Thursday, November 28, 2019

Concept of Bond Duration

Question: Explain the concept of duration and then comment on the statement, â€Å"it is possible that a bond with a shorter maturity than another bond may actually have a longer duration and be more price sensitive to interest rate changes.Advertising We will write a custom essay sample on Concept of Bond Duration specifically for you for only $16.05 $11/page Learn More Explain why a bond with a shorter maturity than another bond could have a longer duration; use examples When investing in bonds, the measure of risk that is commonly used is the bond duration. In this case, a single number is used in depicting call features, final maturity, coupon and the expected yield of a bond. Hence, the concept of bond duration attempts to point out the degree of price sensitivity over a given period. This implies that when there is a change in interest rate with the passage of time, it directly affects the yield margin or profitability of a portfolio or bond (DeC osta, Leng Noronha, 2013). As a result, portfolio managers have to be very keen when floating their bonds into the market. Duration can be computed using a number of methods. Nonetheless, it is vital to note that the most common term used is effective duration. It refers to bond duration over a given time. This duration may be short, medium or long term. When the price of a security changes and then it is calculated as a percentage, it is referred to as effective duration. As already hinted out, this change also affects the yield or return of a bond. For instance, the value of a bond or portfolio that has an effective duration of 3 years is anticipated to either increase or decline in market price with a margin of 3 percentage points. On the same note, a bond with an effective duration of ten years may either improve or weaken in value by a margin of ten percent.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OF F Learn More The latter scenario is possible because bond yield is supposed to get better after a given period. In any case, maximum returns are only possible for long-term bonds. Various situations also demand different methodologies for estimating the duration of a bond. This implies that different interest-rate scenarios influence changes in bond portfolios. Some of the common measurement of duration include total curve duration, spread duration, curve duration, bull duration and the bear duration. On the other hand, the time taken by a bond portfolio to remain relevant is usually referred to as maturity. After the cessation of a financial instrument, the maturity level ends. The principal sum should then be repaid together with interest earned. This finite period indicates the maturity of a portfolio (DeCosta, Leng Noronha, 2013). It is indeed true that a bond with shorter maturity may have a longer duration. It may also witness significant changes when it comes to int erest rates. When other external and internal market factors are kept constant, higher interest rates are accrued from bonds with longer maturities. It is crucial to mention that a greater risk is carried by a bond with a longer duration. In other words, long-term bonds stand the risk of being affected by market forces such as inflation and changes in government policies. As a result, the payment values received from such bonds may decline against the expectations of investors. The price of such long-term bonds can easily fall owing to the glaring risks in the market. The latter are more profitable than short-term portfolios. From the outset, it is evident that bonds with short maturities do not yield optimum benefits to investors. Even if specific bonds are slated for short-term maturities, a very limited number of investors may be willing to release them out for trading. Even though the degree of risk increases with the time taken for a bond to mature, most investors are often rea dy to risk their investments for the sake of reaping higher returns.Advertising We will write a custom essay sample on Concept of Bond Duration specifically for you for only $16.05 $11/page Learn More In any case, markets can hardly be free from financial challenges even if investors rush for short-term bonds. Portfolios that mature after a very short time tend to lock investors’ money. In addition, investors earn meager returns in such bonds. This expounds why liquidity risk is a major threat for investors who are keen in reaping maximum returns from the market. The latter scenario also elaborates the reason why a bond with a shorter maturity might as well take quite a long duration before it is eventually released into the market for trading. For example, in the case of short-maturity bonds, there is minimal fluctuation of the dollar prices of the portfolios. In this regard, an investment that is not in tandem with inflation is common in financ es ploughed back for long-term bonds (Leibowitz, Bova Kogelman, 2014). It is also a market tactic to extend the lifetime of bonds with short-term maturities. For example, the monetary policy is often signaled by the Federal Reserve to act appropriately according to the changes in market demands. When the prevailing market conditions are restrictive, the Federal Reserve may institute strict measures that can consequently alter the behavior of professional portfolio managers. Hence, the shortest maturities can be bought after selling the long bonds. Thereafter, matured bonds may be reinvested using the short maturities (Ajlouni, 2012). Such an arrangement can easily lead to a situation whereby bonds with shorter maturities extend for a longer duration in the market contrary to the expectations of traders. The latter depends on the changes in interest rates.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More References Ajlouni, M. M. (2012). Properties and limitations of duration as a measure of time structure of bond and interest rate risk. International Journal of Economic Perspectives, 6(4), 46-56. DeCosta, D., Leng, F., Noronha, G. (2013). Minimum maturity rules: The cost of selling bonds before their time. Financial Analysts Journal, 69(3), 45-56. Leibowitz, M. L., Bova, A., Kogelman, S. (2014). Long-term bond returns under duration targeting. Financial Analysts Journal, 70(1), 31-51. This essay on Concept of Bond Duration was written and submitted by user Kaylynn Hebert to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Applied Skill for Human Services Essays

