the result of a malicious act; an interruption in the system, such as a power surge, may also create unwanted changes in some information. AVAILABILITY The third component of information security is availability. The information created and stored by an organization needs to be available to authorized entities. Information is useless if it is not available. Information needs to be constantly changed. Which means it must be accessible to authorised entities. The unavailability of information is just as harmful for an organization as the lack of confidentiality or integrity. Imagine what would happen to a bank if the customers could not access their accounts for transactions. SECURITY SERVICES It is easy to relate one or more of these services to one or more of the security goals. It is easy to see that these services have been designed to prevent the security attacks that we have mentioned. Data confidentiality It is designed to protect data from disclosure attack. The service as defined by X.800 is very broad and encompasses confidentiality of the whole message or part of a message and also protection against traffic analysis. That is, it is designed to prevent snooping and traffic analysis attack. Data integrity It is designed to protect data from the modification, insertion, deletion, and replaying by an adversary. It may protect the whole message or part of the message. Authentication This service provides the authentication of the party at the other end of the line. In connection oriented communication, it provides authentication of the sender or receiver during the connection establishment. In connectionless communication, it authenticates the source of the data. Non repudiation Non repudiation services protects against repudiation by either the sender or the receiver of the data. In non repudiation with proof of the origin, the receiver of the data can later prove the identity of the sender if denied. In non repudiation with proof of delivery, the sender of data can later prove that data were delivered to the intended to the intended recipient. Access control It provides protection against unauthorised access to data. The term access in this definition is very broad and can involve reading, writing, modifying, executing programs, and so on. CRYPTOGRAPHIC TECHNIQUES SYMMETRIC KEY ENCRYPTION It is also called as secret key cryptography is a cryptographic technique where the two parties share a secret key. Data are encrypted and decrypted using the same key. The sender encrypts data using the key. Once transmitted, the receiver should use the same key to interpret the message. C:UsersmadhuDesktopsyymm.PNG Figure 1. Symmetric encryption algorithm Symmetric encryption is computationally fast, meaning that it can occur in real time on content that is unknown previously. All securely transmitted live traffic today is encrypted using symmetric encryption algorithms for example such as live telephone conversation, streaming video transmission, high speed data link. Asymmetric Key Encryption In asymmetric key encryption, different keys are used for encrypting and decrypting a message. The asymmetric key algorithms that are most useful are those in which neither key can be made public while the other is kept secure. There are some distinct advantages to this public-key-private-key arrangement, often referred to as public key cryptography; the necessity of distributing secret keys to a large numbers of users is eliminated. And the algorithm can be used for authentications as well as for cryptography. Asymmetric cipher algorithms are based on heavy mathematical operations, thus they are not efficient at processing large blocks of data. They are often used to safely exchange small session keys. C:UsersmadhuDesktopasymm.PNG Figure 2: Asymmetric Encryption Algorithm Cryptanalysis As cryptography is the science and art of creating secret codes, cryptanalysis is the science and art of breaking those codes. In addition to studying cryptography techniques, we also need to study cryptanalysis techniques. This is needed, not to break other peoples codes, but to learn how vulnerable our cryptosystem is. The study of cryptanalysis helps us create better secret codes. There are four common types of cryptanalysis attacks Cryptanalysis attack Chosen ciphertext Chosen plaintext Known plaintext Ciphertext only Figure 4: cryptanalysis attacks Ciphertext Only Attack In ciphertext only attack, Eve has access to only some cipher text. She tries to find out the corresponding key and the plain text. The assumption is that Eve knows the algorithm and can intercept the cipher text. The cipher text only attack is the most probable one because Eve needs only the cipher text for this attack. To thwart the decryption of a message by an adversary, a cipher must be very resisting to this type of attack. Various methods can be used in ciphertext only attack. Brute force attack In the brute force method or