Monday, September 30, 2019

Life Dosen’t Frighten Me Essay

The speaker takes on the stance that she is fearless against common fears in life She deals with her fears in an imaginary sort of way. She faces them with a magic charm ‘ that she keep[s] up [her] sleeve, not in a realistic way by marching up to them and facing them with courage, for example. The author denies that she actually has any fears. Magic, the way she deals with her fears , is not real therefore I believe she is in denial of her fears I don ‘t think the author is afraid of what anything in the actual poem I think that she has probably already faced and conquered these particular fears or been subjected to them at some point already in her life. This is why she does not fear them because they are not unknown. The author should not be afraid of these fears because they are mostly childhood fears I think she strongly refused to be afraid of them because they are childish fears If the author was actually afraid of shadows, noises, ghosts, dogs being alone, stranger s, and boys, I ‘d take it that she was very childish in her manners and had not been exposed to much in her life . While most children fear these things initially , they grow up and overcome those fears as they face life. I think that if the writer were to be afraid of these , she may possibly be classified in a stereotypical manner of a young girl , but certainly not a woman , especially in the twenty first century where woman ‘ suggest strength and power almost equal to that of man. However, girl ‘ still holds the stereotype of weaker frailer, and in need of being protected (from things such as fears I do not find it interesting at all that of these things frighten the speaker. I think the speaker is trying to be convey strength, but it is such an immature strength , that it is a very weak argument. According to the fifth stanza , the speaker seems to be saying that boys are nasty brutes who pick on the girls who appear to be extremely girly. The speaker probably fits in physically and stereotypically with the children , but mentally, emotionally, and intellectually she is older since she can detach herself from life . She is more artistic and free in that sense than her peers. Other indicators that the speaker is fearless is how she makes the ghosts go away I go boo. Make them shoo ‘ and her sense that anything is possible I can walk the ocean floor. And never have to breathe. Strangers in the dark frighten me slightly as do panthers, but only if they are loose.

Sunday, September 29, 2019

The Creation of Heavy Metal and Its Effect on Society

â€Å"Heavy Metal music's influence on society is really profound. Most people don't realize this, but Heavy Metal has spawned an entire subculture, with millions worldwide who can call themselves Heavy Metal fans. It is more than just aggressive music; it is an obsession and a way of life for a staggering amount of people† (Dunn 2008). Anthropologist, Sam Dunn documented how Heavy Metal has changed lives and societies across the globe. Heavy Metal music is a way of art, and how humans show what they see in society and translate it through a very artistic and creative way, which is the music itself†(Dunn 2008). â€Å"Human nature would argue for this scenario. Humans are influenced by conditions in their environment and react, whether physically, emotionally, or in this case, creatively† says sociologist of DePaul University (Deena Weinstein). This does not rule out the fact that artistic output created by humans can go back and in turn be an influence on society. By looking at some examples both historic and current, you can observe this process and how it has affected our world. (Weinstein 2005) Metal Music affects the world and Teen society in many diverse ways, whether it be by fashion, politics, religion, lyrical aspirations, and simply bringing people together. John Lennon was one of those people to bring peace by music, he went on a hunger strike for a week to promote piece all around the world with music, and he was not just recognized for doing this but many other inspirational acts with music. Through music, artists, bands and so on, speak of things going on in the society around you. Origin of Heavy Metal In the gritty streets of Birmingham, UK 1970, where Black Sabbath, took music too a more darker and sinister place, there was a man named Tony Iommi, who together with the well known Ozzy Ozbourne, formed a band and started the era of Heavy Metal. The first album they produced was self titled – Black Sabbath. Research shows that the Tri-Tone (Blue scale) is the devils note, which was used in the also self titled track â€Å"Black Sabbath†, claimed by Cannibal Corpse guitarist Alex Webster in â€Å"Metal, A Headbangers Journey (2008) â€Å"This note, in the Middle Ages, was forbidden because if its thought up relationship with the devil, towns folk believed that this â€Å"Tri-Tone† summoned the devil, thus explaining why it was forbidden†(Ezrin 2008). In the middle Ages, sorcerers used this Tri-Tone to summon the beast and cause havoc amongst the villagers who were ignorant and scared of heavy sounds. As Black Sabbath’s music spread through out the U. K, people from all over the world started to react to this new heavier style of music and became influenced, such as Led Zepplin, Deep Purple, Rainbow, and many more bands all over the world became interested and incorporated Heavy Metal to their personas and musical ways. Anthropologist Sam Dunn: Metal, A Headbangers Journey (2008) and also past Heavy Metal band member says that â€Å"There’s an on going battle in heavy metal to be more heavier and evil than the band that came before you, this has kept me into metal all these years† Competition plays a great part in Heavy Metal, which is also a great factor that spread Heavy Metal world wide and turned it into many now known Heavy Metal sub genres per say. As Heavy Metal started to grow in the 70’s, band after band tried to sound heavier than the last band which is how these â€Å"sub genres† of metal, like I stated earlier, came to be. The teens in that era, noticed this, â€Å"competition† and many teens started and incorporated, Heavy Metal to their own bands and were so influenced by this music, that it made teens in this society more hardworking and also up for a challenge. Musical Roots The classical roots of heavy metal were fairly obvious (Ezrin 2008), most of the really good practitioners were fans of dark powerful music, and for example Beethoven was one of them. Beethoven had created great classical music that incorporated heavy bass music and powerful orchestral sound waves, which are great assets to Heavy Metal that traced Classical music to Heavy Metal roots. Heavy Metal has another musical ancestor which is The Blues. (Morton, Blythe, from Lamb of God 2001), stated that the guitar is an African instrument, and the Guitar was used in slave music, and influenced the Blues and Heavy Metal now in today’s music. In the movie: Metal, A Headbangers Journey, The director and producer/ anthropologist Sam Dunn, interviews many Heavy Metal Pioneers such as Toni Iommi, Ozzy Ozborne, Ronnie James Dio, Rob Zombie, and they all claim to say that The Blues and Jazz classical type music were influential in their music. Environment and the Effect Towards Teen Society â€Å"It comes down to growing up in a rundown place, full of poverty, hopelessness, scumbags and assholes, that make your life hell and get you bottled up inside, then that’s when the music comes in and sets you free. † states (Taylor, of Slipknot2005). Music takes a maximum effect in everyone’s lives, Heavy Metal for many, claims that this musical genre sets them free and sets them in a straight forward positive mind set due to the message that some Heavy Metal artists send. James â€Å"Munky† Shaffer bassist for the band â€Å"Korn† says in an interview, that as a teenager, the environment he grew up in was based on drug abuse, violence, problems at home and death. â€Å"I found salvation through Heavy Metal, it influenced me to stay positive, grab an instrument and just jam out and let all the negativity out and let the positive and creative stuff flow in you know? Ha-ha, look at me now, I am in my mid 20’s and part of a great well known band selling out everywhere and loving it, all thanks to Metal! †(Shaffer2008). Rob Zombie, (White Zombie, Movie Director), – Revolver magazine, June 2009 said that â€Å"Metal is a life style, it’s your life style, people listen to what they listen too but in the end, what you listen too defines who you are. † Heavy Metal is like mine and any other metal heads own world. The music tells you to stick to your guns and stay strong and positive, (Dickinson 2008). Bruce Dickinson of Iron Maiden was one of the worlds most influential Heavy Metal band of the late 70’s- 80’s that helped pioneer this musical genre. Heavy Metal Archive (2001-20011) stated that â€Å"It gives them an alternate universe, it gives them a life of imagination through which they can view music and be influenced by many things the world and their society has to offer them. † Metal does impact children nowadays in this young society, and makes them aware of what’s going on in the world such as, wars, politics, corruption and genocide and inequality. The Message through Different Methods & Styles Politically Impacting the Media/Society Dee Snider of the Heavy Metal band Twisted Sister- was attacked by many parental groups and the (P. M. R. C) also known as the Parents Music Resource Center (1984) about censorship in Heavy Metal bands (Music in general). Sam Dunn, stated in his Documentary; Metal: A Headbangers Journey, that in 1984, Heavy Metal met its first organized attack and many bands were put in â€Å"The Filthy Fifteen†. Twisted Sister were not the only band censored and put on â€Å"The Filthy Fifteen† but Many Heavy Metal bands such as W. A. S. P, Judas Preist, Motley Crue, Def Leppard, AC/DC, Venom, and Heavy Metal Pioneers Black Sabbath were amongst those â€Å"Filthy Fifteen† These bands were put in â€Å"The Filthy Fifteen† by the â€Å"Parents Music Resource Center (1984)† because their music was deemed offensive and violent. The P. M. R. C rated songs according to the following: 1. X= Profane or sexually explicit, 2. O= Occult, 3. D/A= Drugs or Alcohol, 4. V= Violence and 5. Sac= Sacrilegious. Although the lyrics in Twisted Sister’s song â€Å"Were Not Gonna Take It† talked about standing up for your rights and never giving up, the video was censored as violent which led them into â€Å"The Filthy Fifteen† by the P. M. R. C. It must have been upsetting to the band members that their music is being prohibited to teens that in society look for he lp and sanctuary in music. Music that is inspirational should not be banned to teens because it can affect their social mental lives. Due to the fact that the P. M. R. C censored Twisted Sister’s enthusiastic, stand up for your self, keep going on music, children were unable to buy their music and listen to what they wanted to hear. Music is a way of life, as I always say and everyone needs it in their daily personal lives to get by, whether they are down, lonely, happy, and or just out of mind and ready to loose it. You can not help to imagine how many youths rebelled against parents because of this cause and made them unable to listen to music that appealed their ears, and helped them get by in life’s daily struggles and challenges. Religion and Satanism Many Metal artists used religious symbolism in their music. For example when up and rising band Venom (1983) came out on stage with satanic pentagrams, gory live performances, and brutal satanic lyrics, many people were scared. In that era, Satanism was well known but only in secluded parts of Norway. As venom and many other bands such as Slayer(1983-present) went on stage and vulgarly scared the non-metal community, people and many other religious groups as well, started to ban there shows, and music all over the world. The media started to engage in a non stop attack of releasing ideas that these bands were satanic, insane, and inappropriate content for teens, and that they should be socially declined to the public. (Dunn2008) This however did not stop the bands from releasing their music, being less graphic, and selling out shows. Nor did it stop teens from tuning in to their music and impacting their religious views and life’s. Slayer, created masterpiece after masterpiece of brutal Satanic, Anti-Christian, war related, lyrics and album covers that there were literally protests at their shows by religious groups because teens were so xcited and appealed at this new style of musical art, and parents thought their children were being manipulated and brainwashed to do bad and in the end hurt and destroy their life’s and their social backgrounds. They also manifested an idea that Slayer (1983) were Satanists, when in fact they were just trying to shock the audience and gain more fans. H aving the mindset of Slayer being Satanists, they also thought up the idea that Metal Music was the doing of the devil. And that those teens were heading towards a path of destruction and anti- religious acts in their society, like burning churches down. Slayer, to defend themselves stated, â€Å"We consider what we do art, and art can be a reflection of society, and we are simply just picking up the dark reflections, and manifesting them to the world† (Araya2008) Norwegian Black Metal bands certainly do live up to Satanism, (Dunn2008). Norway is an isolated country in northern Europe in which 87% of Norway’s population belongs to The Lutheran State Church, and yet strangely their most cultural export is Satanic Black Metal (Rasmussen 2008). Because many Satanists in Norway have a grudge against the Christian religion, due to conflicts and clashes between Vikings thousands of years ago (Rasmussen2008), there was a series of arsons. A man by the name of Varg Vekernes, and along side of him to help was a man named Jorn Tunsberg, set out a quite discrete plan to burn down some of the oldest churches in Oslo, Norway. They were convicted of arson on multiple counts and both were sentenced to prison. Because of these satanic acts in Norway due to Black Metal and what it symbolized for these men, people of all over the world started to react in an eruptive way towards the Metal community. The parents now have reason to believe that children’s musical interests could indeed affect the society in which their kids lived in and cause harmful behavior for generations to come. Death and Violence Death has played a major role in Metal Music. Since Metal Music spawned from dark imagery and horrific violence and brutal lyrics, a sub genre emerged known as Death Metal. Death Metal was built up on Thrash Metal and Black Metal, which consisted of machine gun guitars and fast passed drumming, with guttural vocals, also with a little twist of bloody gore and violence, Death Metal was created. Cannibal Corpse, along with Death, were the first bands among many Death Metal bands to use gory imagery. Cannibal Corpse was known for producing horrific album art. Cannibal corpse(1985) 3 first albums are banned in Germany, New Zealand, and Korea due to very gory and graphic album art also horrific lyrics related to murder. (Slagel2008). Rose Dyson(2008) states that there is evidence to state that the average person these days sees more violence through popular culture that would occur in real life, and this also has been marketed in many essences, particularly in teenage society and disrupts the teenage mind into murder, suicide, corruption and drug abuse as a conflict resolution. Manny bands have been set for trial over the past 20 years, such as Judas Preist, Slayer, Slipknot, Cannibal Corpse and Marilyn Manson, due to suicides and murders all because Metal Music has been stereotyped as devil music and everything else you have read thus far in this research paper. A main reason, as to why Metal Music and these bands have been blamed as the cause to many teen deaths, is because of their lyrics. Most Metal bands have an image they portray whether it is evil, Blasphemy related, or just simply vulgar. It is crazy to argue that there is a relationship between the imagery in Metal and some teen suicides and acts of violence. (Klosterman2008). The most powerful predictor of whether someone will commit suicide is the feeling of helplessness (Kahn2008). No one listens to Heavy Metal in order to feel helpless, they listen to Heavy Metal in order to feel empowered and connected with other people, and that may be empowered through a song that’s about suicide that makes you realize your not alone. And your not helpless and other people are going through the same thing; you don’t need to kill yourself! Human society should realize this because blaming such horrific incidents other people cause to themselves should not be blamed on people who are merely making art in their own personal ways, such as these bands. As the media and such sources uproar and release these serious issues about teen suicide and their causes, all over the world, parents should focus on Teen Society and how teens learning and hearing these issues of teen suicide may affect them personally. Teen youth does get affected by seeing this media provided information because it somewhat brainwashes them into thinking that music of such sorts leads them into suicide and disruptive mayhem. When they grow older they judge other teenagers amongst their societies and start labeling them.

