Friday, November 29, 2019

Ackee free essay sample

However, online students should expect to spend about 6 hours a week (over a 7 h week period) for each credit hour enrolled. This would include reading, researching and writing papers, doing projects, completing exercises, studying and fleeting on the course material, as well as the time spent on the computer participating in discussion threads, reviewing online course materials, taking tests, and uploading and downloading materials. The time devoted to classes scheduled for other than a 7 h week period would adjust proportionally.Written Assignments: There are no written assignments for this course. There are practice problems for this course using http:// www. interactions. Com . Discussion Boards: Participation is a combination of logging into the platform and participating in the class discussions. Students are required to issues the weekly topic. There are 35 points assigned to each weeks discussion board, with the Meet and Greet thread in Week 1 worth another 5 points.The total points equal 250, or 25% of the total course grade. We will write a custom essay sample on Ackee or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Students are expected to: * post an initial response to the topic (posted by mid-week (e. G. Wednesday or Thursday, depending on the due date assigned by the Instructor) * Post at least two responses to the posting made by the classmates. * Post at least three different times during the week. * Class Participation: Must be completed by Sunday evening at the midnight of the current week. This includes the discussion forum. Late Assignments: Late assignments will not be accepted by the instructor unless the circumstances are extenuating (such as birth of child, death in family, catastrophic weather event, etc. ). Contact the instructor if something extenuating happens to you during the term to work out a late assignment schedule. Written Assignments: There are no written assignments for this course.

Monday, November 25, 2019

Definition and Purpose of a Heterogeneous Class

Definition and Purpose of a Heterogeneous Class Heterogeneous groups  in educational settings include students from a wide range of instructional levels. The practice of assigning mixed groups of students to shared classrooms stems from the education precept that positive interdependence develops when students of varying achievement work together and help each other reach educational goals. Heterogeneous groups contrast  directly with homogeneous groups, in which all students perform at roughly the same instructional level. Examples of Heterogeneous Groups A teacher may deliberately pair low-, medium-, and high-level readers (as measured by reading assessments) together in a heterogeneous group to read and analyze a given text together. This type of cooperative group can improve outcomes for all of the students as the advanced readers can tutor their lower-performing peers. Rather than putting gifted students, average students, and special-needs students in separate classrooms, school administrators may divide students into classes with a relatively even distribution of abilities and needs. Teachers may then further divide the group during instructional periods using either the heterogeneous or homogeneous model. Advantages For students of lesser ability, being included in a heterogeneous group rather than pigeonholed into a homogeneous group reduces their risk of being stigmatized. And labels that classify academic skill can become self-fulfilling prophecies as teachers may lower expectations for students in special-needs classrooms. They may not challenge those students to perform well and may rely on limited curriculum that restricts exposure to concepts some students could, in fact, learn. A heterogeneous group gives advanced students a chance to mentor their peers. All members of the group may interact more to help each other understand the concepts being taught. Disadvantages Students, parents, and teachers may prefer to work in a homogeneous group or be part of a homogeneous classroom. They may see an educational advantage or just feel more comfortable working with peers of similar ability. Advanced students in a heterogeneous group may at times feel forced into a leadership role they do not want. Rather than learning new concepts at their own speed, they must slow down to assist other students or curtail their own study to proceed at the rate of the whole class. In a heterogeneous grouping, advanced students may take the role of co-teacher, rather than advancing their own skills. Students of lesser abilities may fall behind in a heterogeneous group and may be criticized for slowing the rate of the whole class or group. In a study or work group, unmotivated or academically challenged students may be ignored rather than assisted by their peers. Management of a Heterogeneous Classroom Teachers need to remain aware and recognize when a heterogeneous grouping does not function properly for a student at any level. Teachers should support advanced students by supplying additional academic challenges and help students who fall behind receive the assistance they need to catch up. And students in the middle of a heterogeneous group face the risk of getting lost in the shuffle as the teacher concentrates on the special needs of students at either end of the spectrum.

Thursday, November 21, 2019

Racism in Football (soccer) Essay Example | Topics and Well Written Essays - 2500 words

Racism in Football (soccer) - Essay Example Basically race and football presents itself in several forms. Since the early years of the last century, many fans have used their football matches to express their racial chauvinism though it has been discovered that these were just a minority of the population but causing great trouble. It's very critical how the minority groups could become very dangerous to coaches, players, and fans. Basically the problem could be worse than implied because many respondents perceive not to give bad impressions. This research will study the extent of racial discrimination in football especially at international and professional levels, and the strategies to alleviate this problem. Racism is a big concern in the world of football all over. In essence, racism is not simply aimed at undermining or intimidating football players because of the colour of their skin (Russell 1997). In recent times, coaches, officials and even fans have fallen victims of racial discrimination particularly based on their nationality, ethnic origin and religion. Some people are targeted because they are associated by their opponents rather than the colour of skin and ethnicity (Back & Solomos 1998). There have also been cases where people have been individualized and insulted by their own fans, the most notable incidence was that of John Barnes. Racism is a major problem especially in the European nations and a very critical factor in the cases of hooliganism in football. The real degree to which racism is practiced is virtually difficult to measure since there is no detailed information as evidence or important data and statistical analyses are non existent (Russell 1997). Nonetheless, the activities of disorders in football are particularly on the international level are often referred to as racists or they are perceived to be perpetrated by a groups of racists and currently even some clubs are being considered as being inherently supporters of racism. Types of Racism Racism in football takes a variety of forms and some of them are not clearly seen as discriminatory. However chanting against a team, player, coach, football official or fans has been a common form of racist activity. This was very common especially in the English football in the period around 1970s and 1980s. A crowd of some fans usually made some funny noises at players; in England, fans made monkey noises to intimidate black football players on the field. Some other cases included even more personalized abuse and insults (Back & Solomos 1998). A outstanding case is that of Deptford fire where thirteen black players in their youthful ages were burnt by a mod to death, while chanting insulting songs- ' niggers burning better than petroleum' could be heard even as far as Milwall. There have been anti-Semitic songs targeting for instance the Tottenham Hotspurs fans. Other songs are patriotic and connected to country's national anthems. Due to the increasing number of cases of racist chanting during football matches, a law was enacted in 1991 termed as the football offences act which made these chants during soccer matches an illegal activity but this law is still inadequately effective in its definition of chanting; chanting is defined as 'utterances of any words made repeatedly or making of some sounds in unison with one or a

Wednesday, November 20, 2019

Business Ethics and corporate social responsibility(new) Essay

Business Ethics and corporate social responsibility(new) - Essay Example This is apparent in the company’s advertising and sales catalogues which depict aspirational youths maintaining the physical characteristics the company believes are stimulating to other youths who look toward reference groups to determine and shape their identities. The brand engages the desirable and shuns what the business considers the undesirable, the less attractive (Logue 2013). The CEO Mike Jeffries made an explicit commentary that the business hires only nice-looking individuals as sales representatives and managers in-store and that the company does not want people who are not cool to wear the company’s clothing (Levinson 2013). The majority of the branded clothing merchandise provided by Abercrombie & Fitch serves as a billboard for the company, presenting the business’ trading name in very visible and eye-catching font. As the CEO believes that this aspirational brand should retain its most loyal markets, this being trends-focused, attractive and yout hful buyers, the company believes that marketing to other market segments would depreciate the brand value of the organisation and make it less inspiring to loyal consumers. Offered the CEO in a 2006 interview (which has recently resurfaced in mass media), â€Å"Candidly, we go after the cool kids. A lot of people don’t belong in our clothes, and they can’t belong† (Levinson 2013, p.1). These comments angered one famous celebrity, Hollywood actress Kirstie Alley, who recently shed considerable weight and after having been the victim of media taunting about her explosive weight gain in recent years. Offered Alley, â€Å"blah, blah, blah, blah. That would never make me buy anything from Abercrombie. I’ve got two kids...they will never walk in those doors† (Winston 2013, p.1). In addition, advocates for the rights of overweight consumers have even developed mock advertising campaigns in an effort to bring public attention to the alleged unethical beha viours of the company. Figure 1: Mock A&F Publicity Exposing Hostile Sentiment about CEO Comments Source: LeTrent, S. (2013). ‘Attractive & Fat’ ad spoofs Abercrombie, CNN Living. [online] Available at: http://www.cnn.com/2013/05/23/living/abercrombie-attractive-and-fat (accessed 21 May 2013). The CEO responsible for creating this negative public backlash had, historically, stood by his comments, defending the statements as justifiable with brand strategy and corporate rights. However, with a sudden 17 percent drop in retail sales in the United States as a result of the controversy (Become Gorgeous 2013), the CEO offered, â€Å"We look forward to continuing this dialogue and taking concrete steps to demonstrate our commitment to anti-bullying† (News Limited 2013, p.2). However, prior to this apologetic statement, Abercrombie & Fitch had been the historical target of special interest groups and general societal stakeholders for unethical business behaviours associ ated with alleged pornographically-centric depiction of its advertising models and for offending youth markets that are, essentially, shunned by the business and its representatives. Sales continue to fall with this company quarter by quarter. Literature review – Ethical leadership and stakeholder values Some of those who argue that Abercrombie & Fit