Applied Skill for Human Services Essays Applied Skill for Human Services Essay Applied Skill for Human Services Essay The field of Human Services is loosely defined. unambiguously nearing the aim of run intoing human demands through an interdisciplinary cognition base. concentrating on bar every bit good as redress of jobs. and keeping a committedness to bettering the overall quality of life of service populations. The Human Services profession is one which promotes improved service bringing systems by turn toing non merely the quality of direct services. but besides by seeking to better handiness. answerability. and coordination among professionals and bureaus in service bringing. ( hypertext transfer protocol: //www. nationalhumanservices. org/what-is-human-services ) . Human services professional is a generic term for people who hold professional and paraprofessional occupations in such diverse scenes as group places and halfway houses ; correctional. rational disablement. and community mental wellness centres ; household. kid. and youth service bureaus. and plans concerned with alcohol addiction . drug maltreatment. household force. and aging. Depending on the employment scene and the sorts of clients served at that place. occupation rubrics and responsibilities vary a great trade. The primary intent of the human services professional is to help single and communities to map every bit efficaciously as possible in the major spheres of life. A strong desire to assist others is an of import consideration for a occupation as a human services worker. Persons who show forbearance. apprehension. and caring in their traffics with others are extremely valued by employers. Other of import personal traits include communicating accomplishments. a strong sense of duty. and the ability to pull off clip efficaciously. ( hypertext transfer protocol: //www. nationalhumanservices. org/what-is-human-services ) . When you think about it we all are in the human service field in some manner or another. assisting person across the street. picking up something person dropped for them. assisting for the vacations. these are all ways of assisting y our fellow man/woman. The bigger difference is the profession of human service goes farther to make this every twenty-four hours non merely on a random caprice. When it comes to assisting a household on the threshold of dividing up because maltreatment. force. or any other unthinkable act against a kid will you assist or merely turn a cold shoulder. a human service worker has made a pick to set themselves as an advocator for the child/family to step in and supply a safe oasis or manner out and off from the job. When looking at Todd and Reggie. they truly are traveling through a batch individually allow entirely together as a twosome. You know off the chiropteran that this will non be a speedy twosome of Sessionss and name it a twenty-four hours. these cats have a batch of things traveling on from decease to substance maltreatment to being homosexual. which has been non every bit tabu as it has been in the past few old ages. The demand separate guidance to aerate out their ain personal issues so one time that has been dealt with so seek undertaking twosomes therapy. Classs give order to life. and every twenty-four hours. we group other people into classs based on societal and other features. This is the foundation of stereotypes. bias and. finally. favoritism. A stereotype is an overdone belief. image or distorted truth about a individual or group - a generalisation that allows for small or no single differences or societal fluctuation. Stereotypes are based on images in mass media. or reputes passed on by parents. equals and other members of society. Stereotypes can be positive or negative. A bias is an sentiment. prejudgement or attitude about a group or its single members. A bias can be positive. but in our use refers to a negative attitude. Many of the biass and favoritism are passed down to the other coevalss. When the media and parents perpetuate degrading stereotypes and images about certain groups of people tend to know apart others who belong to such groups. Peoples with autocratic personalities tend to prejudice every bit good since their thought has its base on unconscious frights. Ethnocentrism makes people to measure other people’s civilization based on their ain and they are normally leery of foreigners. Group closing which involves maintaining clear boundaries between groups with different features could be another cause. The struggle theory suggests that the people who belong to the bulk. the high societal category and the privileged groups try really hard to keep on such places. Any sort of competition particularly from the minority can convey force and struggle between them. In America. for illustration. black patients may travel to a white counsellor with negative outlooks and prejudices. A recommendation to them would be to seek heartache. intoxicant. and substance maltreatment reding aside from what they are acquiring. There may besides be other plans Reggie could look into for employment aid as he is non truly happening anything with the STARS plan. It seems as if Reggie and Todd may necessitate clip apart before they can go a twosome. They truly need to sit down and be honest with each other and see if this truly traveling anyplace or are they merely hanging on in hopes something alterations for the better. Resources hypertext transfer protocol: //www. nationalhumanservices. org/what-is-human-services hypertext transfer protocol: //www. psychologytoday. com/articles/199805/where-bias-begins-the-truth-about-stereotypes

Thursday, November 21, 2019

Change Management Essay Example | Topics and Well Written Essays - 1250 words

Change Management - Essay Example The first stage involves creating a sense of urgency and advocating for change through strong leadership. Kotter advises organizations to hire new leaders or designate change champions who act as the driving force of change (Kotter, 1996, P. 125). The second stage is the engagement of senior managers in the implementation of change. Senior managers form a guiding coalition which is committed to excellence through renewal. This coalition exists outside normal hierarchy and is guided through efforts and the commitment of the top management. The next stage is the creation of a vision by the guiding coalition. The vision is a guiding strategy that clarifies the direction which the organisation intends to take. The ideal vision is brief and concise (Kotter, 1996, P. 125). The fourth step is communicating the vision through newsletters and speeches. If downsizing is part of the vision, new growth possibilities and commitment to fair treatment of those who are laid off is critical. Executives should constantly use the existing communication channels to broadcast the vision. The next stage involves removing of obstacles to change such obstacles include constraints in the compensation or performance appraisal systems and a rigid organizational structure. It is important for the appraisal and reward system to be consistent with the vision (Kotter, 1996, P. 125; (Wilson, 1999, P. 57)). The transformation process should accommodate short-term wins. As such, the process should set short-term goals to be met and celebrated. Managers should actively design ways to obtain performance improvements and to achieve objectives with the people involved being rewarded and celebrated. Victory is not attained until the changes are embedded in the organisation culture. Rather than declaring victory managers should use the milestones achieved by short-term gains to tackle bigger challenges (Kotter, 1996,

Wednesday, November 20, 2019

Password Cracking Systems Research Paper Example | Topics and Well Written Essays - 5000 words

Password Cracking Systems - Research Paper Example The research paper "Password Cracking Systems" discusses the password cracking systems in detail. Password cracking is a process of accessing a computer system, network or resource with or without making use of software applications to open a resource that has been locked with a password. E-authentication (Electronic authentication) is a way of authenticating the client identities offered to an information system via electronic means. However, the e-authentication can create a technological issue for the reason that this procedure engages the remote or distant verification of particular people by using a digital communication network, intended for the idea of electronic administration and business. In fact, this idea offers practical directions to the corporations to authorize a single person to distantly confirm his/her uniqueness to a Federal IT arrangement. However, this way of management tackles simply customary, extensively applied techniques intended for remote verification based on secrecies. Moreover, through these techniques, the person who has to be authenticated verifies that he or she recognizes or possesses a number of confidential data and information. In this scenario, the majority of verification systems are basically dependent on secret passwords. But unluckily, the uncertainty and extent of user selected secret passwords to turn out to be permanent even after a long period. In difference, a hardware development continually provides attackers growing computational control. Thus, password methods like that customary UNIX user-authentication structure are becoming unsuccessful with the passage of time (Provos & Mazieres, 2002). Password cracking is a way of trying to access or crack passwords in an attempt to enter into a computer system or a communication network. In addition, crackers usually make use of a range of scripts, tools or cracking software to break a communication system password. In this scenario, the prime objective of the cracker is to perfectly get the password of server (UNIX) or other system and for Windows and NT. Moreover, the process of password cracking starts by matching each protected dictionary word with information stored in the system secret password file so that a match could be found (Webopedia, 2011) . Security management is one of the major concerns in this age of technology. However there is a large number of technology based applications those are breaking and disturbing such security settings. Password cracking systems are one of such systems those are used to breach the security of any system (Nash, 2000) and (Snyder, 2006). In the upcoming sections this paper will analyze such password cracking systems and their possible functioning. TECHNOLOGY EVOLUTION After the evolution of technology based systems microprocessors developed quickly, so does the pace of cryptographic digital software. In this scenario, speedy cryptographic technique offers a lot of chances for making application system safer. It makes encryption exploitable for a broad variety of systems. In addition, it offers superior standards of adjustable protection metrics like that secrete key length. However, growing security limitations make it very difficult to crack cryptography (or at any rate super-polynomia lly), dwarfing a number of advantages quickly hardware can present invaders. However, there is a security challenge in way of its implementation that is the extent and uncertainty of client selected passwords does not level in any way with computing control. Despite the fact that many systems need users to choose secret passwords for verification, some in fact acclimatize their algorithms