Saturday, September 28, 2019

An Autobiography Of Josh Hamilton

Ashley kennedy Autobiography of Ashley kennedy I was born on August 24th, 2000 into a family of 4. I came home to a two story house where I sill live in even to this day. When I was 5 my parents decided to get a divorce. Up until 2008 there had always been someone else taking care of me and my brother while we were living with my dad in picnic point. My father met my current stepmom in 2006 through work and she happened†¦ is about a college student named Josh Wheaton, who enrolls in a philosophy class taught by Professor Jeffrey Radisson. In this class, Josh’s professor make his student write on a piece of paper â€Å"God is dead† and to sign their names. Josh refuses to do this, which result in him giving three twenty-minute lectures about God’s existence. In the first two lectures, Professor Radisson has counterclaims against Josh’s. However, in the last lecture that Josh gives, Josh asks Professor Radisson â€Å"Why do you†¦ In the article, "The Real Troy," the author, Josh Fischman, states that while not all Trojan myths maintain historical accuracy, most contain some elements of truth. The author cites instances in the Iliad and The Odyssey that archeologists are now finding might be historically relevant. In the article, Fischman quotes Manfred Korfmann saying, "The town makes Troy about 15 times larger than previously thought." (Fischman 56) In this statement, Korfmann is describing the discoveries that had been†¦ Joshua Joel Cosby, my uncle, also known as Josh Cosby, was born June 30, 1982. He grew up as the youngest child out of eleven siblings in St.louis, Missouri. After graduating high school in 1997, he skipped college to start a professional basketball career that included stops in the United States, Europe, Asia, and South America. On June 13, 2000, he helped the Yakima Sun Kings win the Continental Basketball Association (CBA) Championship and earned first team honors while leading the Colombia Copa†¦ JOSH MCDOWELL Slide 2: * Josh McDowell is a Christian apologist, evangelist, and writer. He is within the Evangelical tradition of Protestant Christianity. * Born August 17, 1939 in Union City, Michigan with the given name Joslin, now he obviously goes by Josh and lives in California. * He was 1 of 5 kids born to Wilmot McDowell. * Struggled with low self-esteem as a result of an alcoholic and abusive father. * After being sexually abused by a hired farm hand from the ages†¦ lifelong friend I would like to tell you about, his name was Josh Childs. We met in my freshman year of high school and became closer over the years. We remained friends outside of school and continued to be friends even after I graduated. The bond Josh and I had developed been simple, he was very motivational! For example, Josh was an amazing two year wrestler when I joined the wrestling team my freshman year. It was a co-ed team, so Josh and I were allowed to partner up. He constantly tackled me†¦ "Sound and Fury," a documentary by Josh Aronson, is a compelling story of a struggle between two cultures; the hearing community and the deaf community, grounded in a conflict between members of one family, split over the perceptions and beliefs of what it means to be"normal." It is a film about identity and culture, belonging and being an outsider, misconceptions and a desire to be understood. It is a film about the struggles of a cultural minority to find its place and acceptance in the larger†¦ The play Hamilton is about Alexander Hamilton, one of the founding fathers of the United States. Alexander Hamilton was an immigrant who came to New York to improve his life. Despite what was thought of his past he improved his image, â€Å"How does a bastard, orphan, son of a whore, and a Scotsman, dropped in the middle of a forgotten spot in the Caribbean by providence, impoverished, in squalor, Grow up to be a hero and a scholar?†(Aaron Burr, â€Å"Alexander Hamilton.†) It doesn’t matter if you grew up†¦ Marketing Challenge Josh Howard, a founder of the charitable, Intercamp Classic (IC) held in Brampton, Ontario faced a marketing decision in October, 2012. Developed from an idea in 2010, the graduated Ivey student from Western University created a multisport tournament to which had been highly successful in its 3 completed years. As the primary decision maker for the tournament, Howard wanted to continue to improve the charitable donations of the 2013 event by 25% of the previous year’s donation†¦ From an Electrician to a Teacher: An Autobiography â€Å"The heart of human excellence often begins to beat when you discover a pursuit that absorbs you, frees you, challenges you, and gives you a sense of joy, meaning and passion.† – Angel Chernoof* I firmly believe that to be successful and flourish in education and childhood learning, your heart must lead you to this passion – as my heart did a year ago. Coming out of high school, my dreams were far beyond teaching and spending a lifetime discovering†¦

Friday, September 27, 2019

Ch10 - reflectional journal Essay Example | Topics and Well Written Essays - 250 words

Ch10 - reflectional journal - Essay Example ficant because it is teachers who become responsible to address the gap by adopting a range of suitable instructional strategies in the science classes. It points out the need for science teachers like me to understand the reasons behind achievement gap in science and address those while designing and delivering instruction. Not only to achieve equity in science education but also to make my teaching effective, I should be following some of the useful suggestions given in the chapter. For example, even though the rule of the thumb is that I must be using all best practices that have been researched and proven effective, if I do not differentiate instruction, it will be like treating students as a homogenous group than to make it an inclusive classroom by addressing the diverse needs. In order to do it, I must take into consideration the individual and special learning needs of my students. I used to wonder whether I must be lowering expectations for some students, but I learnt from the chapter that it does not help. Instead, I must make the classes more supportive. The chapter talks about several ways in which support can be provided, such as providing additional time to complete tasks. Learning and equipping myself with a range of useful instructional support strategies will certainly help me accommoda te various needs of my students. Learning needs are not limited to only those who are usually categorised as underachievers due to disabilities, but also extend to gifted ones. I learnt that I must identify such students as well while doing an assessment of learning needs in my class. I should be approaching them differently by setting more abstract or challenging tasks allowing more room for exploration, at the same time not ignoring the fundamentals they should learn as part of the curricular goals. The chapter also points out the importance of being aware of the cultural needs of students and their level of language proficiency. I should take these into account

Thursday, September 26, 2019

Peer review paper Research Example | Topics and Well Written Essays - 250 words

Peer review - Research Paper Example Islam has its own rules and principles as mentioned in the Quran. Accordingly, Muslims that are democratically empowered to caste vote do it in favor of implementation of the Sharia Law. A relatively poor response has been made by â€Å"Jay Ulfelder† since he identifies religious concerns as the fundamental reason behind the discriminatory attitudes against such practices as abortion and homosexuality in most of the states whereas the truth is that there is a considerable population of people who condemn these practices because of them being libertarians or because of their ethical and moral concerns. Although it is undeniably true that these practices are condemned on religious grounds, but there are just as many, if not more, reasons cited to oppose these practices as the religious concerns. There is also lack of support of the argument with statistics in the response. Words like â€Å"most states†, and â€Å"some parts of the country† incorporate bias in the