Monday, November 18, 2019

Workplace Violence. Demonstrations of temper that impact work Research Paper

Workplace Violence. Demonstrations of temper that impact work performance and general well-being within the hospital workplace - Research Paper Example Other members of the surgical team, primarily the scrub tech, was observably upset by the actions and lack of restraint shown by Dr. X in regard to his emotional state. Upon approaching the Director in regard to this behavior, it was revealed that this form of violence was common for Dr. X and the hospital has been allowing the behavior to continue without intervention. The Director made the comment â€Å"Oh, that is common behavior for Dr. X. We just ignore it and Dr. X will forget all about it by tomorrow†, which indicates that the issue is centered on how Dr. X feels about the event rather than on how the rest of the staff is affected by his actions. Purpose The purpose of this report is to explore the ways in which this type of incident can be avoided in the future, both in direct relation to Dr. X and in relation to the behaviors and reactions of the entire staff. Guidelines about what is and what is not permitted where behavior and emotions are concerned will help to out line how this type of incident can be avoided in the future.... The staff is affected by the impact of that unpredictability and has no stable ground on which to determine the appropriate procedures from which to continue working. As well, the intended target of the anger is left emotionally affected, thus their work can be undermined. The care of the patient is then compromised due to the shift in focus from the medical situation to self-protection in an environment that has become hostile. This puts the patient in harms way as their care is compromised and the outcome of their care is put into jeopardy. Additionally, the event of a medical instrument being thrown across a room has the potential of creating damage or injury, thus creating the potential for legal liability. The potential costs of a hostile work environment are relevant on many levels. The first potential cost can be financially crippling as litigation from an employee who has experienced an inappropriate event or series of events can sue the hospital for having had no prevention, response, or intercession between the employee and the doctor who has behaved in this manner. A hostile workplace can be defined as â€Å"Conduct that has the effect of unreasonably interfering with an individual’s work performance or creating an intimidating, hostile, or offensive work environment† (Colaprete, 2007, p. 182). From the result of Harris v. Forklift Systems Inc, the decision that was made by the Supreme Court extended responsibility for actions that do not necessarily create psychological injury, but also to those events that are â€Å"severe or pervasive (enough) to alter the conditions of the victims employment and create an abusive work environment† (Colaprete, 2007, p. 182). It would be reasonable to assess the event in question as having the potential for