Monday, November 18, 2019

LO 1. Understand the difference between personnel management and human Essay

LO 1. Understand the difference between personnel management and human resource management LO 2. Understand how to recruit emp - Essay Example LO. 1 Understand the Difference between Personnel Management and Human-Resource Management Personnel management Personnel management is defined as: 1. obtaining, 2. maintaining, and 3. Utilizing the satisfied workforce The objective of personnel management is to achieve the mission and vision statements of the organization. Personnel management is a paramount pat of the management, which is mainly concerned with the employees as well as their relationships with the organization. It is paramount to note that personnel management is mainly administrative in nature whereby it deals employees, the employment laws and their payroll among other administrative functions. Personnel management is considered reactive since it offers demands and concerns as they are presented whereas from a motivational concept, it mainly tends to only motivate the employees through bonuses, compensations and rewards. Notable human resources management have defined personnel management as the process of: organi zing, planning, integration, maintenance, and Compensation of the employees. The fundamental purpose of this process is o effectively contribute to: societal, individual and Organizational goals. Goals of the Personnel Management 1. ... To create effective inter-personal relations at the same time developing a sense of responsiveness and responsibility amongst the employees and the workers. Personnel management adopts the best conceivable methods or techniques in order to bring the best possible developments of the employees on work by cooperation between capital and labor (Randhawa, 2007). Human Resource Management Human-resource management is the fundamental function within an organization that mainly focuses on management, recruitment as well as offering directions to the employees in order for them to achieve the organizations' objectives. The line managers can perform these functions since nowadays; human-resource management courses are an integral part of the line managers’ training. Human-resource management is an organizational role that deals widely with: hiring, safety, wellness, performance management, compensation, employees’ motivation, administration, communication, and Training. Human-re source management is a strategic approach that manages employees as well as the workplace environment and culture. Effective human-resource management plays a fundamental function in ensuring that an employee can contribute productively and effectively to the organizations’ overall directions and be able to achieve the organization’s objectives and goals. Human-resource management involves shifting away from the old traditional transactional, administration and personal roles. Currently, a human-resource manager is fully expected to add value, especially to the strategic utilization of the employees and to ensure that the various employee programs have a direct impact on the business in measurable ways. Some of the latest