Renewable energy Essay Example | Topics and Well Written Essays - 1000 words

Renewable energy - Essay Example In the 1970 though, the first awareness of the need to raise awareness on the use of natural sources of energy had been realized through the first Earth Day. The said need is due to the discovered negative effect of the scarcity of fuel to power the planet’s need for energy. From the said concern, sustainability had been a trend but is continuously becoming a need (Maczulak, 2009). The study is aimed to explore the concept of renewable energy which specifically includes the definition of the concept, the different types, the effects and the implementation of the methods. Methodology The study is undertaken through library-based research of both primary empirical data and secondary references. The main aim in the search for references to be used in the research is to find sources that generally explore the concept of renewable energy. There are two types of references used namely reference books and journal articles. The reference books are used for the definition of the differ ent concepts and other secondary data while the journal articles are used to gather both primary empirical data and secondary review data. Results The use of renewable energy is related the concept of sustainability which is related to the proper use of resources such as land, clean water, clean air, and the species diversity in nature. One of the main issues of sustainability is the sources of the energy needed to answer the needs of the world. Energy sustainability is the specific concept that targets the efficient use of energy and the implementation of techniques that can both save the two types of energy sources, the natural fuels and the renewable resources (Maczulak, 2009, p.26). Types of Renewable Resource Renewable sources of energy are materials that can be replenished easily such as sun or solar energy; wind power; ocean waves; water flows and tides; heat flows and stored heat; and biomass (Sorensen, 2004, p.210). For each of the said sources of renewable energy, there ar e techniques and methods used to extract and store energy. There effectiveness of the method lies on the application and optimization of available resources. Thus, every nation and locality needs to efficiently use the locally available renewable resources to increase the sustainability and to lessen the costs involved (Wengenmayr and Burhrke, 2008). One of the main renewable energy sources promoted on the basis of sustainability is the solar energy. This is considered as the most basic and readily available. Thus, the technology that can capture, store and utilize the power of the sun can make a significant difference. Different developments regarding the use of solar energy are being undertaken in various places around the world. An example is the development of solar concentrators by the engineers of the Massachusetts Institute of Technology (MIT) which will be combined with solar films thus surfaces such as windows can gather solar power (Maczulak, 2009, p.108). In the European region, sustainability and the use of renewable energy sources is considered as an important part of the social policies. In 2007, the use of renewable sources of energy had been set on a comprehensive directive to intensify the 2001 directive thus covering the electrical power, heat and mobility. In Germany, Austria, and Greece, solar thermal usage is the main energy source. Biomass is the main source of energy in France specifically used to answer the heat consumption of the country. In other countries such as Sweden, Finland, and

Wednesday, September 25, 2019

Ethics & Social Responsability in Strategic Management Essay

Ethics & Social Responsability in Strategic Management - Essay Example could result in delay in supply of any one of them and consequently delay the launch. Â   The delay in projects, especially when the dates are announced, may corrode the reputation because the businesses build their credibility on the efficient and timely delivery of their projected target objectives. Mutual trust between business partners is also an important part of business processes and withholding of crucial information corrodes their credibility in the market that may result in loss of business in future. Â   The companies had not been able to launch successfully a commercial satellite primarily because it not only is high cost venture with costly software and hardware, the amount of contract is also dependent on the size of the anticipated market, the number of competitors and the whether the imageries would be used by the military and local agencies. Secondly in the case of the delays in launch, the preferences of the market may change, resulting in huge financial and business loss. Satellite programs are dependent on the venture capitalists for their finance and in case, they are not able to acquire advance contracts or their rivals are able to gain leverage, the venture capitalists are likely to withdraw from the business that may force the companies to stop production, leading to bankruptcy. The venture capitalists look for companies that could acquire advance contracts so as to ensure success for their investment. The current problem mainly cropped up because there was great chances of delay in the officially stated launch date of the satellite due to the fact that the satellite camera sub contractor was having problems with the development of thermal stabilizers for the instruments. The development of the thermal stabilizers could take up more time, thus delaying the launch by twelve to eighteen months. If the launch date is officially delayed and advanced by another one year, the company is

Tuesday, September 24, 2019

Design and analysis (aerodynamics) of the new engine cover for open Lab Report

Design and analysis (aerodynamics) of the new engine cover for open wheel climb race car in by using CFD (computational fluid dynamics). [2500 words] - Lab Report Example At first, the investigation will revolve around the models of turbulence like Shear Stress Transport (SST) and Spalart Allmaras (SA). These models are the best suited for the Computational Fluid Dynamics research. In practice, the Spalart Allmaras (SA) model meritoriously produce good Computational Fluid Dynamics simulations in relation to performance on the cost and stability. The model is suited for meshes without structure. However, Shear Stress Transport (SST) is on the basis of k-epsilon and k-omega baselines. K-epsilon is for the parts of the body that are a bit far from the wall while K-omega model is applicable on the parts near walls. The design model, will have a design of low level engine covers for the new car in a way of cutting down the area at the front of the car. On the basis of the nature science, the new model is created in a way of reducing the coefficient of the drag as one of the aerodynamic forces. This on the assumption that the engine cover is capable of reducing the drag as a result of a decreased area at the front of the car. The small area at the front induced by low height engine cover aids in decreasing the parts of vortices and turbulence near the engine covers and cockpits. This way, the rear wing is capable of developing an excess downward force, on condition the flow is continuous. The vital fact thus is knowledge of the best way to decrease the vortices and turbulence (complex flow). The lab was also effective in perfoming Computational Fluid Dynamics simulation on the helmet. This is the first design established in the process which incorpiorates the engine cover as a way of investigating the regions of flow near the cockpit in each section. The design of the second car is aimed at discovering new ways on basis of high hill engine cover. In accordance to the first simulation result, unstable airflow is developed. A high

Sunday, September 22, 2019

Acute Pain in Children Essay Example | Topics and Well Written Essays - 2250 words

Acute Pain in Children - Essay Example The intervention made to health institution through the initiative international health bodies has led to the creation of the pediatric analgesic trails, which aim at providing evidence pain management in child across the ages. In practice, assessments methods for pain intensity are critical in treating children of different ages. Acute pain is one of the common ailments in childhood and one that requires emergency response. In this paper, we will discuss the RCN guidelines on response given to acute pain in children. Acute Pain Assessment Tools In the last decade, a number of assessment tools required for testing the pain for appropriate ages have enabled documentation and quantitative and qualitative assessment of pain. The assessment method for children across the ages have undergone various changes, where issues affecting the new born to those children that are talking can be addressed. Currently, assessment methods include behavioral measures of pain. In this measurement method, the pediatrician would use behavior checklists, which has a list of pain effects that a child would encounter. The list has scores, which the pediatrician would check before assigning a given pain. In the assessment checklist, issues such as time, response to pain among others influence the decision that the pediatrician would make against a given pain. ... The RCN guideline has nine key areas that health professionals should observe when assessing acute pain in children. The provision in the guideline indicates when pain should be accessed, indictors, what the health professionals should do, as well as the parents of the child. The RCN guideline sought to achieve three objectives; first, create awareness about symptoms, which helps in recognition of pain, second, recommend methods for pain assessment, lastly, promote use of method in pain assessment. While many nurses claim they know when children are in pain, the guideline for pain assessment intended to clarify how best the nurses should respond to children pain. In addition, it sets standards, which nurses should uphold while assessing pain. Since nurses did not have standards of assessment, it is arguable that cases of misinterpretation of pain existed. Prior to the creation of the RCN guideline on pain assessment, critics observed that nurses interpreted pain differently. It was a rgued that parent and nurse observation and interpretation of pain is different. Most of the available research on pain assessment indicates that observation was the most common method used in the assessment. Although the method proves to be worthy, the behavior observed might not be the degree of pain. Other consideration included emotional response to pain as observed by their parents. Thus, settling on an inclusive procedure acceptable by parents and nurses was critical at this stage. It is also notable that consideration of the preexisting literature and research on pain were adequately done before the recommendation of the guideline. Since the introduction of pain assessment scale, observation made on its application has