exhaustive key search method, Eve tries to use all possible keys. We assume that Eve knows the algorithm and knows the key domain. Using the intercepted cipher, Eve decrypts the cipher text with every possible key until the plain text makes sense. Using brute force attack was a difficult task in the past; it is easier today using a computer. To prevent this type of attack, the number of possible keys must be very large. Statistical attack The cryptanalyst can benefit from some inherent characteristics of the plain text language to launch a statistical attack. For example we know that the letter E is the most frequently used letter in English text. The cryptanalyst finds the mostly used character in the cipher text and assumes that the corresponding plain text character is E. After finding a few pairs, the analyst can find the key and use it to decrypt the message. To prevent this type of attack, the cipher should hide the characteristics of the language. Pattern attack Some ciphers may hide the characteristics of the language, but may create some patterns in the ciphertext. A cryptanalyst may use a pattern attack to break the cipher. Therefore, it is important to use the ciphers that make the ciphertext look as random as possible. Known Plaintext Attack In a known plaintext attack, Eve has access to some plain or ciphertext pairs in addition to the intercepted ciphertext that Eve wants to break. The plain or ciphertext pairs have been collected earlier. Alice has sent a secret message to bob, but Alice later made the contents of the message public. Eve has kept both the cipher and the plaintext to use them to break the next secret message from Alice to Bob, assuming that Alice has not changed her key. Eve uses the relationship between the previous pair to analyze the current ciphertext. The same methods used in the ciphertext-only attack can be applied here. This attack is easier to implement because Eve has more information to us for analysis. However, it is less likely to happen because Alice may have changed her key or may have not disclosed the contents of any previous messages. Chosen Plaintext Attack The chosen plaintext attack is similar to the known plaintext attack, but the plaintext or ciphertext pairs have been chosen by the attacker. This can happen, for example, if Eve has access to Alice computer. She can choose some plaintext and intercept the created ciphertext. Of course, she does not have the key because the key is normally embedded in the software used by the sender. This type of attack is much easier to implement, but it is much less likely to happen. Chosen Ciphertext Attack The chosen ciphertext attack is similar to the chosen plaintext attack, except that the Eve chooses some ciphertext and decrypts it to form a ciphertext or plaintext pair. This can happen if Eve has access to Bobs computer. TRADITIONAL CIPHERS We can divide traditional symmetric key ciphers into two broad categories substitution ciphers and transposition ciphers. In a substitution cipher, we replace one symbol in the cipher text with another symbol; in a transposition cipher, we reorder the position of symbols in the plaintext. Substitution ciphers A substitution cipher replaces one symbol with another. If the symbols in the plaintext are alphabetic characters, we replace one character with another. For example, we can replace letter A with letter D, and letter T with letter Z. If the symbols are digits (0 to 9), we can replace 3 with 7, and 2 with 6. Substitution ciphers can be categorized as either monoalphabetic ciphers or polyalphabetic ciphers. Monoalphabetic ciphers We first discuss a group of substitution ciphers called the monoalphabetic ciphers. In monoalphabetic substitution, a character in the plaintext is always changed to the same character in the ciphertext regardless of its position in the text. For example, if the algorithm says that letter A in the plaintext is changed to letter D. In other words, the relationship between letters in the plaintext and the ciphertext is one to one. Example: we use lowercase character to show the plaintext; we use the uppercase characters to show the ciphertext. The cipher is probably the monoalphabetic because both 1s are encrypted as 0s. Plaintext: hello ciphertext: khoor Caesar cipher Caesar cipher is a special case of substitution techniques wherein each alphabet in a message is replaced by an alphabet three places down the line. Caesar cipher is susceptible to a statistical ciphertext only attack. Julius Caesar used this additive cipher to communicate with his officers. For this reason additive ciphers are referred as Caesar cipher. Caesar cipher used a key of 3 for his communications. P a b c d e f g h i j k l m n o p q r s t u C A B C D E F G H I J K L M N O P Q R S T U V 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 v w x y z V W X Y Z 21 22 23 24 25 For example: let the message hello is encrypted with the key of 15. Then