Friday, November 15, 2019

Decision support systems

Decision support systems Abstract Nowadays, Decision Support Systems has a significant role in almost all areas of life. These systems go further and use new technologies like data mining and knowledge and data discovery (KDD) to improve and facilitate human decision making. First of all we provide some definitions about decision making, models and processes. Afterwards, we discuss about knowledge and data discovery and also, Intelligent decision support systems. At last, as an empirical survey, we compare two different cultures in using decision making support systems. One of them uses decision support system in clinical environment to improve the decision making and reduce crucial errors significantly; while the other uses the traditional system and relies on the human memory and experience rather than using decision support systems. Keywords: Decision Making, Decision Support, Knowledge and Data Discovery (KDD), Intelligent Decision Support Systems Introduction Information system has a significant role in supporting decision making, and in some special environments like business, health and education, gets the mandatory part. Moreover, such systems go further and use data mining and knowledge and data discovery (KDD) techniques to improve their abilities in supporting decision making. One of the environments that need information systems support for making crucial decisions and have direct effect on human life is clinical and health environment. We are going to look through the effect of decision support system in it. Decision Making Decisions and models Decision making is undeniably an essential and vital part of the human life. A decision problem may consist of numerous smaller decisions inter-related together, and the results of multiple decisions can be consolidated together; or one decision can influence another subsequent one. This influence can be fed as the input to a subsequent decision, or as a decisional choice for the users in determining which decision to make subsequently. This bigger decision, and its smaller decisions embedded within, must be represented in a simple manner for decision makers to read, understand, and communicate with. Each decision can be represented in the form of a model, to represent, describe and depict the decision problem and its interaction under consideration, whether it is simply an abstraction schema, insights to the decisions rather than mere numbers actual model instance, or executable computer program module. Each decision model can be a permanent modeling scenario which can be retrieved and included as part of a bigger scenario. Alternatively, it can be a temporary modeling scenario that is aggregated or pipelined within a bigger scenario. Such model integration treatments are subject to the discretion of users at the time of making such decisions. Even though each of these decisions may have a direct or indirect bearing on other subsequent decisions and can easily influence the overall decision and conclusion, many decision making processes and systems treat these decisions as independent and unrelated. This obscures the users from seeing and discovering the true effects and influen ce of the decision problem and its interaction under consideration, whether they are interrelated and/or interdependent. The element of interdependence may not be discovered until the full picture can be seen and assessed. Even though many decisions do occur in a sequential fashion, there are also many decisions that occur in parallel, evolve over time and converge to a concluding decision, or eventually combine or are interwoven into a final decision. Therefore, the decision making process should neither be fixed nor predetermined beforehand so that the execution order can be created as required. Hence, modeling is an important process in understanding, capturing, representing, and solving these decision models especially in terms of their interrelatedness across multiple models and their instances over a period of time. Furthermore such models should ideally be able to capture functional, behavioral, organizational, and informational perspectives. Decision systems are intended to assist users in making a decision. There are several types of users involved in using decision systems and these users progress as they develop more confidence: from inexperienced/na?ve decision makers, to average decision makers/ analysts, to experienced decision makers/modelers. Each type of user has different needs and should not be restricted by the constraints of any decision system that dictates the steps and techniques behind analyzing and solving a decision problem. Some users may need more decisional and/or system usage guidance while others may prefer to have minimal guidance. Some may wish the decision system will take care of the entire decision making process including prescribing the order in which each set of data is requested as well as the order in which each decision model is executed; while others may wish to intervene to a greater extent in designing the entire decision making process and the execution order to suit, or to a lesser extent in specifying a particular solution method. There are a variety of reasons as to why a human intervention is warranted and needed from the perspective of an experienced user. However, it is interesting to note that the type of guidance may have an adverse effect on decision model selection and ultimately the decision outcome. It is unreasonable and impractical to expect decision makers to operate a different decision making system for each decision and to comprehend the full effects of the consolidation and integration from these decisions. A decision making process is not necessarily about concentrating on the decision itself, but should emphasize the ways in which decisions are made. Therefore, users should be able to choose an optimizing approach and solution as well as a satisfying approach and solution, and not be limited to only one approach and solution that is traditionally incorporated in decision systems. Due to the frequency and complexity of interrelated decisions, some users may recall an existing scenario as input to another scenario, or recall several existing scenarios for comparative purposes. Decision systems need to be built in a flexible way so that decision models and components can be easily assembled and/or integrated together to create new scenarios and specific scenarios can be built and tailored to meet the needs of particular user groups. With all these issues in mind, the framework and architecture of an ideal decision system should have independent components that enable components to be easily assembled and integrated together to form a decision scenario. They should be flexible enough to serves various types of users and accommodate various types of decision making processes. They should also be sufficiently versatile to handle decision problems regardless of paradigms and/or domains under consideration. Good decision making frameworks must therefore be in place f or system framework and architecture to exhibit modeling flexibility, component independence, and versatility in domain and/or paradigm. To overcome the issues and fulfill the requirements discussed above, we first propose a converging decision analysis process, an optimizing?satisfying decision model, and a cyclical modeling lifecycle. Normative decision making processes Decisions can evolve and converge into a concluding decision over time. This can occur within re-evaluating a decision problem, or evaluating across multiple decision problems that are similar. This iterative decision making process is known as the convergence process. As decisions evolve and refine over time, decision makers are able to concentrate on essential factors and eliminate nonessential ones in order to narrow down the scope of the decision problem. Such attention-focused method provides a cut down version of the problem. A decision is subsequently made from these remaining factors of the reduced problem. Such decision-focused method provides an actionable result from the given problem. Since there can be many decisions within a decision problem, several iterations of attention-focused and decision-focused methods are applied while intermediate decisions within the decision problem are made and converged. Such revision and refinement occur irrespective of paradigms and doma ins. This notion of applying the attention focused and decision-focused methods within a convergence decision making process are depicted in Figure 1. Figure 1. Converging decision analysis, as in an 1D-CSP scenario One-Dimensional Cutting Stock Problem (1D-CSP) was used for illustrative purposes in order to design and implement the proposed framework and architecture. 1D-CSP is about cutting strips of raw material into desired sizes according to customer order widths. We often do not have unlimited supplies of raw materials and would therefore need to formulate and decide on which cutting patterns are used. 1D-CSP is a resource management problem with a traditional goal of minimizing wastage. Besides wastage, there may be other objectives that must be considered. For example, minimize machine setups through the changing of cutting knives, minimize machine setups through reducing the number of cutting patterns used, or minimize the number of disruption in the sequence of cutting patterns used. Even though 1D-CSP is considered to be a simple problem in pure mathematical terms, it becomes a reasonably complex decision problem once one considers all the real world constraints and objectives, and th e interrelated decisions involved within its decision making process. The 1D-CSP can be used as a decision problem to illustrate the converging decision analysis process, as depicted in Figure 1. The first decision is a pattern generation heuristic that generates combinations of cutting patterns. This decision concentrates only on generating those cutting patterns that are relevant to the decision problem under consideration (an attention-focused method). The second decision is determining which cutting patterns among the generated ones should be retained or discarded (a decision-focused method). This can be based on specific rules such as an allowable number of cutting knives per cutting pattern. It can also be based on the decision makers personal experience on whether certain cutting patterns should be discarded. The third decision is the creation of linear programming constraints that identifies