Saturday, November 16, 2019

Dennis Rader: The BTK Killer

Dennis Rader: The BTK Killer When you hear the words SERIAL KILLER, you instantly think about people like Jeffrey Dahmer, Ed Gein, Ted Bundy, or Charles Manson. You dont think about a family man with a wife and two children, county board member, President of the church congregation council, or a Cub Scout leader. Dennis Rader possessed all of these shining attributes. He also possessed a dark secret. This secret had festered in him from an early age and grew as he got older. Dennis Rader had fantasies about bondage, control, and torture which eventually led to murder. Raders reign of terror began in 1977 and ended with his capture in 2005; almost 30 years later. He labeled his victims as projects.3 He hunted his prey in stages he described as the trolling stage and stalking stage.3 He even called the tools used for his trade his hit kit.3 Dennis Rader was a stone cold killer who had no plans of stopping. The letters BTK stands for Bind, Torture and Kill, which was Raders mode of operation and a name he gave to himself. Throughout the years and in numerous communications with the police, he talked about his need for acknowledgment. In the 1990s BTK had disappeared from sight when, without explanation, he re-emerged in 2004. This re-emergence was more than likely due to his need for acknowledgment or public attention. In 2004, Rader started sending multiple letters, clues, and photos to the authorities that led to his capture and arrest in 2005. In the Beginning Dennis Rader was born on March 9, 1945. His parents were William and Dorothea Rader. His family moved to Wichita Kansas when Dennis was little. While growing up, Rader appeared to be a normal child. He was a member of the Boy Scouts and a church youth group member. He attended Riverview Elementary School1 and was described as a student with withdrawn tendencies.1 Rader later admitted that he developed fantasies about bondage, control and torture from an early age, while still in grade school.1 As he got older, he had fantasies about tying girls up and having his way with them.1 He also admitted to killing cats and dogs as a youth by hanging them.1 He began to perfect the art of hiding his dark secret from everyone at an early age. 1974-The Killing Begins It all started when a family of four, the Otero Family, was brutally and maliciously murdered in their home on January 15th, 1974. These four murders, along with six others, would leave the authorities, media, people of Wichita Kansas, and people around the world baffled and in fear for the next 30 years. A killer was on the loose and Bind, Torture, Kill was his mode of operation. Joseph Sr., Julie, Joseph II, and Josephine Otero were the BTK Killers first victims. Their family consisted of the husband, wife, and 5 children. Only two of the children were murdered and they were the children that were home on the day of the murders. These murders occurred in the early morning hours. Dennis Rader invaded their home at gunpoint and ordered everyone into a bedroom where he tied them up. He tried to kill Joseph Sr. first by putting a bag over his head and pulling tight, but somehow a hole was torn in the bag. He later went back and put another bag over Joseph Sr. head and strangling him with a cord. Julie Otero was the second victim to be killed by Rader. He tried to kill Julie with his hands at first but when that didnt work, he strangled her with a cord. Nine year old Joseph II was the third victim. Joseph was moved to another bedroom and suffocated with two bags placed on his head. The fourth and final victim, on this day, was Josephine Otero. She was eleven year s old. Rader took Josephine to the basement of their house and hung her from the drainage pipe. Rader admitted to having sexual fantasies after she was hung.3 He masturbated on her legs and a pipe near where she was hung. His DNA left at the scene was later matched to other killings. BTKs fifth victim was Katherine Bright. She was killed by Rader in April 1974; just four short months after the Oteros were murdered. She was 21 years old. Radar broke into her house and waited for her to come home but he didnt expect for her brother (Kevin Bright) to be with her. He made her brother tie her up first, and then he tied her brother up in another room in the house. Kathryn put up a fight for her life and was eventually stabbed several times by Rader. She later died in the hospital. Her brother escaped during Raders fight with Kathryn but was shot in the head while he fled. Kevin may be the only person to see the serial killer and live (although his description still didnt help the police capture BTK in the 70s). 1977-The Killing Continues It had been 3 years since the Otero family and Kathryn Bright was brutally murdered by the BTK Killer. His sixth victim was Shirley Vian Relford, 24. Rader admitted in court that Relfords murder was completely random.3 He actually planned on killing a particular person but when he went to knock on the door, no one answered. After continuing to troll the neighborhood, he knocked on one other door and got no response. He approached a little boy, watched what house the little boy went into and followed him. When he got inside the house, he put Shirleys three young children in the bathroom and then tied Shirley up and strangled her. He left his semen on some panties that were found next to her body. December 1977, BTK struck again. This time his victim was Nancy Fox, 25. She was victim number 7 and Rader labeled her as Project Fox Hunt5. He had apparently been watching Fox for a long time, stalking her. He would go by her house several times, rummage through her mailbox to find out what her name was, and stalked her at her job.3 On this night in December, he went by her house and knocked on her door but when no one answered, he broke in. He waited in her house in the kitchen and when she got home, he told her he was going to rape her and tied her to the bed. Afterwards, he strangled her. He left semen on a nightgown that was found next to her body. Rader later described Foxs murder as the perfect hit6(pp. 53) because he said that there was no interference in the killing. 1985-Eight Years Later Eight years after Nancy Fox was murdered, BTK was back on the scene and ready for his next victim. That victim was Marine Hedge, 53. Rader labeled her as Project Cookie.6(pp. 92) The sad part about this murder is that Hedge lived on the same street as Rader; only six doors down to be exact. He broke into her house and waited for her. When she came home, she was not alone. She had a male friend with her so Rader hid out in the house and waited for her male friend to leave. Once her male friend left, Rader strangled her in her bed with his bare hands. Hedge was the first victim where Rader moved the body from the house after killing them. He took her body to his churchs basement and posed it for photographs. Her body was later found in a ditch on the roadside. 1986-Victim #9 On September 16, 1986, Vicki Wegerle became BTKs ninth victim. She was 28 years old. Rader used trickery to get in to Wegerles house. He posed as a telephone repair man3 with a uniform and a hard hat. He called his outfit for this murder his hit clothes.3 When he got into her house, he pulled a gun on her and attacked her. She put up a fight for her life but he eventually overpowered her and strangled her with a nylon sock. He also posed her body for photographs as he had previously done to Hedge. It was later found out that Vicki was not dead when Rader left her house; he only thought she was dead. She later died when the paramedics couldnt revive her. 1991-Final Victim-5 years later BTKs last and final victim was Delores Davis, who was murdered on January 19, 1991. She was 62 years old. By this time, a decade had passed since BTK began his killing spree. Rader had previously cased the place before3 and this time she was in the house. It appears as though Rader had gotten lazy by the 10th murder because he threw a concrete cinder block through Daviss patio glass door and bombarded his way into her house. He made no attempt to conceal the noise that the shattering glass made. He pretended to be a wanted criminal and eventually strangled Davis. She was the second victim that Rader had moved from the location of the murder. Her body was dumped under a bridge. She too was posed and photographed after being killed. Raders mask was left by her face. The Investigation The BTK investigation began in the mid 1970s, spanned the length of 30 years, and concluded with the arrest and conviction of Dennis Rader in 2005. In the early 1980s, the Wichita Police Chief created a secret task force6(pp.86) of special investigators to work on the BTK case. They were the team that hunted BTK. This team was called the Ghostbusters.6(pp. 85) There were tons of calls and tips throughout the BTK investigation. Investigators came up with lists to eliminate and compare suspects. They put together a list with tens of thousands of names 6 (pp.88) This list included men who went to the local college, men who worked with any of the victims, men who were between 21 and 35 years of age in 1974 and lived in the county6(pp. 88), and mostly men with any kind of sex/torture/perverse/stalking behavior on their criminal record. Several of the detectives went door-to-door to most of these suspects houses and asked outright if they would submit to DNA testing. Suspects who were unwi llingly to be tested were placed under surveillance. In the Otero murders, police interviewed more than 1500 people6(pp. 31) to no avail. Police originally thought that organized crime families or drugs may have been involved in the family murders. Some police didnt want to accept the fact that a serial killer may have been on the loose or that there were similarities in the Otero and Bright killings. It wasnt until BTK starting sending the police clues about the murders that they put it all together and realized that a serial killer was on the loose. Three of the victims worked at the same location; Colemans. Even when Kathryns brother Kevin (who survived the attack) gave the police a description of his attacker, they never caught him. Even with all of the man hours and leg work put into the investigation, BTK was not caught back then. From 1991 until 2004, when BTK resumed communication with the police, the trail for the serial killer had gone completely cold. Search and Arrest Warrants and Subpoenas There were several search and arrest warrants issued in the BTK case in the later years. In the beginning, there was mostly list compiling and DNA tests done to eliminate suspects but no definite leads as to who BTK was. There were too many suspects and police kept hitting dead ends. In December 2004, the television station KSN reported that Roger Valadez had been arrested in connection with the BTK killings. The report was based on an anonymous tip that was inaccurate. Mr. Valadez was arrested early that morning on charges of criminal trespassing and housing code violations12 but it was somehow leaked that he was a suspect in the BTK murders. A search warrant was executed on his home. He was cleared by DNA tests of any criminal activity related to the BTK killer.6(pp. 227) Valadez later sued the television station and won. In 2005, police obtained a warrant for the medical records of Raders daughter (Kerri Rader) which was a familial match with semen collected at an earlier crime sc ene.13 His daughters DNA match and other evidence that police had accumulated while surveilling Rader gave them probable cause for a search warrant. Raders home, vehicle, church and office were also searched for evidence after the warrant was executed. Also, a search warrant for Raders DNA was executed after he was arrested. He was cheek swabbed while in police custody. Four swabs were taken; two were immediately sent to the county forensic lab and the other two went to the forensic lab in Topeka, Kansas. 