Saturday, August 31, 2019

Website report

However, the sample code provided In the lecture notes is in C. Therefore, this mall task is divided into the following sub-tasks: Port the SSP code to Java Implement missing timer related classes and functions The following sections will cover these three sub-tasks. Porting the code Minor changes were made in order to change the syntax of the code to Java. As see_nor was not specified in the given files, it was replaced with into type. In the original code, to declare a frame named s, it used the following syntax:However, to create a frame object in Java, the code was modified accordingly. The same change was made to the following code: The resulting code was shown below. The out_buff and event were not declared here because they were pre-set in the given code. In order to make the piece of code below work, credits were added as parameter. As a result, it was changed to NOR_BUFFS was the maximum buffer size (window size) that could be held to avoid redundant retransmission. Therefor e, It was put In as credit to Initialize the network layer with the same number of buffers. Implementation of classes and functionsTwo timer related classes were Implemented for different timer purposes. D Peacetimes Peacetimes was to monitor and time how long had passed since a packet was transmitted. Cacciatore Cacciatore was to monitor the expiration of an acknowledgement timer. Both of them extended from the Timer Task class and overrode the run method to generate cacciatore_event. On the other hand, five functions were implemented to complete the protocol. Private void start_timer(into see) The start_timer started a timer function for each packet transmitted. If a packet timer already existed, it was cancelled.When the timer of a packet had expired (time_out), that packet would be required to resend. Private void stop_timer(see) The stop_timer was to cancel the timer of a packet when it was called. Private void start_jack_timer() The start_jack_timer was to set a timer for an a cknowledgement. This was to ensure that the sender could receive an acknowledgement within a reasonable time constraint. Originally, an acknowledgement should take advantage of piggybacking to travel to the sender. However, when there was no outgoing packet back to the sender, retransmission might take place. This caused redundant retransmission.Therefore, his timer was created. If it timed out, a separate acknowledgement would be sent to the sender to indicate the packet was received successfully. If there was already an acknowledgement timer, the current timer would be cancelled. Private void stop_jack_timer() The stop_jack_timer was to stop the acknowledgement timer if there already existed one. However, in order to get the timers work, two files were imported. Inc(mum) This Inc function simply incremented the input parameter's value by 1 . As there implemented as (mum + 1) % (MAX_SEE + 1). This would ensure that the number would increment in a circular manner.

Friday, August 30, 2019

Footnote to Youth Reaction Paper Essay

â€Å"The youth is the hope of motherland.† It has always been said that we, the youth, is the hope of our country. This has been the mentality of almost everybody in the society. I, myself had this mentality strongly rooted in my mind before I had read the story, â€Å"Footnote to Youth.† Yes, the youth could possibly be the hope of our country or even of the world. As many have said, we are creative, dynamic, good thinkers, marvelous doers and a lot more. All these positive things also have corresponding negative thoughts from those who don’t believe in our capacity. They say we are lazy, dependent, coward, apathetic and a lot more. I think it is neither laziness nor dependence that drives us youth into somebody useless in the society. We never wanted to become just a piece of crap of course. We always have wanted to do something extraordinary not just for ourselves’ sake. We have always wanted to be something the older and younger generation would be proud of. For me, the dilemma is not within us. It is on how our parents and the people around us treat us and affects us. I admit our minds are not as weak as the minds of the little children. We cannot be easily manipulated. But we’re not also as fixed-minded as the older people. We need guidance. How can we be the hope of the country if our parents themselves don’t lead us to the right path? How can we be the hope if our parents themselves don’t believe that there is real hope from within us? How can we be the hope if our parents themselves cannot correct the mistakes we do? Just like Dodong and Blas, we are preoccupied of the thinking that we can do everything we want to; that we are ready to do the things that the older people can; that what we think is always right. Yes we can do everything if we really insist to but without the guidance of our parents or the older people who know better, we will never know if we are making the right steps toward the right road. They hold the key that runs the engine of hope within the youth. I still believe that we, the youth, is the hope of the motherland but this will just come to reality if the older generatio n, especially our parents know how to bring out the best in us. -Jogie Rodriguez Torres, BST- IV June 25, 2013