the feasible area of the problem under consideration (an attention-focused method), while the fourth decision is finding an optimal point within the feasib le area (a decision-focused method). Neither of the focused methods has to produce an optimal or a satisfying solution necessarily. It is entirely up to the decision maker to decide on what sort of solution is desired at the time. Each decision and solution can be encompassed within a decision model that consists of both the optimizing model and satisfying model, as depicted in Figure 2. In a decision problem that consists of multiple interrelated decisions, the result from one model may be fed into another model continuously until an ultimate result is reached, and the result from a model can take on a different solution option. Each decision model may return to itself for refinement, or return to the previous model for additional processing, or feed to the next model for further processing. This return may be due to an infeasible solution, or a better understanding of the model which eventually leads to a change in the parameters of the model. The 1D-CSP can be used to illustrate the optimizing?satisfying decision model, as depicted in Figure 2. The first decision model pattern generation heuristic is a satisfying model that produces only those cutting patterns that are relevant and desirable to the decision problem under consideration. The second decision model is also a satisfying model in selecting or deselecting among the cutting patterns already produced. The third and fourth decision models are optimizing models that optimize using the linear programmings simplex method. Figure 2. Optimizing?satisfying decision model Decision modeling lifecycle The approach of Simon to the decision making process in terms of intelligence, design, and choice is very decision-oriented. However, as Glob has suggested it is about the way in which we model the decision. Therefore, we propose to integrate Simons proposal with MS/ORs modeling proposals that attempt to support every phase and aspects of decisions and modeling lifecycle. Such a design approach is crucial to support the modeling and decision environments and ensure that non-predetermined decision making processes and interrelated decisions characteristics can be modeled. This proposed modeling process is cyclical and iterative, and enables continuous adjustment and refinement especially in storing and retrieving decision problems as decision scenarios, as summarized in Figure 3. Despite the fact that the modeling lifecycle progresses step-by-step in a cycle, it can return to any earlier steps and not just the previous one, and can skip some steps in the later iteration if it has already gone through that particular step earlier on. It is however more difficult to represent these possible movements visually in the modelling lifecycle and is therefore not illustrated in Figure 3. The lifecycle is valuable not only from the point of view of modeling the decision itself but especially for highlighting the role of the system components of the decision, whether it is a data, model, solver, or scenario. Once a problem is understood it can be represented in the form of a model which is then instantiated with data and integrated with solvers so that it can be executed. Such a model is especially beneficial if it is storable and retrievable for later use and comparison. Once a model is represented, a solution can be derived through analyzing and investigating as well as comparing with various model instances. The derived solution is then reviewed and validated. If it is considered unsatisfactory such information can be used to modify and reformulate the decision model. Figure 3. Cyclical modeling lifecycle Even though the decision system will progress through the entire modeling lifecycle in producing the end result, it is important to note however that not all users will execute all the steps of the modeling lifecycle. Depending on the competencies of the decision makers and their permissions, they may interact with certain steps in the modeling lifecycle. For example, the inexperienced decision maker may interact with only step 2; the average decision maker may interact with steps 2, 3 and 4; whereas the experienced decision maker may interact with all 6 steps in the modeling lifecycle, as shown and contrasted in Figure 4. This decision modeling lifecycle provides a sound basis for the decision support and modeling framework and architecture. Figure 4. Interaction between 3 types of user groups and the modeling lifecycle Intelligent Decision Support Systems While IDSS (Intelligent Decision Support Systems) have been receiving increasing attention from the DSS research community by incorporating knowledge- based techniques to provide intelligent and active behavior, the state-of-the-art IDSS architecture provides little support for incorporating novel technologies that serve useful DSS information, such as the results from the knowledge and data discovery (KDD) community. Data Mining and Knowledge Discovery In recent years, the terms knowledge discovery and data mining (commonly referred to as KDD) have been used synonymously. They both refer to the area of research that draws upon data mining methods from pattern recognition (Tuzhilin, 1993), machine learning (Han et al., 1992) and database (Agrawal et al., 1993, 1994) techniques in the context of vast organizational databases. Conceptually, KDD refers to a multiple step process that can be highly interactive and iterative in the following (Fayyad Uthurusamy, 1995): the selection, cleaning, transformation and projection of data; mining the data to extract patterns and appropriate models; evaluating and interpreting the extracted patterns to decide what constitutes ?knowledge?; consolidating the knowledge, resolving conflicts with previously extracted knowledge; making the knowledge available for use by the interested elements within the system. A number of KDD systems are similar to IADSS data miner agents in spirit and in technique. Such work in designing and implementing practical KDD systems is crucial to our research in the sense that their results provide solid KDD pragmatic technologies ready to be integrated into our IADSS architecture. However, the current state of using KDD techniques for decision support remains in its infancy, as preliminary applications that use exclusively KDD techniques. It is our point of view that such isolated applications have limited scope and capabilities, while future KDD techniques will play an integral role in complex business systems that incorporate a wide range of technologies including intelligent agents, multimedia and hypermedia, distributed systems and computer networks such as the internet, and many others. From a DSS perspective, a simple DSS architecture that consists of a single decision maker with single information source knowledge discovery functionality lacks the ability to deal with complex situations in which multiple decision makers or multiple informatio n sources are involved. Most existing DSSs with data mining and knowledge discovery capability fall into this category. Intelligent Agents The concept of intelligent agents is rapidly becoming an important area of research (Bhargava Branley, 1995; Etzioni Weld, 1994; Khoong, 1995). Informally, intelligent agents can be seen as software agents with intelligent behavior, that is, they are a combination of software agents and intelligent systems. Formally, the term agent is used to denote a software-based computer system that enjoys the following properties (Wooldridge Jennings, 1995): Autonomy: Agents operate without the direct intervention of humans. Co-operatively: Agents co-operate with other agents towards the achievement of certain objectives. Reactivity: Agents perceive their environment and respond in a timely fashion to changes that occur. Pro-activity: Agents do not simply act in response to their environment; they are able to exhibit goal-directed behavior by taking the initiative. Mobility: Agents are able to travel through computer networks. An agent on one computer may create another agent on another computer for execution. Agents may also transport from computer to computer during execution and may carry accumulated knowledge and data with them. Furthermore, there has been a rapid growth in attention paid to developing and deploying intelligent agent-based systems to tackle real world problems by taking advantage of the intelligent, autonomous and active nature of this technology (Wang Wang, 1996). Intelligent Decision Support Systems Intelligent decision support systems (Chi Turban, 1995; Holtzman, 1989), incorporating knowledge-based methodology, are designed to aid the decision-making process through a set of recommendations reflecting domain expertise. Clearly, the knowledge-based methodology provides useful features for the application of domain knowledge in decision making. However, the knowledge stored in the knowledge bases is highly domain-oriented and relatively small changes in the problem domain require extensive intervention by the expert. Powerful information communication channels, such as the internet (information superhighway), are continuously changing the decision making process. When decision makers make decisions they not only rely on brittle domain knowledge but also on other relevant information from all over the world. As a result, the challenge of discovering and incorporating new knowledge with existing ones requires us to introduce new techniques (such as intelligent agents and knowledg e discovery) into DSSs. Research into IDSS includes the work by Rao et al. (1994), who presented an intelligent decision support system architecture, IDSS, that stresses active involvement of computer systems in decision making, on the other hand, the work by Sycara at CMU LEI (Laboratory for Enterprise Integration) proposed the PERSUADER (Sycara, 1993), which incorporates machine learning for intelligent support of conflict resolution and the work on NEST which incorporates distributed artificial intelligence (DAI) with group decision support systems by Fox and Shaw (Shaw Fox, 1993). The proposed IDSS architecture is similar in substance to our proposed IADSS, which incorporates distributed artificial intelligence and incorporates the principles of co-operative distributed problem solving in the decision-making process. However, as we have pointed out above, it is necessary for the incorporation of data mining technology which extracts important information from