6(pp. 269) Interviews Rader was interviewed by the police in 2005. He talked in the third person as though Dennis Rader was someone else. He ducked questions for many hours. Rader gave away nothing during his interview. He spoke to the detectives as equals, noting that he too was in law enforcement.6 Interrogations In September 1986, Bill Wegerle was interrogated by the police and suspected of killing his wife Vicki Wegerle. He was given two lie detector tests and he failed both.6(pp. 102) He was interrogated for hours and asked a lot of probing questions about his and his wifes relationship. Wegerle told the police that on his way home from work, he saw his own car ride right by him and he saw someone else driving it but he didnt think anything of it at the time.16 They mainly wondered how he sat in the house for forty-five minutes before he found her body.6(pp. 101) The police did not believe Bill initially but later contributed him failing both lie detector tests to the stress of a grieving husband. Dennis Rader was interrogated by FBI profiler Bob Morton and Wichita Police Lt. Ken Landwehr shortly after his arrest in 2005. He was arrested on February 25, 2005 as a suspect in the BTK killings. He was formally charged with the murders on February 28, 2005.9 It was during this interrogation that Dennis Rader confessed to being the BTK killer. His 16 hour confession was given in full and of his own free will and recorded on over 20 DVDs.9 Rader knew that he was going to kill again and he told the officers who interrogated him this. He was already in the process of stalking his next victim when he was arrested. Seizure and Analysis of Forensic Evidence There was a ton of evidence and more than enough to get a conviction once BTK was captured. Due to his sexual perversion, he left semen at most of the locations of his killings. Although BTK wasnt caught until 3 decades later, the case was never closed and police had evidence stored from all of the crime scenes. Rader stayed in contact with police through the years taunting them and sending them clues that would later be used to catch and convict him. For example, Rader was so pleased with himself after he killed Nancy Fox that he called the police the next morning to gloat about it. He spoke 15 words during a three-second span of a seven second recording. The audio quality of the call, taped at a slow speed, so was poor it was not released to the public until August 1979. The tape was sent to the Washington DC, FBI laboratory but it was too brief and distorted by background noise to make a comparison voiceprint.5 This tape was kept as evidence and more than likely presented during R aders trial. Semen was found on or near the bodies of his victims Josephine Otero, Shirley Vian and Nancy Fox; all of the semen was matched to Rader. Also, DNA obtained from fingernail scrapings of Vicki Wegerles left hand matched Raders DNA, eliminating any doubt that he was her murderer. High tech forensic computer detection was used to get evidence off of the disk Rader mailed to a Wichita television station in February 2005. This is how Rader was caught. Using this high tech computer, residual information left over on the disk identified the last person who had used the disk: someone named Dennis. It was also learned that the disk had been used on computers registered to two local organizations, Christ Lutheran Church and Park City Library. An internet search on the churchs name provided the name of the congregations president: Dennis Rader.14 Summary Its sad to say that if he had maintained his silence after his last murder in 1991, BTK would still be a free man today, writing citations and catching dogs for the city of Park City. He probably would have never been caught. But his ego was way too big for his own good, and he just had to let everyone know he was still at large. He wanted to taunt the police with the fact that BTK was still on the loose after 3 decades. His cockiness led to his downfall. Had these murders occurred today, I believe that he would have been caught before he got the chance to kill ten people. Today, we have much more advanced technologies than investigators had in the 70s and ways to gets results faster. Rader left entirely too many clues and had entirely way too much correspondence with the police over the years for them to not have caught him long ago. Some of his murders were way too sloppy and although he had a college education, he didnt appear to be intelligent enough to outsmart 3 decades worth o f police investigators. That is probably the reason why as soon as he re-emerged in 2004, he was caught. Although he planned to kill others, that same year, he never got the chance. Dennis Rader pled guilty to 10 counts of first degree murder and was found guilty and sentenced on August 18, 2005. He was sentenced to 10 consecutive life terms, which require a minimum of 175 years without a chance of parole. Because Kansas had no death penalty at the time the murders were committed, life imprisonment was the maximum penalty allowed by law. His earliest possible release date is February 26, 2180. Rader, 60, will spend the rest of his life at the maximum-security El Dorado Correctional Facility near Wichita. Other cold cases in Kansas were reopened to see if Raders DNA matched crime scenes, but Raders confession was limited to the 10 known victims and police and prosecutors do not believe there were any more victims because of the extensive records and memorabilia he kept on each of his victims.9 During Raders sentencing hearing, the families of the victims were given the chance to give victim impact statements describing how the murders have effected and continues to effect their lives. The families got a chance to speak on behalf of their loved ones who are no longer here because of BTK. C, Si, Ge Doped (6,3) Chiral BNNTs: A Computational Study C, Si, Ge Doped (6,3) Chiral BNNTs: A Computational Study The C, Si, Ge Doped (6,3) Chiral BNNTs: A Computational Study Mohammad Reza Zardoost a,*, Behnam Dehbandib , Marjan Dehbandib Abstract: Electronic structure properties including bond lengths, bond angles, dipole moments ( µ), energies, band gaps, NMR parameters of the isotropic and anisotropic chemical shielding parameters for the sites of various atoms were calculated using density functional theory for C , Si , Ge doped (6,3) Chiral BNNTs. The calculations indicated that average bond lengths were as: Ge-N > Si-N > C-N and Ge-B > Si-B > C-B. The dipole moments for C, Si, and Ge doped (6, 3) Chiral BNNTs structures show fairly large changes with respect to the pristine model. Keywords: NMR, Nanotube, DFT, Dipole moment 1. Introduction Since the early times that carbon nanotube (CNT) was discovered by Iijima [1], the physical, chemical and structural properties and applications of this material have been investigated extensively [2–4]. The properties of CNTs are mostly dependent on the tubular diameter, doped atoms in the structure and chirality, which make their synthesis for the specific purposes difficult. A lot of studies have been done in the investigation of stable structures of non-carbon based nanotubes, among them boron-nitride nanotubes (BNNTs) have a great importance [5]. The stable tubular structure of BNNT was initially found by calculations [6] and later was successfully synthesized [7]. After this time, a large growing number of experimental and theoretical studies, specifically ab initio calculations on carbon-, silicon- and germanium substituted BN nanotubes have been performed on the electronic structures of the BNNTs [8–11]. The results show that C, Si and Ge replacements can induce spontaneous magnetization with different deformation in the nanotube [12]. At the present time, nuclear magnetic resonance (NMR) spectroscopy [13-14] is the best technique to study the electronic structure properties of materials. Doping of Chiral BNNTs by C, Si, Ge atoms changes their properties and so the interactions of the nanotube and foreign atoms or molecules. (see Fig. 1). In this work we studied the electronic structure properties, including bond lengths, bond angles, dipole moments ( µ), energies, band gaps, and NMR parameters in the C, Si, Ge doped Chiral BNNTs structures. a b c d e f g 2. Computational methods All calculations were performed using Gaussian 98 computational package [15] with density functional theory (DFT) method using Becke’s three-parameter hybrid exchange functions with the correlation functions of Lee, Yang, Parr (B3LYP) [16,17] using 6-31G (d) basis set [18]. Previously it has been found that the calculated NMR parameters at the B3LYP and B3PW91 levels have a good agreement with the experiment [19]. It is shown that B3LYP gives reasonable and even accurate band gap values for nanotubes [19] so this function is chosen for band gap calculations. In the present study, we considered a pristine (6,3) chiral BNNTs of diameter 6.6 Ã… and 10.1 Ã… length. This BNNT model consists of 42 Boron, 42 Nitrogen and 18 hydrogens (B42N42H18) B and N sites of this BNNT are doped by C, Si, Ge (see Fig. 1). We have seven models, namely pristine (Fig. 1a), or with a B or N atom doped by C, i.e., the B-C-B or N-C-N model (Fig. 1b, c), doped by a Si atom, i.e., the B-Si-B or N-Si-N model (Fig. 1d, e), doped by a Ge atom, i.e., the B-Ge-B or N-Ge-N model (Fig. 1f, g). We investigated the influence of the C, Si, and Ge doping on the properties of the (6,3) Chiral BNNTs. The hydrogenated models of the pristine (6,3) Chiral BNNTs and the three atoms doped models of BNNTs consisted of 102 atoms with formulas of B42N42H18 (pristine), CB41N42H18 and CB42N41H18 (B-C-B or N-C-N model), SiB41N42H18 and SiB42N41H18 (B-Si-B or N-Si-N model), GeB41N42H18 and GeB42N41H18 (B-Ge-B or N-Ge-N model). The calculated CS tensors in the principal axis system (PAS) with the order of ÏÆ'33 > ÏÆ'22 > ÏÆ'11 [20] for C, Si, and Ge doping for the investigated models of the (6,3) Chiral BNNTs were converted into measurable NMR parameters (isotropic chemical shielding (CSI) and anisotropic chemical shielding (CSA) p arameters) using Eqs. (1) and (2) [23], summarized in Tables 3-6. CSI(ppm)= (ÏÆ'11+ ÏÆ'22+ ÏÆ'33) (1) CSA(ppm)= ÏÆ'33(ÏÆ'11+ ÏÆ'22) (2) For NQR parameters, computational calculations do not directly detect experimentally measurable NQR parameters, nuclear quadrupole coupling constant (CQ), and asymmetry parameter (). Therefore, Eqns. (3) and (4) are used to convert the calculated EFG (electric field gradient) tensors in the principal axis system (PAS) with the order of |qzz| > |qyy| > |qxx| to their proportional experimental parameters; CQ is the interaction energy of nuclear electric quadrupole moment () with the EFG tensors at the sites of quadrupole nuclei (Nuclei with nuclear spin angular momentum greater than >1/2), but the asymmetry parameter () is a measure of the EFG tensors, which describes the deviation from tubular symmetry at the sites of quadrupole nuclei. The standard Q value (Q (11B) = 40.59 mb) reported by Pyykkà ¶ [21] is used in Eq. (3). The NQR parameters of 11B nuclei for the investigated models of the (6,3) BNNTs are summarized in Table 7. (3) (4) 3. Results and discussion 3.1. Structures of the (6,3) Chiral BNNTs The structural properties consisting of the B-N bond lengths, bond angles, dipole moments ( µ), energies, and band gaps for the investigated models of the (6,3) Chiral BNNTs are given in Table 1 and Table 2. R1, R2, and R3 are B-X-B and N-X-N bond lengths (doped atom and its neighbors). ÃŽ ±, ÃŽ ², and ÃŽ ³ are B-X-B and N-X-N angles. There are Six forms of C, Si, Ge doped Chiral BNNTs for the (6,3) Chiral model. These calculations indicated that the average of the (X = C, Si, Ge) bond lengths of the B-X-B and N-X-N models is larger than those the pristine models. The reason seems to be increasing of atomic radius going from carbon to Ge. The bond angles produce some structural deformations that are responsible for deformation in structure by changing the doped atom size respect to carbon. For the B-X-B and N-X-N (X = C, Si, Ge) models, the diameter values are larger than those the pristine models. It has worth to be noted that the significant changes of geometries are just for those atoms placed in the nearest neighborhood of X atom and those of other atoms almost remained unchanged. 3.2. Energy band structure and density of states Table2. Energy, LUMO, HOMO, LUMO-HOMO gap, dipole moment ÃŽ ¼, and electronegativity (χ) of the studied structures at B3LYP/6-31G(d). The total densities of states (DOS) of these tubes are presented in Fig. 2. As can be seen from Fig. 2, the calculated HOMO-LUMO gap (band gap) of the (6,3) Chiral BNNTs is 6.2 (eV) and the calculated band gaps of the C , Si , Ge doped models molecular orbital’s are 3.5,5.8 , 5.0 , 5.0 , 5.5 and 5.0 (eV) respectively (See Table 2). Doping of C, Si, and Ge in these tubes causes significant changes in the gaps of the DOS plots. In comparison with the pristine model, the band gaps of these models are reduced that increase their electrical conductance. These results indicated that the doping of C, Si, Ge atom by B, N atoms B-X-B and N-X-N model (X=C, Si, Ge) has more influence on the band gap of the Chiral BNNTs (see Table 2). By increasing atomic number and size polarizability increases that enhances dipole moment. Dipole moments ( µ) of the C, Si, Ge doped Chiral BNNTs structures (Fig. 1) indicate slightly changes with respect to the pristine model. 3.3. NMR parameters of the (6,3) Chiral BNNTs The NMR parameters for the investigated models of the (6,3) Chiral BNNTs are tabulated in Table 3, 4, 5 and Table 6. In the pristine model of the (6,3) Chiral BNNTs, there are 42 B atoms and 42 N atoms in the considered model and the NMR parameters are separated into five layers and six Columns, which means that the CS parameters for the atoms of each layer and Column have equivalent chemical environment and electrostatic properties. In Fig. 1b,c,d,e ,f,g the B and N atoms has been replaced by the C, Si, Ge atoms. Table 3 Isotropic shielding parameters of the studied structures at B3LYP/6-31G(d) The calculated results in Table 3 indicate that doping C, Si, and Ge slightly changes the NMR parameters of the various B and N atoms in (Fig.1b–g) of the Si, Ge, C doped(6,3) Chiral SWBNNTs except for the N25 and N27 atoms for which the changes are significant. Because among the atoms of (Fig.1b–e) B–X model (X= C, Si, Ge), the N25 and N27 atoms are the nearest neighbors of the C, Si, and Ge atoms; hence, both the CSI and CSA parameters show the most significant changes due to the C, Si, Ge doping. Also, changes in the CSI parameters of the N10 and N12 atoms, which are the next nearest neighbors of the C, Si, Ge atoms, are also notable. There are differences between the properties of the electronic structures of C, Si, Ge atoms. Comparison of the calculated NMR parameters in (Fig. 1b–g) indicates that the properties of the electronic structure of the Ge doped (6,3) Chiral SWBNNTs are more influenced than those of the Si–N model, where the N atom is doped by the Si atom. We studied the electronic energies of the models. The changes in the NMR parameter due to the C, Si, and Ge doping are more significant for the N–Si, N–Ge, N-C models with the pristine model. 3.2. NQR parameters The 11B NQR parameters (ÃŽ ·Q and CQ) in the geometrically optimized SWBNNT models were calculated from the EFG tensors. The results are tabulated in Table 7. A quick look at the results reveals that the calculated NQR parameters are not similar for various nuclei; therefore, the electrostatic environment of BNNT is not equivalent in length in all BNNT models. Since, in contrast with CNTs, the ends of BNNTs are different, the NQR values decrease from each end to the opposite end of the chiral model. It was proved before that the end nuclei in the SW-BNNTs are crucial to their growth and also field emission properties [22, 23]. Since no experimental NQR data for BNNTs are available in the literature, the tables do not include any reference experimental data for the calculated results. B17 and B46 in all models have the largest CQ that states greater orientation of the EFG tensor eigenvalues along the z-axis of the electronic distribution at the sites of the 11B17 and 11B46 nuclei. The electrostatic environments of atom B17 and B46 are stronger than in the other layers along the length of the tube. The largest change in CQ is due to B46, located in the layer of doped atoms, because doping changes the geometrical parameters and hence the electronic behavior of atoms. Table 8 The 11B NQR parametersThe highest occupied molecular orbital (HOMO) and the lowest unoccupied molecular orbital (LUMO) in the pristine, and C–X (X=B, N) models are plotted in Fig. 3. For the pristine model, HOMO and LUMO are uniformly distributed throughout the B–N bonds, whereas, in the C–X model (X=B, N) models, HOMO and LUMO are highly localized at the doped regions. (see Fig. 3) In comparison with the pristine model, band gaps of the C, Si, and Ge doped models increased their electrical conductance. Conclusion We studied the electronic structure properties including bond lengths, bond angles, dipole moments (ÃŽ ¼), energies, band gaps, the NMR parameter of the six C, Si, Ge doped SWBNNTs models by means of DFT calculations. The calculated results indicated that the average Ge-B bond lengths of the Ge-N model are larger than those the pristine and the C–B, C–N, Si–B, Si-N and Ge-B models: Ge–N>Si–N>Ge–B>Si–B>C–N>Pure>C-B. The values of dipole moments (ÃŽ ¼) of the six C, Si, Ge doped SWBNNTs are Ge–N> Si–N> Ge–B> C–N> Pure> Si–B > C-B. In comparison with the pristine model, the band gaps of the six C, Si, Ge doped models are reduced and their electrical conductance increased as: C–B > Si–B = Si–N = Ge–N > Ge–B > C-N. The NMR values for the B and N atoms directly bound to the C, Si, and Ge in the C, Si, and Ge doped models are significantly changed. Comparison of the calculated NMR parameters in the X–B and X-N (X=C, Si, Ge) models shows that the properties of the electronic structure of the X-B doped (6,3) Chiral SWBNNTs are more influenced than X–N model in Fig. 1b–g. The electronic sites of the B and N atoms in X-N model have greater effects than X-B model in Fig. 1 in the C, Ge, and Si doping processes. References [1]S. Iijima, Single-shell carbon nanotubes of 1-nm diameter, Nature 354 (1991) 56. [2]H. Terrones, F. Lopez-Urias, E. Muooz-Sandoval, J.A. Rodriguez-Manzo, A. Zamudio, A.L. Elias, M. Terrones, Magnetization of carbon-doped MgO nanotube, Solid State Sci. 8 (2006) 303. [3]F. Moreau, R. Langlet, P.h. Lambin, P.P. Kuzhir, D.S. Bychanok, S.A. Maksimenko, Dielectric properties of a novel high absorbing onion-like-carbon based polymer composite, Solid State Sci. 11 (2009) 1752. [4]R. Joshi, J. Engstler, P. Haridoss, J.J. Schneider, Formation of carbon nanotubes from a silicon carbide/carbon composite,Solid State Sci. 11 (2009) 422. [5]A. Loiseau, F. Willaime, N. Demoncy, N. Schramcheko, G. Hug, C. Colliex, H. Pascard, Mathematical modeling for the simulation of heavy metal ions, Carbon 36 (1998) 743. [6]X. Blase, A. Rubio, S.G. Louie, M.L. Cohen, Stability and band gap constancy of boron-nitride nanotubes, Eur. Phys. Lett. 28(1994) 335. [7]N.G. Chopra, R.J. Luyken, K. Cherrey, V.H. Crespi, M.L. Cohen, S.G. Louie, A. Zettl, Boron-nitride nanotubes, Science 269 (1995) 966. [8]L. Guo, R.N. Singh, Catalytic growth of boron nitride nanotubes using gas precursors, Physica E 41 (2009) 448. [9]B. Fakrach, A. Rahmani, H. Chadli, K. Sbai, J.-L. Sauvajol, Raman spectrum of single-walled boron nitride nanotube, Physica E 41 (2009) 1800. [10]M. Mirzaei, An electronic structure study of O-terminated zigzag BN nanotubes, Physica E 41 (2009) 883. [11]M. Giahi, M. Mirzaei, Computational NQR study of a boron nitride nanocone, Z. Naturforsch. A 64 (2009) 251. [12]J. Wu, W. Zhang, Chem. Phys. Lett. 457 (2008) 169. [13]R. R. Zope, B.I. Dunlap, Phys. Rev. B. 72 (2005) 45439-6. [14]F.A. Bovey, Nuclear Magnetic Resonance Spectroscopy, Academic Press, San Diego, 1988. [15]M.J. Frisch, G.W. Trucks, H.B. Schlegel, G.E. Scuseria, M.A. Robb, J.R. Cheese- man, V.G. Zakrzewski, J.A. Montgomery Jr., R.E. Stratmann, J.C. Burant, S. Dapprich, J.M. Millam, A.D. Daniels, K.N. Kudin, M.C. Strain, O. Farkas, J. Tomasi, V. Barone, M. Cossi, R. Cammi, B. Mennucci, C. Pomelli, C. Adamo, S. Clifford, J. Ochterski, G.A. Petersson, P.Y. Ayala, Q. Cui, K. Morokuma, D.K. Malick, A.D. Rabuck, K. Raghavachari, J.B. Foresman, J. Cioslowski, J.V. Ortiz, A.G. Baboul, B.B. Stefanov, G. Liu, A. Liashenko, P. Piskorz, I. Komaromi, R. Gomperts, R.L. Martin, D.J. Fox, T. Keith, M.A. Al-Laham, C.Y. Peng, A. Nanayakkara, C. Gonzalez, M. Challacombe, P.M.W. Gill, B. Johnson, W. Chen, M.W.Wong, J.L. Andres, C. Gonzalez, M. Head-Gordon, E.S. Replogle, J.A. Pople, GAUSSIAN 98, Gaussian, Inc., Pittsburgh, PA, 1998. [16]A.D. Becke, J. Chem. Phys. 98 (1993) 5648-5652. [17]C. Lee, W. Yang, R. G. Parr, Phys. Rev. B. 37 (1988) 785. [18]G. A. Petersson and M. A. Al-Laham, J. Chem. Phys. 94, 6081 (1991). [19]M. Mirzaei, N.L. Hadipour, J Phys Chem A. 110 (2006) 4833-4838. [20]Y. Matsuda, J. Tahir-Kheli and W. A. Goddard, The Journal of Physical Chemistry letters 1 (2010) 2946. [21]R.S.Drago,Physical Methods for Chemists,second ed. ,Saunders College, Florida, 1992. [21]P. Pyykkà ¶, Mol. Phys. 99 (2001) 1617. [22] S. Hou, Z. Shen, J. Zhang, X. Zhao, Z. Xue, Chem. Phys. Lett. 393 (2004) 179. [23] E. Bengu, L.D. Marks, Phys. Rev. Lett. 86 (2001) 2385.