Saturday, September 21, 2019

Drugs and Their Effect on Society Essay Example for Free

Drugs and Their Effect on Society Essay Drugs have been a long standing issue in this country from sniff and cocaine as one of the main ingredients in Coca-Cola and opium dens in much of the west coast till in recent years of prescription drugs being sold illegally. It wasn’t till the early 1900’s has drugs been addressed as habit forming and legislation being implemented to curtail addition and violence that can go hand-and-hand with the drug trade culture. The history of drugs in this country can go as far back as the Native Americans sharing the peace pipe with the Pilgrims. Drugs have taken many different forms within American society from what may have originally been used in the form of something as innocent as a soft drink (the original ingredients in Cocoa-Cola) and in forms of ailing some sort of deficiency that originally was prescribed by doctors can eventually be abused. In the late 1800’s and early 1900’s Chinese’s immigrants brought over opium and created opium dens in much part of the west coast where the drug itself left the user in a euphoric and mind and mood altering state. In the late 1960’s and early 1970’s with the hippie cultural, much part of the society was introduced to drugs like psychedelics which would be considered LSD and other drugs with heavy usage like mushrooms, marijuana and hashish and in other forms of society like the inner cities heroin pelage the communities with how highly addictive and deadly the drug came to be with heavy use. In the late 1970’s and early 1980’s cocaine became the prominent drug in club the atmospheres of disco techs and later became in the form of crack cocaine that pelage major cities around the U. S. with addiction and violence over the drug trade. In the early 1990’s till recent years many perception drugs and meth have been highly addictive and have been a part of the illegal drug trade. The DEA was established in 1973 that was assisted by President Richard Nixon in its creation as a form of a task force with combating drug smuggling and use within the United States of all the drugs deemed illegally additive or dangerous. â€Å"Controlled substances are generally grouped according to both pharmacological and legal criteria into the following seven categories: stimulants, depressants, cannabis, narcotics, hallucinogens, anabolic steroids and inhalants. (Schmalleger, 2012, p. 341) By federal law these categories are deemed illegal from use or distribution; stimulants: cocaine and amphetamines; cannabis: cannabis plants, hashish, hashish oil and marijuana; narcotics: codeine, Dilaudid, heroin, methadone, morphine and opium; hallucinogens: belladonna, LSD, Ectstasy (MDMA), mescaline, MDA and PCP; anabolic steroids: nandrolene, oxandrolene, oxmetholone and stanozolol; inhalants: acetate, amyl nitrite, butyl nitrite, carbon tetrachloride, chloroform, Freon, nitrous oxide and toluene. Trafficking is a form of distribution of illegal drugs through the means of either smuggling which is the illegal shipment of controlled substances across state and national boundaries in many different methods like shipment overland, direct shipments to U. S. ports concealed in containers or packed with legitimate products, flights onto United States commercial airplanes or private aircrafts and airdrops to vessels waiting offshore to smuggle drugs into the U. S. boarders. The DEA follows different routes used by traffickers and one of the methods to track the occurrences is the Heroin Signature Program (HSP) is a Drug Enforcement Administration program that employs special chemical analyses to identify and measure chemical constituents of sample of seized heroin. Border patrols have protected the boarders to ensure that traffickers are disparaged from attempting to smuggle in their products. The supply and demand has kept smugglers in business because as long as there is a need for their product by the users and suppliers; distributors of the drugs will find new and advanced methods of smuggling in drugs. Government agencies have enacted different policies to somehow impact drug abuse like the Pure Food and Drug Act of 1906 which required manufactures to list their ingredients and specifically targeted mood-altering chemicals. The Harrison Act was passed in 1914 which was the first federal anti-drug legislation that required anyone dealing in cocaine, heroin and morphine and other drugs to register with the federal government and pay a tax of $1 per year with the authorized the registration of only those in the medical profession and outlawing the street use and street distribution of these drugs. In 1956 the Narcotic Control Act increased penalties for drug traffickers and made the sale of heroin to anyone under the age of 18 a capital offense. In 1970 the Comprehensive Drug Abuse Prevention and Control Act established five schedules that classified psycho-activity and potential for abuse. In 1988 the Anti-Drug Abuse Act proclaimed the goal for a â€Å"drug-free America by 1995 by increased penalties for drug users and made weapon purchases by drug dealers much more difficult. The goal of drug control acts are to battle illegal drugs from use and distribution by anti-drug legislation and strict enforcement, interdiction, crop control, asset forfeiture and antidrug education and drug treatment. Conclusion Early legislation against drug abuse focused on eradicating the wide spread problem of drugs in numerous of ways like requiring companies to list their ingredients on their products if it may alter the users mood or brain chemistry, taxation on drug companies, making harsher drugs illegal for sale or distribution and harsher sentencing for those whom distribute illegal drugs. Since numerous types of legislation; the focus has been much in fact on punishment and less on rehabilitation which has caused a financial strain on society and has given a stigma upon those involved in the drug trade or an abuser of these substances.

Friday, September 20, 2019

Human Relations In The Workplace Essay

Human Relations In The Workplace Essay â€Å"Human Relations at the Workplace†. The purpose of this report is to reflect on the learned experiences from the subject â€Å"Human Relations at the Workplace†. Human Relations are very important in our life as they influence our social and professional lives. When we talk about Human Relations, there are so many relationships we generally see i.e. Family, Friendship, Social, Diplomatic, Professional etc. But one thing is common in all relations is that people do behave or act differently as they really are. And our tendency should be to learn the positive points/act/behaviour from others and neglect all negative ones. During the trimester, Prof. Chris Green had taught us about Human Relations from the book Effective Human Relations and covered topics like motivation, stress-management, work-life balance, developing yourself, time management and so many other topics related to workplace environment. I am very glad that I have got a chance to discuss my experience with Human Relations at Workplace. In the past, I also read some material regarding Human Relations when I was doing my Bachelors in Commerce in third year from Guru Nanak Dev University in India. After covering these topics again in James Cook University Brisbane, now I understand all these topics much more clearly and their direct impacts on me. Through this course and the subject matter, I have been able to develop and enhance my management and motivational skills. An additional skill that I have gained is to accept beliefs from other cultures and points of view of different people. In the past most of my friends, colleagues and relatives had similar opinions about different aspects of life. This limited me in sharing my ideas and beliefs. After working within multicultural groups, I am now able to understand better, the importance of self disclosure and personal identity. Sharing your ideas and beliefs creates trust and is the key for an effective collaboration. Now I can understand and relate these two points in a way that these could help me to improve my work and life balance. One of the reputed companies in field of sales and marketing gave me an opportunity to work for them as a sales representative. We were a team of 10 people from different social, religious and financial backgrounds. There we all learnt the power of TEAMWORK. The true value, as I see it, is that people work better collaboratively rather than competitively. It had been a very different and challenging experience for me as, personally, I was not permitted to motivate my team members with cash bonuses, nor could fire them or release them out of the project. I read motivational books/stories, and learnt that there were several strategies and ways one could try to motivate the team members. These books and articles helped me in improving my understanding regarding the ways one can motivate his/her team members within the authority given to him. My supervisor, who is one of the greatest motivators in my business life, also taught me some invaluable lessons for teamwork, as he always pushed me and motivated all my team members. This will help me in future too, as I will be able to tackle situations with other team members, managers or supervisors in a more delicate, effective and constructive way. Few lessons that I learnt from my work experience was -Gracefully admit your mistake, Motivate others by saying that â€Å"You did a good job†, Ask for others opinion. Remember these two most important words â€Å"Please† and â€Å"Thank you†. Reward in Public and Criticize in person. From my past experiences, I have also learned, that how to become leaders and how good leaders develop through a never ending process of self-study, education, training, and experience. The power of the high position does not make anybody a leader; it only makes you a boss. A leader should have some leadership attributes such as beliefs, values, ethics, character, knowledge, and skills. In my belief, I will be able to do better at handling situations like motivation and team leading. During the trimester, I got a chance to give a presentation on Human Relation Challenges in the New Economy. In that presentation, we discussed topics related to Understanding new economy, communicating effectively with new technologies, managing people in virtual environment. Here I would like to share a true story based on â€Å"Rewards to improve Motivation†. â€Å"One of my friends is working as a Software Test Engineer in an IT company in USA. He is a contractor with that company and was doing his job well and working on one of the live projects. Then he was presented with an opportunity to work for a critical project that had high visibility in the organization. His manager asked him â€Å"Will you be able to work on two different projects side-by-side and give 24 hour support for 7 days a week?† My friend replied:†Ok†, but from inside he was not happy because there was no motivation for him for the extra work he had to do. After two-three days, his manager told him that for all this extra workload he will be paid $500 per week additionally from his normal salary and he will be given one week of vacation after the 2nd project goes live. In the above scenario Abraham Maslows Hierarchy of needs were present. His needs were of creativity and fulfilment which we refer to as Self-Actualisation needs. In this case five major areas affected his motivation- Variance of skills, Identification of task, Significance of task, autonomy and feedback. This motivated my friend and now he was more happy and efficient in his work than before.† Reference http://www.envisionsoftware.com/articles/Maslows_Needs_Hierarchy.html Further, while preparing this presentation, I had given nice colours and effects to slides. But when I saw these slides from audiences point of view, I found so many mistakes and also recognized that colour and effects do not help too much in making a good presentation. Good presentation includes proper arrangement of the good material with bold heading, underlining important tasks, diagrams, graphs etc. to make it more interesting for the audience as well as the presenter. I hope this presentation is going to improve my speaking, presentation and communication skills. Overall, in future, I should be able to work as a good team member, leader and able to understand the organizational structure thoroughly. Further, I can more effectively understand behavioural, social and cultural dimensions of my team members and subordinates. This will help me in providing and promoting healthy, effective and comfortable work environment.

Thursday, September 19, 2019

Tragic Hero in Sophocles Antigone :: Antigone essays

The Tragic Hero in Antigone Antigone is a Greek tragic piece that stresses the use of power and morality versus the law written by Sophocles. Both Antigone and Creon, the main characters in the play, could represent the tragic hero. A tragic hero is a character who is known for being dignified and has a flaw that assists to his or her downfall. In my opinion, Creon best qualifies for being the tragic hero and fitting the definition read in the previous sentence. The things he said, did, and the comments that were made by those around him show how a man with everything could lose it all due to his own behavior. To open, the things he said showed how he changed and became the tragic hero of the play. Many of his statements reveal his personality including his admirable parts and his flaws. When Creon says: "I call to God to witness that if I saw my country headed for ruin, I should not be afraid to speak out plainly," (Sophocles, scene 1,24-26), it shows his strong sense of nationalism and leadership which catches up with him in the end. "The inflexible heart breaks first, the toughest iron cracks first, and the wildest horses bend their necks at the pull of the smallest curb" (scene 2,76-79) is what Creon says to Antigone after finding out she is the one who buried Polynieces. He thinks that if Antigone wasn't so headstrong and arrogant then she could have avoided the consequence he was about to give her. I think Creon was being a hypocrite because he is just as stubborn as she is. The reason why Creon and Antigone come in to so much conflict is because their ways of thinking are almost exa ctly alike. "It is hard to deny the heart! But I will do it: I will not fight with destiny" (scene 5, 100), is a statement that shows Creon detecting his fault and how he needs to correct it. After talking to Teiresias, the blind prophet, he realizes in order for the higher powers to forgive him he needs to release Antigone. "Fate has brought all my pride to a thought of dust" (exodos, 138). Creon recognizes his flaw and its consequences but it is too late because fate has already occurred. Moreover, many people say that actions speak louder than words.