vast amounts of or ganizational data sources in order to provide additional information that may be crucial for the decision-making process. IADSS architectural configuration As we have pointed out in our introduction, there exist numerous obstacles that remain to be overcome in today?s DSSs to fully achieve the vision of IADSS. The integration of intelligent agents with DSSs will be able to address most, if not all, of the articulated issues. However, even within the application of an intelligent agent-based architecture, there exist two different forms (or configurations) of the decision-making process that the particular architecture will be able support: Single decision maker-multiple miners and multiple decision makers-multiple miners. Single Decision Maker-Multiple Miner DSS Processes We have argued in the previous section that a possible configuration of IADSS architecture, namely the single decision maker-single miner form, has severe limitations when it comes to extendibility and the ability to be integrated into an overall organizational decision support framework. However, in many real life cases, the single decision maker situation is still of importance. In today?s organization, there may exist a myriad of organizational information sources on which useful data relationships and patterns may be discovered to support the singular decision maker?s decision process. As a result, the IADSS configuration of a single decision maker with multiple data miners warrants attention and analysis. Under IADSS, the architecture of such a single decision maker, multiple knowledge miners assisted DSS is shown in Figure 5. Figure 5. Multi-Agent-based DSS Figure 6. A Multi-Agent-Based GDSS There are three classes of intelligent agents (we call them decision support agents or DS agents) contained within this architecture: Knowledge miners that discover hidden data relations in information sources, user assistants that act as the intelligent interface agents between the decision maker and the IADSS and a knowledge manager with repository support that provides system co-ordination and facilitates knowledge communication. Further details about the functionality and internal structure about each type of agent is elaborated in the next section. Multiple Decision Maker-Multiple Miner-Assisted GDSS Process The single decision maker configuration discussed above can be easily extended into a group decision support system (GDSS) architecture (as seen in Figure 6. by the introduction of additional user assistants for each additional decision maker). Compared to the single decision maker configuration in Figure 5, each user assistant agent is further augmented to provide support for group-based communication between different decision makers. It is important to observe that with the introduction of each additional DS agent; only an extra knowledge communication channel between the new DS agent and the knowledge manager is needed. This enables a manageable linear increase in the number of knowledge communication links corresponding to the increase in the number of agents in the IADSS system, rather than the quadratic increase in the number of direct communication links in a direct agent-to-agent fashion. Furthermore, our proposed IADSS is an open architecture with potential for the integration of future technologies by the incorporation of additional classes of intelligent agents. IADSS architecture at a glance Intelligent Decision Support Agents As described above, there are three types of intelligent agents in an IADSS system: Knowledge miners, user assistants and knowledge managers. This section will provide a more detailed description of such agents and their internal architectures. Knowledge Miners. The role of knowledge miners in IADSS is to actively discover patterns or models about a particular topic which provides support in the decision-making process. There are four components in a knowledge miner. The IADSS interface component manages the communication between the miner and the knowledge manager. When a knowledge miner receives messages that are represented in a common representation, the IADSS interface translates these messages into the local format based on the common vocabulary. On the other hand, when the knowledge miner sends messages out, the IADSS interface translates them into common format first, then sends them to the knowledge manager. In order to carry out the mining task, the necessary control knowledge as well as domain knowledge is kept in the knowledge base component, while the data interface component serves as a gateway to the external information sources. The knowledge discovery is usually done by discovering special patterns of the d ata, i.e. by clustering together data that share certain common properties. For instance, a knowledge miner may find that within this week, a number of stocks are going up. There are two different types of knowledge mining agents, event-driven knowledge miners and tusk-driven knowledge miners. The event-driven knowledge miners are agents that are invisible to the decision makers, and their results may contribute towards the decision-making process. Based on the specification of the IADSS, such event-driven knowledge miners start when the IADSS starts up. When a particular event comes, an agent will start its knowledge mining. Events may be temporal events, e.g. every day at 1 a.m., every hour, etc. Or, events may be constraint-triggered events, e.g. every 10,000 customers, when a certain type of customer reaches lo%, etc. Usually, such event-driven knowledge miners work periodically. They follow a sleep-work-sleep-work cycle and will be destroyed when the entire IADSS system termina tes. On the other hand, task-driven knowledge miners are created for particular data mining tasks based on requests originated by the decision makers. After a knowledge miner completes its task, it sends the mining results to the knowledge manager and is then terminated automatically. From the view point of decision support, knowledge miners play the role of information extractors which discover hidden relationships, dependencies and patterns within the database, whether the information is discovered by an event-driven knowledge miner or a task-driven knowledge miner, which may be utilized as evidence by decision makers within the GDM process. User Assistants. Interaction between a particular decision maker and the IADSS is accomplished through a user assistant agent. The architecture of a user assistant contains four components. The multimedia user interface component manages the interactions with the decision maker such as accepting requests for a task-driven knowledge miner, while the IADSS interface manages the knowledge communication with the knowledge manager. The necessary knowledge such as the common vocabulary, decision history and others are kept in a local knowledge base component. All three components are controlled by an operational component that provides the facility of differencing, multimedia presentation and collaboration. With regard to the role the user assistant plays in the decision process, it enables the decision maker to view the current state of the decision process and to convey his or her own opinions and arguments to the rest of the decision making group. It also enables the decision maker to i ssue requests for task-driven knowledge miners to attempt to discover some particular type of organizational knowledge from business data. The user assistant will then relay the request to the knowledge manager and interpret the mining result if it is deemed appropriate. Knowledge Manager: The knowledge manager provides management and co-ordination control functions over all the agents in the IADSS architecture. The internal component-wide architecture of the knowledge contains four Components: The decision maker interface, the operational facilities, the miner interface and the agent knowledge base that provides support for localized reasoning. From the functional standpoint, the knowledge manager provides the following functionality in the IADSS architecture: Makes decisions concerning the creation and termination of knowledge miners as provided by the miner interface component of the knowledge manager. Mediates requests from user assistants through the decision maker interface, analyzes these requests through the localized knowledge and inference engine and then initiates an appropriate group of task-driven knowledge miners to collaboratively perform the requested task through the miner interface. Mediates the discovered knowledge from knowledge miners (whether it is an event-driven or a task-driven miner), stores the knowledge into the repository for possible future usage and forwards the relevant knowledge to interested decision maker users through the decision-maker interface. Manages and co-ordinates the knowledge transactions with each individual decision support agent such as common vocabulary, available decision topics, existing mining results and strategic knowledge, as provided by the operational facilities component. Manages the synchronization between the collection of decision support agents such as the progress of the task-driven knowledge miners and the notification of the decision makers when crucial knowledge is discovered. Mediates all other types of communication among decision support agents including the communication among user assistants and supports the retrieval of appropriate evidence from the repository by user assistants. In terms of the decision support process, the knowledge manager plays the role of manager and mediator between two decision makers, between the decision maker and the corresponding task-driven miners and between all decision support agents and the repository to address the issue of knowledge sharing. Current prescription process at the hospital The prescription process is shown in Figure 7. This description is based on interviews (questions 1?3 in the interview guideline, Appendix A) and observations by the first author. Figure 7. Current prescription process in the Ekbatan and Boras Hospital (UML activity diagram) The process starts as the physician in charge takes the patients history, performs physical examinations, and reviews available medical documents, including progress notes, laboratory findings, and imaging. These data sources guide the physician(s) to a set of differential diagnoses or a definitive diagnosis, which help the prescriber(s) to select appropriate treatment for the patient. The prescriber will then register medical records