all the characters in the ciphertext will be shifted from 15. Then the answer is hello= WTAAD Mathematically C (ciphertext) = (P+K) mod 26 (K= key) P (plaintext) = (C-K) mod 26 To encrypt message hello Plaintext h= 7 encryption (7+15)mod 26 C= 22=> W Plaintext e= 4 encryption (4+15)mod 26 C= 19=> T To decrypt WTAAD Ciphertext W=22 decryption (22-15)mod 26 P= 7=>h Ciphertext T=19 decryption (19-15)mod 26 p= 4=>e Cryptanalysis Caesar ciphers are vulnerable to ciphertext only attacks using exhaustive key searches (brute force attack). The key domain of the Caesar cipher is very small; there are only 26 keys. However, one of the keys, zero, is useless (the ciphertext is same as the plaintext). This leaves only 25 possible keys. Eve can easily launch a brute force attack on the ciphertext. Caesar cipher using cryptool Working the same example using cryptool, first of all, to acquaint ourselves with the Caesar encryption algorithm we will open a document, encrypt it and then decrypt it again. We will then try to get the computer to work out the key with which a plaintext is encrypted. This plaintext document is encrypted using the Caesar encryption algorithm by selecting the menu crypt/decrypt. C:UsersmadhuDesktopcaseaer 5.PNG Then the following dialog box appears. The key we enter is the number 15. Additionally, we change the options how to interpret the alphabet characters. The first alphabet character is set to 1 (if we set the character to 0 and use A as key, then the resulting ciphertext is the same as the plaintext). C:UsersmadhuDesktopcaesar 3.PNG Clicking on the Encrypt button opens a new window that contains the encrypted text. It becomes apparent that the letters have been shifted by 15 positions. So the word hello, is now wtaad C:UsersmadhuDesktopcaeser 6.PNG The plaintext version of this encrypted document can now be obtained by selecting crypt/decrypt again. In this dialog box which appears we now enter the key with which the document was encrypted (15). This time it has to be decrypted so decrypt button must be selected. Now the next step is to find the key using cryptanalysis. The plaintext window is made active by clicking on it. Now the entropy is selected via the menu selection Analysis/General/Entropy) C:UsersmadhuDesktopentropy.PNG Now the frequency distribution of the letters is calculated. The histogram of the encrypted document letter frequencies have been shifted by 15 positions. That means the encryption algorithm is not secure. Moreover Z shifts the text by 26 positions so that the encrypted text is actually identical with the unencrypted text. Hence there are really only 25 keys. The Caesar encryption algorithm can be broken easily by a ciphertext only attack. To perform such an attack, restore the window containing the encrypted text to the window and select Analysis/ciphertext only/ Caesar. The text will automatically be analyzed. By analyzing the superposition it is possible to discover the key which was used to encrypt this document. In this case it was the letter P. When the decrypt button is clicked the plaintext appears, i.e. the text that has been decrypted with the key p that was discovered. So the cryptool successfully found the key with which the document has been encrypted. C:UsersmadhuDesktopcaesar 8.PNG Analysis of Caesar Cipher Advantages Very easy to use The encryption and decryption can be done very quickly Disadvantages The encryption and decryption algorithms are known There are only 25 keys to try The language of the plaintext is known and easily recognizable. Applications It was used biblical times can be found on the back of Mezuzah where it encrypts the name of the god. During the First World War the Russian army used this method to relay messages to troops. It is used as an application in the Android version 1.4.0 Polyalphabetic Cipher In polyalphabetic substitution, each occurrence of a character may have a different substitute. The relationship between characters in the plaintext to a character in the ciphertext is one-to-many. For example, a could be enciphered as D in the beginning of the text, but as N at the middle. Polyalphabetic ciphers have the advantage of hiding the letter frequency of the underlying language. Eve cannot use single letter frequency statistic to break the ciphertext. To create a polyalphabetic cipher, we need to make each ciphertext character dependent on both the corresponding plaintext character and the position of the plaintext character in the message. This implies that our key should be stream of subkeys, in which each subkey depends somehow on the position of the plaintext character that uses that subkey for encipherment. In other words, we need to have a key stream k= (k1,k2,k3.) in which ki is used to encipher the ith character in the plaintext to create the ith character in the ciphertext. Playfair Cipher Playfair cipher is the example of polyalphabetic cipher. The secret key in this cipher