Wednesday, November 13, 2019

Flirting and Courting Rituals of The Victorian Era :: Victorian Era

Flirting and Courting Rituals of The Victorian Era In Victorian society courting rituals were put into effect to keep the young ladies pure and the gentlemen confused. Courting usually began at balls and dances where young girls were first introduced into society during their â€Å"coming out.† At every gathering of Victorian society the young ladies were chaperoned by their mothers or some other married woman so that nothing improper would happen that could ruin the young lady's reputation in society. The young ladies and gentlemen at the dances and balls were introduced through a third party and their Christian names were prohibited from being used because it would have been to forward and improper. After placing their name on the dance card of the young lady they could then proceed to dance no more then three dances because any more then that would be inappropriate in Victorian society. â€Å"After this formal introduction the gentleman would give the young lady his card to remember him by and at the end of the evening the young lady would look through her cards to see which gentleman she would allow to court her† (Powell). She would give the gentleman permission to court her by giving that gentleman her card and the right to call on her at her home where the courtship must take place. In Victorian society there were certain criteria that each party followed to find the perfect suitor. If they followed these rules to pick their mate their personal shortcomings would balance out when they married. Certain criteria consisted of â€Å"not marrying a person with the same eye color as yourself, marrying someone that was opposite of you in physical and mental characteristics, and marry someone with straight or thicker hair if your hair was curly or thin† (â€Å"Finding† 2). After a suitable suitor is chosen and the young lady and the gentleman begin to court certain rules must be followed. These rules were in place to keep the ladies pure until marriage. â€Å"The courting couple always had to be chaperoned, the couple needed permission to go out during the day, the gentleman could never stay late at the young lady's house, he could never call without permission and the young lady had to say goodbye at the parlor door† (â€Å"Love† 21). Because Victorian society was repressive towards true emotion, gentlemen and their ladies could not publicly express their love for one another.

Monday, November 11, 2019

Inspiring a Shared Vision

When it comes to inspiring a shared vision, I have an easier time with envisioning the future than I do with enlisting others. I think and imagine with the utmost optimism, assuming all people can and will reach their maximum potential. I envision a utopia of independently motivated people who learn for the sake of learning and achieve for intrinsic satisfaction. This is typical pacesetting leadership. My strength in this area is due to my enthusiasm and excitement for improvement, new beginnings, and becoming the most efficient versions of us. Like Laura Esserman, however, I am not the best at enlisting others to manifest my vision into reality. Overall, my peer reviewers and I think my ability to envision the future is above average. I can see long-term ideas and how different environmental variables will affect the outcome of a project. I enjoy thinking about contingency plans and I usually have a good understanding of what I would like the end result to look like and perform like. For example, I currently work as a web designer at an apparel company in Stafford. I have been working here almost eight months. When I arrived in May to start the job, I had many fantastic ideas already that I wanted to try. However, limitations by the software and the staff forced me to re-assess my vision several times every month. I can still see what I would like the functionality of the website to be in my head, and continue to take every strenuous step forward that I can to achieve this sometimes lofty goal. The problem with my job is that an individual best undertakes creative tasks, yet everyone wants to have input on the website’s design. My weakness in inspiring a shared vision is in persuading others that my way will be the best way in the end. The main reason I pursued an MBA is because I was hoping it would add more credibility to my ideas. I frequently struggle with this as a graphic designer, as well, because everyone has a different idea of what they want the end product to look like. I already know that the client will almost always go with my original idea. I am the hired expert after all, but it takes awhile for others to catch up with what I know. I become frustrated with others’ inputs. I have entertained many of my coworkers’ ideas for the website, almost to the point where it now eclipses my original vision and I have very little task identity. Because of this, I have lost any remaining motivation I had to create an appealing design for the website. I know a week later, a coworker will tell me, â€Å"I really hate the blue. Make it red.† Because I don’t desire constant input on the design of the website, it has made it difficult to enlist others for help in functional areas of the site. I require salespeople’s help in creating showrooms of featured products, as well as marking sale options, for example. When I ask for specific products, I get vague answers from my co-workers. I need them to feel like they have a say in the website’s look, but more importantly, they need to feel accountable for their respective sections of the site. I need to take control of the creative part of the website as an individual, and take the role of a teacher in helping catch everyone up to my vision. I think everyone wants to help out, but they are too busy with their own tasks to get excited about the work I need for them to do for the website. I will do my best to harness my enthusiasm and optimism this week in flushing out the functional areas of the website, maybe working alongside nervous co-workers who don’t have the confidence to make edits to the company’s public website. Once everyone knows their roles and has a uniform strategic idea in their mind, finishing the website should be so much easier than the difficult task it has been for me.