Thursday, August 29, 2019

Case Study On Euro Land Foods Finance Essay

Case Study On Euro Land Foods Finance Essay The company was founded in 1924 by Theo verdin a previous as a subsidiary of his dairy business. His keen attention to product Development and grew business steadily over the year .the company went public in year 1979 and by 1993, was listed on trading in the London and Germany exchanges. In January 2001, the senior management of Euro land foods was to draw the firm’s one year capital budget and up for new 11 major projects are imposed to spending limit on capital of 120 million pound. Investment at that rate would be representing a major increase in the firm’s current assets base on 965 million pound. The senior manager challenge of Euro land foods to allocate funds among a range of compelling project, new product introduce and preventive maintenance, safety and pollution control. As a matter of policy, investment proposals at Euro land foods were subject to two financial test, payback and internal rate of return. NET PRESENT VALUE (NPV) The net present value (NPV) re quires cash flow discounting by making use of the so-called risk-adjusted cost of capital, which serves the purpose of accounting for risk. A widespread model employed for computing the cost of capital is the capital asset pricing model (CAPM). Rubinstein (1973) and other scholars in the late 1960s and 1970s have provided the link between CAPM and capital budgeting decisions: in their classical contributions they show that, if the CAPM assumptions are met, then the cost of capital is a function of the systematic risk, which is given by the beta of the project. The latter depends in turn on the cost of the project, which implies that it is a disequilibrium beta. The corresponding NPV is therefore disequilibrium NPV. If†¦ It means†¦ Then†¦ NPV > 0 the asset would add value to the definite the venture may be acknowledged NPV < 0 the asset would take from value as of the firm the plan should be unwanted NPV = 0 the asset would neither gain nor misplace value for the firm We should be uncaring in the conclusion whether to accept or refuse the project. This plan adds no monetary value. Decision should be base on other criteria, e.g. designed position or other factors not evidently included in the calculation. Formula: Npv =CFo+ ___CF____ ( 1+k) n Example:- Year Cash flow Present Value 0 100,000 1 22,727 2 20,661 3 18,783 4 17,075 5 15,523 Internal rate of return:- It is a different economical cash flow practice which takes report of the extent and time of cash flow. Formula: – IRR=LOWER RATE+ npv at lower rate x (HIGHER RATE -LOWER Rate) Npv at lower rate -NPV at higher rate Example 1. If a speculation may be given by the chain of cash flows: Year (n) Cash Flow (Cn) 0 -4000 1 1200 2 1410 3 1875 4 1050 Then the IRR  r  is given by . In this case, the answer is 14.3%. 1. Project with NPV and IRR:- The research on the resource-constrained project scheduling problem is focused mainly on two types of objectives: objectives based on time and obje ctives based on cost. Both of these factors, i.e. time and cost, are indispensable in practical applications. Year

Wednesday, August 28, 2019

Potential Impact of Retail Sales and Personal Income Forecasts on Essay

Potential Impact of Retail Sales and Personal Income Forecasts on Tobacco Industry - Essay Example But regardless of the source, increases in the retail price of cigarettes causes a decrease in the quantity of cigarettes demanded, though the ratio is less than 1 to 1 when comparing the percentage price increase to the percentage of consumption decrease. This shows that there is resistance to forgoing consumption altogether, and that few if any substitute goods are available to the consumer. The correlation between income and spending can be summed up as follows: "In general, growth of retail sales follows the same path as the growth of personal income. However, this may not be the case during economic slowdown and expansion. In general, in the time of recession, retail sales tend to grow slower than personal income, while in the time of economic boom, retail sales tend to grow faster than personal income" (Kovalyova & Zakharova, 2003). This implies that consumer spending anticipates future economic conditions, and that so-called consumer confidence plays a bigger - or at least a leading - role in purchasing patterns than do actual changes in macroeconomic conditions.