is made of 25 alphabet letters arranged in a 55 matrix (letters I and J are considered the same when encrypting). Different arrangements of the letters in the matrix can create many different secret keys. One of the possible arrangements is shown below L G D B A Q M H E C U R N I/J F X V S O K Z Y W T P Before encryption, if the two letters in a pair are the same, a bogus letter is inserted to separate them. After inserting bogus letters, if the number of characters in the plaintext is odd, one extra bogus character is added at the end to make the number of characters even. The cipher uses three rules for encryption If the two letters in a pair are located in the same row of the secret key, the corresponding encrypted character for each letter is the next letter to the right in the same row (with wrapping to the beginning of the row if the plaintext letter is the last character in the row). If the two letters in a pair are located in the same row of the secret key, the corresponding encrypted character for each letter is the letter beneath it in the same column (with wrapping to the beginning of the column if the plaintext letter is the last character in the column). If the two letters in a pair are not in the same row or column of the secret, the corresponding encrypted for each letter is a letter that is in its own row but in the same column as the other letter. The playfair cipher meets the criteria for a polyalphabetic cipher. The key is a stream of subkeys in which the subkeys are created two at a time. In playfair cipher, the key stream and the cipher stream are the same. This means that the above mentioned rules can be thought of as the rules for creating the key stream. The encryption algorithm takes a pair of characters from plaintext and creates a pair of subkeys by following the above mentioned rules. We can say that the key stream depends on the position of the character in the plaintext. Position dependency has a different interpretation here the subkey for each plaintext character depends on the next previously neighbour. If P= P1, P2, P3 C= C1, C2, C3. K= [(k1, k2), (k3, k4) ] Encryption: Ci = ki Decryption: Pi = ki Example: keyword is PLAYFAIR P L A Y F I R E X M B C D G H J K N O S T U V W Z ENCRYPT: hide the gold underground plaintext HI DE TH EG OL DU ND ER GR OU ND ciphertext BM ND ZB XD KY CV VN XE CX KW VN DECRYPT: DMYRYKEVGHWGNGPXM ciphertext DM YR YK EV GH WG NG GP XM plaintext HE LX LO AN DG OX OD BY EX Message: Hello and Goodbye. Cryptanalysis of a Playfair Cipher Brute force attack on a playfair cipher is very difficult. The size of the key domain is 25! (Factorial 25). In addition, the encipherment hides the single letter frequency of the characters. However, the frequencies of diagrams are preserved. So a cryptanalyst can use a ciphertext-only attack based on the diagram frequency test to find a key. Analysis of playfair Advantages The main advantage of the system is it robs a cryptanalyst as they are no longer looking for recurring encoding as in an letter e can be encrypted as different letter each time. Playfair was long time considerably unbreakable. There are 26 letters so it is 26*26=676 diagrams which are quiet difficult to break. Disadvantages Still leaves much of the language structure Frequency distribution of letters Few 100s of ciphertext letters are enough for cryptanalysis. Applications Playfair cipher was used by British army during World War 1. When John F. Kennedys PT-109 was sunk by a Japanese controlled plum pudding island and was able to send an emergency message in playfair from an allied coast watchers hut to arrange the rescue of the survivors from his crew. Playfair crossword by Beetlejuice is an example puzzle using playfair as a gimmick. Vigenere Cipher Vigenere cipher made an immediate success as a field cipher. This type of polyalphabetic cipher was designed by Blaise de Vigenere, a sixteenth century French mathematician. A vigenere cipher uses a different strategy to create the key stream. The key stream is a repetition of an initial secret key stream of length m, where we have 1 P= p1p2p3.. C= c1c2c3 K= [(k1,k2,k3km),(k1,k2,k3km),] Encryption: Ci= Pi+Ki Decryption: Pi= Ci-Ki One important difference between the vigenere cipher and the other polyalphabetic ciphers is that the vigenere cipher key stream does not depend on the plaintext characters; it depends only on the position of the character in the plaintext. In other words the key stream can be created without knowing what the plaintext is. Example mathematically She is listening this message should be encrypted using the keyword PASCAL. plaintext s h e i s l i s t e n i n g P values 18 7 4 8 18 11 8 18 19 4 13 8 13 6 key 15 0 18 2 0 11 15 0 18 2 0 11 15 0 C values 7 7 22 10 18 22 23 18 11 6 13 19 2 6 Ciphertext H H W K S W X S L G N T C G Another way to look at viginere ciphers is through what is called a Vigenere Tableau. The first row shows the plaintext