Wednesday, September 18, 2019

Self-esteem Essay -- Psychology, Anxiety

To date, there is a large body of studies support the function of self-esteem defend against death anxiety. Conventional studies on the role of self-esteem act as an anxiety buffer to the mortality salience rely on the self-report questionnaire as the measurement tool (Burke et al., 2010). The construct measure by self-report questionnaire is mainly derived from the concept of explicit self-esteem. It is common for the research of TMT using explicit self-esteem indicates the concept of self-esteem and hence to explain their role on mortality salience (Pyszczynski, & Greenberg, 1992).Explicit self-esteem is measured in a conscious way. It is a reliable measure for the construct but we should not ignore the role of unconscious and introspective measurement of self-esteem. However, there is still concern about the social desirability effect on the self-report measurement. Previous research examined that participants had a tendency to have self-deception and impressive management on the measurement (Paulhus, 1998). It is not necessary to hold the view that self-reflections only process in conscious level. There are evidence revealed that many social cognitive functions operates in a unconscious evaluation (Greenwald & Banaji, 1995). Implicit measures of personality have proven useful since the beginning of personality psychology (Wilson, Lindsey, & Schooler, 2000). Scholars have argued that certain self-reflections may similarly operate at unconscious levels. It is assumed that non-conscious self-reflections are inaccessible to rational and conscious and have to observe in an indirect and implicit way (Greenwald & Banaji, 1995). The automatic self-reflection is termed as implicit self-esteem. Implicit self-esteem is defined as an aut... ... the other hand, there are several researches to construct self-esteem as other source of self-esteem or other self-related concept on TMT. For example, self-esteem is defined as a self-body image and body esteem (Goldenberg, McCoy, Pyszczynski, Greenberg, & Solomon, 2000; Goldenberg & Shackelford, 2005); self-enhancement (Arndt & Goldernberg, 2011) and fitness intentions (Arndt, Schimel, & Goldenberg, 2003).Therefore, it is justified enough to predict that people with high implicit self-esteem can reduce death anxiety by imposing defensive response to the mortality salience. In the theoretical point of view, full understanding of self-esteem in the TMT requires taking into consideration components of self-esteem other than the explicit level. These include implicit self-esteem and hence both implicit and explicit self-esteem will be examined in the current study.

Examining History :: essays research papers

It is imporatant to carefully examine history in order to learn from previous mistakes, and also to ensure that the same mistakes are not repeated. The Manhattan project is an excellent example. This program allowed the United States to unleash the power of the atom, thus, introducing a new and devastating element into warfare. Although they managed to come in first in the race with Germany, the U.S. bears the responsibility of having introduced the atomic bomb, and have the blood on their hands from the use of it. It is obvious that the U.S. reaped the benefits by introducing the bomb, because no one else had the chance to use it on them. However, it is imperative to realize that when they dropped the bomb they became hypocrates. They did not want it used on them, but were eager to use it on another country. Actually, the U.S. had trouble deciding who to use it on. However, when a target was selected, the results were devastating. There were 170,000 people killed in Hiroshima alone and in Nagasaki, estimates say, nearly 70,000 died. After the bomb was dropped, the resulting radiation killed nearly 70,000 people. The Manhattan Project and the use of the atomic bomb were unfortunate products of a scientific breakthrough and a frantic race; which resulted in a revolution in warfare. The Manhattan Project originated from the Army Corps of Engineers, this division was originally named the Manhattan District. The later name, The Manhattan Project, encompassed the district, the scientific, the governmental and the strategic aspects (4:9). In 1941 President Roosevelt and several American scientists began work on the project (1:1). The bomb was never reffered to as the "atomic bomb" it was referred to as "a new weapon of unusual destructive force" (13:74). The main hub of acivity for this project was in New Mexico, the program lasted from 1942 to 1946. The total cost was nearly 2 billion dollars (1:3). Another important aspect to this program was the secrecy invovlved. It was said that "loose lips sink ships" (13:37). According to Roosevelt the only people who knew about the program at it's conception were Vice President Wallace, the Speaker of the House, the Democratic Leader of the Senate Mr. Barkley, and the Chairman of the Appropriations Committee for the House and Senate (11:27). As time went on it was still kept very quiet, most cabinet members and even more congressmen did not know about it (1:3).