Tuesday, August 27, 2019

The Representation of Women in Films in the 1930s Essay

The Representation of Women in Films in the 1930s - Essay Example 27). According to this choice of portrayal, the principles of womanhood conflicted with material and economic pressures, which touched upon class and gender identity problems as well. In the 1930s, Hollywood produced different styles of films depending on the eras and genres that synchronised with social trends. Numerous elements of cinematic style existed within the development of a film context. Since the 1930s, the role of women in films has differed conspicuously depending on social trends. This research paper examines the portrayal of women in films during the 1930s. The Portrayal of Women in Films in the 1930s Women’s position in films was subjected to gender discrimination as reflected during this era. Women stayed behind the scenes as undervalued and frail characters and were rarely featured as main characters (Adams, 2002, p. 210). They played the role of supporting a male lead character. In the film, Gold Digger of 1933, by Busby Berkeley, sound effects and women fea tured numerously in many scenes of the film. In this film, women were portrayed in an elegant and classic way. These times exemplified utter respect for women subject to the classy and dignified way of dressing and commentary. This film also portrayed women as equal to men especially in the many scenes they featured in and various lead roles they took in the film just like men. Starting from this film, it could be seen that women were given preference and were glorified unlike in the current films (Feuer, 1982, p. 80). Fashion in the 1930s was elegant and classy. During this period, the world faced many wrangles and financial depressions as depicted in Purple Rose of Cairo by Woody Allen. The only escape route from the depression was by going to the films. The stunning fashion of the 1930s corresponded with the glamour of Hollywood. People were eager to show that their fashion was copied from the films (Adams, 2002, p. 210). The United States (US) encountered the Great Depression an d its effects between 1929 and 1941 and was going through a difficult phase of international politics; the advent of World War II (WWII) was gaining momentum. Movie producers took it upon themselves to minimise the effects of the depressions by producing movies that were captivating and enthralling (Watkins, 2005, p. 10). The movies in the 1930s took a different turn with the introduction of the comedy category. These comedies focused on women with movies like Lady Eve, Nothing Sacred, and His Girl Friday. These films had the characteristic of women characters having more screen time and sharing equal rights with the male actors (Watkins, 2005, p. 10). The movie, The Women by George Cukor released in 1939 exemplified the ever-growing importance of female actresses. The film featured female protagonists and it comprised of three women who shared a bond with each other. The film included women gossiping about aspects of their lives as they spoke about men and matters concerning them. This film demonstrated a feminist viewpoint regarding womanhood (Lovas, 2007, p. 15). It comes as no surprise that during this era people experimented with new ideas for pleasing the audience. Movie directors did a cast of women with a sensual appearance and look. This culminated into the acceptance of the different roles that women can play in a movie thus initiating a new dimension of

Monday, August 26, 2019

Theories of knowledge and The Matrix Essay Example | Topics and Well Written Essays - 1250 words

Theories of knowledge and The Matrix - Essay Example For example, with the power of vision a person can perceive height and width of three dimensional objects with ease but would have trouble knowing the depth (Thornton, 1987). The classic case of a mountain can be presented to clarify this idea because it is easy to see the height of the mountain and know how wide it is by sight alone but to realize that the mountain also has a certain depth and also extends deep into the ground has to come from the inferences made by the mind. This is in fact the central proposition made by Berkeley that people can never know what an object really is or they can never understand reality through their senses. The objects around us and the reality we see is only a perception which depends on our senses. Therefore, all we know about objects are our perceptions of those objects. Of course we can also imagine about things which never existed or imagine certain situations which can not exist given the physical laws of the universe (Thornton, 1987). However, such imaginations are weak perceptions and have little bearing on the real world. On the other hand, real objects and things continue to remain present in our ideas even if we do not see them as their perception is strong. The false reality is not false for the human inhabitants of The Matrix since it is the only reality they know. The information gathering which they do to function in their world comes from the same sources which provide information to other characters within the matrix, i.e. Neo, Morpheus or Trinity. The only difference is that the human inhabitants are getting signals sent to their brain from a supercomputer which is controlling how their reality functions. On the other hand, the characters which are free from the Matrix are using their natural abilities to experience the real world. Morpheus explains this quite clearly when he defines the reality of the Matrix by questioning what Neo considers to be real. Morpheus says, â€Å"What is "real"? How do you define