Friday, November 8, 2019

5 Ways to Handle Rejection Like a Pro

5 Ways to Handle Rejection Like a Pro Rejection stinks and it happens to everyone. Everyone. We’ve all gone on first dates that didn’t turn into second dates. We’ve all missed out on the publication, the big promotion, the invite to our second-grade schoolmate’s selective birthday party. Instead of wallowing in self pity, here are five ways to make lemonade and reframe your rejection next time you get whacked with one. 1. Buckle down and  rethink your strategyEither it’s a numbers game and you just have to wade through the pile of â€Å"no’s† to get to the eventual â€Å"yes,† or there are things you could be doing better. Every few rejections, take a time out to reconsider your focus and your game plan, then make the necessary adjustments. This will make you feel like you’re doing something constructive even when the good news seems to be just beyond reach and out of your control.2. If the door is closed, find the windowOr the silver lining. Or the upside of the downside. Basically, try and tell yourself that this rejection only leaves you open for a better opportunity you might have missed. In other words, let go of this one and go for one better!3. Learn from itTake each rejection as a challenge to goad you to do better and be better. No matter what, you’ll grow (and succeed) faster, regardless of how many rejections you receive. You’ll probably still get rejections; everybody always does. But if you learn something and let each one spur you on, you’ll be way ahead of the game.4. Zen it outSay to yourself that this just wasn’t meant to be. Maybe the timing was off, or you were looking in the slightly wrong direction. Tell yourself everything happens for a reason, try to be at peace with that, and prepare yourself to seize the next opportunity with clear eyes and open arms.5. Realize it’s not all about youSometimes we’re rejected not because we’re not good enough. Sometimes we’ re too good. Or the reason for our being rejected has nothing to do with us at all. Maybe  you remind the hiring manager of a kid who bullied him on the playground 20 years ago. Or maybe someone was having a really bad day when she  interviewed you. Or, for company politics reasons, they had to overlook your stellar qualifications in favor of some other factor. You never know. Sometimes it’s best to sit back and not take things quite so personally. Remember, the right â€Å"yes† is just around the corner.

Wednesday, November 6, 2019

What Mobile Phone Do Consumers Prefer

What Mobile Phone Do Consumers Prefer Free Online Research Papers The purpose of the present study is to identify the association of age group regarding preference of a particular cellular service. In the era of globalization and information society, the fundamental role of telecommunication technologies cannot be underestimated. Pakistan’s mobile Industry is a dynamic and highly competitive market. Pakistan has the highest mobile penetration rate in the region. Cellular service subscribers are at 91.44 million growing @ 0.5%, and Cellular Mobile Density is 56.80 as of March 2009. As a result of unstable political situation and weakening macroeconomic indicators the growth in cellular segment has considerably slowed down. Thus, it is of growing concern to look at consumer buying decision process and shed light on the factors that finally determine consumer choices between different cellular services brands. For the purpose of our study five cellular service companies in Pakistan namely Mobilink, Ufone, Warid, Telenor, and Zong are selected. The findings provide that preference of a particular cellular service by a consumer is not independent of age group and it is concluded that there is some association exist i.e. preference of a particular cellular service by a consumer is dependent on age group. Literature Review: The last decade of the 20th century has been witness to remarkable technological developments in the area of wireless communication technologies. Telecommunication Industry has one of the most turbulent market environments today due to increased competition and change. Thus, it is of growing concern to look at consumer buying decision process and shed light on the factors that finally determine consumer choices between different cellular services brands. (Karjaluoto, H., Karvonen, J., Kesti M., Koivumki T., Manninen M., Pakola J., Ristola A., Salo J., 2005) argue that the choice of a mobile phone is a subjective choice situation, there are some general factors that seem to guide the choices. They also found that while technical problems are the basic reason to change mobile phone among students; price, brand, interface, and properties are the most influential factors affecting the actual choice between brands. (Ondrus, J. and Pigneur, Y., 2007) presents a study that unveils the technological and organizational preferences of various industries towards mobile payment developments in Switzerland. They argue that card based solutions are still preferred to mobile phone based solutions from an industry point of view. (Siau, K. and Shen, Z., 2003) examines issues in providing services via wireless technologies, i.e. mobile services. They discuss the challenges facing by mobile services, such as changes in business strategies, investment risk, limitations in mobile devices, networking problems, infrastructure constraints, security concerns, and user distrust in mobile applications. The authors also discuss the research issues, such as killer applications, usability, user interfaces, mobile access to databases, and agent technologies. (Leppaniemi, M. and Karjaluoto, H. 2005) presents the study which investigates the consumers willingness to accept mobile advertising. First, they study the factors that influence the acceptance of mobile advertising from both industrys and consumers point of view. Second, based on a review of previous studies in the field, the authors propose a conceptual model of consumers willingness to accept mobile advertising. Their findings provide several conceptual and managerial insights into the role of mobile advertising today and in the near future. Pakistan’s Experience with Telecommunication Industry: In the era of globalization and information society, the fundamental role of telecommunication technologies cannot be underestimated. Pakistan’s mobile Industry is a dynamic and highly competitive market. Cellular mobile telecommunication services – An Overview: Cellular mobile telecommunication services were introduced in Pakistan in 1990 and now Pakistan stands as one of the largest telecom subscriber with the cheapest calling rates in the region. Our Industry already has LL (Local Loop), WLL (Wireless Local Loop), LDI (Long distance and International), and ISP (Internet Service Provider) players and WiMax; 3G cellular systems are expected be a part of this Industry soon. Market Players: The major players of Pakistani Cellular mobile telecommunication service Industry are Mobilink by Orascom, Ufone by PTCL, Telenor from Norway, Warid by Abu Dhabi group and Zong by China Mobile. According to Pakistan Telecommunication Authority (PTA) Mobile subscribers are 91.44 million as on March 2009. Mobilink continues to lead the market with 28.24 million subscribers having (30.88%) market share, followed by Telenor with 19.98 million (21.86%), Ufone 19.61 million (21.45%), Warid 17.37 million (19%), Zong 5.98 million (6.54%) and Instaphone 0.25 million (0.27%). At present Mobilink has the largest coverage network across the nation, covering more than 10,000 locations. Telenor claims it is now acquiring more than 20,000 new subscribers every day, whereas Ufone claims to cover over 4536 key destinations. Current Scenario: (Rafiq, A., 2008) argues that a tough competition is expected as in the present scenario existing players are having a price war to attract existing and new users. Mostly the audience is subjected to deceptive advertisements and misleading offers which directly impacts consumer purchase decision. Objective: The aim of this study is to identify the association of age group regarding preference of a particular cellular service. We would like to investigate that whether the preference of users for a particular cellular service is dependent on different age group or not. Hypothesis: Ho: Preference of a particular cellular service is independent of age group. H1: Preference of a particular cellular service is not independent of age group. Methodology: For this research the Survey method is used. The data is collected through questionnaire technique in which responses from 200 respondents were collected through 19 questions which include general information as well as factors which motivates the people to prefer a particular cellular service. All the data was provided by the teacher to perform analysis as per the course requirement. Analysis: The analysis was performed by the using the software called SPSS and the variable and test used are mentioned below: Variables under study: Following are the variables which are used in the analysis. 1. Cellular service 2. Age group Both above-mentioned variables are categorical. Cellular service with 6 levels Age group with 2 levels Test Statistic: The Chi square test is used to test the hypothesis in this research. Chi-square is a statistical test which is commonly used to test the; Goodness of Fit Test Test of Attributes/ test of association/ test of independence The Chi – Square distribution is a positively skewed distribution therefore we use one tail critical region for the test. It is a positively skewed distribution lie between zero and upper value. Numerical and categorical variables are used and the critical region will always come in the right side. It is denoted by ?2 and its degree of freedom is n-1, where n = Number of categories Goodness of Fit Test: Chi-Square goodness of fit test is used when the distribution is non-normal and the sample size is less than 30, so the chi-square goodness of fit test determines whether the distribution follows uniform distribution or not. Test of Attributes / Association / Independence: It is used to measure the relationship between two attributes. In test of attributes we check the hypothesis that, is there any dependency exist amongst the attributes or not. For our research we are testing the association between cellular service and age group. Out Put: Summary: The N value 200 shows the total number of respondents or observations. 100% shows that all 200 respondents have responded and there is no missing value or observation. Summary: Cross tabulation is used to examine the variation in the categorical data, it is a cross measuring analysis. Above we are cross examine the Different age groups and Cellular Service used by the consumers. We take Cellular Service used in the column and Different age groups of the consumers in row, and we have totaled 200 observations. From the above-mentioned Cross tabulation table we can see that; The most number of people in the sample of 200 respondents are using Mobilink cellular service. Out of total two hundred respondents 90 are using Mobilink. Of which 38 users are in the age group of between 18 to 24 while 52 users are in the age group of between 25 to 30. Similarly if we analyze the Telenor and Ufone cellular services we can see that although Ufone cellular service users in total = 50 which are more then Telenor cellular service users in total = 38. But Telenor is more successful in capturing the consumers having age group between 18 to 24 with 28 users while Ufone has keep up with only 24 users. The results also show that Warid has a very low consumer base with overall users are only 22 with 10 users are in age group between 18 to 24 while 12 users are in the age group between 25 to 30. Analysis: The above table gives the test results for the chi-square test for independence or association. The first row labeled Pearson Chi-Square shows that the value of ?2 is 10.966 with 3 degree of freedom. The two-tailed p-value is shown as 0.012, which is less than 0.05, so we can reject our null hypothesis which means that the attributes are not independent and there is some dependency exists between attributes and concludes that the preference of a particular cellular service is not independent of age group. Conclusion: The test results are statistically significant at 5% level of significance and the data provide sufficient evidence to conclude that the preference of a particular cellular service is not independent of age group, and we are almost 100% confident on our decision and the rejection of the null hypothesis. Recommendation: From the above-mentioned Pie Chart it is evident that Mobilink cellular service has the largest market share and is most preferred by consumers or cellular service users of both age groups (i.e. between 18 to 24 and between 25 to 30) (see Table-2). The results of our analysis also show that preference of a particular cellular service by a consumer is not independent of age group which means that there is some association exist i.e. preference of a particular cellular service by a consumer is dependent on age group. In this respect we recommend that Cellular Service companies like Mobilink (market leader) and Ufone, Telenor and Warid (followers) should understand and closely monitor the changing attitudes of different age groups and formulate their marketing strategies accordingly. Reference: Karjaluoto, H., Karvonen, J., Kesti M., Koivumki T., Manninen M., Pakola J., Ristola A., Salo J., (2005) â€Å"Factors Affecting Consumer Choice of Mobile Phones: Two Studies from Finland†, Journal of Euro marketing, Vol. 14(3), The Haworth Press, Inc. Ondrus J. and Pigneur Y., (2007) â€Å"Cross industry Preferences for Mobile Payments Development in Switzerland†, Electronic Markets The International Journal, Vol.17, No.2. Siau, K. and Shen, Z., (2003) â€Å"Mobile communications and mobile services†, International Journal of Mobile Communications, Volume 1, Number 3. Leppaniemi, M. and Karjaluoto, H. (2005) â€Å"Factors influencing consumers willingness to accept mobile advertising: a conceptual model†, International Journal of Mobile Communications, Volume 3, Number 3, p. 197-213 Rafiq, A. (2008) â€Å"The telecommunication industry Growth prospects†, Pakistan Research Telecom Sector update, Khojas Capital Management (Pvt.) Ltd Mobile Cellular Services: at pta.gov.pk retrieved on: [Tuesday, May 12, 2009] Research Papers on What Mobile Phone Do Consumers PreferBionic Assembly System: A New Concept of SelfMarketing of Lifeboy Soap A Unilever ProductInfluences of Socio-Economic Status of Married MalesPETSTEL analysis of IndiaOpen Architechture a white paperThe Project Managment Office SystemIncorporating Risk and Uncertainty Factor in CapitalResearch Process Part OneMoral and Ethical Issues in Hiring New EmployeesDefinition of Export Quotas