Tuesday, September 17, 2019

An Efficient Bio-key Management Scheme for Telemedicine Applications

An Efficient Bio-key Management strategy for Telemedicine Applications Abstraction: Checkup detector webs play a critical function for real-time wellness attention monitoring of telemedicine based applications. Telemedicine provide specialized health care audience to patients in distant locations. We use electronic information and communicating engineerings to supply and back up health care when the distance separate the participants. In order to guarantee the privateness and security of patient’s critical wellness information, it is indispensable to supply efficient cryptanalysis strategy. This paper presents a fresh Mamdani based Bio-Key Management ( MBKM ) technique, which assures existent clip wellness attention supervising with out any overhead. We present the simulation consequences to demo that the proposed MBKM strategy can accomplish greater security in footings of public presentation prosodies such as False Match Rate ( FMR ) , False Non Match Rate ( FNMR ) , and Genuine Acceptance Rate ( GAR ) than other recent bing attacks. Keywords:Healthcare, security, Medical detector webs, Key Management 1. Introduction Progresss in communicating engineerings, such as wearable and implantable biosensors, along with recent developments in the embedded computer science country are enabling the design, development, and execution of medical detector webs. This category of webs is paving the manner for the deployment of advanced health care monitoring applications. In the past few old ages, much of the research in the country of medical detector webs has focused on issues related to medical detector designs, detector miniaturisation, low-power detector circuitry, signal processing, and communications protocols. In this paper, we present a novel Mamdani based Bio-Key Management ( MBKM ) , which assures existent clip wellness attention supervising with less operating expense for telemedicine applications. Telemedicine means the distant medical expertness at the point of demand or medicate at distance. Telemedicine engineering is chiefly required for the people populating in rural countries, aged people and handicapped people [ 1 ] . We highlight some of the design challenges and unfastened issues that still need to be addressed to do medical detector webs genuinely everyplace. The development of telemedicine based health care applications presents assorted fresh challenges like dependable existent clip informations transportation, seasonableness, Energy and Power direction for a broad scope of applications [ 2 ] . Further using new engineerings in telemedicine applications without sing security facets like privateness, hallmark, confidentiality and unity as susceptible [ 3 ] . For illustration, the patient’s wellness information is delicate and escape of single patient’s personal informations could do him uncomfortable. Furthermore sometimes exposing wellness information may ensue in a individual losing his occupation or do it infeasible to obtain insurance protection [ 4 ] . Fig.1 explains the hazards to patient security in Body Area Network ( BAN ) . Here assorted detectors are implanted in the human organic structure to mensurate the critical marks like ECG, EEG, EMG, Blood force per unit area, glucose degree, etc. , can be connected to other detectors or to the control nodes. Further detectors transmit the patient information to a medical expertness utilizing wired or wireless engineering. Now the interloper may spy the patient informations and he can change or may post the information in societal sites, which pose hazards to patient’s security. Fig.1 Risks to patient security More significantly, Healthcare supplier must follow HIPAA ( Health Insurance Portability and Accountability Act ) regulations. Otherwise supplier is subjected to punishment [ 5 ] .So a patient security is a most of import anxiousness in telemedicine based health care applications. 2. Related Plants With the betterment of progress engineering invasive computer science is observed as cardinal engineering to help streaming medical informations communicating for telemedicine based applications with the aid of deploying detectors [ 6, 7 ] .Several solutions for medical information security have been proposed to protect the Body country web security. ECC ( Elliptic curve cryptanalysis ) , hardware encoding, TinySec and biometric methods are sorts of solutions discussed in [ 8 ] . Link layer encoding is achieved in the organic structure country web by TinySec attack [ 9 ] . If one medical detector releases the key or it acts as an aggressor, all the information in the Body country web will be released. Elliptic curve cryptanalysis ( ECC ) has been used in the radio detector webs [ 10, 11 ] . This public cardinal cryptographic technique requires more energy compared to symmetric cardinal cryptanalytic techniques. Biometricss obtained from the human organic structure to procure the key is proposed in [ 12 ] . Compared with cryptanalytic techniques, this technique cut down calculation and communicating cost. Electro cardio gm ( ECG ) and Photo plethysmogram ( PPG ) signals are used as first-class biometric characteristics to procure the informations in organic structure country web [ 13, 14 ] . The fuzzed vault strategy has been preponderantly used for biometric hallmark, such as fingerprints and iris image acknowledgment [ 15–17 ] . Fuzzy vault strategy play a major function to work out the job of security in telemedicine based applications. Fuzzy vault strategy is used in Phsiological Signal based Key Agreement ( PSKA ) to set up secured pairwise cardinal understanding between the nodes in Body country webs [ 18 ] , which solves chiefly the synchronism job and issues in characteristic reordering [ 19 ] . Biometric Encryption strategy is a cryptanalysis strategy which is used to keep the security of biometries and bring forth a strong key from biometries [ 20 ] . In this strategy, the husk points are non necessary to be added to convey, so the hold clip and energy ingestion is reduced. In [ 21 ] , the writer proposes new thought for message and user hallmark. This strategy compares present ECG signal with the antecedently recorded ECG templet to verify the individuality. Since the templet is inactive, this method provides hapless public presentation. The writers of the paper [ 22 ] propose ECG-IJS strategy to better hallmark of streaming medical information. The writer used characteristics of ECG signal to identify coevals for unafraid real-time medical informations communicating. 3. System Design Mamdani based Bio-key Management ( MBKM ) strategy is proposed based on the earlier treatment on ECG-IJS strategy. MBKM strategy is introduced to guarantee the security for streaming medical informations communicating in Telemedicine based applications. The proposed MBKM strategy is shown in Fig. 2. Fig. 2 MBKM strategy A novel proposed MBKM strategy is shown in Fig. 2 which uses organic structure country webs to give qui vive to the infirmary, even before the patient have critical jobs like bosom onslaught, glucose degree through mensurating alterations in their important marks as temperature of the patient, pulse rate, glucose degree, blood force per unit area and respiratory rate. Detectors, which are implanted in the patient’s organic structure step the degree of important marks and convey the parametric quantity values to medical expert working in the intensive bearer unit of the infirmary to take necessary actions to salvage the life of a patient. Intensive attention units are equipped with multi-modal proctors which are able to simultaneously step and expose the wellness position of the patient. In such instance, this important real-time medical information must be good sheltered against aggressors and security facets must be satisfied [ 23 ] . Health attention units with hapless security execution processs for telemedicine may take to incorrect diagnosing and intervention for the patient. The process at the transmitter side is given as follows: Electrocardiogram detector is used to detect the ECG signal from the human organic structure. Nyquist theorem at the rate of 120 Hz is applied on the ECG signal to take samples. 512 points Fast Fourier transform ( FFT ) is conducted on the sampled ECG informations. Since FFT procedure is symmetric foremost 256 coefficients are retained among 512 coefficients. All the extremum values on the extracted FFT coefficients are used as characteristics. A multinomial equation with degree N is constructed and the cardinal K is generated. Patient’s information is encrypted with the generated key K and hash value based on SHA-1 algorithm is calculated. Then sender sends the envelope contains the encrypted message, subset of coefficients and hash value to the receiving system. The process at the receiver side is described as follows: Similar to the transmitter, receiving system besides repeats the process to detect the ECG signal, try the signal and pull out the first 256 Feature coefficients. Then a new multinomial with degree M is constructed utilizing the standard coefficients and the multinomial on all points in characteristics to acquire a set of braces. Key at the receiving system K’ is reconstructed from received coefficients and the new hash value is calculated. Key K and hash value is compared with reconstructed cardinal K’ and new hash value. If the keys are same, so decrypted information is authenticated informations. Mamdani based Fuzzy illation system is playing a major function to guarantee security in telemedicine applications. Stairss for the design of fuzzed illation system are explained in the instance of multinomial grade 10 as follows: 1 ) Input signal variables are identified as I1, I2and end product variable is identified as Y. 2 ) Universe of discourse for the input variables are defined in the scope [ -0.01, -1e-16] and end product variable is defined in the scope [ 0,1 ] . 3 ) Linguistic label assigned for the interval spanned by each input variables in to a figure of fuzzed subsets are taken as S1, S2, S3, S4, S5,Second6, S7, S8, S9, S10. Linguistic label assigned for the interval spanned by each end product variables in to a figure of fuzzed subsets are taken as Yttrium1, Y2, Y3, Y4, Y5Yttrium6, Y7, Y8, Y9, Y104 ) Triangular rank map is assigned for each fuzzy subset. 5 ) Rule-base is formed by delegating the fuzzy relationship between inputs fuzzed subsets on the one manus and end products fuzzy subset on the other manus. If I1is S1and I2is S1so Y is Y1.If I1is S1and I2is S2so Y is Y2.If I1is S1and I2is S3so Y is Y3.If I1is S1and I2is S4so Y is Y4.If I1is S1and I2is S5so Y is Y5.If I1is S1and I2is S6so Y is Y6.If I1is S1and I2is S7so Y is Y7.If I1is S1and I2is S8so Y is Y8.If I1is S1and I2is S9so Y is Y9.If I1is S1and I2is S10so Y is Y10.In similar manner, wholly the 100 combinations of regulations are formed. 6 ) Fuzzy end products recommended by each regulation are aggregated. 7 ) Crisp end product is obtained by using one of the defuzzification technique called Centroid of country ( COA ) . Then utilizing this end product, parametric quantities like False Match Rate, False Non Match Rate and Genuine Acceptance Rate are calculated. 4. Simulation Consequences We validate the MBKM strategy by mensurating the parametric quantities like False Match Rate ( FMR ) , False Non Match Rate ( FNMR ) and Genuine Acceptance Rate ( GAR ) and Half Total Error Rate ( HTER ) . For this strategy, we downloaded 10 patient’s ECG signal for 10 seconds from MIT-BIH Arrhythmia database. We used MATLAB package tool to imitate the proposed MBKM strategy. ECG signals are used for coevals of cardinal and medical information like EEG, EMG, blood glucose degree, blood force per unit area degree etc. , can be send to medical expertness in existent clip for telemedicine based applications. The public presentation of FMR versus figure of patients is given inFig. 3. FMR value represents the chance that the system falsely matches the input form to a non-matching templet in the database. It measures the per centum of invalid inputs which are falsely accepted. So FMR value must be low for the stable system. This secret plan proves that False Match Rate is lower in the proposed MBKM strategy when compared to ECG-IJS strategy. Fig. 3 FMR versus Number of patients The public presentation of FNMR versus figure of patients is shown inFig. 4. FNMR value represents the chance that the system fails to observe a lucifer between the input form and a duplicate templet in the database. It measures the per centum of valid inputs which are falsely rejected.Stable system should give lower FNMR. This secret plan proves that False Non Match Rate is lower in the proposed MBKM strategy when compared to bing ECG-IJS strategy. Fig. 4 FNMR versus Number of patients The public presentation of GAR versus figure of patients is present inFig. 5.GAR value represents the fraction of hallmark efforts by echt users that are accepted. Stable system should give higher GAR. This secret plan proves that Genuine Acceptance Rate is higher in the proposed MBKM strategy when compared to the bing ECG-IJS strategy. Fig. 5 GAR versus Number of patients The public presentation of HTER versus figure of patients is present inFig. 6.HTER value represents the norm of False Match Rate and False Non Match Rate. Stable system should give low HTER. This secret plan proves that HTER is lower in the proposed MBKM strategy when compared to the bing ECG-IJS strategy. Fig. 6 HTER versus Number of patients 5. Decision Secure communicating is robustly required to continue a patient’s wellness privateness and safety in telemedicine based applications. In this paper, we present an efficient Mamdani based Bio-Key Management ( MBKM ) strategy for cardinal direction based security strategy in telemedicine based applications. This strategy makes the system stable system by supplying low FNMR, High GAR, low FMR and low HTER. This new strategy is less complex and is offers the security in footings of hallmark, informations confidentiality, informations unity. It remains future work to make energy analysis and implement nervous web attack to procure medical informations communicating for telemedicine applications. Mentions: [ 1 ] Yasumitsu Tomaika, Isao Nakajima, Hiroshi Juzoji, Toshihikonkitano, Patent Issues on Telemedicine in eHealth, IEEE International conference on e-Health Networking, Applications and Service,187-193,2008. Pardeep kumar and Hoon Jay-Lee, Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey, Sensors,55-91,2012 [ 3 ] Dimitriou, T. , ,Loannis, K. , Security Issues in Biomedical Wireless Sensor Networks. In Proceedings of 1st International Symposium on Applied Sciences on Biomedical and Communication Technologies ( ISABEL’08 ) , Aalborg, Denmark, 25–28 October 2008. [ 4 ] Meingast.M, Roosta.T. , Sastry.S, Security and Privacy Issues with Healthcare Information Technology. In Proceedings of the 28th IEEE EMBS Annual International Conference, New York, NY, USA,5453-5458, 31 August–3 September 2006. . [ 5 ] Office for Civil Rights, United State Department of Health and Human Services. Medical Privacy. National Standards of Protect the Privacy of Personal-Health-Information. Available online: hypertext transfer protocol: //www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index.html. [ 6 ] J. Woods, â€Å"The five manners of centripetal applications, † Gartner Research, 2006. [ 7 ] M. M. M. B. Amer and M. I. M. Izraiq, â€Å"System with intelligent cable-less transducers for monitoring and analysing biosignals, † European Patent Application, 2007. [ 8 ] M. Mana, M. Feham, and B. A. Bensaber, â€Å"Trust cardinal direction strategy for radio organic structure country webs, † International Journal of Network Security, vol. 12, no. 2, pp. 61–69, 2011. [ 9 ] C. Karlof, N. Sastry, and D. Wagner, â€Å"TinySec: a nexus bed security architecture for radio detector webs, † in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, ( SenSys ’04 ) , pp. 162–175, Baltimore, Md, USA, November 2004. [ 10 ] M. Guennoun, M. Zandi, and K. El-Khatib, â€Å"On the usage of biometries to procure radio biosensor webs, † inProceedings of the 3rd International Conference on Informationand Communication Technologies: FromTheory to Applications, ( ICTTA ’08 ), pp. 1–5, Damascus, Syria, April 2008. [ 11 ] P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, â€Å"NanoECC: proving the bounds of elliptic curve cryptanalysis in detector webs, † inProceedings of the 5ThursdayEuropean Conference onWireless Sensor Networks, pp. 305–320, Bologna, Italy, February 2008. [ 12 ] S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, â€Å"BioSec: a biometric based attack for procuring communicating in wireless webs of biosensors implanted in the human organic structure, † inProceedings of the International Conferenceon Parallel Processing Workshops, pp. 432–439, Kaohsiung, Taiwan, October 2003. [ 13 ] C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, â€Å"A novel biometries method to procure radio organic structure country detector webs for telemedicine and m-health, † IEEE Communications Magazine, vol. 44, no. 4, pp. 73–81, 2006. [ 14 ] S. D. Bao, C. C. Y. Poon, L. F. Shen, and Y. T. Zhang, â€Å"Using the timing information of pulse as an entity identifier to procure organic structure detector web, † IEEE Transactions on Information Technology in Biomedicine, vol. 12, no. 6, pp.772–779, 2008. [ 15 ] U. Uludag, S. Pankanti, and A. K. Jain, â€Å"Fuzzy vault for fingerprints, † in Proceedings of the Audio- and Video-Based Biometric Person Authentication ( AVBPA ’05 ) , vol. 3546, pp. 310–319, Hilton Rye Town, NY, USA, July 2005. [ 16 ] E. S. Reddy and I. R. Babu, â€Å"Authentication utilizing fuzzed vault based on iris textures, † inProceedings of the 2nd Asia International Conference on Modelling and Simulation, ( AMS ’08 ), pp. 361–368, Kuala Lumpur, Malaysia, May 2008. [ 17 ] A. Juels and M. Sudan, â€Å"A fuzzy vault strategy, † inProceedings of the International Symposium on Information Theory, vol. 38, pp. 237–257, Seattle, Wash, USA, July 2006. [ 18 ] K. K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, â€Å"PSKA: useable and unafraid cardinal understanding strategy for organic structure country webs, †IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 60–68, 2010. [ 19 ] F. M. Bui and D. Hatzinakos, â€Å"Biometric methods for secure communications in organic structure sensor webs: resource-efficient cardinal direction and signal-level informations scrambling, †EURASIPJournal on Advances in Signal Processing, vol. 2008, Article ID 529879, 16 pages, 2008. [ 20 ] A. K. Jain, K. Nandakumar, and A. Nagar, â€Å"Biometric templet security, †EURASIP Journal on Advances in Signal Processing, vol. 2008, Article ID 579416, 17 pages, 2008. [ 21 ] L.Biel, O.Pettersson, L.Philipson and P.Wide.ECG Analysis: A new attack in human designation [ J ] .IEEE Trans.Instrum.Meas,2001:808-812. [ 22 ] Zhaoyangzhang, Honggangwang, Athanasios V.Vasilokas And Hua Fang.ECG-Cryptography and Authentication in Body Area Networks [ J ] .IEEE Transactions on Information Technology in Biomedicine,2012:1070-1078. [ 23 ] H.Wang, D.Peng, W.Wang, H.Sharif, H.Hwa Chen and A.Khoynezhad.Resource-aware secure ECG wellness attention supervising through organic structure detector webs [ J ] .IEEEWirelessCommunications,2010: vol.17, no.1,12-19.