Sunday, August 25, 2019

Ethics and Law in Business and Society. History and Implementation of Research Paper

Ethics and Law in Business and Society. History and Implementation of SOX - Research Paper Example However, there are those who say that the price is not commensurate to the benefits that the law appears to be bringing to the corporate world and especially when it comes to the high compliance costs. History and Implementation of SOX: Following several high profile accounting scandals in the 1990s and particularly the infamous Enron and WorldCom scandals, the ensuing intense soul-searching in the US corporate world concluded that effective safeguards needed to put in place if a repeat of the two scandals was to be completely obviated and if the investor confidence was to be restored. This is how the Public Company Accounting Reform Protection Act, the so-called Sarbanes-Oxley Act was conceived. Enacted in July of 2002, the Sarbanes Oxley Act was informed by need to put an end to corporate scandals and particularly to restore the public confidence in the capital markets (Roberts, & Mahoney, 2004). According to Section 404(a) of this Act, the management ought to not only assess but a lso report on the effectiveness of the business internal controls over financial reporting (Roberts, & Mahoney, 2004). ... There are a number of laws governing SEC, however and after the 1940’s Investment Adviser Act, SOX is arguably SEC’s most recent law that it is charged to oversee. Other than SEC, SOX has implementation power that it exercises through the US Department of Justice whose primary function is to prosecute the federal crimes that are associated with acts like; conspiring or even attempting to commit fraud, verifying false financial statements, destroying or tampering with documents, and retaliating against whistleblowers (Heath, & Norman, 2004). In corroboration with the office of the Attorney General, the FBI (Federal Bureau of Investigation) is charged with the responsibility of investigating crime related with corporate fraud while still retaining its mandate as the only detective agency that can investigate and apprehend those accused of committing corporate bad behavior (Heath, & Norman, 2004). SOX immense power can be looked from its Titles that include; acting as a Pu blic Company Accounting Oversight Body; enforcing the independence of auditors; policing corporate responsibility; improving financial disclosures; analyzing conflict of interest; upholding the accountability of corporate and criminal fraud; and enhancing penalties on white collar crimes (Brannick, & Roche, 1887). According to Section 404 of the Sarbanes-Oxley Act, SEC was to adopt rules requiring the management of all companies with publicly traded securities (apart from registered investment companies) to annually report their assessment of the effectiveness of their internal controls as well as an auditor’s independent confirmation of the effectiveness of the said internal controls. Adopted on 27th March 2003, these rules laid out

Should spam emails be banned Essay Example | Topics and Well Written Essays - 750 words