Monday, November 4, 2019

Literature review Essay Example | Topics and Well Written Essays - 2000 words - 5

Literature review - Essay Example characterizes Russia’s basic Chechnya policy dating back to Stalin, which looks at Chechens as undeserving of political latitude because of their long history of banditry, among other reasons. This means political alienation for the Chechens, a condition that makes it a perfect breeding ground for violence (Hewitt, C., 2002). Hewitt posits that violence is a response to being excluded from the political arena, such that people will resort to violence if they see the political system as unresponsive to their needs. So when Chechen rebel bands intensified attacks on Russian troops and civilian targets, the Russian federation responded in kind and, in some cases, with even greater force. The group instinct of the Chechens perceived this as a threat. Based on Evan Harrington’s (2004) theory of inter-group hostility, the situation is rife for violence when a â€Å"group senses a threat from its government, from another group in the same country, or another government.† All the known political and psychological theories on inter-group hatred, prejudice, realistic conflict, ethnocentrism and authoritarianism may have come into play to hasten the plunge of the Russia-Chechen conflict into the pit of violence and hostility. Russia is a melting pot of races, cultures and religions, making the federation a stratified society. This condition breeds inter-group hatred, in which there will always be unequal power relations and even discrimination between social groups. (Amiot, C. & Bourhis, R., 2005) The Russians who comprise the social and political majority in the federation may thus look down on the smaller Muslim segment of the population who are then reduced to a minority or low-status group. Amiot & Bourhis (2005) observe that the dominant group members in such a situation tend to initiate â€Å"overt† or â€Å"covert† acts of discrimination against the low-power groups. This portends certain trouble because at a later stage, the members of the low

Saturday, November 2, 2019

Chinese and Japanese Buddhist Calligraphy Essay

Chinese and Japanese Buddhist Calligraphy - Essay Example Geographical features, cultural traditions, and religious beliefs have influenced art in in Asian countries. Calligraphy or the art of writing characters, one of the most ubiquitous forms of art, was practiced and revered in the Chinese cultural sphere. However, it later got spread across other Asian countries like Japan, Taiwan, Korea, and Vietnam, influencing the sensibilities and styles of different calligraphies. The art of calligraphy encompasses a sense of aesthetic richness that is estimated to have spanned over four millennia. It originated from a region of diverse cultures, traditions, and beliefs, contributing much to the writing art of Asian countries, particularly China and Japan. Building on the tradition of calligraphy, Japanese and Chinese arts developed a distinct style that sets it apart from the Western art and paintings. Both Japanese and Chinese Calligraphy originated and developed primarily from the ancient writing system of China. The discussion compares and con trasts the origins, forms, and inscriptions of Japanese Buddhist Calligraphy and Chinese Buddhist Calligraphy. Thesis: The similarities in Japanese and Chinese Buddhist Calligraphy are primarily based on the Chinese writing system from which they both originated. However, the differences that developed between the calligraphy styles can be attributed to the symbols, inscriptions, language, and the manner in which it is composed.