Monday, September 16, 2019

Essay on document entitled “Free Printing Being Abused” Essay

As can be gleaned from the article entitled â€Å"Free Printing being Abused† by Mark Burk, he is dismayed on how irresponsible most of the students are in their actions. Students must understand that free printing offered by the library is a privilege and not a right. It is an initiative of the academe to provide convenience to their students. It is a selfless concern of the school to its students. Burk pointed out the waste of resources particularly papers. As everyone knows, raw materials of a paper come from trees. In short it comes from nature. When one wastes a piece of paper, it is tantamount a small percentage of nature destruction. When all of paper waste as a result of irresponsible printing will be collectively accounted for, it might be tantamount to killing one big tree in the forest. Nature is there to provide our needs and let us not allow this purpose to be futile. It is not just a waste of resources as pointed out by Burk. It is also a waste of electricity and a waste of printer toner (ink). This irresponsible action of most students contributes to the overall expenses of the school. It is very painful to pay for services when you know that this is a result of immaturity and intentional unwanted actions. Burk has a point into making students pay for each paper they print. As he said, this is to minimize the abuse students are doing basically because it is heavy on the pocket to pay for something not valuable like paper wastes. Another point for making students pay is for the continuing maintenance of the printer. But on the other hand, making students pay for each page printed is rather a temporary and a weak solution to the problem. The root of the problem must be addressed and that root cause of the problem is moral values system of students. The school must always instill in their students the importance of conservation and the importance of responsibility for their actions. In this manner, the root cause of the problem is extinguished. Always remember not to waste any resources because in this day and age most of our resources are depleted and there will come a time that we will experience scarcity in resources such as papers and electricity and sad to say that they will longer be free by that time and you have to pay huge amount of money just to be able to obtain those resources.

Sunday, September 15, 2019

Americanisation Is the Large Influence

Americanisation is the large influence that the United States has on other countries. This particular presentation will focus on the impact of American culture on Australia. Americanisation had started in Australia in the 1950’s, with the introduction of the Television. Since then, Australian culture has been influenced dramatically by America. Americanisation has caused Australia’s popular culture to imitate American society and culture. This presentation agrees with this thesis and will argue that Americanisation has a positive effect on Australia.In particular, it will examine American impact on Television and food, as well as Australian fashion. Television is one of the major indicators of Americanisation in Australia. It is an influential tool that shows how American culture works and operates, and affects the cultural mindset of the Australian people. In Australia, the amount of American shows to Australian shows is very huge. This is in turn provides a higher var iety of entertainment to Australian TV, at a cheap price. Many shows like Two and a Half Men and Seinfeld, are shown more than Local-variety TV shows like Home & Away and Neighbours.This means that Australia is introduced to more American culture on TV than Australian culture, and is an indicator that Americanisation is very present in Australia although food and cuisine is also highly-affected by Americanisation. Australian diets are impacted on by American chain-restaurants such as KFC, McDonalds, and Subway, all of which have chains located in Australia. These chains have turned Australian diets that are of no difference to Americans, and have introduced a wide variety of American food products.This means that Australians have a higher number of options to choose from, along with their own variety of local foods, such as lamingtons and meat pies. America’s chains in Australia have included some big-brand and highly popular names, such as McDonalds, KFC, Subway, and Burger King, along with our own unique brand names, such as Oporto, Baskin-Robins, and Hungry Jacks. This creates a unique blend of Australian cuisine, highly influenced by American culture. This is evidence of the imitation of American culture, as our diets have been made to fit theirs, and our food selections are also ainly American. Australian diets, and Aussie entertainment, have all been influenced by America, and fashion is no exception. Australian fashion is highly Americanized. This means our Aussie fashion has been has been stylized to imitate America, to suit American values and culture. A recent example of this would be the snapback hats and varsity jackets, clothing usually only seen in American Major-league sport, which have been recently introduced into Australian fashion earlier this year.This is an example of American culture seeping into Australian society, and has introduced a broader variety of clothing and styles in Australia. But even before the snapbacks, America alre ady had an extreme influence on what we wear, and how we wear it. This is proved in the sports-wear brand Nike. Nike had introduced themselves as a sport-wear company, and eventually introduced their own brand of clothing lines into Australia. Another example would be the introduction of bandannas and wearing baseball caps back-to-front.These are all examples of Americanisation on Australian culture, and what they wear, affects what we wear, and how we wear it. Australian society has a feint international presence in the world. We are a highly Americanized nation, following American culture and society, and have imitated what they do, how they entertain, what they eat, and what they wear. This means we live in an Australian society, with American culture, values, and mind-set, and has had a positive affect on Australia.