character to be encrypted. The first column contains the characters to be used by the key. The rest of the tableau shows the ciphertext characters. To find the ciphertext for the plaintext she is listening using the word pascal as the key, we can find s in the first row, p in the first column, the cross section is the ciphertext character H. We can find h in the first row and A in the second column, the cross section is the ciphertext character H. The same method should be followed until all the ciphertext characters are found. C:UsersmadhuDesktoptable.PNG Vigenere Tableau Cryptanalysis of Vigenere Cipher Vigenere ciphers do not preserve the frequency of characters. The cryptanalysis here consists of two parts for finding out the length of the key and finding the key itself. Several methods has been devised to find the length of the key but one method called kaisiski test, the cryptanalysis searches for repeated text segments, of atleast three characters, in the ciphertext. Suppose that two of the segments are found and the distance between them is d. The cryptanalyst assumes that d/m where m is the key length. If more repeated segments with distances d1,d2,d3.dn then gcd (d1,d2,d3,..dn)/m. This assumption is logical because if two characters are the same are k*m (k= 1,2,) characters part in the ciphertext. Cryptanalyst uses segment of at least three characters to avoid the cases where the character in the key are not distinct. After the length of the key is found, the cryptanalyst uses the idea of dividing the ciphertext into m different pieces and applies the method used to crypt analyze the additive cipher, including the frequency attack. Each ciphertext piece can be decrypted and put together to create the whole plaintext. Vigenere Cipher Using Cryptool To perform vigenere cipher encryption a new document is opened and then the encryption and decryption is performed. C:UsersmadhuDesktopvin1.PNG This plaintext document is encrypted using the vigenere encryption algorithm by selecting the keys crypt/decrypt/vigenere following which another dialog box appears. C:UsersmadhuDesktopvin3.PNG By clicking on the Encrypt button opens a new window that contains the encrypted text. C:UsersmadhuDesktopvin2.PNG The plaintext of this document can now be obtained by selecting crypt/decrypt/vigenere. In the dialog box which appears then where the key with which the document was encrypted. This time the document is to be decrypted. Therefore the decrypt button must be selected. C:UsersmadhuDesktopvin3.PNG By clicking on the decrypt button the plaintext document appears immediately. C:UsersmadhuDesktopvin4.PNG To find the key with which the document was encrypted. Restore the encrypted document window and then select analysis/ciphertext only/vigenere, following with which the text will automatically be analyzed. C:UsersmadhuDesktopvin5.PNG It is possible to work out the key length from the regular peaks in the autocorrelation. It is correctly calculated at 6 characters. C:UsersmadhuDesktopvin6.PNG When the continue button is clicked, another dialog box opens to display the key that has been computed. C:UsersmadhuDesktopvin7.PNG By clicking on the decrypt button the dialog box disappears and another window opens which contains the plaintext. C:UsersmadhuDesktopvin8.PNG Hill Cipher Hill cipher is invented by Lester S. Hill. This polyalphabetic cipher divides the plaintext into equal size blocks. The encrypted one at a time in such a way that each character in the block contributes to the encryption of other characters in the block. Hill cipher belongs to the category of ciphers called block ciphers. C1= (+ + ) mod 26 C2= (+ + ) mod 26 C3= (+ + ) mod 26 The encryption algorithm takes m successive plaintext letters and substitute for them m ciphertext letter. The substitution is determined by m linear equations in which each character is assigned a numerical value (a=0, b=1,c=2, ..z=25). This can be expressed in terms of column vectors and matrices = mod 26 C = KP mod 26 where C and P are column vectors representing the plaintext and ciphertext. K is the encrypting key. Example for Hill Cipher: Plaintext: pay more money Key (K) = C = KP mod 26 = mod 26 = = LNS For plaintext pay, ciphertext is LNS. The entire ciphertext is LNSHDLEWMTRW. For the decryption of the hill cipher is done using the inverse of the matrix K. Cryptanalysis of Hill Cipher Ciphertext-only attack on hill cipher is difficult. Even brute force attack on a hill cipher is extremely difficult because the key is an m*m matrix. Each entry in the matrix can have one of the 26 values. At first glance, this means that the size of the key domain is. Secondly the hill ciphers do not preserve the statistics of the plaintext. Frequency analysis cannot be run on single letters, diagrams and trigrams. A frequency analysis of words of size m might work, but this is very rare that a plaintext has many strings of size m that are the same.