Should spam emails be banned - Essay Example A poll conducted by BBC showed that 93% of the people wanted the spam emails to be banned because of the concerns that these spam emails are causing in the society. It was witnessed that the spam emails were increased by 80% in the beginning of the year 2002 and the demand for an anti spam software increased with the greater number of spam emails. The problem of spam email has reached its limits as even the large companies such as Microsoft are being affected by it. In 2005 Microsoft charged Levon Gillespie on the charges of providing shelter to the spammers so that they could send bulk emails to the customers of Microsoft itself. An Act is known as ‘Can Spam Act’ was formulated in the United States in the year of 2004 after which the spam emails on the internet have increased by around 80 percent. The problem of spam emails is not only limited to illegal advertising and unwanted emails but also expands to viruses which can be found in these emails. Internet users who do not know much about viruses tend to get caught up in a whirlwind as the spammers use the computers of these individuals without their permission to send spam emails.  A poll conducted by BBC showed that 93% of the people wanted the spam emails to be banned because of the concerns that these spam emails are causing in the society. It was witnessed that the spam emails were increased by 80% in the beginning of the year 2002 and the demand for an anti spam software increased with the greater number of spam emails.   The problem of spam email has reached its limits as even the large companies such as Microsoft are being affected by it. In 2005 Microsoft charged Levon Gillespie on the charges of providing shelter to the spammers so that they could sent bulk emails to the customers of Microsoft itself. An Act known as ‘Can Spam Act’ was formulated in the United States in the year of 2004 after which the spam emails on the internet have increased by around 80 percent. The problem of spam emails is not only limited to illegal advertising and unwanted mails but also expands to viruses which can be found in these emails. Internet users who do not know much about viruses tend to get caught up in a whirlwind as the spammers use the computers of these individuals without their permission to send spam emails (Zeller 2005). Moreover a research by the Standford University showed that a regular internet user spends almost 10 days of a year handling the incoming spam of emails. Spam emails have not only proved to be unethical but they have also increased financial problems for the companies (Zeller 2005). Analysts maintained that companies might suffer a financial balance of around $50 billion because of the spam emails that are being sent. An example of a company which was struck by spam emails in 2006 was Blue Security Inc. In an attempt to stop the spammers from sending spam to their customers the company started spamming the spammers from the emails of the ir customers. This resulted in a counter attack by the spammers stating that they would reach new horizons by hacking into the accounts of their customers. The spam in 2006 not only affected Blue Security Inc but also affected other companies as it increased the internet traffic. The company Blue Security closed its website after the spam event (Krebs 2006). On the other hand many argue that spam should not be banned because it is not a serious crime like killing or terrorist attacks. This can be witnessed in the policy of the United States which did not enact any spam law for many years. Others argue that spam emails help to learn more about things which people are unaware about of. They think that spam can help them to know about products or services which they can avail in the society these days. Spam is not an issue of serious concerns as argued by the opponents (BBC News 2002). Conclusion However in the recent years it is seen that Europe has also implemented certain laws which do not allow emails to be sent without the consent of the recipient. But it is still seen that the measures taken by

Saturday, August 24, 2019

Photograph Essay Example | Topics and Well Written Essays - 750 words

Photograph - Essay Example The stretching position she is holding is one that is commonly undertaken by people prior to taking a jog or a brisk walk. The common stretching techniques include taking an upright or seated position, and hold it while either stretching their legs by gently pulling the ankle backwards or touching their toes respectively. The article highlights, through evidence from studies, the disadvantages of stretching before working out. When one undertakes a stretching exercise, they should not do it for more than 30 seconds and it should not be in a fixed position for the entire time. This explains the use of the photo of the woman doing a stretching exercise while seated on the ground. In that story, the photo editor selected a photograph of a woman on the road stretching, seemingly about to take a jog, in which the road acts as the line of the photograph, which essentially creates structure allowing the reader to view the photo from one end to another. This also adds symmetry to the photo which further draws a reader to the photo, and produce shapes, that add depth to a photograph. For this photo, the shapes are created from white rails visible on the left, just off the road. These rails are rectangular and elongated in shape forming a perception of the distance to be covered by the woman when she starts to jog. These two elements go hand in hand to produce depth and structure, allowing the reader to form a perspective on the context of the article i.e. the location or surrounding environment. The young woman seated on the road provides the element of a form that brings three-dimensionality to the photo. Three-dimensionality implies length, width and depth that draw the eye of the reader allowing them to look deeper into the photograph, then develop a perception for example whether they find it beautiful. The photos value enhanced by the shadows and light within a photograph, and these further