Saturday, September 14, 2019

Boeing Bond Analysis

Boeing Bond Analysis Presented to Dr. —– Prepared by Filipe Ferro October 9, 2012 Table of Contents Boeing Company3 Bond Issue3 Unsystematic Risk4 Principal Repayment4 Debt to Invested Capital4 Debt to Equity4 Current & Quick Ratios5 Interest Repayment5 Times Interest Earned5 Credit Position6 Competitor Analysis6 General Dynamics6 Northrop Grumman7 Systematic Risk7 Market Responsiveness7 Duration8 Modified Duration9 Accuracy of Rating9 Interest Rate Expectations9 Summary10 Appendix11 Descriptive Statistics11 Regression Analysis11 Duration & Modified Duration12References13 Boeing Company Boeing is a manufacturer of aircrafts and national defense equipment making it a member of the Aerospace & Defense industry. It was founded in Seattle, Washington on July 15, 1916. It is headquartered in Chicago, Illinois, USA. Commercial aircraft include the 737, 747, 777, and very recently, the 787. Military products consist of high-dexterity and stealthy aircraft such as a the A-10 Th underbolt II and highly-efficient and powerful satellites such as the Boeing 601. 1 Its biggest competitors are Northrop Grumman, General Dynamics, and Airbus.According to Morningstar, Boeing employed 171,700 people and revenue reached $69 billion in 2012. 2 Bond Issue The bond I have chosen to analyze is a debenture with a maturity date of August 15, 2021. Morningstar shows this bond issue consists of 400 million $1,000 par value bonds with 398 of them outstanding. The bond is a semi-annual fixed coupon bond with an annual rate of 8. 75%. The accrual start date was August 15, 1991. The original life of the bond was 30 years and the remaining life as of October 2012 is a little over 8 years and 10 months.This bond issue is non-callable, non-putable, non-convertible, and it is not subject to Rule 144A. These bonds are currently selling at 135. 20% of par value as of September 29, 2012, making their price $1,352. Standard & Poor’s NetAdvantage rates this issue as an A. Its curr ent yield ratio is 6. 47. I have always been enthusiastic about airplanes. My first experiences in flight were in Boeing aircrafts. I also chose this bond issue because of Boeing’s large size, reputation, and financial security.Selecting a debenture is risky and requires strong financial security since the only security backing it is the issuing company’s credit rating. With a current yield of 6. 47 resulting from the relatively high coupon rate of 8. 75%, this is a great bond for a fixed income (coupon pays $87. 50 annually). Unsystematic Risk Principal Repayment Debt to Invested Capital In recent years, Boeing’s debt to capital ratios have been 42% for 2007, 112. 9% for 2008, 85. 2% for 2009, 80. 6% for 2010, and 74. 0% for the end of 2011. Boeing’s total debt to invested capital ratio is 65. 3% (as of June 2012)3. Standard & Poor’s calculates this as (total debt)/(total equity + total debt), 2,466,000+8,735,0005,892,000+11,201,000. This means th at debt makes up about 65% of all invested capital. Boeing still has 35% of capital that is not tied to debt. This is good compared to the last few years. This ratio is on a downward trend. Debt to Equity Boeing’s total debt to equity ratio is 1. 51 (as of June 2012) 3, meaning that for every $1 in equity there is $1. 51 of debt. This is calculated as 8,735,0005,804,000 on the balance sheet.According to Standard & Poor’s Industry Survey, Boeing’s debt to equity ratio at the end of 2011 was 2. 85. The Aerospace & Defense industry average from 1981 to 2011 was 0. 90. 4 The industry survey states that Boeing’s high debt to equity ratio is due to its â€Å"financial arms† since it has a large financing department. It is also probably due to its new model plane, the 787 Dreamliner, which requires a relatively expensive manufacturing processes – unibody parts made up of composite carbon fiber materials – and advanced electronics and sensors . These higher costs require raising more capital than the average model plane.While debt has priority over equity in being repaid, debentures are at the bottom of the list, which is why this high ratio may be a concern for holders of Boeing’s bond issues. If bankruptcy occurs, debentures will be the last of debt holders to get paid. Although it is not exactly good to have this somewhat high ratio, knowing that Boeing has a brand new and appealing aircraft reassures that positive future cash flows will cover this financial leverage. S&P’s NetAdvantage highlights the potential sales to emerging airlines from China and airlines with old worn out planes in the U. S. and Europe.S&P’s industry survey states â€Å"China, India, the Middle East, Eastern Europe, and Latin America, will drive growth in global air travel and demand for new aircraft. †4 The market for aircraft purchases looks like it will grow in the coming years, thus Boeing will have greater oppor tunities for sales. Current & Quick Ratios The current assets to current liabilities ratio was 1. 22 for the 4th quarter of 2011, which means every $1 in current liabilities is covered by $1. 22 in current assets. Boeing has enough current assets to pay off all its current liabilities if it needed to do so. The current ratio has been 0. for 2007, 0. 8 for 2008, 1. 1 for 2009, and 1. 1 for 2010. The current ratio has been on an upward trend since 2008 which would imply added financial security in forecasts. But the current ratio assumes that a company’s current assets are highly liquid. This might not be the case with Boeing, whose inventory is made up of large and expensive aircraft and is not as highly traded as smaller inventory such as food in a grocery store. The quick-ratio would be more accurate for Boeing, which is 0. 39. Boeing – using only its instantly liquid assets – would not be able to pay off all of its short-term liabilities if it was required to. Interest Repayment Times Interest Earned As of December 31, 2011, Boeing had a net income of $4 billion and an interest expense of $498 million. Its times interest earned for the year of 2011 was 4,011+498498=9. 05. From 2006 to 2010, times interest earned has been 4. 72, 21. 7, 6. 12, 4. 94, and 7. 42 respectively. From these figures, it seems that Boeing’s TIE ratio has been on an upward trend since the 2009 ratio of 4. 94. The most recent ratio of 9. 05 suggests that Boeing is capable of paying its interest expense since its profit is over 9 times greater than its interest expense. Credit PositionAccording to Mergent Online, Boeing has never had a bankruptcy proceeding of any type (chapter 11 restructuring, etc), which implies that it has never defaulted on any of its debts. Mergent also states Boeing â€Å"had $4,600,000,000 available under credit line agreements†5. Considering Boeing already has $12,371,000,000 in long-term debt, $4,600,000,000 is still considerab le amount. Boeing is still within reasonably comfortable limits within its credit line usage. In addition, Standard & Poor’s Bond Guides shows that it has rated this issue of Boeing’s bonds in the A range for the last 4 years.Overall, Boeing seems to have good character. Many of Boeing’s bond issues have been rated as A+ over the last 4 years. Competitor Analysis General Dynamics General Dynamics currently has 2 outstanding bond issues, both rated A by Standard & Poor’s. Its debt to invested capital ratio in the 4th quarter of 2011 was 22. 6% compared to 74% for Boeing6. General Dynamics’ assets are tied to a much lower amount of debt than Boeing. The current ratio for General Dynamics is 1. 4 as of 2011 while Boeing’s was 1. 2. In addition to its low debt to capital ratio, its debt to equity ratio is also low at 3,930,00013,232,000=0. 0. Boeing’s debt to equity ratio is a little higher at 1. 51. With a higher debt to equity ratio, Bo eing’s leverage is slightly larger. Boeing’s bond issue may have a little more risk of being subordinated by other bonds. A low debt to equity ratio reflects a financial healthy company because it means that it needs a relatively small amount of financial leverage. Times interest earned for the year of 2011 was 2,252+155155=15. 53. Again, this makes General Dynamics’ bonds less risky. In contrast, Boeing has more liquidity in its stock at an average trading volume of 4,344,230.General Dynamics’ average trading volume is only 1,642,0007 which means General Dynamics’ ratios are subject to more volatility. With a higher trading volume and a new, cutting edge plane, this may offset Boeing’s higher risk compared to General Dynamics. Northrop Grumman The current ratio as of the 4th quarter of 2011 for Northrop Grumman was 1. 4. Its debt to equity ratio was 3,948,00010,715,000=0. 37. Times interest earned was 2,086+221221=10. 44. 8 Like General Dyn amics, Northrop Grumman’s ratios also suggest lower unsystematic risk compared to Boeing.Although the bonds may also be more volatile because just like General Dynamics, Northrop Grumman has a much lower average trading volume (at 1,533,070) than Boeing does. Systematic Risk Market Responsiveness Date| YTM-Boeing| YTM-Avg. A Rated Market| Mar-08| 5. 28%| 6. 24%| Jun-08| 6. 09%| 6. 43%| Sep-08| 6. 01%| 6. 55%| Dec-08| 7. 16%| 6. 70%| Mar-09| 6. 50%| 6. 66%| Jun-09| 5. 92%| 6. 39%| Sep-09| 4. 96%| 5. 56%| Dec-09| 4. 69%| 5. 77%| Mar-10| 5. 13%| 5. 80%| Jun-10| 4. 69%| 5. 44%| Sep-10| 3. 67%| 5. 01%| Dec-10| 3. 89%| 5. 52%| Mar-11| 4. 56%| 5. 52%| Jun-11| 3. 93%| 5. 26%| Sep-11| 3. 66%| 4. 54%| Dec-11| 3. 0%| 4. 40%| Mar-12| 3. 32%| 4. 51%| Jun-12| 2. 63%| 4. 14%| Sep-12| 2. 56%| –. –| Below is a list of Boeing’s yields to maturity and the AA-rated bond market yields to maturity according to the S&P Bond Guide: Yield to maturity has been on a downward trend since December 2008 for both Boeing and the rest of the AA-rated bond market. It seems like the YTMs for Boeing and the rest of the market move together. The null hypothesis for this situation would be that the market movement has no correlation to Boeing’s movement in YTMs; therefore the slope would be 0 for a linear regression of the scatter plot below.The alternative hypothesis is that the market does have some influence. The null hypothesis can be tested with some calculations. The test statistic is calculated by taking the value of the beta 0. 96 and dividing it by the standard error of 0. 11132, we get 8. 62. Using the test statistic and a level of significance of 10%, the corresponding P-Value is 0. 0000000007. Anything to the left of the 10% level of significance is a rejection of the null hypothesis. The P-Value is well below the level of significance of 10% and therefore the null hypothesis should be rejected.This means that the population coefficient of determinati on is not equal to 0 according to our sample of 18 periods. The sample yields a coefficient of determination of 0. 91. Boeing’s movement in YTM can be explained by a movement in market YTM 91% of the time. Boeing’s YTMs have a strong positive correlation with the market’s YTMs and makes its bond issues just slightly less volatile to movements in the market. Duration This bond issue has a par value of $1,000 and a coupon payment of 8. 75% semi-annually. The coupon payment is $87. 50 and the latest rate for the AA bond class, according to the Wall Street Journal, is 1. 3%9 as of October 2, 2012. The present value of this bond is $1,569. 44. The weighted present value of this bond is $11,157. 82. The current duration for this bond issue is 7. 11 years. It will take a little over 7 years for this bond to cover the initial investment. Modified Duration The modified current duration is calculated as the current duration divided by 1 + (bond class interest rate). In th is case it is 7. 111+0. 0183=6. 98. This means that for every 1% increase in market interest rates, this bond issue will go down 6. 98% in value. Accuracy of RatingStandard & Poor’s definition for an A rating is defined as a â€Å"strong capacity to meet financial commitments, but somewhat susceptible to adverse economic conditions and changes in circumstances. With a beta of 0. 63 and a current duration of 6. 98%, it seems like the rating of A is accurate according to the â€Å"somewhat susceptible to adverse economic conditions† part of the definition. For the â€Å"strong capacity to meet financial commitments†, I also feel like this fits Boeing since it has a times interest earned ratio of 9. 05 and a current ratio of 1. 22. Interest Rate ExpectationsAccording to the Federal Reserve Board press release of September 13, 2012, the announced quantitative easing program will keep bond prices high and interest rates low, at least for the short-term (next year). Also, the economy has expanded somewhat in recent months, but still at a lower than expected rate10. This suggests that interest rates will remain mostly unchanged since there is not a lot of spending. The Washington Post’s front-page article on October 2, 2012, stated that Americans â€Å"do not want to take any risks with their money – even as the government is encouraging risk-taking†11.According to the Fisher Effect, when expected inflation rises, interest rates will rise12. With low inflation expectations, we can expect a continuation of low interest rates. Instead of trending they will be â€Å"ranging†. As of October 2, 2012, a 10-year Treasury bond had a yield of 1. 64% while AA-Rated bonds had a yield of 1. 83%. The spread is 0. 19. The present value of a single bond from this issue is $1,569. 44. With interest rates rising only 10 basis points by the end of this year and with a modified duration of 6. 98, the present value will drop by 0. 698%. $1,569. 44(1 – 0. 00698) = $1,558. 9. The estimated yield to maturity for Boeing one year from now with a 20 basis point increase is YTM-BA = -3. 2949 + 1. 4426(4. 34) + 0. 001 = 2. 97% for Boeing, up from 2. 63%. 4. 34% is 20 basis points above the last market YTM data point of 4. 14%. This small rise in interest rates means Boeing’s bond issue is going to drop slightly in price. Summary I would definitely buy this bond despite some of its shortcomings. Boeing may be heavily leveraged at the moment, but it still has other ratios that show its financial health, such as market capitalization, the debt to equity ratio of 1. 1 and the current ratio of 1. 22. Additionally, Boeing’s new model airplane, the 787 Dreamliner, is a positive prospect for future financial health. According to Mergent’s records, Boeing has never defaulted on its loans before and with 96 years of history I wouldn’t expect a default any time soon. Appendix Descriptive Statistics YTM-BA%|   | YTM-A%|   | |   |   |   | Mean| 4. 755| Mean| 5. 58| Standard Error| 0. 291509762| Standard Error| 0. 193077925| Median| 4. 69| Median| 5. 54| Mode| 4. 69| Mode| 5. 52| Standard Deviation| 1. 236771176| Standard Deviation| 0. 19160259| Sample Variance| 1. 529602941| Sample Variance| 0. 671023529| Kurtosis| -0. 700358347| Kurtosis| -1. 043305373| Skewness| 0. 246024371| Skewness| -0. 261513425| Range| 4. 53| Range| 2. 56| Minimum| 2. 63| Minimum| 4. 14| Maximum| 7. 16| Maximum| 6. 7| Sum| 85. 59| Sum| 100. 44| Count| 18| Count| 18| Regression Analysis Duration & Modified Duration References 1Boeing. (1995). A-10 Thunderbolt II. Retrieved 2012 05-October from http://www. boeing. com/defense-space/support/maintenance/a10/index. html 2Morningstar. (2012, September 28). Boeing Co BA. (N.Dihora, Editor) Retrieved September 29, 2012, from Morningstar: http://www. morningstar. com 3Standard&Poor's. (2012, October 02). Boeing. Retrieved October 02, 2012, from Standard ;Poor's NetAdvantage: http://www. netadvantage. standardandpoors. com 4Tortoriello, R. (2012 26-July). Industry Surveys: Aerospace & Defense. Retrieved 2012 05-October from Standard&Poor's: http://www. netadvantage. standardandpoors. com. proxymu. wrlc. org/NASApp/NetAdvantage/showIndustrySurveyPDF. do? loadIndSurFromMenu=pdf 5Mergent Online. (2011, December 31). Boeing Co. (The) (NYS:BA): Long Term Debt.Retrieved October 1, 2012, from Mergent Online : www. new. mergentonline. com. proxymu. wrlc. org/companydetail. php? pagetype=longtermdebt;compnumber=1048 6Standard;Poor's. (2011, 12 31). Genl Dynamics. Retrieved 10 02, 2012, from NetAdvantage: http://www. netadvantage. standardandpoors. com. proxymu. wrlc. org/NASApp/NetAdvantage/cp/companyFinancials. do 7Yahoo! (2012, October 03). General Dynamics (GD). Retrieved October 03, 2012, from Yahoo! Finance: http://www. finance. yahoo. com/q? s=GD 8Yahoo! (2012, October 03). Northrop Grumman Corportation (NOC). Retrieved October 03, 2 012, from