Wednesday, November 13, 2019

Essay --

1. What is RCRA and what are its goals and objectives? Resource Conservation Recovery Act of 1976 was created to regulate solid waste and hazardous waste as well as regulate underground storage tanks. The goals and objectives of the RCRA are: †¢ Protect human health and the environment from the potential hazards of waste disposal †¢ To conserve energy and natural resources †¢ To reduce the amount of waste generated †¢ To ensure that wastes are managed in an environmentally sound manner (EPA, What is RCRA?, 2010) 2. What are the two agencies that regulate the generation and transportation of hazardous waste? Briefly describe these agencies. The 2 agencies that regulate are the EPA and the Department of Transportation (DOT). The EPA is known to all as the Environmental Protection Agency and is the main government control group. All other entities report to the EPA. The DOT is the Department of Transportation. This group is in charge of everything that moves across the nation on wheels, and has the record control. 3. What is a hazardous waste manifest and what is it used for? The ...

Sunday, November 10, 2019

Women rights, education, economy, politics

Fundamental aims of Islamic culture include welfare, happiness and progress of human society. Human being was created as the representative of Allah. Both man and woman are required to play an imperative role for the cause of serving humanity in a better way. No progress in the field of culture can be possible unless and until woman plays her divergent role in the society. Islam raised the status of woman to a great extent.She has been given rights to property, rights to take part in economic activities, rights to choose life partner, rights to determine his financial requirements and to overcome these and an honorable social status which was not given by the prior and other contemporary cultures and societies. It is a matter of fact that woman occupied an important place during the Islamic Era and played an active role for the uplift of Society. In this article, I have tried to bring out the importance of the role of woman for the development of Islamic Culture and improvement of an Islamic Society.Key words: Islamic culture; Purpose of creation; Status of women; Right and duties of women; Distinction of Islam Women in ancient civilization There had not been a single civilization in ancient world which did not inflict various forms of pains and cruelties to woman. Study of history reveals that that during different era, women had lost their recognition in their respective civilizations. * Assistant Professor, Department of Islamic Studies, NIJML, Islamabad, Pakistan Jih ¤t al-lsl ¤m Vol. 5 Oanuary-June 2012) No. 2 Not only had she lost her capabilities but also her freedom.Moreover, she had to lose her worth and status. She was maltreated in each society and every part of the world. As far as her moral and lawful rights concerned, she had fallen to the lowest level. In different nations of the world, she was living her life in miserable and terrible conditions. She was forced to marry and sometimes into adultery. Other became heirs of her wealth irrespecti ve of the intensity of her financial needs. She secondary to her husband and father or any male member of her family. Her husband used to become the owner of her wealth even before her death and also became her master.It all happened when the nature was changed. It all happened hen nations left the way of God and followed the path of Satan. However, a moderate way, which harmonized with nature, wisdom and human interest, existed there. And this way is Islam which is established by God himself. Women in Greek civilization: Despite the fact that Greek civilization was the most modern civilization among the ancient nations, the Greeks considered woman the essential inconveniences and fountain head of all problems. She was cut-off from society.She had only one Job to do i. e. , to give birth to children. There were many women who were compelled to do adultery. Mothers were also forced to do adultery. Furthermore, sisters were forced to marry against their will. She was looked down up in the society; she was treated as a servant; she was maltreated. Their concept of woman was faulty (1) . Famous writer Demosthenes says, â€Å"Women were used to quench the thirst of sex and men had them as girl friends. They had wives to produce children and girl friend enjoy their physical contact with them†.