Sunday, October 13, 2019

Magical and Sublime Characteristics of A Very Old Man With Enormous Win

Magical and Sublime Characteristics of A Very Old Man With Enormous Wings      Ã‚  Ã‚   "A Very Old Man With Enormous Wings" is a short fiction story written by Gabriel Garcia Marquez in 1955. It has both characteristics of magical realism and of the modern sublime. Therefore, Magical Realism and the Sublime seem to be related in many ways depending on how a person looks at a story. From all of the research I have read, magical realism and the sublime help to explain the characteristics of one another. This story definitely meets the criteria for magical realism and the sublime because of the many elements described. The very old man with wings, the unusual miracles, the woman spider, and the crab infestation, represent elements of the sublime and magical realism. Marquez makes these magical elements seem like the natural thing to occur. Angels, miracles, crabs, spiders, and money -making events are very real, but in this story he makes them sound so real and normal, whereas in real life they would be crazy and hard to believe. I discovered that that this story is based on a spiritual subject rather than something that is just completely not able to be related to some certain thing or place. Longinus talks about different authors stating that "the import of the sublime is clearly that it plumbs the depths of natural, visible reality to evoke an aesthetic and psychological experience of its hidden and invisible dimension of mystery, magic, and spirituality"(461). Sublime, having spirituality as a characteristic, and magical realism, having magic as a characteristic, are mixed in the story. The very old man with wings is sublime and magical because of its spirituality and the magic he made as he lived in the town. It is a r... ...all based on opinion. I know that there will be many people will place the two genres in different categories based on what they see. When a magical element is given, not everyone gets the same view out of it. I stand by my point, though; magical realism and the sublime are more alike than different. Works Cited Arensberg, Mary. The American Sublime. Ed. Mary Arensberg. Albany; N.Y.: State University of New York Press, 1986. 1-5. Faris, Wendy B. "Magical Realism : Post Expressionism. "Magical Realism: Theory, History, Community." Ed. Lois Parkinson Zamora and Wendy B. Faris. Durham; N.C.: Duke UP, 1995: 163-190. Longinus. On the Sublime. Cambridge. Harvard UP, 1995. Shopenhauer, Arthur. The World as Will and Idea! Philosophies of Art and Beauty. Eds. Albert Hofstadter and Richard Kuhns. Chicago: University of Chicago Press, 1976. 448-468.   

Saturday, October 12, 2019

Interview with a High School Counselor Essay -- Counseling

School counseling has evolved over the years into a significant component of the educational system. School counselors are taking on new roles in schools as leaders, working with â€Å"school administration and staff in developing student attitudes and behavior which are necessary to maintain proper control, acceptable standards of self-discipline and a suitable learning environment within the school† (Secondary School Counselor 2012). Counselors work in â€Å"diverse community settings designed to provide a variety of counseling, rehabilitation, and support services† (Counselors, 2010). When working in a school district as a counselor, you can either be an elementary school counselor, middle school counselor or a high school counselor. This essays explores a recent interview with a high school counselor. High school counselors advise students on an assortment of topics. Counselors help from advising students about colleges and requirements to helping students deal with social, behavioral and personal problems. School counselors do not always interact with students individually; they will also work with small groups of students or even an entire class, depending on the topic. According to the American School Counselor Association (ASCA), high school is a time for students to transition into adulthood and the work of work, begin separating from their parents, and exploring and defining their independence. They need guidance in making concrete and compounded decisions. This is where school counselors come in to help these students guide them with information. While interviewing the high school counselor of my choice Mr. Lee Ryland, this learner has learned that Mr. Ryland’s responsibilities as head school counselor i... ...and then peer approval, trying to be accepted in a group. Having strong counselors is a good foundation for a school; these educators are here to help promote academic success. Works Cited Counselors. (2010). United States Department of Labor. Retrieved 2015, from Bureau of Labor Statistics website: http://www.bls.gov/oco/ocos067.htm Ekchian, V. K. (Ed.). (2010, December). Los Angeles Unified School District Policy Bulletin. Professional Growth Manual.(2013). Renew a professional clear credential. Retrieved from California Commission on Teacher Credentialing website: http://www.svusd.k12.ca.us/resources/pg_manual_multsingsubj.pdf Secondary School Counselor. (2012). Los Angeles Unified School District. Retrieved from http://www.teachinla.com/research/class_descriptions/0533.pdf Ryland, L. (2015, February). Professional Counselor Interview.