Friday, November 8, 2019

Analysis on “Porphyria’s Lover” by Robert Browning Essay Essay Example

Analysis on â€Å"Porphyria’s Lover† by Robert Browning Essay Essay Example Analysis on â€Å"Porphyria’s Lover† by Robert Browning Essay Paper Analysis on â€Å"Porphyria’s Lover† by Robert Browning Essay Paper In â€Å"Porphyria’s Lover† . Robert Browning dramatically builds strength and exhibits the diminution in the situation’s stableness to show the at hand day of reckoning of the characters’ love. The puzzling tone suggests the fright in the lover’s bosom would shortly get the better of him – the fright of the fate of their out love. Throughout the verse form. Browning intensifies the state of affairs indicated by each narrative displacement. There are several cases of this which correspond to a new action or a fresh point of position. In line 21. the passage from â€Å"me† to â€Å"she† occurs at the dash. bespeaking a new expression on the state of affairs. Before the hyphenated displacement. the verse form was a wholly factual history of the actions taking topographic point ; it was ramping. Porphyria came indoors. she sat down following to her â€Å"lover† and so at the dash. the talker begins analysing the state of affairs and construing her words. This creates suspense because it places the control of the verse form into the custodies of her lover. The 2nd displacement occurs between lines 39 and forty-one. This is. possibly. the most thrilling and cliff-hanging point in the verse form. Predating this narrative displacement. a sense of discordance was hardly present between the two characters. This is noticed when Porphyria attempts to talk to her lover and â€Å"no voice relpl [ ies ] † ( line 15 ) . At the displacement. the secret plan climactically intensifies when he strangles her to decease. This dismaying action goes farther to turn out the presence of fright in the bosom of the talker. He could see no other sensible class of action to take that would decide their love’s quandary but to stop it – with every bit small residuary hurting as possible. Simultaneously. the poet utilizations usually guiltless and customary descriptions in a manner that highlight the debasement of the state of affairs at manus. When Porphyria entered the bungalow. she â€Å"withdrew [ her ] dripping cloak and shawl. / and laid her dirty baseball mitts by† ( lines 11-12 ) . This comparatively common act reveals something greater about the state of affairs. When she came out of the dark stormy dark and took off her cloak. she finally opens herself up wholly to her lover. but the soil on her baseball mitts indicate something is incorrect. something dark about their yesteryear. Even more. this act shows the parturiency placed upon her from the outside world’s letdown ; nevertheless. with him. she feels comfy and trusts him wholly. This is all boding to the horrific events yet to take topographic point and how their â€Å"struggling passion† would shortly be relieved. The devices reveal the backwards ethical motives of the verse form. the result of ill-destined love. and the fatal change of human behaviour when tainted by passion and clouded with fright. The thrilling and changeless add-on of suspense along with the fade outing strength of the secret plan achieves the poet’s end of making a spectacularly cliff-hanging rendering of a love narrative.

Wednesday, November 6, 2019

Bach essays

Bach essays Bachs Concerto for Harpsichord exhibits many features that are common in the first movements of Classical concerto forms. The movement begins with an orchestral exposition, all in tonic, in which a soft opening theme leads to a transitional tutti in measure 12. A light cadential theme is then heard from the orchestra, followed by a closing tutti in measure 24-43. The soloist then restates this in embellished form, being joined occasionally by the orchestra in measures 44-58, embroidering the transitional tutti with runs and turns as seen in measures 59-71, and then introducing a secondary theme on the dominant in measure 71. The light cadential theme of the orchestral exposition (measure 25) fuels an imaginatively elaborated closing section, in measures 85-105, to which the earlier closing tutti adds a final mark of punctuation in measure 106-114. Here, instead of developing these ideas as in a normal classical concerto, Bach plays on different tonal levels with a new idea intr oduced by the keyboard. In measure 146, the recapitulation is dominated by the solo instrument, omitting the keyboards second theme, and going directly from the now familiar transitional tutti to the graceful closing theme in measure 171. This is done nicely to extend to reach the six-four chord that announces the cadenza seen in measure 191, after which the closing tutti energetically ends the movement. This was a blend of the ritornello-solo structure of the Baroque concerto and the formal exposition, elaboration or excursion, and recapitulation of the symphonic allegro. The tutti now has discrete functions within a deliberate scheme of thematic and tonal contrast, and the solos, though still free and fanciful, are anchored in the principal thematic substance. (NAWM pg. 92) ...

Monday, November 4, 2019

Explain why and how firms become multinational enterprises Essay

Explain why and how firms become multinational enterprises - Essay Example re than one country and so linked that they may co-ordinate their operations in various ways† (OECDS, 2008, p.12) It is the most common way among several by which foreign direct investments are transmitted outward by the home country, or invested inward into the host country. At times multinational firms are described in terms of equity proportion; some jurisdictions peg a multinational as one whose voting rights are 10% owned and controlled by a foreign entity; other dispensations say 50%. The OECD definition is thus an interesting one in that it specified no ownership proportion, but stresses the operational link among internationally engaged organizations in different countries. These internationally engaged firms are systematically different from those domestically oriented; they are as a rule larger and have a more complex organizational structure and processes. Multinationals are thus more complex to manage (Yeaple, 2009). A multinational enterprise (MNE) is, simply put, a business organization the operations of which spans different countries and is intricately linked to its subsidiaries or other subsidiaries of the same mother firm. Therefore, what then makes a firm into an MNE is the nature of its activities, that its activities are geographically expanded across borders under a common ownership. There are times when a stage of the firm’s operations is intended to be performed in another country, for any number of reasons such as greater cost-effectiveness or locating closer to raw material or human resources. But rather than outsourcing that stage of operations to another, domestic, firm, the company instead sets up its own subsidiary or unit in that country to perform that stage of the operations. There are several ways how a company can internationalize its operations: In all these methods, a substantial amount of long-term funds is committed in the productive activity, which infusion is called the foreign direct investment, or FDI. Forms

Friday, November 1, 2019

Personal Statement Example | Topics and Well Written Essays - 500 words - 6

Personal Statement Example way of life is found to be intriguing and offers vast opportunities for a career path with potentials for personal and professional growth on a more holistic and multidisciplinary perspective. Natural science is more than a good choice. It is a dynamic and contemporarily relevant discipline that pervades various facets of human life. It is a broad based science education and will provide me with the theoretical foundation to be an instrumental contributor as a competent and qualified worker for future employers. I look forward to being a proactive citizen of the human race that is committed to protect, preserve and ensure sustainability of the natural resources of the environment. As one of my research findings revealed, natural science provides an integrated, quantitative, and interdisciplinary approach to the study of environmental systems. As I have been made aware, there are diverse disciplines within the Natural Science course that interested students can specialize in. I am actually interested in all disciplines as they are all interconnected and could provide the more holistic and comprehensive development of knowledge and abilities, if taken in its entirety. As a potential candidate for the position in future organizations that have core competencies and requirements for graduates from the Natural Science course, I have envisioned to begin as an environmental technician - gaining hands on field experience, leading to field supervisor or site foreman. I plan to utilize my quantitative and analytical abilities gained as an auditor; my communication and management skills gained as an accountant; and interpersonal skills gained as a floor coverer. Majoring in Bachelor of Science in Natural Science by August, 2011 would enable me to obtain a solid foundation and reinforced understanding of the diverse principles and potential relevant applications of environmental science in our contemporary times and in addressing environmental problems in the future. The