Friday, October 11, 2019

Legal aspects of cultural diversity Essay

Cultural diversity is of great essence to any community, just as diversity is important to the living organisms which can in fact, have their ecological system adversely affected, lack of cultural diversity can lead to an increase in the risk of economic and political instabilities. This therefore implies that it is very important to preserve cultural diversity. Its preservation, above all conflicts and security concerns has made it to be of much concern in the global arena. For effective integration of the cultural diversity there is need to develop and enact laws that are intended to preserve it so as to continue enjoying its numerous benefits (Heuberger, Gerber, & Anderson, 1999). Legal aspects of cultural diversity A major fundamental characteristic that is emerging as a result of political space that is increasingly widening globally is not so much due to plurality but as a result of polarity of thoughts coming from different corners of the globe which vary significantly. The polarity of these ideas naturally corresponds to the cultural diversity of the communities. Polarity does not necessarily lead to development in the negative direction in the process of social politics. However, there is need to derive some values which are useful from this particular development. This therefore means that there should be efforts which are aimed at developing institutional mechanisms, which apart from acknowledging the existence of cultural diversity they also stress on the fundamental consensual principles and values as a basis of any state. The potentiality of such opportunities lies in the enactment of laws intended to safe guard cultural diversity, such laws should be well entrenched in a country’s supreme law, that is, the constitution (Tarver, 1999). The ethnic and cultural diversity is a broad area which can be very problematic should states fail to adequately cater for them in their laws of the land. When properly managed, cultural diversity is capable of producing positive fruits in the development of institutional structures aimed enhancing integration of various cultures. It is therefore important to note that dealing with ethnic and cultural diversity is not only a sensitive issue but a complex one too. Thus it is of much essence to include virtually all the stakeholders while coming up with laws of regulating and governing this diversity. This is very important since if such a process is not well managed the minorities are likely to feel left out in the development of their nations and thus opposed to its objectives. This can result into anarchy in a country, which can easily lead to tribal conflicts which do not auger well for the economic and political stability of a nation (Mitullah, 2002). The differences in various cultures are not absolute, they can therefore, be mediated positively through a well engineering process of the constitution of the country or other laws governing the state. This is a task that every country should endeavor to accomplish so as to avoid instances of discrimination of minorities. Their values too should be well taken care of and appreciated in a similar manner as those of the majority. Making laws on such basis will ensure that no single culture is left out in the task of nation building as they are all important and each form an integral part of the nation and thus a state cannot function optimally without the inclusion of all the cultures existing within its boundaries (Mitullah, 2002). By the laws properly addressing the issue of cultural diversity the states are likely to be saved from effects of conscious mobilization of people based on their culture and ethnic origins by their elites who are selfish and only interested in their political gains as opposed to the greater good of the entire nation. Such laws should ensure that there is eradication of political processes in which politicians are able to divide people during the periods of campaigns through ideas of cultural differences instead of policies that are needed by the state in order to develop both democratically and economically and thus liberate the citizens from the handicaps of ethnicity and their respective cultures. The laws should enable the citizens to perceive each culture in the country as an important part in the general development of the nation (Mitullah, 2002). In many countries ethnic or cultural social engineering so as to achieve myopic political goals is a major challenge in attaining credible political and economic stability. Not unless such is adequately addressed several countries will continue suffering and their development objectives delayed. Such short comings can be effectively addressed if there are laws and statutes to cater for cultural diversity so that it can be used to yield good fruits for these nations as opposed to situations of political and economic instabilities resulting from failing to manage cultural diversity in a proper manner (Lewis, 2007) Conclusion Cultural diversity when well managed in any given society is capable of yielding a lot of benefits to the all the nationalities. There is need therefore to ensure that it is well preserved and adequately taken care of so as to realize the benefits of stable economies and political systems. By appreciating cultural diversity the members of the different communities are able to borrow the strong values from other cultures and this will lead to the emergence of a culture that incorporates all the cultural diversities that exist within their limits. This can be effectively addressed in laws and statutes which should be oriented at ensuring that cultural diversity is preserved. Reference: Heuberger, B. , Gerber, D. & Anderson, R. (1999): Strength through Cultural Diversity; Journal Article of Multiculturalism Vol. 47, Issue 4. Lewis, M. (2007): Cultural Norms and Political Mobilization: Accounting for Local and State-Level Liquor Laws, 1907-1919, Journal of Cultural Geography, Vol. 24, Issue 8. Mitullah, W. V. (2002): Recognising and Respecting Cultural Diversity in the Constitution, Retrieved on 22nd May 2009 from, http://www. commonlii. org/ke/other/KECKRC/2002/5. html. Tarver, M. L. (1999): Law Enforcement Diversity Training And Technology, Retrieved on 22nd May 2009 from, http://aabss. org/journal1999/f13Tarver. html.